ClaudSkillsGeneral › Page 246

General-Purpose Claude Skills (Page 246 of 389)

Productivity, automation, knowledge management, integrations, AI tooling, and general-purpose skills for Claude Code.

23,313 skills · updated 2026-05-04 · showing 14701–14760 of 23,313 by quality score

Implements WPF 2D graphics using Shape, Geometry, Brush, and Pen classes. Use when building vector graphic UIs, icons, charts, or diagrams in WPF applications.
Score 70/100
Loads plan, reviews critically, executes each batch, and reports for review between batches. Use when implementing a plan from a plan file.
Score 70/100
Guidelines to create/update a new mode for PostHog AI agent. Modes are a way to limit what tools, prompts, and prompt injections are applied and under what conditions.
Score 70/100
Implements new Agent Skills for the project. Identifies the AI coding tool (Cursor, Claude Code, Gemini CLI), ensures specification compliance, and provides specialized templates.
Score 70/100
Implements strategies to reduce SOC alert fatigue by tuning detection rules, consolidating duplicate alerts,
Score 70/100
Implements application whitelisting using Windows AppLocker to restrict unauthorized software execution on endpoints,
Score 70/100
Phylax Credible Layer assertions implementation. Implements phylax/credible layer assertion contracts using cheatcodes, triggers, and event/state inspection.
Score 70/100
Implement role-based (RBAC) and attribute-based (ABAC) access control in Go using Casbin. Covers model configuration, GORM adapters, Chi/gRPC middleware, and production patterns.
Score 70/100
Implementing Cloud Data Loss Prevention (DLP) using Amazon Macie, Azure Information Protection, and Google Cloud
Score 70/100
Implements code changes and creates commits. Triggered when: implementation tasks, code changes, feature additions, bug fixes.
Score 70/100
Teaches code splitting with lazy() and Suspense in React 19 for reducing initial bundle size. Use when implementing lazy loading, route-based splitting, or optimizing performance.
Score 70/100
Use when building Cmd+K command palettes in React - covers keyboard navigation with arrow keys, keeping selected items in view with scrollIntoView, filtering with shortcut…
Score 70/100
Implements data loss prevention policies using Microsoft Purview to protect sensitive information across Exchange
Score 70/100
Deploy and monitor Canary Tokens via the Thinkst Canary API for deception-based breach detection using web bug
Score 70/100
Implementing device posture assessment as a zero trust access control by integrating endpoint health signals
Score 70/100
Ed25519 is a high-performance digital signature algorithm using the Edwards curve Curve25519. It provides 128-bit
Score 70/100
Implements endpoint Data Loss Prevention (DLP) controls to detect and prevent sensitive data exfiltration through
Score 70/100
Implements Figma designs 1:1 using OneKey component library. Use when implementing UI from Figma, converting designs to code, or building pages/components from design specs.
Score 70/100
Implements functions following project conventions. Applies data-first parameter order, currying patterns with *On and *With variants, and consistent universal operation names.
Score 70/100
The General Data Protection Regulation (EU) 2016/679 (GDPR) is the EU's comprehensive data protection law governing
Score 70/100
Automates GDPR Data Subject Access Request (DSAR) workflows including identity verification, PII discovery across
Score 70/100
Configure SAML 2.0 single sign-on for Google Workspace with a third-party identity provider, enabling centralized
Score 70/100
Deploy SailPoint IdentityNow or IdentityIQ for identity governance and administration. Covers identity lifecycle
Score 70/100
Sign and verify container image provenance using Sigstore Cosign with keyless OIDC-based signing, attestations,
Score 70/100
Implements high-performance streaming using System.IO.Pipelines in .NET. Use when building network protocols, parsing binary data, or processing large streams efficiently.
Score 70/100
Implement Just-In-Time (JIT) access provisioning to eliminate standing privileges by granting temporary, time-bound
Score 70/100
JSON Web Tokens (JWT) defined in RFC 7519 are compact, URL-safe tokens used for authentication and authorization
Score 70/100
