Search Skills
Search across 54932 indexed skills
mutation-test-runner
Line coverage lies. 80% coverage with weak assertions catches nothing. Mutation testing injects real bugs into your code and checks whether your tests...
tls-configuration-auditor
Audit TLS/SSL configuration for security weaknesses. Check protocol versions (TLS 1.2/1.3 only), cipher suite strength, certificate chain validity, HS...
sbom-generator
Create a comprehensive Software Bill of Materials listing every dependency, its version, license, and known vulnerabilities. Supports CycloneDX and SP...
test-impact-analyzer
Don't run all tests for every change. Analyze which source files changed, trace their dependencies, find the corresponding tests, and produce a target...
flaky-test-detective
Hunt down flaky tests — the ones that pass sometimes and fail sometimes with no code change. Analyze CI run history, detect timing-sensitive tests, fi...
aws-cdk-analyzer
Analyze AWS CDK applications for best practices, security vulnerabilities, cost optimization, and deployment safety. Reviews construct patterns, IAM p...
ci-pipeline-optimizer
Make CI/CD pipelines faster and cheaper. Analyzes workflow files to find bottlenecks, missing caches, serial steps that can run in parallel, unnecessa...
codebase-onboarder
Analyze any codebase and produce a structured onboarding guide. Covers architecture, key flows, patterns, dependencies, entry points, and gotchas — th...
pr-review-assistant
Automated pull request review with structured feedback on code quality, security, performance, and best practices. Use when reviewing PRs, preparing c...
composer-json-validator
Validate and lint PHP Composer composer.json files for structure, dependencies, autoload configuration, and best practices. python3 scripts/composerjs...
commit-message-linter
Validate commit messages against Conventional Commits and custom rules. Pure Python, no dependencies. python3 scripts/lintcommits.py python3 scripts/l...
secrets-audit
Scan any project directory for exposed secrets, hardcoded credentials, and sensitive data leaks. Produces a severity-ranked report with remediation st...