Loading...
Loading...
Found 2,616 Skills
Security best practices and threat mitigation patterns for PACT framework development. Use when: implementing authentication or authorization, handling API credentials, integrating external APIs, processing sensitive data (PII, financial, health), reviewing code for vulnerabilities, or enforcing SACROSANCT security rules. Triggers on: security audit, credential handling, OWASP, auth flows, encryption, data protection, backend proxy pattern, frontend credential exposure.
Skeleton-intelligent revenue strategy for AI automation agencies. Frames proposals through monetization lenses across all UI types — dashboards, product pages, and admin panels. Knows the full skeleton catalog, SaaS wrapper productization flow, and enrichment boundaries. Active in propose phase only. Max 1-2 questions, plain language, agency-native vocabulary.
When the user wants to write, rewrite, or improve any kind of marketing copy. This includes page copy (homepage, landing page, sales page, pricing, feature, about), short-form copy (bios, taglines, value propositions, one-liners, elevator pitches), ad copy (social ads, search ads, display ads), and microcopy (CTAs, button text, form labels, notification text). Use when the user says anything like "write copy for," "improve this copy," "rewrite this," "headline help," "CTA copy," "value proposition," "tagline," "bio," "ad copy," "hero section," "above the fold," "this copy is weak," "make this more compelling," "help me describe my product," "write my bio," "social media bio," or "about me." World Code integrated — uses your voice, climax, method, and crossing to write copy that's unmistakably yours. For email copy, see boring-email-sequence. For popup copy, see boring-popup-cro. For line-by-line editing of existing copy, see boring-copy-editing.
This skill should be used when the user asks to "edit an image", "modify a photo", "inpaint", "outpaint", "extend an image", "replace object in image", "add element to image", "resize image for social media", "crop image", "adapt image for Twitter", "convert image to OG format", or needs AI-powered image editing with masks.
Detect and remove AI-generated writing patterns from text while preserving semantic meaning and factual accuracy. Rewrites text to sound natural, varied, and human-authored across domains including academic, technical, blog, professional, and social media writing. Use this skill when the user asks to "humanize text", "make this sound human", "remove AI patterns", "rewrite to sound natural", "make this less AI", "de-slop this", "clean up AI writing", "make this not sound like ChatGPT", or provides AI-generated text and asks for a natural rewrite. Also trigger when reviewing drafts for AI tells, checking if text sounds AI-generated, or requesting a "human pass" on content.
Audits web UI quality across accessibility, interaction, forms, typography, navigation, layout, performance, motion, and microcopy. Use when reviewing or refining frontend UI before merge or release, or when the user asks for a UI, UX, or accessibility audit.
This skill covers designing and implementing security zones and conduits for industrial automation and control systems (IACS) per IEC 62443-3-2. It addresses zone partitioning based on risk assessment, assigning Security Level targets (SL-T), designing conduit security controls, implementing microsegmentation with industrial firewalls, and validating zone architecture through traffic analysis and penetration testing against the Purdue Reference Model.
Autonomous crypto business development patterns — multi-chain token discovery, 100-point scoring with wallet forensics, x402 micropayments, ERC-8004 on-chain identity, LLM cascade routing, and pipeline automation for CEX/DEX listing acquisition. Use when building AI agents for crypto BD, token evaluation, exchange listing outreach, or autonomous commerce with payment protocols.
Microsoft Azure expert for az CLI, AKS, App Service, and cloud infrastructure
Structured C-suite onboarding through a founder interview that captures company context across 7 dimensions. Generates a persistent company context file used by all C-level advisory skills. Includes quarterly refresh protocol, context quality scoring, and graceful handling of missing information. Use when setting up advisory context for the first time, refreshing stale company context, or onboarding a new executive.
AI-powered search that aggregates and summarizes results from multiple sources including web, X/Twitter, Reddit, Hacker News, YouTube, ArXiv, and Wikipedia. Use this when you need a synthesized answer or curated links from across the internet and social platforms.
Monthly delta tracking and progress reporting for GEO clients. Compares two GEO audits (baseline vs. current), calculates score improvements across all categories, tracks action item completion, and generates a "here's your progress" client report. Use when user says "compare", "delta", "monthly report", "progress", "confronta", "progressi", "report mensile", or when running a monthly client check-in.