Toolverse
All skills

evernote-data-handling

by jeremylongshore

Best practices for handling Evernote data.\nUse when implementing data storage, processing notes,\nhandling attachments, or ensuring data integrity.\nTrigger with phrases like \

Installation

Pick a client and clone the repository into its skills directory.

Installation

Quick info

Category
Security

About this skill

Best practices for handling Evernote data.\nUse when implementing data storage, processing notes,\nhandling attachments, or ensuring data integrity.\nTrigger with phrases like \

How to use

  1. Zainstaluj skill w swoim środowisku Claude Code, Codex lub OpenClaw, dodając go do pakietu saas-packs/evernote-pack/skills.

  2. Przygotuj bazę danych — utwórz schemat SQL odzwierciedlający model danych Evernote z tabelami: notes (identyfikator, tytuł, zawartość, identyfikator notebooka, daty), notebooks (identyfikator, nazwa, stos), tags (identyfikator, nazwa) oraz resources (identyfikator, identyfikator notatki, typ MIME, hash, rozmiar). Śledź Update Sequence Numbers (USN) do synchronizacji przyrostowej.

  3. Wyzwól skill frazami takimi jak "evernote data", "handle evernote notes", "evernote storage" lub "process evernote content".

  4. Przetwarzaj zawartość ENML — skill dostarcza funkcje do ekstrakcji tekstu zwykłego (usuwanie tagów), konwersji do HTML (zamiana en-note na body, en-media na img/a) lub Markdown. Waliduj ENML przed wysłaniem do API, sprawdzając wymagane deklaracje i zabronione elementy.

  5. Zarządzaj załącznikami — przechowuj zasoby lokalnie, śledź ich metadane (typ MIME, rozmiar, hash) i synchronizuj je z notatkami za pomocą identyfikatorów.

  6. Synchronizuj dane — używaj USN do śledzenia zmian i wykonywania synchronizacji przyrostowej zamiast pełnego eksportu, co przyspiesza pracę z dużymi zbiorami notatek.

Related skills

academic-researcher

by Shubhamsaboo

Academic research assistant for literature reviews, paper analysis, and scholarly writing.\nUse when: reviewing academic papers, conducting literature reviews, writing research summaries,\nanalyzing methodologies, formatting citations, or when user mentions academic research,

Security
1260

senior-security

by davila7

Comprehensive security engineering skill for application security, penetration testing, security architecture, and compliance auditing. Includes security assessment tools, threat modeling, crypto implementation, and security automation. Use when designing security architecture,

Security
2482

google-analytics

by davila7

Analyze Google Analytics data, review website performance metrics, identify traffic patterns, and suggest data-driven improvements. Use when the user asks about analytics, website metrics, traffic analysis, conversion rates, user behavior, or performance optimization.

Security
1260

reviewing-code

by CaptainCrouton89

Systematically evaluate code changes for security, correctness, performance, and spec alignment. Use when reviewing PRs, assessing code quality, or verifying implementation against requirements.

Security
1493

architect-review

by sickn33

Master software architect specializing in modern architecture patterns, clean architecture, microservices, event-driven systems, and DDD. Reviews system designs and code changes for architectural integrity, scalability, and maintainability. Use PROACTIVELY for architectural

Security
2773

gmail-manager

by jeffvincent

Manage Gmail - send, read, search emails, manage labels and drafts. Use when user wants to interact with their Gmail account for email operations.

Security
17128