convex-component-authoring
How to create, structure, and publish self-contained Convex components with proper isolation, exports, and dependency management
Security skills for audits, auth flows, vulnerability detection, and compliance checks in AI-assisted development.
This directory brings installable AI Agent skills into one place so you can filter by search, category, topic, and official source, then install them directly into Claude Code, Cursor, Windsurf, and other supported environments.
How to create, structure, and publish self-contained Convex components with proper isolation, exports, and dependency management
How to create, structure, and publish self-contained Convex components with proper isolation, exports, and dependency management
GitHub CLI authentication and GraphQL API usage for safe GitHub operations
Analyze git repositories to build a security ownership topology (people-to-file), compute bus factor and sensitive-code ownership, and export CSV/JSON for graph databases and visualization. Trigger on
Use this skill when the user asks to work with GitHub from the command line using gh CLI. This includes managing repositories, issues, pull requests, releases, authentication, codespaces, actions, and
Comprehensive getting started guide for Fullstory Browser API v2 implementation. Provides the complete initialization flow, API overview, decision framework for which APIs to use, industry-specific gu
Apply modern web development best practices for security, compatibility, and code quality. Use when asked to apply best practices, security audit, modernize code, code quality review, or check for vul
Guides and best practices for working with Neon Serverless Postgres. Covers getting started, local development with Neon, choosing a connection method, Neon features, authentication (@neondatabase/...
gws-chat is a command-line interface tool for Google Chat, providing structured JSON output for managing chat spaces, messages, and members.
This skill should be used when the user asks to pentest WordPress sites, scan WordPress for vulnerabilities, enumerate WordPress users, themes, or plugins, exploit WordPress vulnerabilities, or use WP
Deploy project to the Agentuity Cloud. Requires authentication. Use for Agentuity cloud platform operations
Authentication is the process of verifying user identities and authorizing access to protected routes and resources, using technologies like OAuth and session management.