Loading...
Loading...
Found 1,281 Skills
Process and manage account transfers between and within financial institutions. Use when handling full or partial ACAT transfers between broker-dealers, troubleshooting ACAT rejection codes or FINRA Rule 11870 timeline issues, setting up non-ACAT transfers like mutual fund direct transfers or DTC free deliveries, processing internal journal entries to move assets between accounts, handling retirement account rollovers or Roth conversions with proper tax reporting, managing estate transfers with cost basis step-up and date-of-death valuations, reconciling assets after transfer completion including residual credits and fractional shares, coordinating multi-account household transfers across different account types, or building transfer tracking dashboards and client communication workflows.
Expert UI/UX designer specializing in user-centered design, accessibility (WCAG 2.2), design systems, and responsive interfaces. Use when designing web/mobile applications, implementing accessible interfaces, creating design systems, or conducting usability testing.
Cal's UI design system. Use when building interfaces inspired by Cal's aesthetic - light mode, Inter font, 4px grid.
Creates design_guidelines.md for frontend projects. L3 Worker invoked CONDITIONALLY when hasFrontend detected.
Build HIPAA-compliant telemedicine apps with PubNub real-time messaging
Senior-level UI/UX design skill with data-driven architecture for building premium, production-grade interfaces. Includes: BM25 search engine over 1,875+ data rows across 27 CSV databases, 8 Python scripts (search, contrast checker, palette/token/typography generators, design system generator, UI auditor), 16 tech stack guides, 11 reference documents, and 331 lines of intent-first design methodology. Covers: design token architecture, oklch color systems, typography hierarchies, spacing grids, depth strategies, component patterns, animation timing, WCAG 2.2 accessibility, cognitive science principles, and industry-specific reasoning for 30+ industries.
Dynamically validate that the implemented codebase matches architectural decisions documented in plan files. Use when validating implementation matches planning documents, checking for architecture drift, or preparing for architecture reviews.
Step-by-step cookbook for setting up cryptographically signed audit trails on Claude Code tool calls. Use when explaining, evaluating, or demonstrating the pattern before committing to the protect-mcp runtime hooks. Covers Cedar policy, Ed25519 receipts, offline verification, tamper detection, CI/CD integration, and SLSA composition.
Map identified threats to appropriate security controls and mitigations. Use when prioritizing security investments, creating remediation plans, or validating control effectiveness.
Analyze Supabase authentication configuration for security weaknesses and misconfigurations.
Security audit for LLM and GenAI applications using OWASP Top 10 for LLM Apps 2025. Assess prompt injection, data leakage, supply chain, and 7 more critical vulnerabilities.
Expert-level banking systems, core banking, regulations, and banking technology