ElevenLabs voice cloning techniques, audio quality requirements, recording best practices, and training data optimization for professional-quality voice clones. Use when creating custom voices, cloning voices, or optimizing voice clone quality.
Skills(SKILL.md)は、AIエージェント(Claude Code、Cursor、Codexなど)に特定の能力を追加するための設定ファイルです。
詳しく見る →ElevenLabs voice cloning techniques, audio quality requirements, recording best practices, and training data optimization for professional-quality voice clones. Use when creating custom voices, cloning voices, or optimizing voice clone quality.
要件定義を支援
MANDATORY pre-check before ANY response - ensures you use applicable skills and follow best practices. Use this skill FIRST before responding to any Elixir/Phoenix request.
Use when Elixir Ecto patterns including schemas, changesets, queries, and transactions. Use when building database-driven Elixir applications.
Expert-level Elixir, Phoenix, OTP, and concurrent systems
Use when Elixir OTP patterns including GenServer, Supervisor, Agent, and Task. Use when building concurrent, fault-tolerant Elixir applications.
Write idiomatic Elixir code with OTP patterns, supervision trees,
Mental shifts required before writing Elixir. These contradict conventional OOP patterns.
ElizaOS - TypeScript framework for building autonomous AI agents with multi-platform support (Discord, Telegram, Twitter, Farcaster), blockchain integration (EVM, Solana), plugin architecture, multi-agent orchestration, and 90+ community plugins
Frontend development standards for Ellie's projects. Use when building frontend interfaces, components, pages, or applications. Enforces tech stack preferences (Leptos > HTMX/SolidJS > React, modern vanilla CSS, no Tailwind) and accessibility-first development. Always apply these standards unless they conflict with an existing project's established patterns.
Comprehensive Elm functional programming for web development including The Elm Architecture, type system, JavaScript interop, and production-ready patterns
Professional scientific documentation in org-mode electronic lab notebooks with date-based organization, comprehensive record-keeping of hypotheses, methods, results, reasoning, and outcomes for reproducible research
Elna Company MPN encoding patterns, suffix decoding, and handler guidance. Use when working with Elna audio-grade aluminum electrolytic capacitors and supercapacitors.
Use when manipulating Emacs buffers - provides elisp patterns for listing, switching, creating, killing, and working with buffer contents
Use when navigating files and positions in Emacs - provides elisp patterns for finding files, searching, and position management
Use when working with Emacs org-mode - provides elisp patterns for headings, properties, tables, links, and org-mode manipulation
email-gateway
Create CRPO-compliant welcome email sequences for therapy practices that build trust and reduce no-show rates. Use when new leads fill out contact form but before first appointment. Creates 5-7 email nurture sequence that educates, builds connection, and gently encourages booking. Triggers on: create welcome sequence, nurture new leads, reduce no-shows, warm up cold leads. Outputs education-focused sequence with NO high-pressure tactics, NO outcome promises, and proper CRPO compliance.
Evaluate whether to invest in new or emerging acquisition channels (e.g., TikTok, VR, newsletter ads). Use this when growth on primary channels is plateauing or when a new platform gains significant market traction.
Emerging technologies (prompt engineering, AI agents, red teaming) and leadership roles (product manager, engineering manager, DevRel).
Use when animation feels wrong, creates unintended emotional response, or mismatches context
Guides efficient learning by prioritizing encoding over retrieval. Use when discussing study strategies, flashcards, active recall, spaced repetition, Anki, or when user asks how to remember or study something.
Automates deployment of Encore.ts backend and Next.js frontend to Encore Cloud and Vercel. Use this skill when deploying the full-stack application, setting up new environments, or troubleshooting deployment issues.
Project uses AES-256-GCM for encrypting user credentials (BYOD Convex keys, BYOK API keys). Node crypto module, requires `"use node"` directive.
Diagnose weak endings, rushed resolutions, and arbitrary conclusions. Use when stories build well but end disappointingly, when climax feels unearned, or when resolution doesn't complete character arcs.
Expert-level energy systems, smart grids, renewable energy, power management, and energy analytics
enferno-dev
Guide feature-based directory structure and file placement. Apply when creating new files or organizing code. Enforce naming conventions and import ordering for backend and frontend files.
Help users build strong engineering culture. Use when someone is improving developer experience, fostering technical excellence, designing engineering practices, or scaling an engineering organization.
Guidelines for planning engineering tasks with precision and clarity. Use this skill when creating todo lists, breaking down complex engineering tasks, or designing implementation plans for software development work. Emphasizes concrete, actionable steps without time estimates.
Engineers effective prompts using systematic methodology. Use when designing prompts for Claude, optimizing existing prompts, or balancing simplicity, cost, and effectiveness. Applies progressive disclosure and empirical validation to prompt development.
engram-recall
Deploy and manage enter.pollinations.ai text/image services on EC2 and Cloudflare Workers. Requires: SSH keys, sops, wrangler.
Production-grade AI architecture patterns for enterprise - security, governance, scalability, and operational excellence
Complete guide for enterprise architecture patterns including domain-driven design, event sourcing, CQRS, saga patterns, API gateway, service mesh, and scalability
Apply Gremlin's enterprise chaos engineering methodology. Emphasizes categorized failure injection, safety controls, and structured experimentation. Use when implementing chaos engineering in enterprise environments with compliance requirements.
<<<<<<< HEAD
Apply enterprise architecture patterns for integration and governance
Comprehensive guide to implementing Role-Based Access Control for enterprise applications with hierarchical roles, custom permissions, and multi-level access
Rent cars, manage reservations, and access Enterprise Plus benefits through Enterprise Rent-A-Car
Find cross-references between NCBI databases using Biopython Bio.Entrez. Use when navigating from genes to proteins, sequences to publications, finding related records, or discovering database relationships.
General quality standards for all je-dict-1 dictionary entries. Use when creating or revising any entry type.
Validate environment configuration files across local, staging, and production environments. Ensure required secrets, database URLs, API keys, and public variables are properly scoped and set. Use this skill when setting up environments, validating configuration, checking for missing secrets, auditing environment variables, ensuring proper scoping of public vs private vars, or troubleshooting environment issues. Trigger terms include env, environment variables, secrets, configuration, .env file, environment validation, missing variables, config check, NEXT_PUBLIC, env vars, database URL, API keys.
Environment configuration and secrets management skill using UV for Python projects. Handles .env files, environment variables, secrets encryption, multi-environment setups, and secure configuration patterns. Use when setting up project environments, managing API keys, or implementing configuration best practices.
Expert guide for setting up development environments including IDE configuration, tooling, dependencies, and developer onboarding. Use when bootstrapping new projects or standardizing team environments.
Validate environment variables on server start and before builds. Catch missing or invalid variables early with clear error messages.
Manages environment variable additions and updates across all project files. Use when adding new environment variables, updating PORT configuration, modifying deployment configurations, or documenting configuration requirements.
Unify toolchain versions and validation rules (project, gitignored). Use when environment validation guidance is required.
Use compile-time validated environment variables with t3-oss/env-nextjs. Ensures type-safe access to environment variables with automatic validation at build time. Use when accessing any environment variable or adding new environment configurations.
Environmental assessments (Phase I/II ESA), contamination risk evaluation, cleanup cost estimation, regulatory pathway analysis, liability allocation. Use for site acquisitions, contaminated properties, environmental due diligence