Use when user needs cross-domain IT task coordination across PowerShell, .NET, infrastructure, Azure, and M365, especially for Windows environments preferring PowerShell automation.
Expert in browser automation using Chrome DevTools Protocol (CDP) and WebDriver. Specializes in secure web automation, testing, and scraping with proper credential handling, domain restrictions,...
Atomic commits, PR size limits, commit thresholds, stacked PRs
Design multi-agent architectures for complex tasks. Use when single-agent context limits are exceeded, when tasks decompose naturally into subtasks, or when specializing agents improves quality.
Design multi-agent architectures for complex tasks. Use when single-agent context limits are exceeded, when tasks decompose naturally into subtasks, or when specializing agents improves quality.
Design multi-agent architectures for complex tasks. Use when single-agent context limits are exceeded, when tasks decompose naturally into subtasks, or when specializing agents improves quality.
This skill should be used when the user asks to "design multi-agent system", "implement supervisor pattern", "create swarm architecture", "coordinate multiple agents", or mentions multi-agent...
This skill should be used when the user asks to "design multi-agent system", "implement supervisor pattern", "create swarm architecture", "coordinate multiple agents", or mentions multi-agent...
This skill should be used when the user asks to "design multi-agent system", "implement supervisor pattern", "create swarm architecture", "coordinate multiple agents", or mentions multi-agent...
Detects fabricated content, false citations, and unverifiable claims in agent outputs. Uses source verification and consistency checking. Activate on 'detect hallucination', 'fact check', 'verify...
Guidelines for developing with Sequelize, a promise-based Node.js ORM supporting PostgreSQL, MySQL, MariaDB, SQLite, and SQL Server
Implement Zero Trust security model with identity verification, microsegmentation, least privilege access, and continuous monitoring. Use when building secure cloud-native applications.
Define KPIs, build performance dashboards, track metrics, and drive data-driven decisions
Expert guide for creating Docker Compose configurations, Dockerfiles, and container orchestration. Use when containerizing applications, setting up development environments, or configuring...
ไฝฟ็จ Remotion ๅๆๆ็ป่ง้ขใๅฝ้่ฆๅฐ็ๅคดใๅฝๅฑใ้ ้ณใ็ๅฐพ็ปๅๆๅฎๆด่ง้ขๆถไฝฟ็จใๅ ๅซๅจ็ปๆๆใๆถ้ด็บฟ็ฎก็ใๅคๅฐบๅฏธๆจกๆฟๅๆ ้ๅค็ใ
Train Mixture of Experts (MoE) models using DeepSpeed or HuggingFace. Use when training large-scale models with limited compute (5ร cost reduction vs dense models), implementing sparse...
Train Mixture of Experts (MoE) models using DeepSpeed or HuggingFace. Use when training large-scale models with limited compute (5ร cost reduction vs dense models), implementing sparse...
Create user-centered, accessible interface copy (microcopy) for digital products including buttons, labels, error messages, notifications, forms, onboarding, empty states, success messages, and...
Threat modeling skill for identifying security threats, attack surfaces, and designing mitigations. This skill should be used when performing threat assessments using STRIDE, PASTA, or Attack...
Search the web using Google Gemini CLI with built-in Google Search grounding to find current documentation, best practices, solutions, and technical information. Use when the user needs to...