Loading...
Loading...
Found 3,323 Skills
COBOL for mainframe and legacy business systems. Use for .cob files.
Solidity smart contract development for Ethereum and EVM chains. Use for .sol files.
Chai assertion library for JavaScript. Use for JS assertions.
Use when writing or reviewing tests - covers test philosophy, condition-based waiting, mocking strategy, and test isolation
Create high-converting Meta (Facebook/Instagram) ad creative using the 6 Elements framework, proven ad formats, and research-driven copywriting. Optimized for lo-fi, native-feeling ads that don't look like ads.
Code quality tooling with PHPStan, Pint, and strict types. Use when working with code quality, static analysis, formatting, or when user mentions PHPStan, Pint, quality, static analysis, type safety, code style, linting.
Stakeholder-ready summary document for any Intelligems A/B test. Combines verdict, financial impact, segment analysis, and recommendations into a single shareable brief.
Use when structuring payouts, tiers, and eligibility for referral programs.
Fixes a specific flaky test by analyzing its failure patterns from Tuist, identifying the root cause, and applying a targeted correction. Typically invoked with a Tuist test case URL in the format such as `https://tuist.dev/{account}/{project}/tests/test-cases/{id}`.
Design and generate property-based tests (PBT) for changed files in the current git branch. Extracts specifications, designs properties (invariants, round-trip, idempotence, metamorphic, monotonicity, reference model), builds generator strategies, implements tests, and self-scores against a rubric (24/30+ required). Supports fast-check (TS/JS), hypothesis (Python), and proptest (Rust). Use when: (1) "write property tests for my changes", (2) "add PBT", (3) "property-based test", (4) after implementing pure functions, validators, parsers, or formatters to verify invariants.
Validates the interoperability between skills. Ensures that output formats (JSON/Markdown) from one skill are correctly consumed by the next in a chain.
Performs active security "war gaming" by attempting to exploit identified vulnerabilities in a sandbox. Validates threat reality beyond static scans.