Loading...
Loading...
Found 1,583 Skills
Add Clerk authentication to any project by following the official quickstart guides.
Implement secure secrets management for CI/CD pipelines using Vault, AWS Secrets Manager, or native platform solutions. Use when handling sensitive credentials, rotating secrets, or securing CI/CD environments.
Java Spring Boot development guidelines with best practices for building robust, secure, and maintainable enterprise applications
File management skill. Used for creating, moving, copying, deleting files and folders, and organizing directory structures. It is applicable when users need to manage files, organize folders, or process files in batches.
Comprehensive pull request review using specialized agents
OAuth 2.0/2.1 specification expert with deep RFC knowledge and Fastify integration patterns
Comprehensive review of local uncommitted changes using specialized agents with code improvement suggestions
Enable and configure Kibana audit logging for saved object access, logins, and space operations. Use when setting up Kibana audit, filtering events, or correlating Kibana and ES audit logs.
Review dependency PRs with structured research, existing-PR-discussion capture, multi-lens analysis (security, code quality, impact), and a repeatable verdict template. USE FOR: dependency update PRs, Renovate/Dependabot PRs, library upgrade reviews, "review this dependency PR", "should we merge this update". DO NOT USE FOR: feature PRs, application code reviews, dependency automation/bot configuration, or unattended merge without confirmation.
Essential SSH commands for secure remote access, key management, tunneling, and file transfers.
Smart contract development advisor based on Trail of Bits' best practices. Analyzes codebase to generate documentation/specifications, review architecture, check upgradeability patterns, assess implementation quality, identify pitfalls, review dependencies, and evaluate testing. Provides actionable recommendations.
Detects timing side-channel vulnerabilities in cryptographic code. Use when implementing or reviewing crypto code, encountering division on secrets, secret-dependent branches, or constant-time programming questions in C, C++, Go, Rust, Swift, Java, Kotlin, C#, PHP, JavaScript, TypeScript, Python, or Ruby.