Skill | Added | Review |
|---|---|---|
linkerd-patterns Implement Linkerd service mesh patterns for lightweight, security-focused service mesh deployments. Use when setting up Linkerd, configuring traffic policies, or implementing zero-trust networking with minimal overhead. | 89 1.15x Agent success vs baseline Impact 96% 1.15xAverage score across 6 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: 112197c | |
istio-traffic-management Configure Istio traffic management including routing, load balancing, circuit breakers, and canary deployments. Use when implementing service mesh traffic policies, progressive delivery, or resilience patterns. | 89 1.03x Agent success vs baseline Impact 98% 1.03xAverage score across 6 eval scenarios Securityby Passed No known issues Reviewed: Version: 112197c | |
hybrid-cloud-networking Configure secure, high-performance connectivity between on-premises infrastructure and cloud platforms using VPN and dedicated connections. Use when building hybrid cloud architectures, connecting data centers to cloud, or implementing secure cross-premises networking. | 56 Impact — No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 112197c | |
cost-optimization Optimize cloud costs across AWS, Azure, GCP, and OCI through resource rightsizing, tagging strategies, reserved instances, and spending analysis. Use when reducing cloud expenses, analyzing infrastructure costs, or implementing cost governance policies. | 55 Impact — No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 112197c | |
secrets-management Implement secure secrets management for CI/CD pipelines using Vault, AWS Secrets Manager, or native platform solutions. Use when handling sensitive credentials, rotating secrets, or securing CI/CD environments. | 52 Impact — No eval scenarios have been run Securityby Advisory Suggest reviewing before use Reviewed: Version: 112197c | |
gitlab-ci-patterns Build GitLab CI/CD pipelines with multi-stage workflows, caching, and distributed runners for scalable automation. Use when implementing GitLab CI/CD, optimizing pipeline performance, or setting up automated testing and deployment. | 66 Impact — No eval scenarios have been run Securityby Advisory Suggest reviewing before use Reviewed: Version: 112197c | |
deployment-pipeline-design Design multi-stage CI/CD pipelines with approval gates, security checks, and deployment orchestration. Use this skill when designing zero-downtime deployment pipelines, implementing canary rollout strategies, setting up multi-environment promotion workflows, or debugging failed deployment gates in CI/CD. | 72 Impact — No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 112197c | |
kpi-dashboard-design Design effective KPI dashboards with metrics selection, visualization best practices, and real-time monitoring patterns. Use this skill when building an executive SaaS metrics dashboard tracking MRR, churn, and LTV/CAC ratios; designing an operations center with live service health and request throughput; creating a cohort retention analysis view for a product team; or debugging a dashboard where metrics contradict each other due to inconsistent calculation methodology. | 61 Impact — No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 112197c | |
data-storytelling Transform data into compelling narratives using visualization, context, and persuasive structure. Use when presenting analytics to stakeholders, creating data reports, or building executive presentations. | 85 1.06x Agent success vs baseline Impact 95% 1.06xAverage score across 6 eval scenarios Securityby Passed No known issues Reviewed: Version: 112197c | |
web3-testing Test smart contracts comprehensively using Hardhat and Foundry with unit tests, integration tests, and mainnet forking. Use when testing Solidity contracts, setting up blockchain test suites, or validating DeFi protocols. | 87 1.19x Agent success vs baseline Impact 92% 1.19xAverage score across 6 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: 112197c | |
solidity-security Master smart contract security best practices to prevent common vulnerabilities and implement secure Solidity patterns. Use when writing smart contracts, auditing existing contracts, or implementing security measures for blockchain applications. | 81 1.00x No change in agent success vs baseline Impact 96% 1.00xAverage score across 6 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: 112197c | |
nft-standards Implement NFT standards (ERC-721, ERC-1155) with proper metadata handling, minting strategies, and marketplace integration. Use when creating NFT contracts, building NFT marketplaces, or implementing digital asset systems. | 83 1.37x Agent success vs baseline Impact 95% 1.37xAverage score across 6 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: 112197c | |
defi-protocol-templates Implement DeFi protocols with production-ready templates for staking, AMMs, governance, and lending systems. Use when building decentralized finance applications or smart contract protocols. | 86 1.25x Agent success vs baseline Impact 100% 1.25xAverage score across 6 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: 112197c | |
