External research workflow for docs, web, APIs - NOT codebase exploration
External research workflow for docs, web, APIs - NOT codebase exploration
Research and strategize hashtag usage for maximum social media reach and discovery
Expert in infrastructure security, DevSecOps pipelines, and zero-trust architecture design.
Research agent for external documentation, best practices, and library APIs via MCP tools
Research agent for external documentation, best practices, and library APIs via MCP tools
Guidelines for implementing JWT authentication with security best practices for token creation, validation, and storage
Enables Claude to create, link, and query notes in Roam Research via Playwright MCP
Conduct qualitative user research, synthesize insights, and inform product decisions through interviews, usability testing, and behavioral analysis
Security hardening checklist and best practices for TYPO3 v13/v14 installations, covering configuration, file permissions, and common vulnerabilities.
Research topics and produce comprehensive written documentation. Synthesizes information into clear, well-structured, authoritative content pieces.
Expert in understanding user behaviors, needs, and motivations through qualitative and quantitative research methods to drive user-centered design.
Automated security validation for OWASP Top 10, CVE detection, and secrets scanning with confidence-scored vulnerability reports.
Deep research expert for comprehensive technical investigations. Use when conducting technology evaluations, comparing solutions, analyzing papers, or exploring technical trends.
Use when conducting web research with Perplexity API - covers authentication, search strategies, structured output generation, and integration patterns for Claude-interpretable results
Drupal security expertise. Auto-activates when writing forms, controllers, queries, or handling user input. Prevents XSS, SQL injection, and access bypass vulnerabilities.
Conduct user research and validation. Use when discovering user needs, validating assumptions, creating personas, or understanding pain points. Covers interviews, surveys, analysis, and synthesis.
Use this skill when adding authentication, handling user input, working with secrets, creating API endpoints, or implementing payment/sensitive features. Provides comprehensive security checklist...
OAuth 2.1 + JWT authentication security best practices. Use when implementing auth, API authorization, token management. Follows RFC 9700 (2025).
Use this skill when adding authentication, handling user input, working with secrets, creating API endpoints, or implementing payment/sensitive features. Provides comprehensive security checklist...