Claude Code Skills·Claude Skills·The open SKILL.md registry for Claude
ClaudSkillsAuthors › onfire7777 › Page 4

onfire7777

@onfire7777 on GitHub →

287 Claude Code skills authored by onfire7777.

updated 2026-05-23 · showing 181–240 of 287 by quality score

Average Pro QualityScore: 70.2/100

For the full experience including quality scoring and one-click install features for each skill — upgrade to Pro.

Use when clarifying fuzzy boundaries, defining quality criteria, teaching by counterexample, preventing common mistakes, setting design guardrails, disambiguating similar…
Comprehensive IT infrastructure, system administration, networking, troubleshooting, Active Directory, DNS, DHCP, virtualization, cloud infrastructure, and IT automation expertise.
Express confidence in ranges, update predictions with new information, and track calibration over time.
Implement the NIST Privacy Framework IDENTIFY function including ID.BE business environment, ID.DA data actions, ID.IM improvement, and ID.RA risk assessment subcategories.
Make order-of-magnitude estimates for unknown quantities by decomposing into known or estimable factors.
Use when designing or implementing chaos engineering experiments to verify system resilience under failure conditions.
Use when proposing new features/products, documenting product requirements, creating concise specs for stakeholder alignment, pitching initiatives, scoping projects before…
Generate a comprehensive, AI-optimized summary of the current AI session. Use when the user asks to summarize this chat, create a session summary, generate a handoff document,…
Know the boundaries of your expertise and operate within them. Use when evaluating opportunities, making decisions outside your domain, or assessing when to defer to experts.
Evaluates and implements age estimation and verification technologies for online services. Covers facial age estimation, digital ID verification, self-declaration with risk…
Automated feature demo video production using Playwright E2E tests. Scenario design, recording configuration, implementation patterns, and quality checklists for product demos and…
Three-phase architecture design review pipeline: Architect creates initial design, Refiner improves it, Critic challenges it.
Guides ISO 27701 Privacy Information Management System implementation extending ISO 27001/27002. Covers Clause 5 PIMS-specific requirements, Clause 6 PIMS guidance for ISO 27002,…
Git history investigation, regression root cause analysis, and code archaeology specialist. Time-travels through commit history to uncover truth.
Guides continuous privacy compliance monitoring implementation including automated control testing, evidence collection automation, real-time compliance dashboards, alert-based…
Generate color palettes and get color suggestions via the Colormind.io API (list models, generate palettes with optional locked colors).
Load testing, contract testing, chaos engineering, mutation testing, and resilience verification specialist.
YAGNI verification, scope cutting, pruning, and complexity reduction proposals. A 'subtraction' agent that questions the justification for every code, feature, process, document,…
Socratic coach for breaking down problems to fundamental truths. Use when users want to think through a problem deeply, challenge assumptions, or find innovative solutions.
Implements federated learning architecture patterns for GDPR compliance. Covers secure aggregation protocols, differential privacy integration, communication protocols, and…
Apply Kahneman's Dual-Process Theory to recognize when to trust intuition vs engage deliberate analysis.
Design and implement Purpose-Based Access Control (PBAC) architecture including purpose ontology definition, policy engine configuration, audit logging of purpose verification at…
Conducts privacy auditing of AI models including training data extraction testing, membership inference attacks, model inversion testing, and attribute inference assessment.
Use when systematically evaluating existing designs for cognitive alignment, conducting design reviews or critiques, diagnosing usability issues, quality assurance before launch,…
Systematic debugging techniques for unclear root causes. Use when a bug's origin is unknown, multiple hypotheses need testing, you need to narrow down a failing area, end-to-end…
Threat modeling methodologies using STRIDE, attack trees, and risk assessment for proactive security analysis.
Suite of tools for creating elaborate, multi-component claude.ai HTML artifacts using modern frontend web technologies (React, Tailwind CSS, shadcn/ui).
Comprehensive security assessment and remediation. Use for security reviews, compliance checks, vulnerability assessments.
Guides privacy program maturity assessment using the AICPA/CIPT Privacy Maturity Model with five levels: Ad Hoc, Repeating, Defined, Managed, and Optimized.
