Red team tactics principles based on MITRE ATT&CK. Attack phases, detection evasion, reporting.
Red team tactics principles based on MITRE ATT&CK. Attack phases, detection evasion, reporting.
Decompose time series into trend, seasonal, and residual components. Use for forecasting, pattern analysis, and seasonality detection.
Do the work. Pre-flight, build, detect drift, salvage if needed. Use when you have a clear aim and are ready to implement.
Monitor model performance, detect data drift, concept drift, and anomalies in production using Prometheus, Grafana, and MLflow
Expert in detecting private information, secrets, API keys, credentials, and sensitive data in codebases before open sourcing
Automated security validation for OWASP Top 10, CVE detection, and secrets scanning with confidence-scored vulnerability reports.
Claude Code skill for detecting flaky test patterns that cause intermittent CI failures
Convert raw meeting notes to structured markdown or PDF with automatic section detection, action items extraction, and attendee parsing.
Detects violations of Clean Code principles and suggests refactorings. Use when reviewing code quality, improving readability, or refactoring methods, classes, and modules.
Split audio files by detecting silence gaps. Auto-segment podcasts into chapters, remove long silences, and export individual clips.
Implement computer vision tasks including image classification, object detection, segmentation, and pose estimation using PyTorch and TensorFlow
Remove telltale signs of AI-generated 'slop' writing from README files and documentation. Make your docs sound authentically human.
Remove telltale signs of AI-generated 'slop' writing from README files and documentation. Make your docs sound authentically human.
Detect and prevent state-visibility violations across execution contexts within a single transaction.
Run local safety scans on Agent Skills before publishing. Detects secrets, dangerous code patterns, and analyzes required permissions.
Automatically detects and documents user preferences, coding rules, and style guidelines when expressed during conversations
Implement comprehensive cloud security across AWS, Azure, and GCP with IAM, encryption, network security, compliance, and threat detection.
Detect and mask PII (names, emails, phones, SSN, addresses) in text and CSV files. Multiple masking strategies with reversible tokenization option.
Check work and detect drift before committing. A second opinion that catches misalignment early. Use at natural pause points, before PRs, or when something feels off.