workflow-orchestration-patterns Design durable workflows with Temporal for distributed systems. Covers workflow vs activity separation, saga patterns, state management, and determinism constraints. Use when building long-running processes, distributed transactions, or microservice orchestration. | 72 0.98x Agent success vs baseline Impact 92% 0.98xAverage score across 3 eval scenarios Securityby Passed No known issues Reviewed: Version: 112197c | |
temporal-python-testing Test Temporal workflows with pytest, time-skipping, and mocking strategies. Covers unit testing, integration testing, replay testing, and local development setup. Use when implementing Temporal workflow tests or debugging test failures. | 83 1.12x Agent success vs baseline Impact 87% 1.12xAverage score across 3 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: 112197c | |
saga-orchestration Implement saga patterns for distributed transactions and cross-aggregate workflows. Use this skill when implementing distributed transactions across microservices where 2PC is unavailable, designing compensating actions for failed order workflows that span inventory, payment, and shipping services, building event-driven saga coordinators for travel booking systems that must roll back hotel, flight, and car rental reservations atomically, or debugging stuck saga states in production where compensation steps never complete. | 75 Impact — No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: 112197c | |
projection-patterns Build read models and projections from event streams. Use when implementing CQRS read sides, building materialized views, or optimizing query performance in event-sourced systems. | 88 1.59x Agent success vs baseline Impact 97% 1.59xAverage score across 6 eval scenarios Securityby Passed No known issues Reviewed: Version: 112197c | |
microservices-patterns Design microservices architectures with service boundaries, event-driven communication, and resilience patterns. Use when building distributed systems, decomposing monoliths, or implementing microservices. | 89 1.42x Agent success vs baseline Impact 97% 1.42xAverage score across 6 eval scenarios Securityby Passed No known issues Reviewed: Version: 112197c | |
event-store-design Design and implement event stores for event-sourced systems. Use when building event sourcing infrastructure, choosing event store technologies, or implementing event persistence patterns. | 82 1.15x Agent success vs baseline Impact 97% 1.15xAverage score across 6 eval scenarios Securityby Passed No known issues Reviewed: Version: 112197c | |
cqrs-implementation Implement Command Query Responsibility Segregation for scalable architectures. Use when separating read and write models, optimizing query performance, or building event-sourced systems. | 79 1.33x Agent success vs baseline Impact 84% 1.33xAverage score across 6 eval scenarios Securityby Passed No known issues Reviewed: Version: 112197c | |
architecture-patterns Implement proven backend architecture patterns including Clean Architecture, Hexagonal Architecture, and Domain-Driven Design. Use this skill when designing clean architecture for a new microservice, when refactoring a monolith to use bounded contexts, when implementing hexagonal or onion architecture patterns, or when debugging dependency cycles between application layers. | 64 Impact — No eval scenarios have been run Securityby Advisory Suggest reviewing before use Reviewed: Version: 112197c | |
api-design-principles Master REST and GraphQL API design principles to build intuitive, scalable, and maintainable APIs that delight developers. Use when designing new APIs, reviewing API specifications, or establishing API design standards. | 72 1.13x Agent success vs baseline Impact 93% 1.13xAverage score across 6 eval scenarios Securityby Passed No known issues Reviewed: Version: 112197c | |
fastapi-templates Create production-ready FastAPI projects with async patterns, dependency injection, and comprehensive error handling. Use when building new FastAPI applications or setting up backend API projects. | 76 1.11x Agent success vs baseline Impact 95% 1.11xAverage score across 6 eval scenarios Securityby Passed No known issues Reviewed: Version: 112197c | |
wcag-audit-patterns Conduct WCAG 2.2 accessibility audits with automated testing, manual verification, and remediation guidance. Use when auditing websites for accessibility, fixing WCAG violations, or implementing accessible design patterns. | 84 1.04x Agent success vs baseline Impact 97% 1.04xAverage score across 6 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: 112197c | |
screen-reader-testing Test web applications with screen readers including VoiceOver, NVDA, and JAWS. Use when validating screen reader compatibility, debugging accessibility issues, or ensuring assistive technology support. | 87 1.03x Agent success vs baseline Impact 98% 1.03xAverage score across 6 eval scenarios Securityby Passed No known issues Reviewed: Version: 112197c |