tag

api

115 indexed skills · max 10 per page

skills (115)

api-error-handling

aj-geddes/useful-ai-prompts · Backend

0

Build robust error handling systems with standardized error responses, detailed logging, error categorization, and user-friendly error messages. This skill covers the full lifecycle from throwing typed errors through logging, monitoring, and client-facing response formatting.

ln-643-api-contract-auditor

levnikolaevich/claude-code-skills · Backend

0

ln-643-api-contract-auditor

api-gateway-configuration

aj-geddes/useful-ai-prompts · Backend

0

Design and configure API gateways to handle routing, authentication, rate limiting, and request/response transformation for microservice architectures.

trading212-api

trading212-labs/agent-skills · Backend

0

Note: The Trading 212 API is currently in beta and under active development. Some endpoints or behaviors may change.

wix-cli-backend-api

wix/skills · Backend

0

Creates HTTP endpoints for Wix CLI applications — server-side routes that handle HTTP requests, process data, and return responses. HTTP endpoints are powered by Astro endpoints and are automatically discovered from the file system.

jimeng-api-video-gen

wvlvik/toy-skills · Backend

0

Generate high-quality AI videos using Volcengine's Jimeng Video 3.0 Pro API with text prompts or input images.

ln-775-api-docs-generator

levnikolaevich/claude-code-skills · Backend

0

Type: L3 Worker Category: 7XX Project Bootstrap

api-authentication

aj-geddes/useful-ai-prompts · Backend

0

Implement comprehensive authentication strategies for APIs including JWT tokens, OAuth 2.0, API keys, and session management with proper security practices.

encore-api

encoredev/skills · Backend

0

When creating API endpoints with Encore.ts, follow these patterns:

api-fuzzing-for-bug-bounty

sickn33/antigravity-awesome-skills · Backend

0

Provide comprehensive techniques for testing REST, SOAP, and GraphQL APIs during bug bounty hunting and penetration testing engagements. Covers vulnerability discovery, authentication bypass, IDOR exploitation, and API-specific attack vectors.

prevpage 5 / 12next