Research-to-implement pipeline chaining 5 MCP tools with graceful degradation
Research-to-implement pipeline chaining 5 MCP tools with graceful degradation
Postgres performance optimization and best practices from Supabase. Query performance, connection pooling, Row Level Security, schema design, and diagnostics.
Use when user needs security incident response, operational incident management, evidence collection, forensic analysis, or coordinated response for outages and breaches.
Secure environment variable management ensuring secrets are never exposed in Claude sessions, terminals, logs, or git commits
Creates detailed, sectionized implementation plans through research, stakeholder interviews, and multi-LLM review. Use when planning features that need thorough pre-implementation analysis.
View investment accounts, check thinkorswim data, and access TD Ameritrade research (now Schwab)
Build deep architectural understanding through ultra-granular code analysis. Use when doing security audits, code reviews, or getting oriented in an unfamiliar codebase.
Expert in AI/ML with ALL MCP servers. Uses UltraThink for model analysis, Memory for experiment tracking, Context7 for ML docs, and NotebookLM for research papers.
Web search, content extraction, crawling, and research capabilities using Tavily API
Web search, content extraction, crawling, and research capabilities using Tavily API
Web search, content extraction, crawling, and research capabilities using Tavily API
Web search, content extraction, crawling, and research capabilities using Tavily API
Web search, content extraction, crawling, and research capabilities using Tavily API
Search the web using Exa's AI-powered search API. Supports semantic search, content extraction, direct answers, and deep research with structured output.
Launch and configure EC2 instances with security groups, IAM roles, key pairs, AMIs, and auto-scaling. Use for virtual servers and managed infrastructure.
Build comprehensive GitHub Actions workflows for CI/CD, testing, security, and deployment. Master workflows, jobs, steps, and conditional execution.
Guidelines for developing with Deno and TypeScript using modern runtime features, security model, and native tooling
Scan skills for threats before installing them. Trust scores, threat detection, and security badges for the agentic ecosystem.
15-agent hierarchical mesh coordination for v3 implementation. Orchestrates parallel execution across security, core, and integration domains following 10 ADRs with 14-week timeline.