>
Skills(SKILL.md)は、AIエージェント(Claude Code、Cursor、Codexなど)に特定の能力を追加するための設定ファイルです。
詳しく見る →>
Class interfaces present one cohesive abstraction - don't mix domain logic with serialization, persistence, or unrelated concerns
Use when solution space exploration is complete and you're ready to create
Research a task, problem, bug, or feature by exploring the codebase.
MUST INVOKE this skill when creating custom slash commands, standardizing workflows, or adding reusable operations. Secondary: understanding command structure, learning YAML configuration, or optimizing existing commands. Create, audit, and maintain custom slash commands.
Project-level infrastructure configuration for marshal.json
Activate when the user:
Manages temporary and defined agents including creation, promotion, cleanup, and namespacing. Use when user creates custom agents, asks about agent lifecycle, temp agents, or agent management.
Organize incoming files and track import status through the file staging workflow
Momentum is a leader's primary currency. In high-growth environments or crisis periods, waiting for natural milestones to occur is insufficient. You must actively "manufacture" momentum by setting arb
Comprehensive skill for creating, managing, and maintaining Claude Code Marketplaces including plugin development, validation, deployment, and lifecycle management
Git CLI operations, workflows, and automation for modern development (2025). Use when working with repositories, commits, branches, merging, rebasing, worktrees, submodules, or multi-repo architectures. Includes parallel agent workflow patterns, merge strategies, conflict resolution, and large repo optimization. Triggers on git commands, version control, merge conflicts, worktree setup, submodule management, repository troubleshooting, branch strategy, rebase operations, cherry-pick decisions, and CI/CD git integration.
Complete end-to-end WhatsApp media processing workflow. Processes audio/images AND integrates them into chat.md in a single step. Use when you want to do the complete daily media processing (transcribe + OCR + integrate into chat).
Las personas tienden a desarrollar preferencia por cosas simplemente porque
Use when deploying MkDocs documentation to GitHub Pages with GitHub Actions - covers Python-Markdown gotchas (indentation, footnotes, grid tables), workflow configuration, and systematic markdown fixing
Alfred SuperAgent의 필수 규칙을 정의합니다. November 2025 enterprise standard 기반. 3-Layer architecture, 4-Step workflow, Agent-first paradigm, Skill invocation rules, AskUserQuestion patterns, TRUST 5 quality gates, TAG chain integrity, commit message standards. 사용: 워크플로우 규칙 검증, 품질 게이트 확인, MoAI-ADK 표준 준수, 아키텍처 규칙 검증.
You are an expert in analytics implementation and measurement. Your goal is to help set up tracking that provides actionable insights for marketing and product decisions.
You are an expert in email marketing and automation. Your goal is to create email sequences that nurture relationships, drive action, and move people toward conversion.
When the user wants to apply psychological principles, mental models, or behavioral science to marketing. Also use when the user mentions 'psychology,' 'mental models,' 'cognitive bias,' 'persuasion,' 'behavioral science,' 'why people buy,' 'decision-making,' 'consumer behavior,' 'anchoring,' 'social proof,' 'scarcity,' 'loss aversion,' 'framing,' or 'nudge.' Use this whenever someone wants to understand or leverage how people think and make decisions in a marketing context.
This skill covers setting up a secure email inbox that allows your application or AI agent to receive and respond to emails, with content safety measures in place.
Analyzes competitors using web research to provide verified business metrics, actionable leverage strategies, and predicted next moves. Use when user needs competitive intelligence, competitor analysis, market positioning insights, or strategic leverage opportunities.
Force a skeptical second pass on your own work. Because 'it should work' has never once been true.
Compare multiple job offers side-by-side with total compensation analysis
Multi-person projects - shared state, todo claiming, handoffs
Investigate a reported problem, find its root cause, and create a GitHub issue with a TDD fix plan. This is a mostly hands-off workflow - minimize questions to the user.
Investigate compromised Docker containers by analyzing images, layers, volumes, logs, and runtime artifacts to
URLScan.io is a free service for scanning and analyzing suspicious URLs. It captures screenshots, DOM content,
'Analyzes malicious PDF files using PDFiD, pdf-parser, and peepdf to identify embedded JavaScript, shellcode,
'Systematically audit AWS S3 bucket permissions to identify publicly accessible buckets, overly permissive ACLs,
Deploy Cisco Duo multi-factor authentication across enterprise applications, VPN, RDP, and SSH access points.
Detect and investigate Azure service principal abuse including privilege escalation, credential compromise, admin
Deploy AI and NLP-powered detection systems to identify business email compromise attacks by analyzing writing
Detect and prevent privilege escalation in Kubernetes pods by monitoring security contexts, capabilities, and
'Detects typosquatting attacks in npm and PyPI package registries by analyzing package name similarity using
Hunt for adversary persistence and execution via Windows scheduled tasks by analyzing task creation events, suspicious
Configure IAM permission boundaries in AWS to delegate role creation to developers while enforcing maximum privilege
Implement Amazon Macie to automatically discover, classify, and protect sensitive data in S3 buckets using machine
Configure Microsoft Entra Privileged Identity Management to enforce just-in-time role activation, approval workflows,
Implement the CISA Zero Trust Maturity Model v2.0 across the five pillars of identity, devices, networks, applications,
Implement Just-In-Time (JIT) access provisioning to eliminate standing privileges by granting temporary, time-bound
'This skill covers implementing North American Electric Reliability Corporation Critical Infrastructure Protection
Configure and deploy Palo Alto Networks next-generation firewalls with App-ID, User-ID, zone-based policies,
Deploy and configure Proofpoint Email Protection as a secure email gateway to detect and block phishing, malware,
Harden Kubernetes Role-Based Access Control by implementing least-privilege policies, auditing role bindings,
Deploy CyberArk Secure Cloud Access to eliminate standing privileges in hybrid and multi-cloud environments using
Implement NextDNS as a zero trust DNS filtering layer with encrypted resolution, threat intelligence blocking,
Implement HashiCorp Boundary for identity-aware zero trust infrastructure access management with dynamic credential
'Monitors dark web forums, marketplaces, paste sites, and ransomware leak sites for mentions of organizational
Context is the complete state available to a language model at inference time — system instructions, tool definitions, retrieved documents, message history, and tool outputs. Context engineering is th
Use when experiments complete to judge what claims the results support, what they don't, and what evidence is still missing. Codex MCP evaluates results against intended claims and routes to next action (pivot, supplement, or confirm). Use after experiments finish — before writing the paper or running ablations.