Skip to main content

setting-up-gitignore

This skill should be used when users need to create or update a .gitignore file for their project. It provides comprehensive security-focused patterns and automatically detects the tech stack to include appropriate language-specific exclusions. Use when users ask to "set up gitignore", "create a secure gitignore", "add gitignore protection", or similar requests.

Stars

7

Forks

0

Updated

October 19, 2025 at 21:26

Related Skills

proffesor-for-testing

flow-nexus-platform

proffesor-for-testing

Comprehensive Flow Nexus platform management - authentication, sandboxes, app deployment, payments, and challenges

16•security
jezweb

clerk-auth

jezweb

This skill provides comprehensive knowledge for integrating Clerk authentication in React, Next.js, and Cloudflare Workers applications. It should be used when setting up user authentication, implementing protected routes, verifying JWT tokens, configuring Clerk middleware, integrating with shadcn/ui components, or troubleshooting Clerk authentication errors. Use when: adding Clerk to React/Vite projects, setting up Clerk in Next.js App Router, implementing Clerk authentication in Cloudflare Workers, configuring clerkMiddleware for route protection, creating custom JWT templates, verifying tokens with @clerk/backend, integrating Clerk with Hono, using Clerk shadcn/ui components, or encountering authentication errors. Prevents 10 documented issues: missing secret key errors, API key migration failures, JWKS cache race conditions, CSRF vulnerabilities from missing authorizedParties, import path errors after Core 2 upgrade, JWT size limit issues, deprecated API version warnings, ClerkProvider JSX component errors, async auth() helper confusion, and environment variable misconfiguration. Keywords: clerk, clerk auth, clerk authentication, @clerk/nextjs, @clerk/backend, @clerk/clerk-react, clerkMiddleware, createRouteMatcher, verifyToken, useUser, useAuth, useClerk, JWT template, clerk webhook, clerk secret key, clerk publishable key, protected routes, Cloudflare Workers auth, Next.js auth, shadcn/ui auth, @hono/clerk-auth, "Missing Clerk Secret Key", "cannot be used as a JSX component", JWKS error, authorizedParties, clerk middleware, ClerkProvider, UserButton, SignIn, SignUp

6•security
ruvnet

flow-nexus-platform

ruvnet

Comprehensive Flow Nexus platform management - authentication, sandboxes, app deployment, payments, and challenges

143•security
modu-ai

Configuring MCP Servers & Plugins for Claude Code

modu-ai

Set up Model Context Protocol servers (GitHub, Filesystem, Brave Search, SQLite). Configure OAuth, manage permissions, validate MCP structure. Use when integrating external tools, APIs, or expanding Claude Code capabilities.

104•security
modu-ai

moai-domain-security

modu-ai

Modu-AI's Agentic Development Kit

104•security
modu-ai

Authoring CLAUDE.md Project Instructions

modu-ai

Design project-specific AI guidance, document workflows, define architecture patterns. Use when creating CLAUDE.md files for projects, documenting team standards, or establishing AI collaboration guidelines.

104•security
modu-ai

Configuring Claude Code settings.json & Security

modu-ai

Set up permissions (allow/deny), permission modes, environment variables, tool restrictions. Use when securing Claude Code, restricting tool access, or optimizing session settings.

104•security
modu-ai

moai-alfred-ears-authoring

modu-ai

Modu-AI's Agentic Development Kit

104•security
modu-ai

moai-spec-authoring

modu-ai

Modu-AI's Agentic Development Kit

104•security
baz-scm

secure-coding

baz-scm

Incorporating security at every step of software development – writing code that defends against vulnerabilities and protects user data.

47•security
littleben

shipany

littleben

Shipany AI-powered SaaS boilerplate documentation. Use when working with Shipany framework, Next.js 15, TypeScript, Drizzle ORM, NextAuth, payment integration, or building SaaS applications.

21•security
alirezarezvani

senior-secops

alirezarezvani

Comprehensive SecOps skill for application security, vulnerability management, compliance, and secure development practices. Includes security scanning, vulnerability assessment, compliance checking, and security automation. Use when implementing security controls, conducting security audits, responding to vulnerabilities, or ensuring compliance requirements.

19•security
setting-up-gi... by nickpending - Claude AI Skill | SkillsMP