Loading...
Loading...
Found 344 Skills
Creates comprehensive threat models using STRIDE methodology with asset identification, threat enumeration, mitigation strategies, and residual risk assessment. Use for "threat modeling", "security analysis", "STRIDE", or "risk assessment".
Automatically discover research methodology skills when working with research methodology, literature review, systematic review, evidence synthesis, academic research, or experimental design. Activates for research tasks.
Expert system designer for tabletop roleplaying games covering dice mechanics, character creation, combat systems, narrative frameworks, GM tools, and playtesting methodologyUse when "tabletop rpg, ttrpg design, dice mechanics, character creation system, combat system design, gm tools, pbta, powered by the apocalypse, forged in the dark, blades in the dark, osr design, old school renaissance, narrative rpg, rules-light rpg, crunchy system, session zero, safety tools, x-card, fail forward, fiction first, player-facing rolls, advantage disadvantage, target number, dice pool, tabletop, rpg, game-design, dice-mechanics, pbta, osr, narrative-games, ttrpg, gm-tools, character-creation, blades-in-the-dark, forged-in-the-dark" mentioned.
Production Brief methodology for complex Veo 3 video scenes. Use when creating scenes with dialogue, character continuity, structured settings, or multi-beat sequences. Provides 11-block framework (Format & Tone, Main Subjects, Wardrobe & Props, Location & Framing, Lighting & Palette, Continuity Rules, Actions & Camera Beats, Montage Plan, Dialogue, Sound & Foley, Finish) for professional, replicable results.
Strategy for creating efficient short-form video prompts. Use when creating filler shots, atmospheric scenes, or quick video clips that don't require full Production Brief methodology. Covers when to go short vs long, format+style upfront rule, and two approaches (Descriptive vs Directive) for compact yet coherent results.
Context compression and summarization methodology. Techniques for reducing token usage while preserving decision-critical information.
Structured methodology for constructing and verifying mathematical proofs in statistical research
Create Business Requirements Documents (BRD) following SDD methodology - Layer 1 artifact defining business needs and objectives
Systematic debugging methodology with root cause analysis. Phases: investigate, hypothesize, validate, verify. Capabilities: backward call stack tracing, multi-layer validation, verification protocols, symptom analysis, regression prevention. Actions: debug, investigate, trace, analyze, validate, verify bugs. Keywords: debugging, root cause, bug fix, stack trace, error investigation, test failure, exception handling, breakpoint, logging, reproduce, isolate, regression, call stack, symptom vs cause, hypothesis testing, validation, verification protocol. Use when: encountering bugs, analyzing test failures, tracing unexpected behavior, investigating performance issues, preventing regressions, validating fixes before completion claims.
Comprehensive testing standards including unit, integration, security, and property-based testing with TDD methodology
Refactor codebases using Design by Typed Holes methodology - iterative, test-driven refactoring with formal hole resolution, constraint propagation, and continuous validation. Use when refactoring existing code, optimizing architecture, or consolidating technical debt through systematic hole-driven development.
Iterative execution methodology. Small steps, verify each, adapt based on results.