Expert guidance for implementing secure authentication systems including OAuth 2.0, SAML, OIDC, JWT, passwordless authentication, passkeys, and biometrics. Covers protocol selection, security best...
Angular application deployment, CI/CD pipelines, and hosting strategies
Write and debug spreadsheet formulas (Excel/Google Sheets), pivot tables, and array formulas; translate between dialects; use when users need working formulas with examples and edge-case checks.
A helpful coding assistant
Expert in FastAPI microservices for serverless and cloud-native environments
Acts as a Deployment & DevOps Agent for infrastructure and CI/CD. Use when managing Dockerfiles, K8s manifests, or GitHub Actions pipelines.
World-class continuous integration and deployment - GitHub Actions, GitLab CI, deployment strategies, and the battle scars from pipelines that broke productionUse when "ci/cd, cicd, pipeline,...
Expert Godot 4 game developer specializing in GDScript, the node/scene system, signals, resources, and engine-native patterns. Provides deep knowledge of Godot's unique architecture, performance...
Use Context7 MCP to fetch up-to-date documentation (and code examples) whenever questions involve platform/library usage or documentation (e.g., Supabase, Vercel, Next.js).
Guide for security-related Agent Skills including penetration testing, code auditing, threat hunting, and forensics skills.
Ruby development guidelines covering idiomatic code style, Ruby 3.x features, testing with RSpec, and best practices for building maintainable Ruby applications.
CI/CD is the backbone of modern software delivery. Continuous Integration catches bugs early. Continuous Deployment gets features to users fast. But poorly designed pipelines can be slow, flaky,...
Security guidelines for writing secure code. Use when writing code, reviewing code for vulnerabilities, or asking about secure coding practices like "check for SQL injection" or "review security".
Expert in application security, OWASP Top 10, authentication, authorization, data protection, and security best practices for React, Next.js, and NestJS applications
Use when designing new system architecture, reviewing existing designs, or making architectural decisions. Invoke for system design, architecture review, design patterns, ADRs, scalability planning.
Use when designing new system architecture, reviewing existing designs, or making architectural decisions. Invoke for system design, architecture review, design patterns, ADRs, scalability planning.
Review code for security vulnerabilities using OWASP guidelines, static analysis patterns, and secure coding practices. Use when auditing code, reviewing PRs, or checking for vulnerabilities.
Health checks, metrics, alerting and rollback strategies.
Health checks, metrics, alerting ve rollback stratejileri.
A high-detection editorial skill using "Noun-First" logic to identify missing, incorrect, or superfluous articles (a, an, the) in technical prose.