Use when you've developed a broadly useful skill and want to contribute
'Comprehensive spreadsheet creation, editing, and analysis with support
Replace with description of the skill and when Claude should use it.
Use when creating new skills, editing existing skills, or verifying skills
Use when starting feature work that needs isolation from current workspace
A set of resources to help me write all kinds of internal communications,
Comprehensive guide for building high-performance Solana apps with MagicBlock Ephemeral Rollups. Use when you need sub-10ms latency, gasless transactions, or rollup architecture guidance.
Complete guide for MagicBlock Ephemeral Rollups - high-performance Solana execution with sub-10ms latency, gasless transactions, and Solana Plugins. Use when building real-time games,...
World-class application security - OWASP Top 10, secure coding patterns, and the battle scars from security incidents that could have been preventedUse when "security, secure, vulnerability,...
Expert game audio designer and implementer specializing in interactive sound design, adaptive music systems, spatial audio, and audio middleware integration. Brings deep knowledge of FMOD, Wwise,...
Help users design effective product onboarding. Use when someone is creating first-user experiences, trying to improve activation rates, designing the first 30 seconds of product usage, or working...
|
Generate images using Nano Banana Pro (Gemini 3 Pro Preview). Use when creating app icons, logos, UI graphics, marketing banners, social media images, illustrations, diagrams, or any visual...
Daily morning rollup of important emails and calendar events at 8am with AI-generated summaries
>
>
Implement security best practices across the application stack. Use when securing APIs, implementing authentication, preventing vulnerabilities, or conducting security reviews. Covers OWASP Top...
Validate WCAG 2.1 Level AA compliance and accessibility best practices.
Comprehensive security architecture combining threat modeling, security-first design, secure coding review, and compliance validation. Consolidated from threat-modeling, security-first-design,...
>