.claude configuration
A comprehensive configuration framework with skills, agents, commands, and marketplace integrations that transform Claude Code into an autonomous engineering platform.
Interactive Demo
Watch how skills, agents, and commands work together in the terminal.
Skills Library
Domain-specific knowledge loaded on demand. From debugging methodologies to full-stack design systems.
LLM app development with RAG, prompt engineering, vector databases, and AI agents
Systematic 4-phase debugging methodology for complex, intermittent, or mysterious issues. Use when investigating bugs, race conditions, or unexplained failures.
OAuth 2.0, JWT, SSO, MFA, NextAuth/Clerk/Supabase Auth implementation patterns
Stripe, RevenueCat, subscription billing, webhooks, PCI compliance, and tax
Autonomous multi-agent coding with git worktree isolation, QA validation, and memory. Use for complex features requiring autonomous implementation.
Information security expertise for cybersecurity frameworks (NIST, ISO 27001), security architecture, incident response, vulnerability management, identity management, and cloud security. Use when designing security programs, responding to incidents, or assessing vulnerabilities.
REST and GraphQL API design best practices including OpenAPI specs. Use when designing APIs, documenting endpoints, or reviewing API architecture.
OpenTelemetry, structured logging, distributed tracing, alerting, and dashboards
Specialized Agents
Autonomous sub-agents that handle complex tasks. Each tuned for specific domains with curated tool access.
Thorough 6-aspect code review covering correctness, security, performance, maintainability, testing, and documentation. Use for comprehensive PR reviews or code quality audits.
OAuth 2.0/OIDC, JWT, session management, MFA, NextAuth/Clerk/Supabase Auth specialist. Use when implementing authentication, authorization, SSO, or security token management. Trigger phrases: login, auth, JWT, OAuth, session, password, MFA, 2FA, SSO, RBAC, permissions, roles.
Systematic 4-phase debugging for complex and intermittent issues. Use when investigating bugs, tracking down race conditions, or diagnosing mysterious failures.
Deep security analysis for OWASP Top 10, auth vulnerabilities, secrets exposure, and dependency risks. Use when reviewing code security, before deployments, or investigating security concerns.
Next.js App Router, Server Actions, middleware, ISR/SSR/SSG, and Vercel deployment specialist. Use when building Next.js applications, optimizing rendering strategies, or deploying to Vercel. Trigger phrases: Next.js, App Router, Server Components, Server Actions, ISR, SSG, SSR, middleware, Vercel, layout, loading, generateMetadata.
Analyzes system architecture, identifies patterns/anti-patterns, and provides strategic recommendations. Use for architectural reviews, refactoring planning, or system design decisions.
Marketplace
Curated from 110 open-source repositories. Discover, install, and extend your capabilities.
Automation Scripts
Setup, maintenance, and repo management automation that keeps the toolkit running smoothly.
Clone the repository and start using the full configuration framework.
The setup script initializes submodules, enforces no_push on all marketplace repos, registers marketplaces, and installs plugins.