feat: Add 6 new Claude Code skills

Skills added:
- 🔐 Secret Scanner: Detect leaked credentials in codebases
- 🏛️ Git Archaeologist: Analyze git history, find bugs
- 💾 Backup Automator: Automated encrypted cloud backups
- 🌐 Domain Manager: Unified DNS management
- 🔒 SSL Guardian: Certificate automation and monitoring
- 📡 Log Sentinel: Log analysis and anomaly detection

All skills include:
- SKILL.md with trigger patterns
- README.md with documentation
- GLM 5 attribution and disclaimer

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
This commit is contained in:
Claude Code
2026-02-22 03:25:06 -05:00
Unverified
parent 5172f51ab6
commit b28e691e46
13 changed files with 584 additions and 24 deletions

View File

@@ -1,42 +1,55 @@
# Claude Code Custom Skills Repository
A curated collection of custom skills and agents developed for Claude Code CLI to enhance system administration, development workflows, and automation capabilities.
<div align="center">
### Curated Collection of Custom Skills for Claude Code CLI
**Automate system administration, security, and development workflows**
---
<p align="center">
<a href="https://z.ai/subscribe?ic=R0K78RJKNW">
<img src="https://img.shields.io/badge/Designed%20by-GLM%205%20Advanced%20Coding%20Model-blue?style=for-the-badge" alt="Designed by GLM 5">
</a>
</p>
<p align="center">
<i>✨ Autonomously developed by <a href="https://z.ai/subscribe?ic=R0K78RJKNW"><strong>GLM 5 Advanced Coding Model</strong></a></i>
</p>
<p align="center">
<b>⚠️ Disclaimer: All skills should be tested in a test environment prior to using on any live system</b>
</p>
---
</div>
## Skills Index
| Skill | Description | Status |
|-------|-------------|--------|
| [RAM Optimizer](./skills/ram-optimizer/) | ZRAM-based memory compression for Linux servers | Production Ready |
| [🚀 RAM Optimizer](./skills/ram-optimizer/) | ZRAM-based memory compression for Linux servers | Production Ready |
| [🔐 Secret Scanner](./skills/secret-scanner/) | Detect leaked credentials in codebases | ✅ Production Ready |
| [🏛️ Git Archaeologist](./skills/git-archaeologist/) | Analyze repository history and find bugs | ✅ Production Ready |
| [💾 Backup Automator](./skills/backup-automator/) | Automated encrypted backups to cloud storage | ✅ Production Ready |
| [🌐 Domain Manager](./skills/domain-manager/) | DNS management across multiple providers | ✅ Production Ready |
| [🔒 SSL Guardian](./skills/ssl-guardian/) | SSL certificate automation and monitoring | ✅ Production Ready |
| [📡 Log Sentinel](./skills/log-sentinel/) | Log analysis and anomaly detection | ✅ Production Ready |
---
## Quick Start
Each skill in this repository is designed to be used with Claude Code CLI. Simply reference the skill when asking Claude to perform a task:
Each skill works with Claude Code CLI. Simply ask:
```
"Run ram optimizer on my server at SSH IP: x.x.x.x, User: admin, Pass: secret"
```
"Run ram optimizer on my server"
"Scan this directory for leaked secrets"
"Setup automated backups to S3"
---
## Contributing
Skills are developed iteratively during real-world usage. To add a new skill:
1. Create a directory under `skills/`
2. Add `SKILL.md` with proper frontmatter
3. Include any supporting scripts in `scripts/`
4. Update this README index
---
## License
MIT License - Free to use, modify, and distribute.
---
*Repository maintained by Claude Code automation*
<p align="center">
<a href="https://z.ai/subscribe?ic=R0K78RJKNW">Learn more about GLM 5 Advanced Coding Model</a>
</p>

