Search Skills
Search across 54932 indexed skills
scanning-api-security
Detect API security vulnerabilities by scanning endpoint implementations, authentication flows, and data handling against the OWASP API Security Top 1...
generating-api-sdks
Generate type-safe client SDKs in multiple languages (TypeScript, Python, Go, Java) from OpenAPI 3.0+ specifications. Produce idiomatic client librari...
validating-api-schemas
Validate API specifications against OpenAPI 3.0/3.1, JSON Schema Draft 2020-12, and GraphQL SDL standards using linting rules, structural analysis, an...
building-api-gateway
Create an API gateway that provides unified entry point routing, load balancing, authentication enforcement, rate limiting, request transformation, an...
monitoring-apis
Build real-time API monitoring with metrics collection (request rate, latency percentiles, error rates), health check endpoints, and alerting rules. I...
versioning-apis
Implement API versioning strategies -- URL path (/v1/, /v2/), header-based (Accept: application/vnd.api.v2+json), or query parameter (?version=2) -- w...
processing-api-batches
Optimize bulk API operations with batch request endpoints, parallel execution with concurrency control, partial failure handling, and progress trackin...
generating-api-docs
Create comprehensive, interactive API documentation from OpenAPI specifications with runnable code examples, authentication guides, error reference ta...
handling-api-errors
Implement standardized API error handling with RFC 7807 Problem Details responses, centralized error middleware, typed error classes, and environment-...
emitting-api-events
Build event-driven API architectures using outbound webhooks, Server-Sent Events (SSE), and message broker integration. Implement event emission from ...
automating-api-testing
Automate comprehensive API endpoint testing for REST and GraphQL APIs including request generation, response validation, schema compliance, authentica...
fuzzing-apis
Perform API fuzzing to discover crashes, unhandled exceptions, security vulnerabilities, and edge case failures by sending malformed, unexpected, and ...