Toolverse
All skills

ideogram-data-handling

by jeremylongshore

Implement Ideogram PII handling, data retention, and GDPR/CCPA compliance patterns.\nUse when handling sensitive data, implementing data redaction, configuring retention policies,\nor ensuring compliance with privacy regulations for Ideogram integrations.\nTrigger with phrases

Installation

Pick a client and clone the repository into its skills directory.

Installation

Quick info

Category
Security

About this skill

Implement Ideogram PII handling, data retention, and GDPR/CCPA compliance patterns.\nUse when handling sensitive data, implementing data redaction, configuring retention policies,\nor ensuring compliance with privacy regulations for Ideogram integrations.\nTrigger with phrases like \

How to use

  1. Skonfiguruj zmienną środowiskową IDEOGRAM_API_KEY z kluczem API Ideogram.

  2. Wybierz rozwiązanie do przechowywania: system plików lokalny, Amazon S3 lub Google Cloud Storage. Przygotuj dostęp do wybranego systemu.

  3. Przygotuj bazę danych do metadanych – SQLite, PostgreSQL lub JSON. Skill będzie zapisywać tam rekordy każdej generacji (ID, prompt, model, rozdzielczość, URL tymczasowy, ścieżka przechowywania, timestamp).

  4. Wyzwól skill frazami takimi jak "ideogram data", "ideogram images", "ideogram asset management", "ideogram metadata" lub "ideogram image storage" w kontekście pracy z obrazami Ideogram.

  5. Skill automatycznie pobierze obraz z tymczasowego URL Ideogram, zapisze go w wybranym magazynie i zaloguje metadane (prompt, seed, parametry modelu, informacja o bezpieczeństwie) w bazie danych.

  6. Wykorzystaj zapisane seed i parametry do reprodukcji obrazów, a metadane do śledzenia historii generacji i zarządzania cyklem życia zasobów.

Related skills

architect-review

by sickn33

Master software architect specializing in modern architecture patterns, clean architecture, microservices, event-driven systems, and DDD. Reviews system designs and code changes for architectural integrity, scalability, and maintainability. Use PROACTIVELY for architectural

Security
2773

content-creator

by alirezarezvani

Create SEO-optimized marketing content with consistent brand voice. Includes brand voice analyzer, SEO optimizer, content frameworks, and social media templates. Use when writing blog posts, creating social media content, analyzing brand voice, optimizing SEO, planning content

Security
25124

youtube-watcher

by openclaw

Fetch and read transcripts from YouTube videos. Use when you need to summarize a video, answer questions about its content, or extract information from it.

Security
2231

obsidian

by gapmiss

Comprehensive guidelines for Obsidian.md plugin development including all 27 ESLint rules, TypeScript best practices, memory management, API usage (requestUrl vs fetch), UI/UX standards, and submission requirements. Use when working with Obsidian plugins, main.ts files,

Security
14111

reviewing-code

by CaptainCrouton89

Systematically evaluate code changes for security, correctness, performance, and spec alignment. Use when reviewing PRs, assessing code quality, or verifying implementation against requirements.

Security
1493

senior-security

by davila7

Comprehensive security engineering skill for application security, penetration testing, security architecture, and compliance auditing. Includes security assessment tools, threat modeling, crypto implementation, and security automation. Use when designing security architecture,

Security
2482