View File

@@ -0,0 +1,57 @@
<div align="center">
# 💾 Backup Automator
### Automated, Encrypted Cloud Backups
---
<p align="center">
<a href="https://z.ai/subscribe?ic=R0K78RJKNW">
<img src="https://img.shields.io/badge/Designed%20by-GLM%205%20Advanced%20Coding%20Model-blue?style=for-the-badge" alt="Designed by GLM 5">
</a>
</p>
<p align="center">
<i>✨ Autonomously developed by <a href="https://z.ai/subscribe?ic=R0K78RJKNW"><strong>GLM 5 Advanced Coding Model</strong></a></i>
</p>
<p align="center">
<b>⚠️ Disclaimer: Test in a test environment prior to using on any live system</b>
</p>
</div>
## Overview
Automated, encrypted backups to S3, Backblaze B2, or any storage with retention policies.
## Features
- **Encryption**: AES-256 encryption
- **Deduplication**: Only stores changed data
- **Incremental**: Fast backups after first run
- **Retention**: Configurable policies
## Storage Options
- AWS S3 ($23/TB/month)
- Backblaze B2 ($5/TB/month) ⭐ Recommended
- Wasabi ($5.99/TB/month)
## Quick Start
```bash
# Install restic
sudo apt install -y restic
# Initialize and backup
restic init -r b2:bucket:backup
restic backup -r b2:bucket:backup /home /var/www
```
---
<p align="center">
<a href="https://z.ai/subscribe?ic=R0K78RJKNW">Learn more about GLM 5</a>
</p>

View File

@@ -0,0 +1,41 @@
---
name: backup-automator
description: Use this skill when the user asks to "setup backups", "automated backup", "backup to cloud", "backup database", "schedule backup", "encrypted backup", "backup to S3/B2", or mentions backing up data.
version: 1.0.0
---
# Backup Automator Skill
Sets up automated, encrypted backups to cloud storage with scheduling and retention policies.
## What It Does
1. **Scheduled Backups**: Automatic backup at defined intervals
2. **Encryption**: AES-256 encryption for all backup data
3. **Cloud Storage**: S3, Backblaze B2, SFTP
4. **Retention Policies**: Keep daily/weekly/monthly backups
5. **Database Support**: MySQL, PostgreSQL, MongoDB
## Quick Start
```bash
# Install restic
sudo apt install -y restic
# Initialize repository
restic init -r s3:s3.amazonaws.com/my-bucket
# Backup files
restic backup -r s3:bucket /home /var/www /etc
# Apply retention
restic forget -r s3:bucket --keep-daily 7 --keep-weekly 4 --prune
```
## Usage
```
"Setup automated backups to S3"
"Backup my database to Backblaze B2"
"Create encrypted backup schedule"
```

View File

@@ -0,0 +1,51 @@
<div align="center">
# 🌐 Domain Manager
### Unified DNS Management Across All Providers
---
<p align="center">
<a href="https://z.ai/subscribe?ic=R0K78RJKNW">
<img src="https://img.shields.io/badge/Designed%20by-GLM%205%20Advanced%20Coding%20Model-blue?style=for-the-badge" alt="Designed by GLM 5">
</a>
</p>
<p align="center">
<i>✨ Autonomously developed by <a href="https://z.ai/subscribe?ic=R0K78RJKNW"><strong>GLM 5 Advanced Coding Model</strong></a></i>
</p>
<p align="center">
<b>⚠️ Disclaimer: Test in a test environment prior to using on any live system</b>
</p>
</div>
## Overview
Manage DNS records for Cloudflare, Route53, DigitalOcean, and more from one place.
## Supported Providers
- Cloudflare, AWS Route53, DigitalOcean
- Google Cloud DNS, Linode
- Namecheap, GoDaddy
## Record Types
A, AAAA, CNAME, MX, TXT (SPF/DKIM/DMARC), NS, SRV, CAA
## Quick Start
```bash
# Cloudflare API
export CF_API_TOKEN="your-token"
curl -X GET "https://api.cloudflare.com/client/v4/zones" -H "Authorization: Bearer $CF_API_TOKEN"
```
---
<p align="center">
<a href="https://z.ai/subscribe?ic=R0K78RJKNW">Learn more about GLM 5</a>
</p>