Configure Fluentd and Fluent Bit for centralized log aggregation, routing, filtering, and enrichment across distributed
Score 70/100
Build an append-only log integrity chain using SHA-256 hash chaining for tamper detection. Each log entry is
Score 70/100
Implements memory protection mechanisms including DEP (Data Execution Prevention), ASLR (Address Space Layout
Score 70/100
Implementing microsegmentation using Akamai Guardicore Segmentation to map application dependencies, create
Score 70/100
Implements Mobile Application Management (MAM) policies to protect enterprise data on managed and unmanaged
Score 70/100
Implements 802.1X port-based network access control using RADIUS authentication, PacketFence NAC, and switch
Score 70/100
Deploy Cisco Identity Services Engine for 802.1X wired and wireless authentication, MAC Authentication Bypass,
Score 70/100
Deploy and manage network honeypots using OpenCanary, T-Pot, or Cowrie to detect unauthorized access, lateral
Score 70/100
Deploy and query Arkime (formerly Moloch) for full packet capture network traffic analysis. Uses the Arkime API
Score 70/100
Monitoring, logging, and tracing implementation using OpenTelemetry as the unified standard. Use when building production systems requiring visibility into performance, errors,…
Score 70/100
Teaches useOptimistic hook for immediate UI updates during async operations in React 19. Use when implementing optimistic UI patterns, instant feedback, or reducing perceived…
Score 70/100
Develop and implement OT-specific incident response playbooks aligned with SANS PICERL framework, IEC 62443,
Score 70/100
Deploy Nozomi Networks Guardian sensors for passive OT network traffic analysis to achieve comprehensive asset
Score 70/100
Teach parallel routes and slot patterns in Next.js 16. Use when implementing parallel routes, working with @slot syntax, or encountering missing default.tsx errors.
Score 70/100
Design and implement Privileged Access Workstations (PAWs) with device hardening, just-in-time access, and integration
Score 70/100
Implements privileged session monitoring and recording using Privileged Access Management (PAM) solutions, focusing
Score 70/100
Implement cursor-based or offset pagination for Prisma queries. Use for datasets 100k+, APIs with page navigation, or infinite scroll/pagination mentions.
Score 70/100
Set up RAG pipelines with document chunking, embedding generation, and retrieval strategies using LlamaIndex.
Score 70/100
Implement Real User Monitoring (RUM) to capture actual user performance data including Core Web Vitals and page load times.
Score 70/100
Implements the Repository pattern with Service Layer for data access abstraction in .NET. Use when separating data access logic from business logic or building testable data…
Score 70/100
Implement automated user provisioning and deprovisioning using SCIM 2.0 protocol with Okta as the identity provider.
Score 70/100
Logic for constructing Appwrite queries to filter tours. Use when building the search sidebar or search bar.
Score 70/100
Teaches Server Actions in React 19 for form handling and data mutations. Use when implementing forms, mutations, or server-side logic.
Score 70/100
Defines a pattern for abstracting Appwrite database calls into dedicated service files. Use to keep components clean and reusable.
Score 70/100
Implements Sigstore-based software signing and verification using Cosign keyless signing, Rekor transparency
Score 70/100
Implements USB device control policies to restrict unauthorized removable media access on endpoints, preventing
Score 70/100
Deploy and configure Velociraptor for scalable endpoint forensic artifact collection during incident response
Score 70/100
Implements WPF Adorner decoration layers with AdornerLayer, AdornerDecorator, and custom Adorner patterns.
Score 70/100
Implements WPF drag and drop functionality using DragDrop.DoDragDrop, DataObject, and drag/drop events.
Score 70/100
Zero-Knowledge Proofs (ZKPs) allow a prover to demonstrate knowledge of a secret (such as a password or private
Score 70/100
Deploy CyberArk Secure Cloud Access to eliminate standing privileges in hybrid and multi-cloud environments using
Score 70/100
Import account from another machine. Triggered by "import account", "import".
Score 70/100
Convert Cursor custom commands (.cursor/commands/*.md) to Claude Code skills (.claude/skills/*/SKILL.md).
Score 70/100
Search all 23,313 General skills →