Generate a ship-ready CLI for an API with a lean research -> generate -> build -> shipcheck loop.
Score a generated CLI against the Steinberger bar, compare two CLIs side-by-side
Polish a generated CLI to pass verification and become publish-ready. Runs diagnostics (dogfood, verify, scorecard, go vet), automatically fixes all issues (verify failures, dead…
Bring a published CLI from the public library into the internal library so it's identical to a freshly-generated copy — module path reverted, manuscripts placed alongside, ready…
Regenerate an existing printed CLI from scratch under the current Printing Press, with prior research and prior novel features carried into the novel-features subagent's reprint…
Run a retrospective after generating a CLI. Identifies systemic improvements to the Printing Press — templates, Go binary, skill instructions, catalog — so the next CLI comes out…
Internal sub-skill: agentic review of a printed CLI's sampled command output for plausibility issues that rule-based checks can't encode (substring-match relevance, format bugs,…
Audit and improve an existing Quickstop plugin's quality against Claude Code plugin spec
Publish a generated CLI to the printing-press-library repo
Browse and install pre-built Go CLIs for popular APIs from the catalog
The definitive end-to-end pipeline for creating the highest quality portable AI skills. Orchestrates six individual skills in sequence — each run fully, separately, and in its…
Break complex problems into fundamental truths by questioning assumptions and rebuilding from irreducible components.
Use when setting product North Star metrics, decomposing high-level business metrics into actionable sub-metrics and leading indicators, mapping strategy to measurable outcomes,…
Security testing patterns including SAST, DAST, penetration testing, and vulnerability assessment techniques.
Multi-session parallel orchestrator using Claude Code Agent Teams API and Codex CLI Subagents to launch, manage, and coordinate concurrent task execution across multiple…
Use when designing organizational structure (team topologies, Conway's Law alignment), mapping stakeholders by power-interest for change initiatives, defining team interface…
MUST read when a task needs persistent services, Docker, fixed IPs, background jobs, heavy compute, reusable environments, or always-on infrastructure beyond the current AI…
For non-perishable things, future life expectancy is proportional to current age. Use for technology selection, evaluating frameworks/libraries, and predicting tool longevity.
Configure and audit the local universal AI skills setup across Codex, ChatGPT, Claude, Claude Code, Claude Cowork, Cursor, Gemini, OpenCode, OpenSkills, Hermes Agent, OpenClaw,…
Guides development and approval of Binding Corporate Rules under GDPR Article 47 for intra-group international data transfers. Covers Art.
Apply TRIZ (Theory of Inventive Problem Solving) methodology to resolve technical contradictions and find innovative solutions.
Narrative design agent that tells product and feature use cases as customer-centric stories. Use when customer experience storytelling, scenario stories, or product narratives are…
Implements AI transparency requirements under EU AI Act Arts. 13-14 and GDPR Arts. 13-14. Covers user notification of AI interaction, system capability disclosure, limitation…
Guides a comprehensive organisational data protection audit against key GDPR requirements including Articles 5, 24, 25, 28, 30, 32, 35, and 37.
Patterns for creating design systems with personality and distinctive aesthetics. Covers aesthetic documentation, color token architecture, typography systems, layered surfaces,…
Toolkit for styling artifacts with a theme. These artifacts can be slides, docs, reportings, HTML landing pages, etc.
Official GSAP skill for performance — prefer transforms, avoid layout thrashing, will-change, batching.
Use when you need to choose the right visualization for your data and question, then create a narrated report that highlights insights and recommends actions.
Deploy differential privacy in production systems including epsilon selection strategies, noise calibration with Laplace and Gaussian mechanisms, privacy budget tracking,…
Retention strategy, re-engagement, and churn prevention. Retention analysis frameworks, re-engagement trigger design, gamification elements, habit formation design, and loyalty…
Design data systems by understanding storage engines, replication, partitioning, transactions, and consistency models.
Use when conducting sprint retrospectives, project post-mortems, weekly reviews, quarterly reflections, after-action reviews (AARs), team health checks, process improvement…
Talk to customers without leading them using Mom Test rules: discuss their life not your idea, ask about specifics in the past, and talk less.
Domain knowledge agent for Japanese income tax filing (kakutei shinkoku). Guides income classification, deduction optimization, tax calculation, and filing for freelancers, sole…
Build automated PII detection and redaction pipelines using spaCy NER, Microsoft Presidio, and AWS Macie integration.
Use when designing embedding strategies that fuse semantic and structural information for knowledge graphs.
A comprehensive library of 100+ transferable reasoning primitives extracted from 34 high-value domains.
Scan web pages for UI consistency issues — misalignment, bad contrast, near-miss colors, inconsistent spacing, and more. Requires Chrome DevTools MCP.
Standards compliance assessment and gap analysis agent. Evaluates codebases against OWASP/WCAG/OpenAPI/ISO 25010 and other standards, detects violations, and provides actionable…
Apply Herbert Simon's Bounded Rationality and satisficing to make good-enough decisions under real-world constraints.
Understand what "job" users hire your product to do, focusing on progress users seek rather than features.
Guides assessment of third-country adequacy decisions under GDPR Article 45 for international data transfers.
Run a comprehensive security, privacy, and bug audit on any codebase using the absolute best frontier AI models via OpenRouter API.
Systematic rational process for complex problem analysis, decision making, and risk assessment. Use for high-stakes engineering decisions, root cause analysis beyond 5 Whys, and…
Use when developing business strategy (market entry, product launch, geographic expansion, M&A, turnaround), conducting competitive analysis (profiling competitors, assessing…
Software architecture modeling, evaluation, and Structurizr DSL generation based on C4 model methodology. Use when C4 model design or visualization is needed.
Force critical evaluation of any proposal, decision, or approach from 5 adversarial perspectives. Use when you've just agreed to something, accepted a plan, or want to stress-test…
Implementation guide for secure multi-party computation enabling privacy-preserving analytics across organizations.
Handle flaky tests, crashing tests, hanging tests, out of memory tests, stack overflow tests, test isolation, test suite stability issues in .NET projects.
Build in buffers for unknown unknowns and don't optimize to the edge. Use for capacity planning, deadline estimation, architecture design, and risk management.
Combine multiple mental models for richer analysis. Use for complex problems requiring multiple lenses, high-stakes decisions, or when single models leave blind spots.
Set the collaboration style for a session — step-by-step (guided), deep-think (research-first recommendations), or pair (equal partners switching roles).
Implement the NIST Privacy Framework GOVERN function covering GV.AT awareness and training, GV.MT monitoring and review, GV.PO policy development, and GV.RR roles and…
Scaffolds a production-ready Next.js turborepo with TypeScript, Tailwind CSS, the shadcn/ui CLI, Blode UI components from the ui.blode.co registry, blode-icons-react, Oxlint,…
Use when designing and building knowledge graphs from unstructured data. Invoke when user mentions entity extraction, schema design, LPG vs RDF, graph data model, ontology…
Design privacy API patterns including data subject API for DSAR endpoints, consent API for preference management, deletion API with cascading delete orchestration, and audit API…
Build a weekly cadence of customer touchpoints using Opportunity Solution Trees, assumption mapping, and interview snapshots.
Use when verifying claims before decisions, fact-checking statements against sources, conducting due diligence on vendor/competitor assertions, evaluating conflicting evidence,…
Argue against the strongest version of opposing positions, not the weakest. Use for design reviews, evaluating alternatives, conflict resolution, and decision validation.
Guides compliance with China''s Personal Information Protection Law (PIPL, effective 1 November 2021).