Guide for graphics API hooking and rendering techniques for DirectX, OpenGL, and Vulkan. Use this skill when working with graphics hooks, overlay rendering, shader manipulation, or game rendering...
Electron patterns for LlamaFarm Desktop. Covers main/renderer processes, IPC, security, and packaging.
Centralized API key management from Access.txt
Core Supabase CLI, migrations, RLS, Edge Functions
Interactive skill creation wizard - guides through requirements gathering to create properly structured skills
Stripe Checkout, subscriptions, webhooks, customer portal
Remove unneeded Composer packages and assets to improve boot time, memory, and security surface
Real-time bidirectional communication with security focus on CSWSH prevention, authentication, and message validation
Firebase Firestore NoSQL patterns, real-time sync ve security rules rehberi.
Expert guidelines for Chrome extension development with Manifest V3, covering security, performance, and best practices
Implement service mesh (Istio, Linkerd) for service-to-service communication, traffic management, security, and observability.
Review code for quality, security, and best practices. Use when analyzing code, suggesting improvements, or conducting code reviews.
Guidelines for implementing Auth0 authentication with best practices for security, rules, actions, and SDK integration
Expert in RESTful API design, resource modeling, HTTP semantics, pagination, versioning, and secure API implementation
Automatically discover cryptography skills when working with encryption, TLS, certificates, PKI, and security
Configure Cross-Origin Resource Sharing (CORS) and security headers. Use for APIs accessed from browsers on different domains.
OpenAPI Specification (OAS 3.x): document structure, paths, operations, schemas, parameters, security schemes, and validation.
WCAG 2.2 AA compliance expert specializing in audits, automated testing, screen reader validation, and remediation.
Audit and maintain design system consistency, UX/UI patterns, color palettes, and design best practices across frontend applications
Guidelines for implementing OAuth 2.0 and OAuth 2.1 authentication flows with security best practices and PKCE