Toolverse

Find the best skills for

eventbridge

by itsmostafa

AWS EventBridge serverless event bus for event-driven architectures. Use when creating rules, configuring event patterns, setting up scheduled events, integrating with SaaS, or building cross-account event routing.

DevOps
13

eventbridge-rule-creator

by jeremylongshore

Eventbridge Rule Creator - Auto-activating skill for AWS Skills.\nTriggers on: eventbridge rule creator, eventbridge rule creator\nPart of the AWS Skills skill category.

Security
1

evernote-ci-integration

by jeremylongshore

Configure CI/CD pipelines for Evernote integrations.\nUse when setting up automated testing, continuous integration,\nor deployment pipelines for Evernote projects.\nTrigger with phrases like \

Testing
13

evernote-common-errors

by jeremylongshore

Diagnose and fix common Evernote API errors.\nUse when encountering Evernote API exceptions, debugging failures,\nor troubleshooting integration issues.\nTrigger with phrases like \

Security
11

evernote-core-workflow-a

by jeremylongshore

Execute Evernote primary workflow: Note Creation and Management.\nUse when creating notes, organizing content, managing notebooks,\nor implementing note-taking features.\nTrigger with phrases like \

Security
114

evernote-cost-tuning

by jeremylongshore

Optimize Evernote integration costs and resource usage.\nUse when managing API quotas, reducing storage usage,\nor optimizing upload limits.\nTrigger with phrases like \

Security
14

evernote-data-handling

by jeremylongshore

Best practices for handling Evernote data.\nUse when implementing data storage, processing notes,\nhandling attachments, or ensuring data integrity.\nTrigger with phrases like \

Security
1

evernote-hello-world

by jeremylongshore

Create a minimal working Evernote example.\nUse when starting a new Evernote integration, testing your setup,\nor learning basic Evernote API patterns.\nTrigger with phrases like \

Testing
1

evernote-install-auth

by jeremylongshore

Install and configure Evernote SDK and OAuth authentication.\nUse when setting up a new Evernote integration, configuring API keys,\nor initializing Evernote in your project.\nTrigger with phrases like \

Security
14

evernote-local-dev-loop

by jeremylongshore

Set up efficient local development workflow for Evernote integrations.\nUse when configuring dev environment, setting up sandbox testing,\nor optimizing development iteration speed.\nTrigger with phrases like \

Testing
1

evernote-migration-deep-dive

by jeremylongshore

Deep dive into Evernote data migration strategies.\nUse when migrating to/from Evernote, bulk data transfers,\nor complex migration scenarios.\nTrigger with phrases like \

Mobile
11

evernote-observability

by jeremylongshore

Implement observability for Evernote integrations.\nUse when setting up monitoring, logging, tracing,\nor alerting for Evernote applications.\nTrigger with phrases like \

Security
1

evernote-performance-tuning

by jeremylongshore

Optimize Evernote integration performance.\nUse when improving response times, reducing API calls,\nor scaling Evernote integrations.\nTrigger with phrases like \

Security
1

evernote-reference-architecture

by jeremylongshore

Reference architecture for Evernote integrations.\nUse when designing system architecture, planning integrations,\nor building scalable Evernote applications.\nTrigger with phrases like \

Security
1

evernote-sdk-patterns

by jeremylongshore

Advanced Evernote SDK patterns and best practices.\nUse when implementing complex note operations, batch processing,\nsearch queries, or optimizing SDK usage.\nTrigger with phrases like \

Security

evernote-security-basics

by jeremylongshore

Implement security best practices for Evernote integrations.\nUse when securing API credentials, implementing OAuth securely,\nor hardening Evernote integrations.\nTrigger with phrases like \

Security

evernote-webhooks-events

by jeremylongshore

Implement Evernote webhook notifications and sync events.\nUse when handling note changes, implementing real-time sync,\nor processing Evernote notifications.\nTrigger with phrases like \

Security
1

every-style-editor

by EveryInc

This skill should be used when reviewing or editing copy to ensure adherence to Every's style guide. It provides a systematic line-by-line review process for grammar, punctuation, mechanics, and style guide compliance.

Security
1

evm-wallet-skill

by openclaw

Self-sovereign EVM wallet for AI agents. Use when the user wants to create a crypto wallet, check balances, send ETH or ERC20 tokens, swap tokens, or interact with smart contracts. Supports Base, Ethereum, Polygon, Arbitrum, and Optimism. Private keys stored locally — no cloud

DevOps
1

evolution

by ZhangHanDong

CRITICAL: Use for makepad-skills self-evolution and contribution. Triggers on:\nevolve, evolution, contribute, contribution, self-improve, self-improvement,\nadd pattern, new pattern, capture learning, document solution,\nhooks, hook system, auto-trigger, skill

DevOps
16

evolving-skill-creator

by massgen

Guide for creating evolving skills - detailed workflow plans that capture what you'll do, what tools you'll create, and learnings from execution. Use this when starting a new task that could benefit from a reusable workflow.

