1908 results (14.6ms) page 11 / 96
onewave-ai / claude-skills-deal-review-framework exact

Structured deal assessment using MEDDIC, BANT. Risk scoring, required evidence by stage, red flag detection, coaching points.

TaylorHuston / local-life-manager-critique exact

Challenge idea assumptions with skeptical VC-style evaluation. Use when user requests critique, validation, or 'is this a good idea' assessment.

dkyazzentwatwa / chatgpt-skills-data-quality-auditor exact

Assess data quality with checks for missing values, duplicates, type issues, and inconsistencies. Use for data validation, ETL pipelines, or dataset documentation.

dirnbauer / webconsulting-skills-security-audit exact

Security audit patterns for PHP/OWASP. Use when conducting security assessments, identifying vulnerabilities (XXE, SQL injection, XSS), or CVSS scoring.

BrownFineSecurity / iothackbot-onvifscan exact

ONVIF device security scanner for testing authentication and brute-forcing credentials. Use when you need to assess security of IP cameras or ONVIF-enabled devices.

netresearch / security-audit-skill-security-audit exact

Agent Skill: Security audit patterns for PHP/OWASP. Use when conducting security assessments, identifying vulnerabilities (XXE, SQL injection, XSS), or CVSS scoring. By Netresearch.

RefoundAI / lenny-skills-evaluating-new-technology exact

Help users evaluate emerging technologies. Use when someone is assessing new tools, making build vs buy decisions, evaluating AI vendors, or deciding on technical architecture.

404kidwiz / agent-skills-backup-security-scanning-security-dependencies exact

You are a security expert specializing in dependency vulnerability analysis, SBOM generation, and supply chain security. Scan project dependencies across ecosystems to identify vulnerabilities,...

halay08 / fullstack-agent-skills-security-scanning-security-dependencies exact

You are a security expert specializing in dependency vulnerability analysis, SBOM generation, and supply chain security. Scan project dependencies across ecosystems to identify vulnerabilities,...

rmyndharis / antigravity-skills-security-scanning-security-dependencies exact

You are a security expert specializing in dependency vulnerability analysis, SBOM generation, and supply chain security. Scan project dependencies across ecosystems to identify vulnerabilities,...

shipshitdev / library-scale-validator exact

Use this skill when users need to validate if their business can scale, stress-test their model, or assess bottlenecks. Activates for "can this scale," "validate my business model," "what's my...

aj-geddes / useful-ai-prompts-code-metrics-analysis exact

Analyze code complexity, cyclomatic complexity, maintainability index, and code churn using metrics tools. Use when assessing code quality, identifying refactoring candidates, or monitoring technical debt.

NTCoding / claude-skillz-confidence-honesty exact

Force honest confidence assessment before claiming conclusions. Triggers on 'root cause identified', 'problem identified', 'complete clarity'. Express confidence as percentage, explain what's...

RefoundAI / lenny-skills-measuring-product-market-fit exact

Help users assess and achieve product-market fit. Use when someone is trying to determine if they have PMF, measuring user engagement and retention, running the Sean Ellis survey, or figuring out...

BrownFineSecurity / iothackbot-iotnet exact

IoT network traffic analyzer for detecting IoT protocols and identifying security vulnerabilities in network communications. Use when you need to analyze network traffic, identify IoT protocols,...

404kidwiz / agent-skills-backup-threat-modeling-expert exact

Expert in threat modeling methodologies, security architecture review, and risk assessment. Masters STRIDE, PASTA, attack trees, and security requirement extraction. Use for security architecture...

rmyndharis / antigravity-skills-threat-modeling-expert exact

Expert in threat modeling methodologies, security architecture review, and risk assessment. Masters STRIDE, PASTA, attack trees, and security requirement extraction. Use for security architecture...

halay08 / fullstack-agent-skills-threat-modeling-expert exact

Expert in threat modeling methodologies, security architecture review, and risk assessment. Masters STRIDE, PASTA, attack trees, and security requirement extraction. Use for security architecture...

proffesor-for-testing / agentic-qe-mutation-testing exact

Test quality validation through mutation testing, assessing test suite effectiveness by introducing code mutations and measuring kill rate. Use when evaluating test quality, identifying weak...

Smana / cloud-native-ref-improve-pr exact

Comprehensive PR analysis with security review, code quality assessment, and automatic improvements. Use when reviewing PRs for security issues, performance optimizations, or best practices...