Build Retrieval-Augmented Generation (RAG) systems for LLM applications with vector databases and semantic search. Use when implementing knowledge-grounded AI, building document Q&A systems, or...
Comprehensive checklist for conducting thorough code reviews covering functionality, security, performance, and maintainability
Comprehensive checklist for conducting thorough code reviews covering functionality, security, performance, and maintainability
Systematic improvement of existing agents through performance analysis, prompt engineering, and continuous iteration.
Systematic improvement of existing agents through performance analysis, prompt engineering, and continuous iteration.
Comprehensive checklist for conducting thorough code reviews covering functionality, security, performance, and maintainability
Comprehensive checklist for conducting thorough code reviews covering functionality, security, performance, and maintainability
Comprehensive checklist for conducting thorough code reviews covering functionality, security, performance, and maintainability
Comprehensive checklist for conducting thorough code reviews covering functionality, security, performance, and maintainability
Comprehensive checklist for conducting thorough code reviews covering functionality, security, performance, and maintainability
Comprehensive checklist for conducting thorough code reviews covering functionality, security, performance, and maintainability
Systematic improvement of existing agents through performance analysis, prompt engineering, and continuous iteration.
Systematic improvement of existing agents through performance analysis, prompt engineering, and continuous iteration.
Essential patterns, idioms, and gotchas for writing Nushell code. Use when writing Nushell scripts, functions, or working with Nushell's type system, pipelines, and data structures. Complements...
Implement static code analysis with linters, formatters, and security scanners to catch bugs early. Use when enforcing code standards, detecting security vulnerabilities, or automating code review.
This skill should be used when the user asks to "pentest AWS", "test AWS security", "enumerate IAM", "exploit cloud infrastructure", "AWS privilege escalation", "S3 bucket testing", "metadata...
This skill should be used when the user asks to "pentest AWS", "test AWS security", "enumerate IAM", "exploit cloud infrastructure", "AWS privilege escalation", "S3 bucket testing", "metadata...
This skill should be used when the user asks to "pentest AWS", "test AWS security", "enumerate IAM", "exploit cloud infrastructure", "AWS privilege escalation", "S3 bucket testing", "metadata...
This skill should be used when the user asks to "pentest AWS", "test AWS security", "enumerate IAM", "exploit cloud infrastructure", "AWS privilege escalation", "S3 bucket testing", "metadata...
This skill should be used when the user asks to "pentest AWS", "test AWS security", "enumerate IAM", "exploit cloud infrastructure", "AWS privilege escalation", "S3 bucket testing", "metadata...