Loading...
Loading...
Found 64 Skills
Greenhouse Harvest integration. Manage Persons, Organizations, Deals, Leads, Projects, Activities and more. Use when the user wants to interact with Greenhouse Harvest data.
INVOKE THIS SKILL when creating, reading, updating, or deleting Arize AI integrations. Covers listing integrations, creating integrations for any supported LLM provider (OpenAI, Anthropic, Azure OpenAI, AWS Bedrock, Vertex AI, Gemini, NVIDIA NIM, custom), updating credentials or metadata, and deleting integrations using the ax CLI.
Manage WebRTC credentials and mobile push notification settings. Use when building browser-based or mobile softphone applications. This skill provides Go SDK examples.
Wrk integration. Manage data, records, and automate workflows. Use when the user wants to interact with Wrk data.
Leiga integration. Manage data, records, and automate workflows. Use when the user wants to interact with Leiga data.
Zeta integration. Manage data, records, and automate workflows. Use when the user wants to interact with Zeta data.
Otter Waiver integration. Manage data, records, and automate workflows. Use when the user wants to interact with Otter Waiver data.
Paddle integration. Manage Deals, Persons, Organizations, Leads, Projects, Pipelines and more. Use when the user wants to interact with Paddle data.
Nango integration. Manage Connections, Users, Groups. Use when the user wants to interact with Nango data.
Apply when choosing which VTEX IO authentication token should back a request from a backend app. Covers `ctx.authToken`, `ctx.storeUserAuthToken`, `ctx.adminUserAuthToken`, `authMethod`, and how requester context should determine the identity used by VTEX clients. Use for deciding which identity talks to VTEX endpoints in storefront-backed requests, Admin actions, or app-level integrations that should avoid hardcoded VTEX credentials.
Initialize TeamBition workspace configuration (credentials, parameters, common projects)
Apply Spatie's security guidelines when configuring applications, databases, or servers, or when reviewing code for security concerns; use for SSL setup, CSRF protection, password hashing, database permissions, and server hardening.