6800 results (55.2ms) page 52 / 340
shishiv / gsd-on-call-handoff-patterns exact

Master on-call shift handoffs with context transfer, escalation procedures, and documentation. Use when transitioning on-call responsibilities, documenting shift summaries, or improving on-call processes.

halay08 / fullstack-agent-skills-on-call-handoff-patterns exact

Master on-call shift handoffs with context transfer, escalation procedures, and documentation. Use when transitioning on-call responsibilities, documenting shift summaries, or improving on-call processes.

sickn33 / antigravity-awesome-skills-on-call-handoff-patterns exact

Master on-call shift handoffs with context transfer, escalation procedures, and documentation. Use when transitioning on-call responsibilities, documenting shift summaries, or improving on-call processes.

daffy0208 / ai-dev-standards-quality-auditor exact

Comprehensive quality auditing and evaluation of tools, frameworks, and systems against industry best practices with detailed scoring across 12 critical dimensions

martinholovsky / claude-skills-generator-cilium-expert exact

Expert in Cilium eBPF-based networking and security for Kubernetes. Use for CNI setup, network policies (L3/L4/L7), service mesh, Hubble observability, zero-trust security, and cluster-wide...

williamzujkowski / cognitive-toolworks-service-mesh-configurator exact

Configure service mesh (Istio, Linkerd, Consul) with traffic routing, mTLS, observability, and advanced traffic management for microservices.

halay08 / fullstack-agent-skills-vulnerability-scanner exact

Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.

ngxtm / devkit-vulnerability-scanner exact

Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.

cleodin / antigravity-awesome-skills-vulnerability-scanner exact

Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.

sickn33 / antigravity-awesome-skills-vulnerability-scanner exact

Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.

shishiv / gsd-vulnerability-scanner exact

Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.

cnp762 / agent-skills-vulnerability-scanner exact

Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.

404kidwiz / agent-skills-backup-vulnerability-scanner exact

Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.

istio 0.00
cosmix / loom-istio exact

Service mesh implementation with Istio for microservices traffic management, security, and observability. Use when implementing service mesh, mTLS, traffic routing, load balancing, circuit...

guptadeepak / auth-implementation-skill exact

Expert guidance for implementing secure authentication systems including OAuth 2.0, SAML, OIDC, JWT, passwordless authentication, passkeys, and biometrics. Covers protocol selection, security best...

ovachiever / droid-tings-opentargets-database exact

Query Open Targets Platform for target-disease associations, drug target discovery, tractability/safety data, genetics/omics evidence, known drugs, for therapeutic target identification.

jackspace / claudeskillz-opentargets-database exact

Query Open Targets Platform for target-disease associations, drug target discovery, tractability/safety data, genetics/omics evidence, known drugs, for therapeutic target identification.