10460 results (85.8ms) page 21 / 523
astronomer / agents-debugging-dags exact

Comprehensive DAG failure diagnosis and root cause analysis. Use for complex debugging requests requiring deep investigation like "diagnose and fix the pipeline", "full root cause analysis", "why...

tanweai / wooyun-legacy exact

WooYun漏洞分析专家系统。基于88,636个真实漏洞案例提炼的元思考方法论、测试流程、利用技巧、绕过方法。覆盖SQL注入、XSS、命令执行、逻辑漏洞、文件上传、未授权访问等主要漏洞类型。当用户进行漏洞挖掘、渗透测试、安全审计、代码审计时触发。

omer-metin / skills-for-antigravity-climate-modeling exact

Work with climate data, models, and projections for climate impact assessment, downscaling, and scenario analysis using CMIP6 and other climate datasets. Use when "climate model, climate...

astronomer / agents-profiling-tables exact

Deep-dive data profiling for a specific table. Use when the user asks to profile a table, wants statistics about a dataset, asks about data quality, or needs to understand a table's structure and...

synaptiai / agent-capability-standard-gap-analysis-workflow exact

Identify capability gaps and propose new skills with prioritization. Use when analyzing missing capabilities, planning skill development, performing ontology expansion, or assessing coverage.

vaex 0.00
jackspace / claudeskillz-vaex exact

Use this skill for processing and analyzing large tabular datasets (billions of rows) that exceed available RAM. Vaex excels at out-of-core DataFrame operations, lazy evaluation, fast...

fangfang023 / claude-agent-orchestrator-patent-business-analysis exact

生成技术交底书的商业价值评估与专利布局分析报告。聚焦**战略决策**:要不要申请专利?商业价值如何?专利布局优先级是什么?适用于技术交底书完成后的战略评估。不包含商标、版权等其他IP保护(请使用 ip-strategy)。

aj-geddes / useful-ai-prompts-data-replication-setup exact

Set up database replication for high availability and disaster recovery. Use when configuring master-slave replication, multi-master setups, or replication monitoring.

aj-geddes / useful-ai-prompts-code-metrics-analysis exact

Analyze code complexity, cyclomatic complexity, maintainability index, and code churn using metrics tools. Use when assessing code quality, identifying refactoring candidates, or monitoring technical debt.

rmyndharis / antigravity-skills-stride-analysis-patterns exact

Apply STRIDE methodology to systematically identify threats. Use when analyzing system security, conducting threat modeling sessions, or creating security documentation.

halay08 / fullstack-agent-skills-stride-analysis-patterns exact

Apply STRIDE methodology to systematically identify threats. Use when analyzing system security, conducting threat modeling sessions, or creating security documentation.

404kidwiz / agent-skills-backup-stride-analysis-patterns exact

Apply STRIDE methodology to systematically identify threats. Use when analyzing system security, conducting threat modeling sessions, or creating security documentation.