close-automationVerifiziertMCP"Automate Close CRM tasks via Rube MCP (Composio): create leads, manage calls/SMS, handle tasks, and track notes. Always search tools first for current schemas."CompatibleAGMCP31.03.2026Score bis zur Registrierung verborgenLoslegen
clerk-authVerifiziertBackend"Expert patterns for Clerk auth implementation, middleware, organizations, webhooks, and user sync Use when: adding authentication, clerk auth, user authentication, sign in, sign up."CompatibleAG31.03.2026Score bis zur Registrierung verborgenLoslegen
ln-113-backend-docs-creatorVerifiziertDatabase"Creates backend docs (api_spec.md, database_schema.md). Use when project has backend API or database."Compatible31.03.2026Score bis zur Registrierung verborgenLoslegen
clean-codeVerifiziertBackend"This skill embodies the principles of \"Clean Code\" by Robert C. Martin (Uncle Bob). Use it to transform \"code that works\" into \"code that is clean.\""CompatibleAG31.03.2026Score bis zur Registrierung verborgenLoslegen
claude-win11-speckit-update-skillVerifiziertGit"Windows 11 system management"CompatibleAG31.03.2026Score bis zur Registrierung verborgenLoslegen
telegram-telethonVerifiziertTestingThis skill should be used for comprehensive Telegram automation via Telethon API. Use for sending/receiving messages, monitoring chats, running a background daemon that triggers Claude Code sessions, managing channels/groups, and downloading media. Triggers on "telegram daemon", "monitor telegram", "telegram bot", "spawn Claude from telegram", or any Telethon-related request. IMPORTANT: Use `draft` command for "драфт/draft", use `send` for "отправь/send"; if ambiguous, ASK before sending.Compatible31.03.2026Score bis zur Registrierung verborgenLoslegen
claude-speed-readerVerifiziertGit"-Speed read Claude's responses at 600+ WPM using RSVP with Spritz-style ORP highlighting"CompatibleAG31.03.2026Score bis zur Registrierung verborgenLoslegen
broken-authenticationVerifiziertSecurity"Identify and exploit authentication and session management vulnerabilities in web applications. Broken authentication consistently ranks in the OWASP Top 10 and can lead to account takeover, identity theft, and unauthorized access to sensitive systems."CompatibleAG31.03.2026Score bis zur Registrierung verborgenLoslegen
claude-scientific-skillsVerifiziertGit"Scientific research and analysis skills"CompatibleAG31.03.2026Score bis zur Registrierung verborgenLoslegen