Choose the right mental model for the problem at hand. Use when facing new problems, when current approaches fail, or when you need to match tool to context.
Create beautiful printable foldable greeting cards (birthday, thank you, etc.) as PDFs. Use when the user asks to make, design, or create a printable card, greeting card, birthday…
Designs and executes tabletop breach simulation exercises for testing organizational breach response capabilities.
Technical implementation of GDPR Article 25(2) data protection by default. Covers strictest privacy settings as default configuration, minimum data collection, limited storage…
Red team engineering agent. Designs attack scenarios, builds threat models, applies MITRE ATT&CK/OWASP frameworks, runs Purple Team exercises, and performs AI/LLM red teaming.
Ecosystem self-evolution orchestrator. Detects project lifecycle phases, evaluates agent relevance, synthesizes cross-agent knowledge, and proposes evolution actions (health…
Extract brand tone and generate multi-version brand narratives and naming proposals
Comprehensive design skill: brand identity, design tokens, UI styling, logo generation (55 styles, Gemini AI), corporate identity program (50 deliverables, CIP mockups), HTML…
Deep dual-model debugging of AI skills using reasoning model and fast synthesis model. Use when asked to debug a skill, find bugs in a skill, review a skill for issues, fix a…
Addresses healthcare AI privacy at the intersection of HIPAA and the EU AI Act for clinical decision support systems.
Guide for implementing GDPR-valid consent under Article 7 conditions and Article 4(11) definition. Covers five core requirements: freely given, specific, informed, unambiguous,…
Get a merged answer from a configured multi-model pool. Automatically prompt-engineers the query first, queries available models in parallel, and merges results into one best…
Use when stakeholders have conflicting priorities and need alignment, suspect decision blind spots from single perspective, need to pressure-test proposals before presenting, want…
Implements strict data minimization and retention limits for children''s personal data under GDPR Art. 5(1)(c), Recital 38, UK AADC Standard 8, and COPPA Section 312.7.
Use when the user asks for GBrain, personal knowledge brain setup, brain-first retrieval, local PGLite brain, hybrid RAG search, gbrain import/query/sync/embed, GBrain skills,…
Guides internal privacy audit program design and execution including risk-based audit planning, scope definition, fieldwork procedures, finding classification, evidence gathering,…
Use when long-term knowledge retention is needed (weeks to months), studying for exams or certifications, learning new job skills or technology, mastering substantial material…
Use when designing retrieval strategies for querying knowledge graphs in RAG systems. Invoke when user mentions retrieval strategy, search orchestration, global-first retrieval,…
Generate structured decision-making tools — step-by-step guides, bias checkers, scenario explorers, and interactive dashboards.
Use when teaching complex concepts (technical, scientific, philosophical), helping learners discover insights through guided questioning rather than direct explanation, correcting…
Classify problems by complexity domain (clear, complicated, complex, chaotic) and match approach to domain. Use for choosing methodologies, problem framing, and process design.
Use when making messages more memorable or persuasive using the SUCCESs framework. Invoke when user mentions stickiness, making ideas stick, memorable messaging, persuasion, the…
Apply lean thinking to UX: hypothesis-driven design, collaborative sketching, and rapid experiments instead of heavy deliverables.
The master conductor for all 630+ installed skills. Activates automatically on every task to determine which skills to apply, in what order, and how to combine them.
Count lines of code, analyze codebase size and composition, compare code between versions. Use when the user asks about lines of code, codebase size, language breakdown, or code…
Maps the hidden connections between all 630+ installed skills, enabling cross-pollination of ideas across domains.
Generate, optimize, and audit personal development environment config files (zsh/tmux/neovim/ghostty).
Assesses lawful basis for AI training data processing per EDPB April 2025 report on LLMs and general-purpose AI.
Builds a comprehensive breach response team playbook defining CSIRT and privacy team structure with named roles (incident commander, legal counsel, communications, IT forensics,…
Use when prompts produce inconsistent or unreliable outputs, need explicit structure and constraints, require safety guardrails or quality checks, involve multi-step reasoning…
Comprehensive command-line expertise across Bash, PowerShell, Windows CMD, and cross-platform terminal operations for maximum productivity and system control.
Search all 287 skills by onfire7777 →