market-sizing-analysisVérifiéTestingCalculate TAM/SAM/SOM for market opportunities using top-down, bottom-up, and value theory methodologies. Use this skill when sizing markets, estimating addressable revenue, validating market opportunity for a new venture, or building investor-ready market analysis for a startup pitch or business plan.31 mars 2026Score masque jusqu'a l'inscriptionProtéger mon agent
rag-implementationVérifiéMemoryBuild Retrieval-Augmented Generation (RAG) systems for LLM applications with vector databases and semantic search. Use when implementing knowledge-grounded AI, building document Q&A systems, or integrating LLMs with external knowledge bases.31 mars 2026Score masque jusqu'a l'inscriptionProtéger mon agent
competitive-landscapeVérifiéIntegrationsAnalyze competition, identify differentiation opportunities, and develop winning market positioning strategies using Porter's Five Forces, Blue Ocean Strategy, and positioning maps. Use this skill when evaluating competitors, assessing market positioning, identifying sustainable competitive advantages, or preparing competitive strategy analysis for a startup or investor pitch.31 mars 2026Score masque jusqu'a l'inscriptionProtéger mon agent
skill-creatorVérifiéDocumentsCreate new skills, modify and improve existing skills, and measure skill performance. Use when users want to create a skill from scratch, edit, or optimize an existing skill, run evals to test a skill, benchmark skill performance with variance analysis, or optimize a skill's description for better triggering accuracy.31 mars 2026Score masque jusqu'a l'inscriptionProtéger mon agent
threat-mitigation-mappingVérifiéDevOpsMap identified threats to appropriate security controls and mitigations. Use when prioritizing security investments, creating remediation plans, or validating control effectiveness.31 mars 2026Score masque jusqu'a l'inscriptionProtéger mon agent
security-requirement-extractionVérifiéSecurityDerive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.31 mars 2026Score masque jusqu'a l'inscriptionProtéger mon agent
nextjs-app-router-patternsVérifiéWeb EngineeringMaster Next.js 14+ App Router with Server Components, streaming, parallel routes, and advanced data fetching. Use when building Next.js applications, implementing SSR/SSG, or optimizing React Server Components.31 mars 2026Score masque jusqu'a l'inscriptionProtéger mon agent
sast-configurationVérifiéDevOpsConfigure Static Application Security Testing (SAST) tools for automated vulnerability detection in application code. Use when setting up security scanning, implementing DevSecOps practices, or automating code vulnerability detection.31 mars 2026Score masque jusqu'a l'inscriptionProtéger mon agent
attack-tree-constructionVérifiéBackendBuild comprehensive attack trees to visualize threat paths. Use when mapping attack scenarios, identifying defense gaps, or communicating security risks to stakeholders.31 mars 2026Score masque jusqu'a l'inscriptionProtéger mon agent