tag

configuration

19 indexed skills · max 10 per page

skills (19)

n8n-node-configuration

sickn33/antigravity-awesome-skills · Backend

0

Expert guidance for operation-aware node configuration with property dependencies.

shellcheck-configuration

wshobson/agents · Productivity

0

Static analysis tool for detecting shell script issues and enforcing code quality standards. \n \n Supports Bash, sh, dash, ksh, and other POSIX shells with over 100 different warnings and errors \n Configurable via .shellcheckrc files, environment variables, and command-line flags to target specific shells and disable false positives \n Integrates with CI/CD pipelines, pre-commit hooks, and editors; outputs in multiple formats including GCC, JSON, and quiet mode \n Common error categories cover

python-configuration

wshobson/agents · Backend

0

Centralized, typed configuration management using environment variables and pydantic-settings. \n \n Load and validate all configuration into typed objects at application startup, with required settings crashing immediately if missing \n Supports nested configuration groups, type coercion, custom validators, and environment-specific behavior switching \n Provides sensible defaults for local development while enforcing explicit values for secrets and production settings \n Integrates with .env fi

sast-configuration

wshobson/agents · Productivity

0

Configure SAST tools for automated vulnerability detection across multiple languages and CI/CD pipelines. \n \n Covers three major SAST platforms: Semgrep (custom pattern-based rules), SonarQube (quality gates and code coverage), and CodeQL (GitHub Advanced Security integration) \n Includes CI/CD integration patterns for GitHub Actions, GitLab CI, and Jenkins, plus pre-commit hook setup for early detection \n Provides production-ready configuration templates, custom rule examples, and performanc

cloud-security-configuration

aj-geddes/useful-ai-prompts · Cloud

0

Cloud security requires comprehensive strategies spanning identity management, encryption, network controls, compliance, and threat detection. Implement defense-in-depth with multiple layers of protection and continuous monitoring.

n8n-node-configuration

czlonkowski/n8n-skills · Backend

0

Operation-aware node configuration with progressive discovery and property dependency management. \n \n Start with get_node({detail: \"standard\"}) for 95% of configuration needs; escalate to full detail or search_properties mode only when standard doesn't provide required information \n Resource and operation determine which fields are required; use validation iteratively to discover conditional dependencies controlled by displayOptions rules \n Common patterns include resource/operation nodes

agent-configuration

supercent-io/skills-template · Productivity

0

Establish AI agent environment policies, security guardrails, and team configuration standards. \n \n Configure project description files as AI manuals with tech stack, coding standards, and DO NOT rules; use /init for auto-generation from codebase analysis \n Set up security hooks to block dangerous commands (rm -rf, sudo, curl | sh) and auto-approve only safe operations via PreToolUse and PostToolUse events \n Define skills, slash commands, and plugins with token efficiency in mind; skills loa

prometheus-configuration

wshobson/agents · Productivity

0

Complete Prometheus setup guide covering scrape configuration, recording rules, and alerting. \n \n Includes Kubernetes and Docker Compose installation methods with example configurations for static targets, file-based discovery, and Kubernetes service discovery \n Provides pre-built recording rules for HTTP metrics (request rates, error rates, latency percentiles) and resource metrics (CPU, memory, disk utilization) \n Covers alert rule examples for service availability, error rates, latency th

mtls-configuration

wshobson/agents · Productivity

0

Mutual TLS configuration for zero-trust service mesh communication with certificate management. \n \n Covers Istio, Linkerd, cert-manager, and SPIFFE/SPIRE implementations with ready-to-use YAML templates for strict mTLS enforcement, workload policies, and external service integration \n Includes certificate hierarchy design, automatic rotation strategies, and port-level mTLS control for mixed-protocol environments \n Provides debugging commands for TLS handshake issues, certificate expiry verif

prevpage 2 / 2next