configuration▌
19 indexed skills · max 10 per page
n8n-node-configuration
sickn33/antigravity-awesome-skills · Backend
Expert guidance for operation-aware node configuration with property dependencies.
shellcheck-configuration
wshobson/agents · Productivity
Static analysis tool for detecting shell script issues and enforcing code quality standards. \n \n Supports Bash, sh, dash, ksh, and other POSIX shells with over 100 different warnings and errors \n Configurable via .shellcheckrc files, environment variables, and command-line flags to target specific shells and disable false positives \n Integrates with CI/CD pipelines, pre-commit hooks, and editors; outputs in multiple formats including GCC, JSON, and quiet mode \n Common error categories cover
python-configuration
wshobson/agents · Backend
Centralized, typed configuration management using environment variables and pydantic-settings. \n \n Load and validate all configuration into typed objects at application startup, with required settings crashing immediately if missing \n Supports nested configuration groups, type coercion, custom validators, and environment-specific behavior switching \n Provides sensible defaults for local development while enforcing explicit values for secrets and production settings \n Integrates with .env fi
sast-configuration
wshobson/agents · Productivity
Configure SAST tools for automated vulnerability detection across multiple languages and CI/CD pipelines. \n \n Covers three major SAST platforms: Semgrep (custom pattern-based rules), SonarQube (quality gates and code coverage), and CodeQL (GitHub Advanced Security integration) \n Includes CI/CD integration patterns for GitHub Actions, GitLab CI, and Jenkins, plus pre-commit hook setup for early detection \n Provides production-ready configuration templates, custom rule examples, and performanc
cloud-security-configuration
aj-geddes/useful-ai-prompts · Cloud
Cloud security requires comprehensive strategies spanning identity management, encryption, network controls, compliance, and threat detection. Implement defense-in-depth with multiple layers of protection and continuous monitoring.
n8n-node-configuration
czlonkowski/n8n-skills · Backend
Operation-aware node configuration with progressive discovery and property dependency management. \n \n Start with get_node({detail: \"standard\"}) for 95% of configuration needs; escalate to full detail or search_properties mode only when standard doesn't provide required information \n Resource and operation determine which fields are required; use validation iteratively to discover conditional dependencies controlled by displayOptions rules \n Common patterns include resource/operation nodes
agent-configuration
supercent-io/skills-template · Productivity
Establish AI agent environment policies, security guardrails, and team configuration standards. \n \n Configure project description files as AI manuals with tech stack, coding standards, and DO NOT rules; use /init for auto-generation from codebase analysis \n Set up security hooks to block dangerous commands (rm -rf, sudo, curl | sh) and auto-approve only safe operations via PreToolUse and PostToolUse events \n Define skills, slash commands, and plugins with token efficiency in mind; skills loa
prometheus-configuration
wshobson/agents · Productivity
Complete Prometheus setup guide covering scrape configuration, recording rules, and alerting. \n \n Includes Kubernetes and Docker Compose installation methods with example configurations for static targets, file-based discovery, and Kubernetes service discovery \n Provides pre-built recording rules for HTTP metrics (request rates, error rates, latency percentiles) and resource metrics (CPU, memory, disk utilization) \n Covers alert rule examples for service availability, error rates, latency th
mtls-configuration
wshobson/agents · Productivity
Mutual TLS configuration for zero-trust service mesh communication with certificate management. \n \n Covers Istio, Linkerd, cert-manager, and SPIFFE/SPIRE implementations with ready-to-use YAML templates for strict mTLS enforcement, workload policies, and external service integration \n Includes certificate hierarchy design, automatic rotation strategies, and port-level mTLS control for mixed-protocol environments \n Provides debugging commands for TLS handshake issues, certificate expiry verif