Loading...
Loading...
Found 5,702 Skills
Analyze character traits based on story text and generate detailed character biographies. Suitable for in-depth understanding of story character settings, providing references for actors to shape roles, and establishing character files for script creation
Run a generic Vast.ai API lifecycle from offer search to teardown with safety checks and reproducible request steps. Use when users need to list/filter offers, create instances, attach SSH keys, poll readiness, stop/destroy instances, or inspect billing/usage, and when required runtime fields (image, instance type, API key source) should be collected in dialog with default suggestions.
React Native best practices expert. PROACTIVELY use when working with React Native, mobile apps, Expo. Triggers: react-native, expo, mobile, iOS, Android, NativeWind
Build a mass movement around your expertise using Russell Brunson's proven framework—position yourself as the charismatic leader, offer a new opportunity, and create a future-based cause that turns followers into paying customers. Use when: **Position yourself as an expert** in your field; **Create an online course or coaching program** based on your knowledge; **Build a tribe** of loyal followers around your message; **Design a webinar** that converts attendees into buyers; **Craft your orig...
Master FBI hostage negotiation techniques adapted for business. Apply Chris Voss' proven methods to close deals, handle objections, and negotiate from a position of strength. Use when: **High-stakes negotiations** where outcomes matter significantly; **Difficult conversations** with clients, vendors, or partners; **Price negotiations** when you need to hold firm; **Conflict resolution** between team members or stakeholders; **Sales objections** that standard techniques don't resolve
Transform Claude into an expert in evidence-based educational presentation design. Use when designing presentations for teaching, training, or learning contexts where retention and comprehension matter. Applies Cognitive Load Theory, Mayer's 12 Principles of Multimedia Learning, Gagné's 9 Events of Instruction, C.R.A.P. design principles, and WCAG 2.1 AA accessibility standards. Triggers on requests to (1) create educational or training presentations, (2) design slides for teaching or workshops, (3) improve existing educational presentations, (4) convert content into visual presentations, (5) ensure accessible and inclusive presentations, or (6) apply learning science to presentation design.
Specifies design and user experience guidelines, including dark mode compatibility, responsive design, performance optimization, modern UI, and accessibility. This rule promotes a user-friendly and vi
Expert-level code review focusing on quality, security, performance, and maintainability. Use this skill for conducting thorough code reviews, identifying issues, and providing constructive feedback.
Build responsive, mobile-first layouts using fluid containers, flexible units, media queries, and touch-friendly design that works across all screen sizes. Use this skill when creating or modifying UI layouts, responsive grids, breakpoint styles, mobile navigation, or any interface that needs to adapt to different screen sizes. Apply when working with responsive CSS, media queries, viewport settings, flexbox/grid layouts, mobile-first styling, breakpoint definitions (mobile, tablet, desktop), touch target sizing, relative units (rem, em, %), image optimization for different screens, or testing layouts across multiple devices. Use for any task involving multi-device support, responsive design patterns, or adaptive layouts.
World-class application logging - structured logs, correlation IDs, log aggregation, and the battle scars from debugging production without proper logsUse when "log, logging, logger, debug, trace, audit, structured log, correlation id, request id, log level, winston, pino, bunyan, log4j, logging, observability, debugging, monitoring, tracing, structured-logs, correlation, aggregation" mentioned.
Identify security vulnerabilities and anti-patterns providing feedback on security issues a senior developer would catch. Use when user mentions security/vulnerability/safety concerns, code involves user input/authentication/data access, working with sensitive data (passwords/PII/financial), code includes SQL queries/file operations/external API calls, user asks about security best practices, or security-sensitive files are being modified (auth, payment, data access).
Static security analysis for code, auditing for OWASP Top 10 risks. Triggers: "security audit", "is this secure", "check for vulnerabilities". Capabilities: - Static analysis of code snippets. - Mapping findings to OWASP Top 10 (2021). - Providing remediation code patterns.