Loading...
Loading...
Found 7,947 Skills
Produces the script and structure for a personalised video audit outreach message — the primary client-acquisition tool for the results- first agency model. The consultant records a 3–5 minute screen-capture video (using Loom, Screencastify, or a WhatsApp voice note) reviewing a prospect's existing digital presence, naming 2–3 specific improvements, and ending with a soft invitation to discuss a risk-free test campaign. No cold calling. No generic email. Each video is personalised to one prospect and converts at approximately 1 paying client per 10 videos sent (Fihn, 2025). Invoke when prospecting for new clients, when following up on a referral, or when building a pipeline of warm prospects before presenting the biz-dev-beyond-agency-offer skill.
Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Software Composition Analysis (SCA), container security scanning, dependency vulnerability management, and common vulnerability tools (Snyk, Trivy, OWASP ZAP, SonarQube)
Real-time tax liability analysis for active crypto traders with proportional cost basis, gain classification, and tax-aware trading signals
Multi-Harness Portability is the engineering discipline of writing agent skills, prompts, and configurations that work across every major AI coding harness — Claude Code, Cursor, Codex, Gemini CLI, OpenCode, and beyond.
Use when designing or redesigning a landing page with waitlist for an app launch. Auto-detects brand identity from the project, adapts sections by app type (SaaS, mobile, dev tool), and outputs a complete design spec with copy framework. Works with any AI coding tool.
Use when hunting a regression across many commits or tracing the origin of a line/function/string — covers automated bisect, skip, replay, blame -L/-C/-w, and pickaxe search (-S/-G)
WebinarKit integration. Manage data, records, and automate workflows. Use when the user wants to interact with WebinarKit data.
MS17-010 (EternalBlue) is a critical vulnerability in Microsoft's SMBv1 implementation that allows remote code execution. Originally discovered by the NSA and leaked by the Shadow Brokers in 2017, it
Identifies and exploits SMB protocol vulnerabilities using Metasploit Framework during authorized penetration tests to demonstrate risks from unpatched Windows systems, misconfigured shares, and weak authentication in enterprise networks.
Publication-quality bioinformatics figures - phylogenetic trees, genome browsers, iTOL datasets, and data presentation
How to make UI5 Web Components applications accessible. Covers accessibility APIs (accessibleName, accessibleNameRef, accessibleDescription, accessibleRole, accessibilityAttributes), label-input relationships, invisible messaging, keyboard handling, high contrast themes, and screen reader support. Use when the user asks about ARIA attributes, screen readers, keyboard navigation, accessibility properties, or making their app accessible.
Deliver cross-platform and native mobile experiences across React Native, Flutter, SwiftUI, and Jetpack Compose without collapsing mobile work into a single framework.