Explore our collection of Agent Skills to enhance your AI workflow.
Optimizes deep learning model performance by refining architectures, tuning hyperparameters, and implementing efficient training strategies.
Analyzes project dependencies to identify security vulnerabilities, outdated packages, and license compliance issues across multiple ecosystems.
Analyzes project dependencies for security vulnerabilities, outdated packages, and license compliance across multiple programming languages.
Analyzes project dependencies for security vulnerabilities, outdated packages, and license compliance across multiple environments.
Analyzes project dependencies for security vulnerabilities, outdated packages, and license compliance across multiple ecosystems.
Orchestrates complex multi-stage deployment pipelines and generates production-ready CI/CD configurations for automated software releases.
Generates standardized, AI-powered git commit messages following the Conventional Commits specification based on staged code changes.
Generates standardized, AI-powered commit messages following the Conventional Commits specification by analyzing staged code changes.
Identifies and remediates potential security vulnerabilities in infrastructure-as-code, application configurations, and system settings.
Provides structured guidance and specialized playbooks for managing, investigating, and remediating cybersecurity breaches and attacks.
Identifies and remediates security vulnerabilities in infrastructure-as-code, application configurations, and system settings.
Automates security vulnerability testing for applications and APIs to identify OWASP Top 10 risks and critical software flaws.
Automates comprehensive security vulnerability testing and penetration scans to identify OWASP Top 10 flaws and injection risks.
Analyzes text data to identify emotional tone, classifying content as positive, negative, or neutral for actionable insights.
Audits and analyzes codebase session management to identify vulnerabilities like session fixation and improper expiration policies.
Identifies session management vulnerabilities and security flaws within your codebase to ensure robust user authentication and protection.
Defines and monitors service level objectives, indicators, and agreements to ensure system reliability and performance.
Executes automated verification suites to ensure application health and core functionality after deployments or configuration changes.
Simplifies SOC2 audit preparation by automating evidence collection, identifying compliance gaps, and generating readiness reports.
Streamlines SOC2 compliance by automating evidence gathering, identifying security control gaps, and generating readiness reports.
Optimizes SQL queries by identifying performance bottlenecks and suggesting strategic indexing and query rewrites.
Generates production-ready stored procedures, triggers, and custom database functions for PostgreSQL, MySQL, and SQL Server.
Automates the configuration of synthetic monitoring to proactively track application performance, uptime, and critical user journeys.
Generates production-ready, well-documented Terraform modules for scalable and secure infrastructure as code development.
Generates realistic, schema-compliant test data including user profiles, product catalogs, and transactional records for software testing and development.
Generates realistic, schema-compliant synthetic data sets for software testing, database seeding, and performance analysis.
Generates mocks, stubs, and spies for unit testing by automatically analyzing code dependencies and framework requirements.
Generates mocks, stubs, spies, and fakes automatically to streamline unit testing and dependency isolation across various testing frameworks.
Automates the setup and management of isolated, reproducible test environments using Docker Compose and Testcontainers.
Generates comprehensive test reports with coverage metrics and trend analysis across HTML, PDF, and JSON formats.
Scroll for more results...