346 results (5.3ms) page 14 / 18
cosmix / loom-dependency-scan exact

Scans project dependencies for known vulnerabilities, outdated packages, and license compliance issues. Supports vulnerability scanning (CVE detection), SBOM generation, license compliance...

aj-geddes / useful-ai-prompts-azure-functions exact

Create serverless functions on Azure with triggers, bindings, authentication, and monitoring. Use for event-driven computing without managing infrastructure.

yanko-belov / code-craft-error-boundaries exact

Use when deciding where to catch errors. Use when errors propagate too far or not far enough. Use when designing component/service isolation.

aj-geddes / useful-ai-prompts-serverless-architecture exact

Design and implement serverless applications using AWS Lambda, Azure Functions, and GCP Cloud Functions with event-driven patterns and orchestration.

itsAR-VR / goatedskills-qa-regression exact

Automate QA regression testing with reusable test skills. Create login flows, dashboard checks, user creation, and other common test scenarios that run consistently.

ngxtm / devkit-qa-regression exact

Automate QA regression testing with reusable test skills. Create login flows, dashboard checks, user creation, and other common test scenarios that run consistently.

skillcreatorai / ai-agent-skills-qa-regression exact

Automate QA regression testing with reusable test skills. Create login flows, dashboard checks, user creation, and other common test scenarios that run consistently.

dparedesi / agent-global-skills-cli-onboarding exact

Production-ready first-time user experience patterns for CLI tools including setup wizards, first-run detection, doctor/diagnostic commands, actionable error messages, edge case handling, and...

404kidwiz / claude-supercode-skills-chaos-engineer exact

Expert in resilience testing, fault injection, and building anti-fragile systems using controlled experiments.

netsapiensis / claude-code-skills-rocky-foundation exact

Shared conventions, OS detection, and safety model for Rocky Linux 8/9 system administration. This skill is automatically referenced by all other rocky-* skills. Use when performing any sysadmin...

austintgriffith / ethereum-wingman-ethereum-wingman exact

Ethereum development tutor and builder for Scaffold-ETH 2 projects. Triggers on "build", "create", "dApp", "smart contract", "Solidity", "DeFi", "Ethereum", "web3", or any blockchain development...

daffy0208 / ai-dev-standards-deployment-advisor exact

Choose deployment strategy and infrastructure. Use when deciding where to deploy applications, setting up CI/CD, or configuring production environments. Covers Vercel, Railway, AWS, Cloudflare...

questfortech-investments / claude-code-skills-github-expert exact

Complete GitHub expertise covering GitHub Actions, CI/CD workflows, automation, repository management, and best practices. Use when setting up GitHub Actions, creating workflows, managing pull...

aj-geddes / useful-ai-prompts-vulnerability-scanning exact

Automated vulnerability detection using OWASP tools, CVE databases, and security scanners. Use when performing security audits, compliance checks, or continuous security monitoring.

wshobson / agents-k8s-manifest-generator exact

Create production-ready Kubernetes manifests for Deployments, Services, ConfigMaps, and Secrets following best practices and security standards. Use when generating Kubernetes YAML manifests,...

aj-geddes / useful-ai-prompts-database-backup-restore exact

Implement backup and restore strategies for disaster recovery. Use when creating backup plans, testing restore procedures, or setting up automated backups.

ngxtm / devkit-ethical-hacking-methodology exact

This skill should be used when the user asks to "learn ethical hacking", "understand penetration testing lifecycle", "perform reconnaissance", "conduct security scanning", "exploit...

zebbern / claude-code-guide-ethical-hacking-methodology exact

This skill should be used when the user asks to "learn ethical hacking", "understand penetration testing lifecycle", "perform reconnaissance", "conduct security scanning", "exploit...