Total 45,884 skills
Showing 8 of 45884 skills
Use when designing APIs, Architecture, Security, or Scalability for Node, Python, Go, or Java backend systems.
Use when computing orbits, planning maneuvers, propagating trajectories, or analyzing orbital perturbations for spacecraft or celestial bodies. Use when "orbit, trajectory, maneuver, delta-v, Hohmann, Keplerian, perturbation, J2, TLE, orbital elements, semi-major axis, eccentricity, inclination, RAAN, spacecraft propagation, Lambert solver, interplanetary, " mentioned.
When the user wants to optimize pharmaceutical supply chains, manage cold chain logistics, ensure regulatory compliance, or implement serialization. Also use when the user mentions "pharma supply chain," "GMP compliance," "cold chain," "drug serialization," "clinical trials logistics," "pharmaceutical distribution," "good distribution practices," "GDP," "drug safety," or "pharmaceutical quality." For general healthcare, see hospital-logistics. For clinical trials specifically, see clinical-trial-logistics.
Use this skill when users ask "What is the first step to build a brand", the team has a chaotic work rhythm, or discussions on hiring, ad placement, content creation and channel expansion have started without figuring out why to do it and what to do first.
Turbot Pipes integration. Manage data, records, and automate workflows. Use when the user wants to interact with Turbot Pipes data.
Invoke when diving deep into an unfamiliar domain, preparing a research article, or turning collected sources into publishable output. Runs a six-phase workflow: collect, digest, outline, fill in, refine, publish. Not for quick lookups or single-file reads.
Teaches the data provider pattern using renderless components and scoped slots. Use when you need to abstract data fetching or state management logic and expose it to child components via slots.
Guides DeFi protocol security review and rug-risk assessment from public chain data, verified source, and historical patterns—covering EVM and Solana-style deployments, liquidity and tokenomics, governance centralization, bridges, exploit pattern matching, and evidence-structured audit reports. Use when the user asks for a DeFi security audit, rug risk analysis, contract vulnerability triage, LP lock verification, governance or upgrade risk, or cross-chain bridge review from observable data only.