11064 results (84.1ms) page 39 / 554
cto 0.00
escotilha / claude-kit-cto exact

Universal AI CTO advisor for any project. Provides full technical leadership: architecture, code quality, security, performance, and testing strategy. On first run, checks for cto-requirements.md...

aj-geddes / useful-ai-prompts-incident-response-plan exact

Create and execute incident response procedures for security breaches, data leaks, and cyber attacks. Use when handling security incidents, creating response playbooks, or conducting forensic analysis.

omer-metin / skills-for-antigravity-ai-agents-architect exact

Expert in designing and building autonomous AI agents. Masters tool use, memory systems, planning strategies, and multi-agent orchestration. Use when "build agent, AI agent, autonomous agent, tool...

lancenunes / codex-skills-regex-builder exact

Build, test, and explain regular expressions against sample text or files using CLI tools (rg, python) and specific regex flavors. Use when asked to craft, debug, or validate regexes or search patterns.

404kidwiz / agent-skills-backup-dependency-management-deps-audit exact

You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain security. Analyze project dependencies for known vulnerabilities, licensing...

shishiv / gsd-dependency-management-deps-audit exact

You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain security. Analyze project dependencies for known vulnerabilities, licensing...

halay08 / fullstack-agent-skills-dependency-management-deps-audit exact

You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain security. Analyze project dependencies for known vulnerabilities, licensing...

rmyndharis / antigravity-skills-dependency-management-deps-audit exact

You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain security. Analyze project dependencies for known vulnerabilities, licensing...

jackspace / claudeskillz-session-timeout-handler exact

Build timeout-resistant Claude Code workflows with chunking strategies, checkpoint patterns, progress tracking, and resume mechanisms to handle 2-minute tool timeouts and ensure reliable...

halay08 / fullstack-agent-skills-codebase-cleanup-deps-audit exact

You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain security. Analyze project dependencies for known vulnerabilities, licensing...

shishiv / gsd-codebase-cleanup-deps-audit exact

You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain security. Analyze project dependencies for known vulnerabilities, licensing...

rmyndharis / antigravity-skills-codebase-cleanup-deps-audit exact

You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain security. Analyze project dependencies for known vulnerabilities, licensing...

404kidwiz / agent-skills-backup-codebase-cleanup-deps-audit exact

You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain security. Analyze project dependencies for known vulnerabilities, licensing...

majiayu000 / claude-arsenal-zig-project exact

Modern Zig project architecture guide. Use when creating Zig projects (systems programming, CLI tools, game dev, high-performance services). Covers explicit allocators, comptime, error handling,...

jackspace / claudeskillz-biorxiv-database exact

Efficient database search tool for bioRxiv preprint server. Use this skill when searching for life sciences preprints by keywords, authors, date ranges, or categories, retrieving paper metadata,...

shishiv / gsd-stride-analysis-patterns exact

Apply STRIDE methodology to systematically identify threats. Use when analyzing system security, conducting threat modeling sessions, or creating security documentation.

halay08 / fullstack-agent-skills-stride-analysis-patterns exact

Apply STRIDE methodology to systematically identify threats. Use when analyzing system security, conducting threat modeling sessions, or creating security documentation.

rmyndharis / antigravity-skills-stride-analysis-patterns exact

Apply STRIDE methodology to systematically identify threats. Use when analyzing system security, conducting threat modeling sessions, or creating security documentation.

404kidwiz / agent-skills-backup-stride-analysis-patterns exact

Apply STRIDE methodology to systematically identify threats. Use when analyzing system security, conducting threat modeling sessions, or creating security documentation.

ngxtm / devkit-ui-design-system exact

UI design system toolkit for Senior UI Designer including design token generation, component documentation, responsive design calculations, and developer handoff tools. Use for creating design...