9864 results (72.0ms) page 7 / 494
shipshitdev / library-tool-design exact

Design tools that agents can use effectively, including when to reduce tool complexity. Use when creating, optimizing, or reducing agent tool sets.

omer-metin / skills-for-antigravity-community-tooling exact

Expert in community tool selection and implementation - Discord bots, community platforms, analytics tools, CRMs, moderation systems, and automation. Knows the tool landscape, integration...

RichardoC / skills-lightweight-security-review exact

Conducts a comprehensive security review of a git repo. Use when asked about security issues, code quality concerns, or to evaluate the security posture of a codebase or library.

omer-metin / skills-for-antigravity-ai-code-security exact

Security vulnerabilities in AI-generated code and LLM applications, covering OWASP Top 10 for LLMs, secure coding patterns, and AI-specific threat modelsUse when "ai code security, llm...

oguzhantopgul / skill-security-reviewer exact

Security review and threat analysis for agent skills. Use when reviewing, auditing, or validating skills for security issues including prompt injection, code execution risks, data exfiltration,...

404kidwiz / claude-supercode-skills-powershell-security-hardening exact

Expert in Windows security hardening and PowerShell security configuration. Specializes in securing automation, enforcing least privilege, and aligning with enterprise security baselines. Use for...

omer-metin / skills-for-antigravity-agent-tool-builder exact

Tools are how AI agents interact with the world. A well-designed tool is the difference between an agent that works and one that hallucinates, fails silently, or costs 10x more tokens than...

transilienceai / communitytools-web-application-mapping exact

Comprehensive web application reconnaissance and mapping coordinator that orchestrates passive browsing, active endpoint discovery, attack surface analysis, and headless browser automation for...

majiayu000 / claude-arsenal-auth-security exact

OAuth 2.1 + JWT authentication security best practices. Use when implementing auth, API authorization, token management. Follows RFC 9700 (2025).

affaan-m / everything-claude-code-security-review exact

Use this skill when adding authentication, handling user input, working with secrets, creating API endpoints, or implementing payment/sensitive features. Provides comprehensive security checklist...

ngxtm / devkit-security-review exact

Use this skill when adding authentication, handling user input, working with secrets, creating API endpoints, or implementing payment/sensitive features. Provides comprehensive security checklist...

sickn33 / antigravity-awesome-skills-security-review exact

Use this skill when adding authentication, handling user input, working with secrets, creating API endpoints, or implementing payment/sensitive features. Provides comprehensive security checklist...

ronnycoding / claude-secure-web-search exact

Guide for performing secure web searches with privacy protection, source verification, and information validation. Use when the user wants to search the web securely, verify sources, fact-check...

front-depiction / claude-setup-effect-ai-tool exact

Define and implement AI tools using @effect/ai's Tool and Toolkit APIs. Use when building LLM integrations with type-safe tool definitions, parameter validation, and handler implementations....

TaylorHuston / local-life-manager-security-audit exact

Comprehensive security audit of codebase using multiple security-auditor agents. Use before production deployments or after major features.

jackspace / claudeskillz-scvi-tools exact

This skill should be used when working with single-cell omics data analysis using scvi-tools, including scRNA-seq, scATAC-seq, CITE-seq, spatial transcriptomics, and other single-cell modalities....

dirnbauer / webconsulting-skills-cli-tools exact

CLI tool management and auto-installation. Use when commands fail with 'command not found', installing tools, or checking project environments.

rmyndharis / antigravity-skills-security-requirement-extraction exact

Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.

halay08 / fullstack-agent-skills-security-requirement-extraction exact

Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.

404kidwiz / agent-skills-backup-security-requirement-extraction exact

Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.