close-automationVerificadoMCP"Automate Close CRM tasks via Rube MCP (Composio): create leads, manage calls/SMS, handle tasks, and track notes. Always search tools first for current schemas."CompatibleAGMCP31 de mar. de 2026Pontuacao oculta ate o cadastroComece agora
clerk-authVerificadoBackend"Expert patterns for Clerk auth implementation, middleware, organizations, webhooks, and user sync Use when: adding authentication, clerk auth, user authentication, sign in, sign up."CompatibleAG31 de mar. de 2026Pontuacao oculta ate o cadastroComece agora
ln-113-backend-docs-creatorVerificadoDatabase"Creates backend docs (api_spec.md, database_schema.md). Use when project has backend API or database."Compatible31 de mar. de 2026Pontuacao oculta ate o cadastroComece agora
clean-codeVerificadoBackend"This skill embodies the principles of \"Clean Code\" by Robert C. Martin (Uncle Bob). Use it to transform \"code that works\" into \"code that is clean.\""CompatibleAG31 de mar. de 2026Pontuacao oculta ate o cadastroComece agora
claude-win11-speckit-update-skillVerificadoGit"Windows 11 system management"CompatibleAG31 de mar. de 2026Pontuacao oculta ate o cadastroComece agora
telegram-telethonVerificadoTestingThis skill should be used for comprehensive Telegram automation via Telethon API. Use for sending/receiving messages, monitoring chats, running a background daemon that triggers Claude Code sessions, managing channels/groups, and downloading media. Triggers on "telegram daemon", "monitor telegram", "telegram bot", "spawn Claude from telegram", or any Telethon-related request. IMPORTANT: Use `draft` command for "драфт/draft", use `send` for "отправь/send"; if ambiguous, ASK before sending.Compatible31 de mar. de 2026Pontuacao oculta ate o cadastroComece agora
claude-speed-readerVerificadoGit"-Speed read Claude's responses at 600+ WPM using RSVP with Spritz-style ORP highlighting"CompatibleAG31 de mar. de 2026Pontuacao oculta ate o cadastroComece agora
broken-authenticationVerificadoSecurity"Identify and exploit authentication and session management vulnerabilities in web applications. Broken authentication consistently ranks in the OWASP Top 10 and can lead to account takeover, identity theft, and unauthorized access to sensitive systems."CompatibleAG31 de mar. de 2026Pontuacao oculta ate o cadastroComece agora
claude-scientific-skillsVerificadoGit"Scientific research and analysis skills"CompatibleAG31 de mar. de 2026Pontuacao oculta ate o cadastroComece agora