2670 results (21.9ms) page 11 / 134
aj-geddes / useful-ai-prompts-mobile-app-debugging exact

Debug issues specific to mobile applications including platform-specific problems, device constraints, and connectivity issues.

bear2u / my-skills-flutter-init exact

Use when user wants to create a new Flutter project (Todo/Habit/Note/Expense/Custom domain) with Clean Architecture, Riverpod 3.0, Drift, and modern Flutter stack

aj-geddes / useful-ai-prompts-database-monitoring exact

Monitor database performance and health. Use when setting up monitoring, analyzing metrics, or troubleshooting database issues.

RefoundAI / lenny-skills-writing-prds exact

Help users write effective PRDs. Use when someone is documenting product requirements, preparing specs for engineering, writing feature briefs, or defining what to build for their team.

czlonkowski / n8n-skills-n8n-expression-syntax exact

Validate n8n expression syntax and fix common errors. Use when writing n8n expressions, using {{}} syntax, accessing $json/$node variables, troubleshooting expression errors, or working with...

ovachiever / droid-tings-n8n-expression-syntax exact

Validate n8n expression syntax and fix common errors. Use when writing n8n expressions, using {{}} syntax, accessing $json/$node variables, troubleshooting expression errors, or working with...

eugenepyvovarov / mcpbundler-agent-skills-marketplace-n8n-expression-syntax exact

Validate n8n expression syntax and fix common errors. Use when writing n8n expressions, using {{}} syntax, accessing $json/$node variables, troubleshooting expression errors, or working with...

eddiebe147 / claude-settings-monitoring-setup exact

Expert guide for setting up monitoring dashboards, alerting, metrics collection, and observability. Use when implementing application monitoring, setting up alerts, or building dashboards.

Cap-go / capacitor-skills-capacitor-security exact

Comprehensive security guide for Capacitor apps using Capsec scanner. Covers 63+ security rules across secrets, storage, network, authentication, cryptography, and platform-specific...

ovachiever / droid-tings-billing-automation exact

Build automated billing systems for recurring payments, invoicing, subscription lifecycle, and dunning management. Use when implementing subscription billing, automating invoicing, or managing...

erichowens / some-claude-skills-crisis-detection-intervention-ai exact

Detect crisis signals in user content using NLP, mental health sentiment analysis, and safe intervention protocols. Implements suicide ideation detection, automated escalation, and crisis resource...

charlietlamb / ferix-convex-cron-jobs exact

Scheduled function patterns for background tasks including interval scheduling, cron expressions, job monitoring, retry strategies, and best practices for long-running tasks

waynesutton / convexskills-convex-cron-jobs exact

Scheduled function patterns for background tasks including interval scheduling, cron expressions, job monitoring, retry strategies, and best practices for long-running tasks

mhylle / claude-skills-collection-implement-phase exact

Execute a single phase from an implementation plan with all quality gates. This skill is the unit of work for implement-plan, handling implementation, verification, code review, ADR compliance,...

Mrc220 / agent-flywheel-clawdbot-skills-and-integrations-agent-swarm-workflow exact

Jeffrey Emanuel's multi-agent implementation workflow using NTM, Agent Mail, Beads, and BV. The execution phase that follows planning and bead creation. Includes exact prompts used.

Dicklesworthstone / agent-flywheel-clawdbot-skills-and-integrations-agent-swarm-workflow exact

Jeffrey Emanuel's multi-agent implementation workflow using NTM, Agent Mail, Beads, and BV. The execution phase that follows planning and bead creation. Includes exact prompts used.

zaferayan / skills exact

Expo React Native mobile app development with RevenueCat payments, AdMob ads, i18n localization, onboarding flow, paywall, and NativeTabs navigation

charlietlamb / ferix-convex-security-audit exact

Deep security review patterns for authorization logic, data access boundaries, action isolation, rate limiting, and protecting sensitive operations

zartin790 / llm-system-template-agents-skills-patterns-tools-prompts-testing-skills-with-subagents exact

Use when creating or editing skills, before deployment, to verify they