5438 results (58.0ms) page 50 / 272
bgauryy / octocode-mcp-octocode-research exact

This skill should be used when the user asks to "research code", "how does X work", "where is Y defined", "who calls Z", "trace code flow", "find usages", "review a PR", "explore this library",...

jackspace / claudeskillz-hypogenic exact

Automated hypothesis generation and testing using large language models. Use this skill when generating scientific hypotheses from datasets, combining literature insights with empirical data,...

ovachiever / droid-tings-hypogenic exact

Automated hypothesis generation and testing using large language models. Use this skill when generating scientific hypotheses from datasets, combining literature insights with empirical data,...

julianobarbosa / claude-code-skills-holmesgpt-skill exact

Guide for implementing HolmesGPT - an AI agent for troubleshooting cloud-native environments. Use when investigating Kubernetes issues, analyzing alerts from Prometheus/AlertManager/PagerDuty,...

ratacat / claude-skills-ts-morph-analyzer exact

Use when debugging TypeScript/JavaScript bugs by tracing call chains, understanding unfamiliar codebases quickly, making architectural decisions, or reviewing code quality. Extract function...

omer-metin / skills-for-antigravity-risk-management-trading exact

Master of capital preservation and position sizing - combining Kelly Criterion, volatility targeting, correlation analysis, and drawdown management to survive and thrive in marketsUse when "risk...

fangfang023 / claude-agent-orchestrator-patent-ip-strategy exact

生成综合知识产权保护策略。聚焦**执行方案**:全方位IP保护如何实施?包含专利、商标、版权、商业秘密、侵权防控、海外布局6大模块的可落地方案。适用于已确定需要IP保护后的实施规划。战略价值评估请使用 business-analysis。

ryanthedev / code-foundations-aposd-simplifying-complexity exact

Simplify complex code through the Error Reduction Hierarchy: Define out > Mask > Aggregate > Crash. Use when code is too complex, has scattered error handling, configuration explosion, or callers...

aj-geddes / useful-ai-prompts-log-aggregation exact

Implement centralized logging with ELK Stack, Loki, or Splunk for log collection, parsing, storage, and analysis across infrastructure.

hardw00t / ai-security-arsenal-container-security exact

Container and Kubernetes security assessment skill for Docker, Kubernetes, and container orchestration platforms. This skill should be used when scanning container images for vulnerabilities,...

jackspace / claudeskillz-astropy exact

Comprehensive Python library for astronomy and astrophysics. This skill should be used when working with astronomical data including celestial coordinates, physical units, FITS files, cosmological...

ovachiever / droid-tings-astropy exact

Comprehensive Python library for astronomy and astrophysics. This skill should be used when working with astronomical data including celestial coordinates, physical units, FITS files, cosmological...

onewave-ai / claude-skills-tax-strategy-optimizer exact

Pre-tax vs Roth analysis, charitable giving optimization, capital gains timing, deduction maximization. Not a substitute for CPA.

DauQuangThanh / hanoi-rainbow-cobol-migration-analyzer exact

Analyzes legacy COBOL programs and JCL jobs to assist with migration to modern Java applications. Extracts business logic, identifies dependencies, generates migration reports, and creates Java...

mrgoonie / claudekit-skills-debugging exact

Systematic debugging frameworks for finding and fixing bugs - includes root cause analysis, defense-in-depth validation, and verification protocols

cnp762 / agent-skills-systematic-debugging exact

4-phase systematic debugging methodology with root cause analysis and evidence-based verification. Use when debugging complex issues.

DauQuangThanh / hanoi-rainbow-pli-migration-analyzer exact

Analyzes legacy PL/I (Programming Language One) programs to assist with migration to modern Java applications. Extracts business logic, data structures, procedure definitions, and file operations...

DonTizi / codegeass-security-audit exact

Deep security analysis of codebase. Checks for OWASP vulnerabilities, secrets exposure, and insecure patterns. Use for comprehensive security reviews.