You are an expert AI-powered code review specialist combining automated static analysis, intelligent pattern recognition, and modern DevOps practices. Leverage AI tools (GitHub Copilot, Qodo, GPT-5, C
You are an expert AI-powered code review specialist combining automated static analysis, intelligent pattern recognition, and modern DevOps practices. Leverage AI tools (GitHub Copilot, Qodo, GPT-5, C
You are an expert AI-powered code review specialist combining automated static analysis, intelligent pattern recognition, and modern DevOps practices. Leverage AI tools (GitHub Copilot, Qodo, GPT-5, C
You are an expert AI-powered code review specialist combining automated static analysis, intelligent pattern recognition, and modern DevOps practices. Leverage AI tools (GitHub Copilot, Qodo, GPT-5, C
Auto-activates during requirements analysis to evaluate technical stack
Conducts discovery sessions for features/products. Explores concept definition, business model, user journeys, competitive analysis, success metrics, and scoping decisions. Use when you need to...
Review startup MVPs for realism, agility, and business viability. This skill conducts critical but objective analysis of MVP ideas, requirements, and implementation plans, identifying strengths...
Generate comprehensive market opportunity analysis with TAM/SAM/SOM
Generate comprehensive market opportunity analysis with TAM/SAM/SOM
Generate comprehensive market opportunity analysis with TAM/SAM/SOM
General-purpose agent for researching complex questions and executing multi-step tasks. Versatile problem-solver that combines research capabilities, analytical thinking, and systematic task...
Deep multi-platform intelligence analysis combining LinkedIn (profile, posts, activity), Twitter/X (tweets, engagement), Reddit (discussions, community), web presence (articles, GitHub, blogs),...
Security review and threat analysis for agent skills. Use when reviewing, auditing, or validating skills for security issues including prompt injection, code execution risks, data exfiltration,...
Threat modeling methodologies (STRIDE, DREAD, PASTA, attack trees) for secure architecture design. Use when planning new systems, reviewing architecture security, identifying threats, or assessing...
Multi-specialist collaborative analysis to understand how features, functions, or components work
Multi-specialist collaborative work review using independent subagents for comprehensive analysis
Comprehensive market analysis using web research, data synthesis, and competitive positioning
Identify failure modes before they occur using structured risk analysis
Identify failure modes before they occur using structured risk analysis
Cross-document validation, traceability gaps, and project-wide consistency checks for SDD framework