Implements WPF 2D graphics using Shape, Geometry, Brush, and Pen classes. Use when building vector graphic UIs, icons, charts, or diagrams in WPF applications.
Score 70/100
Loads plan, reviews critically, executes each batch, and reports for review between batches. Use when implementing a plan from a plan file.
Score 70/100
Guidelines to create/update a new mode for PostHog AI agent. Modes are a way to limit what tools, prompts, and prompt injections are applied and under what conditions.
Score 70/100
Implements new Agent Skills for the project. Identifies the AI coding tool (Cursor, Claude Code, Gemini CLI), ensures specification compliance, and provides specialized templates.
Score 70/100
Implements strategies to reduce SOC alert fatigue by tuning detection rules, consolidating duplicate alerts,
Score 70/100
Implements application whitelisting using Windows AppLocker to restrict unauthorized software execution on endpoints,
Score 70/100
Phylax Credible Layer assertions implementation. Implements phylax/credible layer assertion contracts using cheatcodes, triggers, and event/state inspection.
Score 70/100
Implement role-based (RBAC) and attribute-based (ABAC) access control in Go using Casbin. Covers model configuration, GORM adapters, Chi/gRPC middleware, and production patterns.
Score 70/100
Implementing Cloud Data Loss Prevention (DLP) using Amazon Macie, Azure Information Protection, and Google Cloud
Score 70/100
Implements code changes and creates commits. Triggered when: implementation tasks, code changes, feature additions, bug fixes.
Score 70/100
Teaches code splitting with lazy() and Suspense in React 19 for reducing initial bundle size. Use when implementing lazy loading, route-based splitting, or optimizing performance.
Score 70/100
Use when building Cmd+K command palettes in React - covers keyboard navigation with arrow keys, keeping selected items in view with scrollIntoView, filtering with shortcut…
Score 70/100
Implements data loss prevention policies using Microsoft Purview to protect sensitive information across Exchange
Score 70/100
Deploy and monitor Canary Tokens via the Thinkst Canary API for deception-based breach detection using web bug
Score 70/100
Implementing device posture assessment as a zero trust access control by integrating endpoint health signals
Score 70/100
Ed25519 is a high-performance digital signature algorithm using the Edwards curve Curve25519. It provides 128-bit
Score 70/100
Implements endpoint Data Loss Prevention (DLP) controls to detect and prevent sensitive data exfiltration through
Score 70/100
Implements Figma designs 1:1 using OneKey component library. Use when implementing UI from Figma, converting designs to code, or building pages/components from design specs.
Score 70/100
Implements functions following project conventions. Applies data-first parameter order, currying patterns with *On and *With variants, and consistent universal operation names.
Score 70/100
The General Data Protection Regulation (EU) 2016/679 (GDPR) is the EU's comprehensive data protection law governing
Score 70/100
Automates GDPR Data Subject Access Request (DSAR) workflows including identity verification, PII discovery across
Score 70/100
Configure SAML 2.0 single sign-on for Google Workspace with a third-party identity provider, enabling centralized
Score 70/100
Deploy SailPoint IdentityNow or IdentityIQ for identity governance and administration. Covers identity lifecycle
Score 70/100
Sign and verify container image provenance using Sigstore Cosign with keyless OIDC-based signing, attestations,
Score 70/100
Implements high-performance streaming using System.IO.Pipelines in .NET. Use when building network protocols, parsing binary data, or processing large streams efficiently.