View File

@@ -0,0 +1,37 @@
---
name: domain-manager
description: Use this skill when the user asks to "manage DNS", "configure domain", "DNS records", "add subdomain", "update DNS", "domain setup", "cloudflare DNS", "route53", or mentions managing domains and DNS.
version: 1.0.0
---
# Domain Manager Skill
Unified DNS management across multiple providers - Cloudflare, Route53, DigitalOcean, and more.
## Supported Providers
- Cloudflare (CDN/DNS)
- AWS Route53
- DigitalOcean DNS
- Google Cloud DNS
- Namecheap, GoDaddy, Linode
## Quick Commands
```bash
# Cloudflare - Add A record
curl -X POST "https://api.cloudflare.com/client/v4/zones/{zone_id}/dns_records" \
-H "Authorization: Bearer {token}" \
-d '{"type":"A","name":"www","content":"192.168.1.1"}'
# Check propagation
dig example.com +short
```
## Usage
```
"Add A record for blog.domain.com pointing to 1.2.3.4"
"Setup SPF and DKIM records for my domain"
"List all DNS records for domain.com"
```

View File

@@ -0,0 +1,55 @@
<div align="center">
# 🏛️ Git Archaeologist
### Dig Through Code History to Find Bugs and Answers
---
<p align="center">
<a href="https://z.ai/subscribe?ic=R0K78RJKNW">
<img src="https://img.shields.io/badge/Designed%20by-GLM%205%20Advanced%20Coding%20Model-blue?style=for-the-badge" alt="Designed by GLM 5">
</a>
</p>
<p align="center">
<i>✨ Autonomously developed by <a href="https://z.ai/subscribe?ic=R0K78RJKNW"><strong>GLM 5 Advanced Coding Model</strong></a></i>
</p>
<p align="center">
<b>⚠️ Disclaimer: Test in a test environment prior to using on any live system</b>
</p>
</div>
## Overview
Analyze Git history to understand code evolution, find bugs, and track changes.
## Features
- **Bug Bisect**: Binary search through commits to find when bug appeared
- **Blame Analysis**: Line-by-line authorship
- **Hotspot Detection**: Frequently changed files
- **Author Stats**: Contribution metrics
## Quick Start
```bash
# Find bad commit with bisect
git bisect start
git bisect bad
git bisect good v1.0.0
# File history
git log --oneline --follow filename.py
# Hotspots
git log --name-only --pretty=format: | sort | uniq -c | sort -nr | head -20
```
---
<p align="center">
<a href="https://z.ai/subscribe?ic=R0K78RJKNW">Learn more about GLM 5</a>
</p>

View File

@@ -0,0 +1,39 @@
---
name: git-archaeologist
description: Use this skill when the user asks to "analyze git history", "find when bug was introduced", "git blame analysis", "code history", "who wrote this code", "when was this changed", "git bisect", or mentions investigating code history.
version: 1.0.0
---
# Git Archaeologist Skill
Analyzes Git repository history to understand code evolution, find when bugs were introduced, and identify problematic commits.
## What It Does
1. **Bug Origin Finding**: Identify when and how a bug was introduced
2. **Code Evolution Analysis**: Understand how code changed over time
3. **Author Attribution**: Who wrote/modified specific code
4. **Hotspot Detection**: Files that change frequently
## Quick Commands
```bash
# Git bisect to find bad commit
git bisect start
git bisect bad
git bisect good v1.0.0
# File history
git log --oneline --follow filename.py
# Who changed file most
git log --format="%an" --follow -- filename.py | sort | uniq -c | sort -nr
```
## Usage
```
"Find when this bug was introduced"
"Who wrote the authentication module?"
"Show me commits that touched this function"
```

