
from aaas-vault12
Extract a website's design tokens and automatically build a 15–16s Remotion composition that showcases the site's design system.
This skill extracts design-system tokens (typography, colors, spacing, icons, logos, radii, shadows) from a website and uses those values to generate a Remotion composition that renders a short, polished showcase video (1920×1080, ~15–16s, 30fps). The output includes a TypeScript theme file with the discovered tokens and a DesignShowcase component wired to use them.
Use this when you need a quick visual presentation of a site's brand or component system — for design reviews, handoffs, marketing, or portfolio pieces. It is useful for designers, frontend engineers, and content teams who want a shareable moving summary of a site's visual identity.
Primarily authoring/automation flows that can run Remotion and Node.js build chains. Works with agent toolchains that can fetch site CSS/DOM and produce TypeScript/React files (Cursor, agent frameworks that run Node-based scripts).
This skill has not been reviewed by our automated audit pipeline yet.
Picnic Grocery Ordering
Use the picnic CLI to search products, manage a shopping cart, and schedule delivery slots for Picnic supermarket (DE/NL).
LLM Game Development
Guided playbook for integrating large language models into the game development lifecycle — design, prototyping, code generation, testing, and review.
Notion API Integration
Read, create, update, delete, search, and query Notion pages, databases, and blocks via the Notion API with curl examples and property type guidance.
Sleep Story — Calming Narrative
Create calming, slow-paced sleep stories and templates for bedtime audio: sensory-rich, low-stakes narratives designed to help listeners drift off.
Dark Matter Analyzer
Diagnose repository health and hidden patterns (strategic drift, documentation inflation, execution gaps) to surface why a codebase feels misaligned and what to
Security Monitor
Continuous security monitoring for agent deployments: detects intrusions, suspicious API usage, credential misuse, port scans, and file changes.