Full 5-layer analysis of a specific function. Use when debugging or deeply understanding code.
Use for ad campaign performance analysis, weekly trend reporting, data correlation, and actionable optimization insights.
Explore data lineage and dependencies. Handles "what depends on this table", "where does this data come from", "impact analysis", "upstream dependencies", "downstream consumers".
Automated analysis of patent claims for USPTO compliance with 35 USC 112(b) requirements - antecedent basis, definiteness, claim structure
This skill provides an advanced financial modeling suite with DCF analysis, sensitivity testing, Monte Carlo simulations, and scenario planning for investment decisions
Enables Claude to create and interact with NotebookLM for document analysis, audio overviews, and knowledge synthesis
Build NLP applications using transformers library, BERT, GPT, text classification, named entity recognition, and sentiment analysis
Debug network issues using browser tools and network analysis. Diagnose connection problems, latency, and data transmission issues.
Chain multiple operations together in pipelines. Use for multi-step workflows, combining research with analysis, and complex automated tasks.
'Comprehensive document creation, editing, and analysis with support
Analyzes and optimizes frontend performance using Core Web Vitals, bundle analysis, lazy loading, image optimization, and caching strategies
Expert in designing high-level enterprise solutions. Specializes in TOGAF adaptation, trade-off analysis, and aligning technology with business strategy.
Red team adversarial analysis to find weaknesses, vulnerabilities, and failure modes. Use before launches, for security review, or when a plan feels too perfect.
Plan and document family history research systematically. Structures genealogical research with proper citations, evidence analysis, and organized family records.
Expert performance optimizer using ALL MCP servers. Uses MongoDB for metrics, UltraThink for analysis, Memory for benchmarks, and search MCPs for optimization techniques.
Use when understanding legacy or undocumented systems, creating documentation for existing code, or extracting specifications from implementations. Invoke for legacy analysis, code archaeology,...
Use when understanding legacy or undocumented systems, creating documentation for existing code, or extracting specifications from implementations. Invoke for legacy analysis, code archaeology,...
Perform a non-destructive cross-artifact consistency and quality analysis across spec.md, plan.md, and tasks.md after task generation.
Security audit skill for detecting dangerous APIs, footgun patterns, and vulnerability variants. Use when reviewing code for security issues or doing variant analysis.
Fast delegation of large-context tasks to Gemini CLI via MCP when file size exceeds 100KB or task requires analysis/review.