Loading...
Loading...
Found 1,596 Skills
Provides comprehensive guidance for AWS EC2 including instance creation, configuration, security groups, and EC2 management. Use when the user asks about AWS EC2, needs to create EC2 instances, configure EC2, or manage AWS compute resources.
Code Reviewer Specialist. Use this to review PRs, check security, and ensure code quality standards before merging.
GitHub Actions workflow 작성 종합 가이드. Use when creating/modifying GitHub Actions workflows, custom actions, reusable workflows, release automation, or CI/CD security hardening.
Python code security analysis, performance optimization, and maintainability assessment
Unity Catalog governance patterns, permissions models, security best practices, and policy enforcement for enterprise data governance.
Create and configure GitHub Actions. Use when building custom actions, setting up runners, implementing security practices, or publishing to the marketplace.
Design and implement VPCs and networking. Configure subnets, route tables, and security groups. Use when setting up AWS network infrastructure.
Pre-commit code quality review workflow. Use before committing changes to verify code quality, security, testing coverage, and adherence to project conventions. Supports both automated checking and interactive review modes.
Comprehensively reviews Python libraries for quality across project structure, packaging, code quality, testing, security, documentation, API design, and CI/CD. Provides actionable feedback and improvement recommendations. Use when evaluating library health, preparing for major releases, or auditing dependencies.
Conduct threat modeling using STRIDE methodology. Identify threats, assess risks, and design security controls. Use when designing secure systems or assessing application security.
Guide for security-related Agent Skills including penetration testing, code auditing, threat hunting, and forensics skills.
Perform security-focused review of code diffs and pull requests, identifying newly introduced vulnerabilities, security regressions, and unsafe patterns in changed code.