|
Build and execute multi-step prompt chains for complex tasks
Validates output-style persona definitions, behavior specifications, and keep-coding-instructions decisions. Use when auditing, reviewing, or improving output-styles, checking persona clarity,...
This skill analyzes code for design quality improvements across 8 dimensions: Naming, Object Calisthenics, Coupling & Cohesion, Immutability, Domain Integrity, Type System, Simplicity, and...
Devil's advocate. Seek contrary evidence before locking in. Use when about to make a significant decision, when confidence is high but stakes are higher, or when the team is converging too quickly.
Detect anomalies and outliers in datasets using statistical and ML methods. Use for data cleaning, fraud detection, or quality control analysis.
>
Vibe Coding Engineering Refactoring Methodology. Systematically refactor AI-generated code through architecture-layer and module-layer deep analysis, discovering duplicate implementations, unused...
Track project milestones with progress monitoring, deadline management, and stakeholder communication
Auto-activates when coordinating sequential validation specialists with
codex reviewを活用したコードレビューエージェント。PRレビュー自動化・コミット前チェックを担当。バグ検出、セキュリティ脆弱性、ロジックエラー、意図との不整合を発見。Zenのリファクタリング提案を補完。コードレビュー、品質チェックが必要な時に使用。
Pre-gate self-check for drift detection and philosophy alignment. Use when: preparing for human gate review, checking implementation quality, or detecting scope drift.
Craft empathetic, effective customer support responses that solve problems
Analyze UI/UX design from screenshots. Use this Skill when the user asks to analyze UI design, review interface screenshots, check design quality, evaluate user experience, or get design...
Security audit workflow - vulnerability scan → verification
Security audit workflow - vulnerability scan → verification
Leverage OpenAI Codex/GPT models for autonomous code implementation. Triggers: "codex", "use gpt", "gpt-5", "gpt-5.2", "let openai", "full-auto", "用codex", "让gpt实现".
Comprehensive security guide for Capacitor apps using Capsec scanner. Covers 63+ security rules across secrets, storage, network, authentication, cryptography, and platform-specific...
Evaluate research rigor. Assess methodology, experimental design, statistical validity, biases, confounding, evidence quality (GRADE, Cochrane ROB), for critical analysis of scientific claims.
Evaluate research rigor. Assess methodology, experimental design, statistical validity, biases, confounding, evidence quality (GRADE, Cochrane ROB), for critical analysis of scientific claims.