gemini-research
π―Skillfrom dnyoussef/context-cascade
Automates comprehensive research workflows by leveraging Google's Gemini AI for in-depth information gathering, analysis, and structured report generation.
Part of
dnyoussef/context-cascade(33 items)
Installation
/plugin marketplace add DNYoussef/context-cascade/plugin install 12fa-core/plugin install 12fa-core 12fa-three-loop 12fa-security 12fa-visual-docs 12fa-swarmnpm install -g claude-flow@alphaclaude mcp add claude-flow npx claude-flow@alpha mcp start+ 5 more commands
{
"mcpServers": {
"connascence-analyzer": {
"command": "python",
...More from this repository10
Automates firmware disassembly, binary analysis, and vulnerability detection for embedded systems and IoT device security assessments.
Rapidly assess software binaries, identify potential vulnerabilities, and extract critical insights using advanced reverse engineering techniques.
Performs comprehensive static and dynamic code analysis to uncover software architecture, dependencies, and potential vulnerabilities in complex systems.
Automates thorough pull request reviews by systematically analyzing code quality, architecture, performance, and potential security risks across multiple dimensions.
Automatically diagnoses and iteratively refines code errors by generating targeted fixes and validating solutions through systematic debugging techniques.
Validates and sanitizes AI-generated code snippets to prevent potential security risks and unintended execution vulnerabilities.
Streamlines feature development by generating boilerplate code, managing dependencies, and creating standardized project structures with minimal configuration.
Rapidly onboard developers to complex codebases by generating comprehensive documentation, architecture diagrams, and dependency maps using AI analysis.
Generates custom React hooks with intelligent type inference, automatic dependency tracking, and performance optimization strategies.
Automates comprehensive network and system reconnaissance by scanning, fingerprinting, and mapping infrastructure vulnerabilities and potential entry points.