market-sizing-analysisVerificadoTestingCalculate TAM/SAM/SOM for market opportunities using top-down, bottom-up, and value theory methodologies. Use this skill when sizing markets, estimating addressable revenue, validating market opportunity for a new venture, or building investor-ready market analysis for a startup pitch or business plan.CompatibleAI31 mar 2026Puntaje oculto hasta registrarteComenzar
rag-implementationVerificadoMemoryBuild Retrieval-Augmented Generation (RAG) systems for LLM applications with vector databases and semantic search. Use when implementing knowledge-grounded AI, building document Q&A systems, or integrating LLMs with external knowledge bases.Compatible31 mar 2026Puntaje oculto hasta registrarteComenzar
competitive-landscapeVerificadoIntegrationsAnalyze competition, identify differentiation opportunities, and develop winning market positioning strategies using Porter's Five Forces, Blue Ocean Strategy, and positioning maps. Use this skill when evaluating competitors, assessing market positioning, identifying sustainable competitive advantages, or preparing competitive strategy analysis for a startup or investor pitch.CompatibleAI31 mar 2026Puntaje oculto hasta registrarteComenzar
skill-creatorVerificadoDocumentsCreate new skills, modify and improve existing skills, and measure skill performance. Use when users want to create a skill from scratch, edit, or optimize an existing skill, run evals to test a skill, benchmark skill performance with variance analysis, or optimize a skill's description for better triggering accuracy.Compatible31 mar 2026Puntaje oculto hasta registrarteComenzar
threat-mitigation-mappingVerificadoDevOpsMap identified threats to appropriate security controls and mitigations. Use when prioritizing security investments, creating remediation plans, or validating control effectiveness.CompatibleAI31 mar 2026Puntaje oculto hasta registrarteComenzar
security-requirement-extractionVerificadoSecurityDerive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.CompatibleAI31 mar 2026Puntaje oculto hasta registrarteComenzar
nextjs-app-router-patternsVerificadoWeb EngineeringMaster Next.js 14+ App Router with Server Components, streaming, parallel routes, and advanced data fetching. Use when building Next.js applications, implementing SSR/SSG, or optimizing React Server Components.CompatibleAI31 mar 2026Puntaje oculto hasta registrarteComenzar
sast-configurationVerificadoDevOpsConfigure Static Application Security Testing (SAST) tools for automated vulnerability detection in application code. Use when setting up security scanning, implementing DevSecOps practices, or automating code vulnerability detection.CompatibleAI31 mar 2026Puntaje oculto hasta registrarteComenzar
attack-tree-constructionVerificadoBackendBuild comprehensive attack trees to visualize threat paths. Use when mapping attack scenarios, identifying defense gaps, or communicating security risks to stakeholders.CompatibleAI31 mar 2026Puntaje oculto hasta registrarteComenzar