區塊鏈
Web3、智能合約和加密貨幣技能
2258 skills in this category
Subcategories
web-test
Execute tests from persistent test cases. Reads ./tests/ directory, runs cleanup, wallet setup (if Web3), executes tests, and generates report.
cybersecurity-fundamentals
Network security, cryptography, vulnerability assessment, and ethical hacking.
Backend Migrations
Create and manage database migrations with reversible changes, zero-downtime deployments, and proper version control practices. Use this skill when creating database migration files, schema change scripts, or any files that modify database structure. Use this when writing migration files with up/down methods, implementing rollback strategies, creating or modifying database tables, adding or removing columns, creating indexes, or handling data migrations separately from schema changes. Use this when working on files in migration directories like db/migrate/, migrations/, or database/migrations/, or when modifying schema definition files.
executing-spikes
Autonomously execute exploratory implementation of one approach from spike definition, working independently until natural stop. Use when partner provides spike definition and assigns you an approach number to explore in isolation, when comparing multiple implementation alternatives, or when evaluating technical feasibility before committing to an approach
development-standards
Standards enforced when writing code, creating pull requests, committing changes, or documenting features. CRITICAL - No emoji in developer-facing content (code/docs/PRs/issues/commits) or CLI output. Also defines standards for using cutting-edge language features and writing comprehensive documentation. Should be applied to all development work.
figma-desktop
Extract design data from Figma files using REST API scripts. Includes frame extraction, metadata retrieval, screenshots, design token extraction, annotations, and FigJam content for design-to-code workflows.
ontology-phase-4-generate
Phase 4 of Ontology Builder Pipeline. Generates final Ontology artifacts (entity definitions, workflow catalog, concept guides) from DRD. Use after Phase 3 DRD is complete.
external-dns
Comprehensive guide for configuring, troubleshooting, and implementing External-DNS across Azure DNS, AWS Route53, Cloudflare, and Google Cloud DNS. Use when implementing automatic DNS management in Kubernetes, configuring provider-specific authentication (managed identities, IRSA, API tokens), troubleshooting DNS synchronization issues, setting up secure production-grade external-dns deployments, optimizing performance, avoiding rate limits, or implementing GitOps patterns with ArgoCD.
gemini-video-understanding
Analyze videos using Google's Gemini API - describe content, answer questions, transcribe audio with visual descriptions, reference timestamps, clip videos, and process YouTube URLs. Supports 9 video formats, multiple models (Gemini 2.5/2.0), and context windows up to 2M tokens (6 hours of video).
type-scale
Generates typography scales using modular ratios with auto-calculated line heights. Use when setting up font-size tokens, heading hierarchy (h1-h6), or text sizing systems. Outputs CSS, Tailwind, or JSON.
backend-models
Define and structure database models with clear naming conventions, timestamps, data integrity constraints, appropriate data types, and relationship definitions. Use this skill when creating or modifying database model files in directories like models/, entities/, schemas/, src/models/, app/models/, or any ORM model definition folders. Use this when defining model classes with ORMs like Sequelize, TypeORM, Prisma schema, Django ORM models, Rails ActiveRecord models, SQLAlchemy models, Mongoose schemas, or any database ORM framework, adding or modifying database constraints like NOT NULL, UNIQUE, CHECK constraints, or foreign key relationships to enforce data integrity at the database level, defining model relationships such as hasMany, belongsTo, hasOne, belongsToMany, ManyToMany, or OneToMany associations between entities to represent how data is connected, implementing validation rules at the model layer for data integrity including required fields, format validation, and custom business rule validation, ch
wallet-encrypt-decrypt
Encrypt and decrypt messages using BSV keys and ECDH. Uses @bsv/sdk for cryptographic operations.
gtars
High-performance toolkit for genomic interval analysis in Rust with Python bindings. Use when working with genomic regions, BED files, coverage tracks, overlap detection, tokenization for ML models, or fragment analysis in computational genomics and machine learning applications.
blockchain-web3
Smart contracts, Ethereum, consensus mechanisms, and decentralized applications.
ptk-keybindings
This skill should be used when the user asks about "prompt_toolkit key bindings", "KeyBindings", "keyboard shortcuts", "key handler", "key sequences", "c-x c-c", "ConditionalKeyBindings", "filters for keys", "vi mode bindings", "emacs bindings", or needs to define keyboard interactions in prompt_toolkit applications.
workflow-define
Define custom workflows with steps, triggers, and conditions as markdown files
vercel-ai-sdk-v5
Expert-level Vercel AI SDK v5 patterns for production chatbots. Use for: (1) Chat persistence with Drizzle/PostgreSQL, (2) Generative UI with typed tool parts, (3) Human-in-the-loop tool confirmations, (4) Custom data streaming with reconciliation, (5) Anthropic provider with extended thinking/reasoning, (6) Type-safe message metadata with token tracking. Covers advanced patterns only - assumes basic AI SDK knowledge. NOT for AI SDK v6.
gh-auth
Automatically authenticate GitHub CLI using .gh-token.txt when seeing errors about "gh auth login", "GH_TOKEN environment variable", or "not logged into any GitHub hosts"
using-theme-variables
Define and use theme variables with @theme directive, oklch() color format, semantic naming, and namespaced utilities. Use when customizing design tokens or creating design systems.
Debugging Omnistrate Deployments
Systematically debug failed Omnistrate instance deployments using a progressive workflow that identifies root causes efficiently while avoiding token limits. Applies to deployment failures, probe issues, and helm-based resources.