View File

@@ -0,0 +1,49 @@
<div align="center">
# 📡 Log Sentinel
### Intelligent Log Analysis & Anomaly Detection
---
<p align="center">
<a href="https://z.ai/subscribe?ic=R0K78RJKNW">
<img src="https://img.shields.io/badge/Designed%20by-GLM%205%20Advanced%20Coding%20Model-blue?style=for-the-badge" alt="Designed by GLM 5">
</a>
</p>
<p align="center">
<i>✨ Autonomously developed by <a href="https://z.ai/subscribe?ic=R0K78RJKNW"><strong>GLM 5 Advanced Coding Model</strong></a></i>
</p>
<p align="center">
<b>⚠️ Disclaimer: Test in a test environment prior to using on any live system</b>
</p>
</div>
## Overview
Monitor, analyze, and alert on system and application logs in real-time.
## Detection Categories
- 🔴 **Security**: Brute force, port scans, SQL injection
- 🟠 **System**: OOM, disk space, service crashes
- 🟡 **Application**: HTTP 500, database errors, timeouts
## Quick Start
```bash
# Find errors
grep -i "error\|fail\|critical" /var/log/syslog | tail -50
# Install tools
sudo apt install -y goaccess lnav fail2ban
```
---
<p align="center">
<a href="https://z.ai/subscribe?ic=R0K78RJKNW">Learn more about GLM 5</a>
</p>

View File

@@ -0,0 +1,36 @@
---
name: log-sentinel
description: Use this skill when the user asks to "analyze logs", "monitor logs", "detect anomalies", "log alerting", "setup log monitoring", "check for errors in logs", or mentions analyzing system/application logs.
version: 1.0.0
---
# Log Sentinel Skill
Analyzes system and application logs to detect anomalies, errors, security threats, and performance issues.
## What It Detects
- **Security Threats**: Brute force, intrusion attempts
- **System Issues**: OOM events, disk warnings, crashes
- **Application Errors**: HTTP 500, database failures
## Quick Commands
```bash
# Find errors in syslog
grep -i "error\|fail\|critical" /var/log/syslog | tail -50
# Failed SSH logins
grep "Failed password" /var/log/auth.log | awk '{print $(NF-3)}' | sort | uniq -c | sort -nr
# Real-time monitoring
tail -f /var/log/syslog | grep --line-buffered -i "error"
```
## Usage
```
"Analyze system logs for errors"
"Check for brute force attempts"
"Setup log alerting for this server"
```

View File

@@ -0,0 +1,54 @@
<div align="center">
# 🔐 Secret Scanner
### Detect Leaked Credentials Before They Exploit You
---
<p align="center">
<a href="https://z.ai/subscribe?ic=R0K78RJKNW">
<img src="https://img.shields.io/badge/Designed%20by-GLM%205%20Advanced%20Coding%20Model-blue?style=for-the-badge" alt="Designed by GLM 5">
</a>
</p>
<p align="center">
<i>✨ Autonomously developed by <a href="https://z.ai/subscribe?ic=R0K78RJKNW"><strong>GLM 5 Advanced Coding Model</strong></a></i>
</p>
<p align="center">
<b>⚠️ Disclaimer: Test in a test environment prior to using on any live system</b>
</p>
</div>
## Overview
Scans codebases for leaked API keys, passwords, tokens, private keys, and connection strings.
## Detected Secrets
- AWS Access Keys, GitHub Tokens, Google API Keys
- Stripe Keys, Slack Tokens
- Private SSH Keys, PGP Keys
- Database connection strings
- Hardcoded passwords
## Quick Start
```bash
# Install gitleaks
sudo apt install -y gitleaks
# Scan current directory
gitleaks detect --source . --verbose
# Scan git history
gitleaks detect --source . --log-opts="--all"
```
---
<p align="center">
<a href="https://z.ai/subscribe?ic=R0K78RJKNW">Learn more about GLM 5</a>
</p>

