Expert in building voice AI applications - from real-time voice agents to voice-enabled apps. Covers OpenAI Realtime API, Vapi for voice agents, Deepgram for transcription, ElevenLabs for...
Autonomous AI agent platform for building and deploying continuous agents. Use when creating visual workflow agents, deploying persistent autonomous agents, or building complex multi-step AI...
AI-powered copywriting and content generation.
Execute test suites with proper configuration, parallel execution, and
|
Test-Driven Development (TDD Red-Green-Refactor)
Generate test scaffolding for modules with proper structure, fixtures,
Testing patterns and principles. Unit, integration, mocking strategies.
Orchestrate autonomous AI development with task-based workflow and QA gates
Write integration tests using TestContainers for .NET with xUnit. Covers infrastructure testing with real databases, message queues, and caches in Docker containers instead of mocks.
This skill should be used when the user asks to "set up a web server", "configure HTTP or HTTPS", "perform SNMP enumeration", "configure SMB shares", "test network services", or needs guidance on...
This skill should be used when the user asks to "set up a web server", "configure HTTP or HTTPS", "perform SNMP enumeration", "configure SMB shares", "test network services", or needs guidance on...
Runs mandatory quality checks before commits. Executes build, tests, and pattern validation from code-review-standards.md. Use when ready to commit code or when asked to verify code quality meets...
AI Resume Forge is a resilient, enterprise-grade tool that optimizes resumes for Applicant Tracking Systems (ATS). Powered by Googleβs Gemini AI with "auto-switch" failover technology, it analyzes...
AI meeting transcription and note-taking assistant.
AI SDK 6 Beta overview, agents, tool approval, Groq (Llama), and Vercel AI Gateway. Key breaking changes from v5 and new patterns.
This skill should be used when the user asks to "escalate privileges", "get root access", "become administrator", "privesc techniques", "abuse sudo", "exploit SUID binaries", "Kerberoasting",...
This skill should be used when the user asks to "escalate privileges on Windows," "find Windows privesc vectors," "enumerate Windows for privilege escalation," "exploit Windows misconfigurations,"...
Complementary health reference - evidence-based information on holistic wellness practices as complementary to conventional medicine
>