Score 70/100
Implement Just-In-Time (JIT) access provisioning to eliminate standing privileges by granting temporary, time-bound
Score 70/100
JSON Web Tokens (JWT) defined in RFC 7519 are compact, URL-safe tokens used for authentication and authorization
Score 70/100
Configure Fluentd and Fluent Bit for centralized log aggregation, routing, filtering, and enrichment across distributed
Score 70/100
Build an append-only log integrity chain using SHA-256 hash chaining for tamper detection. Each log entry is
Score 70/100
Implements memory protection mechanisms including DEP (Data Execution Prevention), ASLR (Address Space Layout
Score 70/100
Implementing microsegmentation using Akamai Guardicore Segmentation to map application dependencies, create
Score 70/100
Implements Mobile Application Management (MAM) policies to protect enterprise data on managed and unmanaged
Score 70/100
Implements 802.1X port-based network access control using RADIUS authentication, PacketFence NAC, and switch
Score 70/100
Deploy Cisco Identity Services Engine for 802.1X wired and wireless authentication, MAC Authentication Bypass,
Score 70/100
Deploy and manage network honeypots using OpenCanary, T-Pot, or Cowrie to detect unauthorized access, lateral
Score 70/100
Deploy and query Arkime (formerly Moloch) for full packet capture network traffic analysis. Uses the Arkime API
Score 70/100
Monitoring, logging, and tracing implementation using OpenTelemetry as the unified standard. Use when building production systems requiring visibility into performance, errors,…
Score 70/100
Teaches useOptimistic hook for immediate UI updates during async operations in React 19. Use when implementing optimistic UI patterns, instant feedback, or reducing perceived…
Score 70/100
Develop and implement OT-specific incident response playbooks aligned with SANS PICERL framework, IEC 62443,
Score 70/100
Deploy Nozomi Networks Guardian sensors for passive OT network traffic analysis to achieve comprehensive asset
Score 70/100
Teach parallel routes and slot patterns in Next.js 16. Use when implementing parallel routes, working with @slot syntax, or encountering missing default.tsx errors.
Score 70/100
Design and implement Privileged Access Workstations (PAWs) with device hardening, just-in-time access, and integration
Score 70/100
Implements privileged session monitoring and recording using Privileged Access Management (PAM) solutions, focusing
Score 70/100
Implement cursor-based or offset pagination for Prisma queries. Use for datasets 100k+, APIs with page navigation, or infinite scroll/pagination mentions.
Score 70/100
Set up RAG pipelines with document chunking, embedding generation, and retrieval strategies using LlamaIndex.
Score 70/100
Implement Real User Monitoring (RUM) to capture actual user performance data including Core Web Vitals and page load times.
Score 70/100
Implements the Repository pattern with Service Layer for data access abstraction in .NET. Use when separating data access logic from business logic or building testable data…
Score 70/100
Implement automated user provisioning and deprovisioning using SCIM 2.0 protocol with Okta as the identity provider.
Score 70/100
Logic for constructing Appwrite queries to filter tours. Use when building the search sidebar or search bar.
Score 70/100
Teaches Server Actions in React 19 for form handling and data mutations. Use when implementing forms, mutations, or server-side logic.
Score 70/100
Defines a pattern for abstracting Appwrite database calls into dedicated service files. Use to keep components clean and reusable.
Score 70/100
Implements Sigstore-based software signing and verification using Cosign keyless signing, Rekor transparency
Score 70/100
Implements USB device control policies to restrict unauthorized removable media access on endpoints, preventing
Score 70/100
Deploy and configure Velociraptor for scalable endpoint forensic artifact collection during incident response
Score 70/100
Implements WPF Adorner decoration layers with AdornerLayer, AdornerDecorator, and custom Adorner patterns.
Score 70/100
Implements WPF drag and drop functionality using DragDrop.DoDragDrop, DataObject, and drag/drop events.
Score 70/100
Zero-Knowledge Proofs (ZKPs) allow a prover to demonstrate knowledge of a secret (such as a password or private
Score 70/100
Deploy CyberArk Secure Cloud Access to eliminate standing privileges in hybrid and multi-cloud environments using
Score 70/100
Import account from another machine. Triggered by "import account", "import".
Score 70/100
Convert Cursor custom commands (.cursor/commands/*.md) to Claude Code skills (.claude/skills/*/SKILL.md).
Score 70/100