Automated security validation for OWASP Top 10, CVE detection, and secrets scanning with confidence-scored vulnerability reports.
Design Azure solutions across compute, storage, networking, and serverless with cost optimization, security hardening, and Framework alignment.
Everyday data transformations using functional patterns - arrays, objects, grouping, aggregation, and null-safe access
Step back, reflect on current work, validate direction and alignment. Use when complexity is increasing, feeling uncertain, before major decisions, or something feels off.
>
Access Pluralsight tech and creative courses for professionals
Expert in forecasting, signal detection, and market intelligence. Specializes in time-series analysis, social listening, and predictive modeling for business trends.
Use when modernizing legacy systems, implementing incremental migration strategies, or reducing technical debt. Invoke for strangler fig pattern, monolith decomposition, framework upgrades.
Use when modernizing legacy systems, implementing incremental migration strategies, or reducing technical debt. Invoke for strangler fig pattern, monolith decomposition, framework upgrades.
Comprehensive exam preparation strategies and materials. Creates study schedules, review sheets, practice tests, and identifies weak areas. Use when preparing for exams, creating study plans,...
Optimize landing pages for maximum conversion through copy, design, and UX improvements
Curate and clean training datasets for high-quality machine learning
Multi-specialist collaborative work review using independent subagents for comprehensive analysis
Anchor claims to evidence from authoritative sources. Use when validating assertions, establishing provenance, verifying facts, or ensuring claims are supported by evidence.
CVE vulnerability testing coordinator that identifies technology stacks, researches known vulnerabilities, and tests applications for exploitable CVEs using public exploits and proof-of-concept code.
Explains difficult concepts using master teaching methodologies (Feynman, Socratic, Cognitive Load, Dual Coding). Use when user asks to explain a concept, "I don't understand X", ELI5 requests,...
Expert payment integration specialist mastering payment gateway integration, PCI compliance, and financial transaction processing. Specializes in secure payment flows, multi-currency support, and...
Deep research expert for comprehensive technical investigations. Use when conducting technology evaluations, comparing solutions, analyzing papers, or exploring technical trends.
Expert payment integration specialist mastering payment gateway integration, PCI compliance, and financial transaction processing. Specializes in secure payment flows, multi-currency support, and...
Verify operating system hardening using CIS benchmarks with patch management, kernel hardening, and host-based firewall validation.