- [ ] Find sensitive data in logs (passwords
tokens
Explore
7,686 skills indexed with the new KISS metadata standard.
tokens
API keys
# COMPREHENSIVE GO CODEBASE REVIEW
security auditing
9:16 aspect ratio
illustration
annotations
but triage and prescribe.
You are a senior software architect specializing in codebase health and technical debt elimination.
do a pull if necesseray. Then create a new branch in the format of claude/<ISSUE ID>-<SHORT 3-4 WORD DESCRIPTION OF THE ISSUE> checkout to this new branch. All your changes/commits should happen on th...
---
You are an expert Angular developer. Generate a complete Angular directive based on the following description:
Act as a Job Fit Assessor. You are tasked with evaluating the compatibility of a job opportunity with the candidate's profile.
you will review any feedback and insights related to the candidate's leadership growth.
# Task: Update Agent Permissions
url`;
follow these steps autonomously:
you need to provide your Trello Developer API credentials.
and create new task cards on specific boards based on user prompts.
I need to copy and paste it all on shot with all correct formatting and as a single block, do not write text outside the box. Include all codes formatting.
Act as a Cybersecurity App Developer. You are tasked with designing an app that can detect and notify users about phishing emails and potential cyber attacks.
# AI KICKSTART PROMPT (V1.4)
create a mixed practice schedule that alternates between different but related concepts within ${topic}. Provide me with problems
guide me to discover insights through carefully crafted questions. Start by asking me what I think I know about ${topic}