Total 36,907 skills
Showing 12 of 36907 skills
Designs interactive AR/VR experiences using 3D modeling, spatial computing, and user interface optimization.
CI/CD: GitHub Actions workflows, parallel sharding, flaky quarantine, junit XML/Allure, coverage gates
Security test: DAST OWASP ZAP/Nuclei, SAST Semgrep/Bandit, Snyk/Trivy, detect-secrets/TruffleHog
IoT protocols: Zigbee (mesh), Z-Wave (home), LoRaWAN (long-range), CoAP (lightweight), Matter (interoperable), Thread (I
API architecture: REST design, versioning, HATEOAS, auth patterns, OpenAPI docs, gateway patterns
OpenAI Whisper API: audio transcription, translation, structured output, large file handling
Create, schedule, and manage social media posts across Instagram, TikTok, YouTube, X, LinkedIn, Facebook, Pinterest, Threads, and Bluesky via the Post Bridge API. Covers media upload, post creation, scheduling, platform-specific configs, draft mode, analytics, and post result tracking.
Download videos from YouTube, Bilibili, Twitter, and thousands of other sites using yt-dlp. Use when the user provides a video URL and wants to download it, extract audio (MP3), download subtitles, or select video quality. Triggers on phrases like "下载视频", "download video", "yt-dlp", "YouTube", "B站", "抖音", "提取音频", "extract audio".
Combining IoT sensor data using algorithms like Kalman filters for improved accuracy and reliability
Run a structured, adversarial multi-agent bug review pipeline on a codebase. Use this skill whenever the user wants to find bugs, audit code quality, review a codebase for issues, or run any kind of bug-finding or code analysis workflow. Also trigger when the user asks to 'review my code for bugs', 'find all issues in this repo', 'audit this codebase', or any similar request. The pipeline uses three sequential phases: a Bug Finder that maximizes issue discovery, a Bug Adversary that challenges false positives, and an Arbiter that issues final verdicts — producing a clean, high-confidence bug report.
XProtect, MRT, TCC privacy permissions, quarantine, code signing validation, security audit
OWASP Top 10, CSP, CORS, XSS/CSRF prevention, auth patterns, dependency scanning