发现优质的 AI Agent 技能
聚合 Claude Skills、LangChain、AutoGPT 等优质资源,助力开发者快速构建智能应用
n8n Expression Syntax
Expert guide for writing correct n8n expressions in workflows.
Magic UI Generator
Leverage [Magic by 21st.dev](https://21st.dev/magic) to build modern, responsive UI components using an AI-native workflow that prioritizes choice and design excellence.
SDLC Phases Reference
All phases with detailed workflows and testing procedures.
Core Workflow Reference
Full RARV cycle, CONTINUITY.md template, and autonomy rules.
Business Operations Reference
Workflows and procedures for business swarm agents.
Logistics Exception Management — Edge Cases Reference
> Tier 3 reference. Load on demand when handling complex or ambiguous exceptions that don't resolve through standard workflows.
Decision Frameworks — Logistics Exception Management
This reference provides the detailed decision logic, scoring matrices, financial models, and mode-specific resolution workflows for logistics exception management. It is loaded on demand when the agent needs to make or recommend nuanced exception-handling decisions.
Linux Troubleshooting Workflow
来自 sickn33/antigravity-awesome-skills 技能
Kubernetes Deployment Workflow
来自 sickn33/antigravity-awesome-skills 技能
Inventory Demand Planning — Edge Cases Reference
> Tier 3 reference. Load on demand when handling complex or ambiguous demand planning situations that don't resolve through standard forecasting and replenishment workflows.
Overview
This skill provides comprehensive tools for AI engineers and researchers to publish, manage, and link research papers on the Hugging Face Hub. It streamlines the workflow from paper creation to publication, including integration with arXiv, model/dataset linking, and authorship management. - **Paper Pages**: Index and discover papers on Hugging Face Hub - **arXiv Integration**: Automatic paper indexing from arXiv IDs - **Model/Dataset Linking**: Connect papers to relevant artifacts through metad
GitHub Actions Security Review
Find exploitable vulnerabilities in GitHub Actions workflows. Every finding MUST include a concrete exploitation scenario — if you can't build the attack, don't report it.