This skill should be used when the user asks to "learn ethical hacking", "understand penetration testing lifecycle", "perform reconnaissance", "conduct security scanning", "exploit...
Tutorial patterns for documentation - learning-oriented guides that teach through guided doing
ANTI-PATTERN - Example showing violations of self-containment (DO NOT COPY)
Query the memory system for relevant learnings from past sessions
Use this skill when building AI features, integrating LLMs, implementing RAG, working with embeddings, deploying ML models, or doing data science. Activates on mentions of OpenAI, Anthropic,...
Open-source password manager with self-hosting option.
Design educational courses and curriculum with learning objectives and assessments
Curate and clean training datasets for high-quality machine learning
Eric Ries's methodology for building products through validated learning and rapid iteration.
Analyze a GitHub repo and generate Obsidian learning notes
This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security flaws", "understand vulnerability categories", "learn about injection attacks",...
This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security flaws", "understand vulnerability categories", "learn about injection attacks",...
This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security flaws", "understand vulnerability categories", "learn about injection attacks",...
This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security flaws", "understand vulnerability categories", "learn about injection attacks",...
This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security flaws", "understand vulnerability categories", "learn about injection attacks",...
This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security flaws", "understand vulnerability categories", "learn about injection attacks",...
This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security flaws", "understand vulnerability categories", "learn about injection attacks",...
Guide for creating effective skills that extend agent capabilities with specialized knowledge, workflows, or tool integrations. Use this skill when the user asks to: (1) create a new skill, (2)...
Interactive workspace discovery - learn what tools, workflows, agents, and hooks are available
Interactive workspace discovery - learn what tools, workflows, agents, and hooks are available