Toolverse
All skills

exa-data-handling

by jeremylongshore

Implement Exa PII handling, data retention, and GDPR/CCPA compliance patterns.\nUse when handling sensitive data, implementing data redaction, configuring retention policies,\nor ensuring compliance with privacy regulations for Exa integrations.\nTrigger with phrases like \

Installation

Pick a client and clone the repository into its skills directory.

Installation

Quick info

Category
Security

About this skill

Implement Exa PII handling, data retention, and GDPR/CCPA compliance patterns.\nUse when handling sensitive data, implementing data redaction, configuring retention policies,\nor ensuring compliance with privacy regulations for Exa integrations.\nTrigger with phrases like \

How to use

  1. Zainstaluj zależności: exa-js SDK oraz opcjonalnie lru-cache (cache w pamięci) lub ioredis (Redis). Ustaw zmienną środowiskową EXA_API_KEY z kluczem API Exa.
  2. Wybierz poziom ekstrakcji treści w zależności od potrzeb: metadane tylko (najszybciej, najtaniej — zwraca URL, tytuł, score), highlights (zbalansowana cena/wartość — zwraca fragmenty tekstu skoncentrowane na zapytaniu), lub pełny tekst z limitem znaków (do 2000 znaków dla kontroli budżetu tokenów).
  3. Dla wyszukiwania z samymi metadanymi użyj exa.search(query, { type: "auto", numResults: 10 }) — bez opcji content zwraca tylko podstawowe dane.
  4. Dla highlights użyj exa.searchAndContents(query, { numResults: 10, highlights: { maxCharacters: 500, query: query } }) — query w highlights skupia fragmenty na oryginalnym zapytaniu.
  5. Dla pełnego tekstu użyj exa.searchAndContents(query, { numResults: 5, text: { maxCharacters: 2000 }, highlights: {...} }) — ograniczenie znaków chroni budżet tokenów LLM.
  6. Implementuj cache'owanie wyników z TTL (time-to-live) aby uniknąć powtarzających się zapytań do API — użyj LRU-cache dla małych zbiorów lub Redis dla produkcji. Deduplikuj cytowania przed wysłaniem do modelu, aby zmniejszyć szum w kontekście.

Related skills

architect-review

by sickn33

Master software architect specializing in modern architecture patterns, clean architecture, microservices, event-driven systems, and DDD. Reviews system designs and code changes for architectural integrity, scalability, and maintainability. Use PROACTIVELY for architectural

Security
2773

accessibility-compliance

by wshobson

Implement WCAG 2.2 compliant interfaces with mobile accessibility, inclusive design patterns, and assistive technology support. Use when auditing accessibility, implementing ARIA patterns, building for screen readers, or ensuring inclusive user experiences.

Security
2173

skill-writer

by pytorch

Guide users through creating Agent Skills for Claude Code. Use when the user wants to create, write, author, or design a new Skill, or needs help with SKILL.md files, frontmatter, or skill structure.

Security
15116

security-compliance

by davila7

Guides security professionals in implementing defense-in-depth security architectures, achieving compliance with industry frameworks (SOC2, ISO27001, GDPR, HIPAA), conducting threat modeling and risk assessments, managing security operations and incident response, and embedding

Security
1172

academic-researcher

by Shubhamsaboo

Academic research assistant for literature reviews, paper analysis, and scholarly writing.\nUse when: reviewing academic papers, conducting literature reviews, writing research summaries,\nanalyzing methodologies, formatting citations, or when user mentions academic research,

Security
1260

gmail-manager

by jeffvincent

Manage Gmail - send, read, search emails, manage labels and drafts. Use when user wants to interact with their Gmail account for email operations.

Security
17128