Backend
1

evowebai-website-builder

by openclaw

Create a Website Designed to Bring Clients from ChatGPT, Gemini u0026 Modern Search

Data Science
221

exa-ci-integration

by jeremylongshore

Configure Exa CI/CD integration with GitHub Actions and testing.\nUse when setting up automated testing, configuring CI pipelines,\nor integrating Exa tests into your build process.\nTrigger with phrases like \

Testing
1

exa-common-errors

by jeremylongshore

Diagnose and fix Exa common errors and exceptions.\nUse when encountering Exa errors, debugging failed requests,\nor troubleshooting integration issues.\nTrigger with phrases like \

Security
1

exa-core-workflow-a

by jeremylongshore

Execute Exa primary workflow: Core Workflow A.\nUse when implementing primary use case,\nbuilding main features, or core integration tasks.\nTrigger with phrases like \

Security
1

exa-core-workflow-b

by jeremylongshore

Execute Exa secondary workflow: Core Workflow B.\nUse when implementing secondary use case,\nor complementing primary workflow.\nTrigger with phrases like \

Security

exa-cost-tuning

by jeremylongshore

Optimize Exa costs through tier selection, sampling, and usage monitoring.\nUse when analyzing Exa billing, reducing API costs,\nor implementing usage monitoring and budget alerts.\nTrigger with phrases like \

Security

exa-data-handling

by jeremylongshore

Implement Exa PII handling, data retention, and GDPR/CCPA compliance patterns.\nUse when handling sensitive data, implementing data redaction, configuring retention policies,\nor ensuring compliance with privacy regulations for Exa integrations.\nTrigger with phrases like \

Security
1

exa-enterprise-rbac

by jeremylongshore

Configure Exa enterprise SSO, role-based access control, and organization management.\nUse when implementing SSO integration, configuring role-based permissions,\nor setting up organization-level controls for Exa.\nTrigger with phrases like \

Security
1

exa-hello-world

by jeremylongshore

Create a minimal working Exa example.\nUse when starting a new Exa integration, testing your setup,\nor learning basic Exa API patterns.\nTrigger with phrases like \

Testing
12

exa-install-auth

by jeremylongshore

Install and configure Exa SDK/CLI authentication.\nUse when setting up a new Exa integration, configuring API keys,\nor initializing Exa in your project.\nTrigger with phrases like \

Security

exa-local-dev-loop

by jeremylongshore

Configure Exa local development with hot reload and testing.\nUse when setting up a development environment, configuring test workflows,\nor establishing a fast iteration cycle with Exa.\nTrigger with phrases like \

Testing

exa-migration-deep-dive

by jeremylongshore

Execute Exa major re-architecture and migration strategies with strangler fig pattern.\nUse when migrating to or from Exa, performing major version upgrades,\nor re-platforming existing integrations to Exa.\nTrigger with phrases like \

DevOps
1

exa-observability

by jeremylongshore

Set up comprehensive observability for Exa integrations with metrics, traces, and alerts.\nUse when implementing monitoring for Exa operations, setting up dashboards,\nor configuring alerting for Exa integration health.\nTrigger with phrases like \

Security
1

exa-plus

by openclaw

Neural web search via Exa AI. Search people, companies, news, research, code. Supports deep search, domain filters, date ranges.

Data Science
12

exa-policy-guardrails

by jeremylongshore

Implement Exa lint rules, policy enforcement, and automated guardrails.\nUse when setting up code quality rules for Exa integrations, implementing\npre-commit hooks, or configuring CI policy checks for Exa best practices.\nTrigger with phrases like \

Security
1

exa-rate-limits

by jeremylongshore

Implement Exa rate limiting, backoff, and idempotency patterns.\nUse when handling rate limit errors, implementing retry logic,\nor optimizing API request throughput for Exa.\nTrigger with phrases like \

Mobile

exa-research

by benjaminjackson

Use when the user mentions Exa research OR when the workflow benefits from complex, multi-step research and other exa-ai approaches are not yielding satisfactory results.

Backend
488

exa-sdk-patterns

by jeremylongshore

Apply production-ready Exa SDK patterns for TypeScript and Python.\nUse when implementing Exa integrations, refactoring SDK usage,\nor establishing team coding standards for Exa.\nTrigger with phrases like \

Security
13

exa-search

by benjaminjackson

Search the web for content matching a query with AI-powered semantic search. Use for finding relevant web pages, research papers, news articles, code repositories, or any web content by meaning rather than just keywords.

Backend
593

exa-security-basics

by jeremylongshore

Apply Exa security best practices for secrets and access control.\nUse when securing API keys, implementing least privilege access,\nor auditing Exa security configuration.\nTrigger with phrases like \

Security
11

exa-upgrade-migration

by jeremylongshore

Analyze, plan, and execute Exa SDK upgrades with breaking change detection.\nUse when upgrading Exa SDK versions, detecting deprecations,\nor migrating to new API versions.\nTrigger with phrases like \

Security
12

exa-web-search-free

by openclaw

Free AI search via Exa MCP. Web search for news/info, code search for docs/examples from GitHub/StackOverflow, company research for business intel. No API key needed.

Data Science
113

exa-webhooks-events

by jeremylongshore

Implement Exa webhook signature validation and event handling.\nUse when setting up webhook endpoints, implementing signature verification,\nor handling Exa event notifications securely.\nTrigger with phrases like \

Security
1

example-skill

by anthropics

This skill should be used when the user asks to \

Data Science
226

examples-auto-run

by openai

Run python examples in auto mode with logging, rerun helpers, and background control.

Backend
23

excalidraw

by ryanquinn3

\

Data Science
124204

excalidraw-diagram

by axtonliu

Generate Excalidraw diagrams from text content. Supports three output modes - Obsidian (.md), Standard (.excalidraw), and Animated (.excalidraw with animation order). Triggers on \

UX / Design
37