Explore our collection of Agent Skills to enhance your AI workflow.
Generates and reviews production-ready Kubernetes manifests with optimized resource management, security hardening, and high-availability configurations.
Guides the construction of induction proofs in the Coq proof assistant for mathematical properties like addition commutativity and arithmetic lemmas.
Implements high-performance gRPC-based key-value store services in Python using protocol buffers and standardized implementation workflows.
Facilitates high-quality code reviews by providing actionable frameworks for identifying bugs, ensuring architectural consistency, and delivering constructive feedback.
Extracts, interprets, and implements code or algorithms from images and screenshots using OCR and systematic preprocessing.
Designs and validates DNA assembly strategies, including Golden Gate and Gibson assembly, with precise requirements for Type IIS restriction enzyme primers.
Extracts and reconstructs text geometrically encoded within 3D printing or CNC toolpaths by analyzing movement coordinates and extrusion patterns.
Implements comprehensive evaluation frameworks for LLM applications using automated metrics, human feedback, and comparative benchmarking.
Implements professional testing strategies using pytest, mocking, and advanced fixtures to ensure high-quality Python codebases.
Identifies, validates, and contributes recurring software patterns and technical improvements back to shared knowledge repositories.
Extracts and implements code or algorithms from images by utilizing OCR tools, image preprocessing, and systematic verification strategies.
Configures and manages local PyPI repositories for hosting and distributing Python packages via HTTP.
Automates complex PDF manipulation tasks including data extraction, document generation, and programmatic form processing.
Performs comprehensive hypothesis testing, regression analysis, and Bayesian statistics with automated assumption checking and APA-style reporting.
Enables Claude to create, edit, and analyze PowerPoint presentations using automated workflows and raw XML manipulation.
Implements multi-layered data validation across system boundaries to make software bugs structurally impossible.
Simplifies genomic data processing by providing a Pythonic interface for reading, writing, and manipulating SAM, BAM, CRAM, and VCF files.
Accelerates Python numerical computations by implementing performance-critical mathematical algorithms as high-speed C extensions.
Optimizes LLM inference workloads on compilation-based accelerators by balancing request batching, shape selection, and padding overhead to minimize costs while meeting latency requirements.
Enforces a rigorous four-phase scientific methodology to identify root causes and implement stable software fixes without guesswork.
Enables the creation of single source files that are syntactically valid and executable as both C programs and Python scripts.
Compiles and configures the portable Memory Array Redcode Simulator (pMARS) from source with a focus on headless, non-X11 environments.
Recovers sensitive data from Git history and ensures complete removal of leaked secrets through secure repository cleanup.
Manipulates, generates, and extracts data from PDF documents using industry-standard Python libraries and command-line tools.
Identifies and replaces sensitive credentials, API keys, and tokens within git repositories to ensure secure codebase sharing and auditing.
Optimizes Redcode warriors for CoreWars competitions through systematic opponent analysis, archetype identification, and mathematical parameter tuning.
Performs comprehensive automated code audits to ensure security, performance, and adherence to industry best practices.
Manages the merging of conflicting git branches and the development of robust, generalized pattern recognition algorithms for ARC-AGI grid transformation tasks.
Recovers data from SQLite Write-Ahead Log (WAL) files by identifying, analyzing, and decrypting corrupted or inaccessible database components.
Provides mathematical and procedural guidance for performing linear cryptanalysis attacks on the FEAL cipher family to recover encryption keys.
Scroll for more results...