market-sizing-analysisVerificadoTestingCalculate TAM/SAM/SOM for market opportunities using top-down, bottom-up, and value theory methodologies. Use this skill when sizing markets, estimating addressable revenue, validating market opportunity for a new venture, or building investor-ready market analysis for a startup pitch or business plan.27 de mar. de 2026Pontuacao oculta ate o cadastroComece agora
rag-implementationVerificadoMemoryBuild Retrieval-Augmented Generation (RAG) systems for LLM applications with vector databases and semantic search. Use when implementing knowledge-grounded AI, building document Q&A systems, or integrating LLMs with external knowledge bases.27 de mar. de 2026Pontuacao oculta ate o cadastroComece agora
competitive-landscapeVerificadoIntegrationsAnalyze competition, identify differentiation opportunities, and develop winning market positioning strategies using Porter's Five Forces, Blue Ocean Strategy, and positioning maps. Use this skill when evaluating competitors, assessing market positioning, identifying sustainable competitive advantages, or preparing competitive strategy analysis for a startup or investor pitch.27 de mar. de 2026Pontuacao oculta ate o cadastroComece agora
github-gistVerificadoGitPublish files or Obsidian notes as GitHub Gists. Use when user wants to share code/notes publicly, create quick shareable snippets, or publish markdown to GitHub. Triggers include "publish as gist", "create gist", "share on github", "make a gist from this".27 de mar. de 2026Pontuacao oculta ate o cadastroComece agora
threat-mitigation-mappingVerificadoDevOpsMap identified threats to appropriate security controls and mitigations. Use when prioritizing security investments, creating remediation plans, or validating control effectiveness.27 de mar. de 2026Pontuacao oculta ate o cadastroComece agora
security-requirement-extractionVerificadoSecurityDerive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.27 de mar. de 2026Pontuacao oculta ate o cadastroComece agora
nextjs-app-router-patternsVerificadoWeb EngineeringMaster Next.js 14+ App Router with Server Components, streaming, parallel routes, and advanced data fetching. Use when building Next.js applications, implementing SSR/SSG, or optimizing React Server Components.27 de mar. de 2026Pontuacao oculta ate o cadastroComece agora
attack-tree-constructionVerificadoBackendBuild comprehensive attack trees to visualize threat paths. Use when mapping attack scenarios, identifying defense gaps, or communicating security risks to stakeholders.27 de mar. de 2026Pontuacao oculta ate o cadastroComece agora
protocol-reverse-engineeringVerificadoDatabaseMaster network protocol reverse engineering including packet analysis, protocol dissection, and custom protocol documentation. Use when analyzing network traffic, understanding proprietary protocols, or debugging network communication.27 de mar. de 2026Pontuacao oculta ate o cadastroComece agora