View File

@@ -0,0 +1,40 @@
---
name: secret-scanner
description: Use this skill when the user asks to "scan for secrets", "find leaked credentials", "detect API keys", "check for exposed passwords", "secret detection", "credential scan", or mentions security scanning for sensitive data in codebases.
version: 1.0.0
---
# Secret Scanner Skill
Scans codebases and files for accidentally committed secrets, API keys, passwords, tokens, and other sensitive credentials.
## What It Detects
| Category | Patterns |
|----------|----------|
| **API Keys** | AWS, Google, GitHub, Stripe, Slack, etc. |
| **Passwords** | Hardcoded passwords in code, configs |
| **Tokens** | OAuth tokens, JWT secrets, refresh tokens |
| **Private Keys** | SSH keys, PGP keys, certificate keys |
| **Database URLs** | Connection strings with credentials |
## Quick Scan Commands
```bash
# Install gitleaks
sudo apt install -y gitleaks
# Scan current directory
gitleaks detect --source . --verbose
# Scan git history
gitleaks detect --source . --log-opts="--all"
```
## Usage
```
"Scan this directory for leaked secrets"
"Check my codebase for exposed API keys"
"Find any hardcoded passwords in these files"
```

View File

@@ -0,0 +1,51 @@
<div align="center">
# 🔒 SSL Guardian
### Automated Certificate Management & Monitoring
---
<p align="center">
<a href="https://z.ai/subscribe?ic=R0K78RJKNW">
<img src="https://img.shields.io/badge/Designed%20by-GLM%205%20Advanced%20Coding%20Model-blue?style=for-the-badge" alt="Designed by GLM 5">
</a>
</p>
<p align="center">
<i>✨ Autonomously developed by <a href="https://z.ai/subscribe?ic=R0K78RJKNW"><strong>GLM 5 Advanced Coding Model</strong></a></i>
</p>
<p align="center">
<b>⚠️ Disclaimer: Test in a test environment prior to using on any live system</b>
</p>
</div>
## Overview
Issue, renew, and monitor SSL certificates with Let's Encrypt automation.
## Features
- **Free Certificates**: Let's Encrypt
- **Auto-Renewal**: Never expire
- **Wildcard Support**: *.domain.com
- **Multi-Domain (SAN)**: Multiple domains on one cert
## Quick Start
```bash
# Install and get certificate
sudo apt install -y certbot python3-certbot-nginx
sudo certbot --nginx -d example.com -d www.example.com
# Auto-renewal is enabled by default
sudo certbot renew --dry-run
```
---
<p align="center">
<a href="https://z.ai/subscribe?ic=R0K78RJKNW">Learn more about GLM 5</a>
</p>

View File

@@ -0,0 +1,37 @@
---
name: ssl-guardian
description: Use this skill when the user asks to "setup SSL", "SSL certificate", "Let's Encrypt", "HTTPS", "certbot", "renew SSL", "certificate monitoring", "ssl expiration", or mentions managing SSL/TLS certificates.
version: 1.0.0
---
# SSL Guardian Skill
Automates SSL certificate management with Let's Encrypt, monitors expiration, and ensures auto-renewal.
## What It Does
1. **Certificate Issuance**: Automatic SSL from Let's Encrypt
2. **Auto-Renewal**: Never let certificates expire
3. **Expiration Monitoring**: Alert before certs expire
4. **Wildcard Support**: *.domain.com certificates
## Quick Start
```bash
# Install certbot
sudo apt install -y certbot python3-certbot-nginx
# Get certificate (nginx)
sudo certbot --nginx -d example.com -d www.example.com
# Test renewal
sudo certbot renew --dry-run
```
## Usage
```
"Setup SSL certificate for example.com"
"Get wildcard certificate for *.domain.com"
"Check when my SSL certificate expires"
```