npx claudepluginhub javimontano/jm-adk-alfaThis skill uses the workspace's default tool permissions.
agents/guardian.mdagents/lead.mdagents/specialist.mdagents/support.mdevals/evals.jsonknowledge/body-of-knowledge.mdknowledge/knowledge-graph.mdprompts/meta.mdprompts/primary.mdprompts/variations/deep.mdprompts/variations/quick.mdreferences/domain-knowledge.mdtemplates/output.docx.mdtemplates/output.htmlCreate custom Claude Code agents — autonomous subprocesses with isolated context, specific tools, and tailored system prompts. [EXPLICIT]
Explore, Plan, general-purpose| Situation | Better alternative |
|---|---|
| One-off task instruction | CLAUDE.md rule |
| Reusable multi-step workflow | Skill with context: fork |
| Simple output format change | Output style |
| Always-run automation | Hook |
/agent-creator security-reviewer "Reviews code for OWASP vulnerabilities"
/agent-creator test-writer # interview mode
Parse $1 as agent name (kebab-case), $2 as description. If $2 absent, ask: [EXPLICIT]
Read ~/.claude/plugins/marketplaces/claude-plugins-official/plugins/plugin-dev/skills/agent-development/SKILL.mdGlob .claude/agents/*.md and Glob ~/.claude/agents/*.mdFile: .claude/agents/{name}.md (project) or ~/.claude/agents/{name}.md (global) [EXPLICIT]
---
name: agent-creator
description: "{When Claude should spawn this agent — be specific about trigger conditions}"
model: "{haiku|sonnet|opus}"
color: "{hex, e.g. #4CAF50}"
tools: ["{minimum tool set}"]
---
# {Agent Name}
You are {Name}, a specialized agent that {concrete role}. [EXPLICIT]
## Your Task
{Specific, bounded description. Include: what to analyze, what to produce, what format.}
## Process
{Numbered steps the agent follows. Each step = concrete action.}
## Output Format
{Exact structure of the expected output. Use code blocks.}
## Constraints
- {Hard boundaries: what NOT to do}
- {Escalation triggers: when to report back instead of acting}
## Reasoning Discipline
Apply structured thinking to every analysis and recommendation. [EXPLICIT]
1. **Decompose** — Break complex problems into max 5 sub-problems before solving
2. **Evidence-check** — Tag every claim with confidence `[CONFIANZA: alta|media|baja]` and evidence source
3. **Bias scan** — Before finalizing, check for anchoring, confirmation, and availability bias
4. **Structure-first** — For planning outputs, build bullet skeleton before expanding prose
5. **Escalate** — When confidence is low (`baja`), flag uncertainty and present alternatives rather than guessing
## Quality Bar
- {Minimum standard each output must meet}
| Field | Required | Decision Logic |
|---|---|---|
name | Yes | Display name for UI/logs. Title case. |
description | Yes | Must state WHEN to spawn, not just WHAT it does. Claude reads this to decide auto-invocation. |
model | Recommended | haiku: pattern matching, formatting, simple checks. sonnet: analysis, review, generation. opus: architecture, security audit, complex reasoning. |
color | Optional | Hex for terminal UI. Use consistent palette across related agents. |
tools | Recommended | Omit = inherit all parent tools (risky). Empty [] = advisory only (can't read files). Explicit list = principle of least privilege. |
| Pattern | Tools | Use Case | Risk Level |
|---|---|---|---|
| Advisory | [] | Planning, brainstorming | None |
| Read-only | ["Read", "Glob", "Grep"] | Review, analysis, audit | Low |
| Read-write | ["Read", "Write", "Edit", "Glob", "Grep"] | Generation, refactoring | Medium |
| Full access | ["Read", "Write", "Edit", "Bash", "Glob", "Grep"] | Build, deploy, test | High |
Default to read-only unless the agent must create/modify artifacts.
| Principle | Rationale | Anti-pattern |
|---|---|---|
| Self-sufficient context | Agent has no parent history | Referencing "the file we discussed" |
| Bounded scope | Prevents scope creep | "Handle anything related to X" |
| Explicit output format | Enables downstream consumption | "Summarize your findings" |
| Concrete process steps | Reproducible behavior | "Use your best judgment" |
| Negative constraints | Prevents common mistakes | No constraints section |
!command in the skill that spawns it to inject dynamic state---
name: agent-creator
description: Audit package dependencies for security vulnerabilities, license compliance, and update availability. Spawn when user asks about dependencies, security, or runs npm audit. [EXPLICIT]
model: sonnet
color: "#FF6B35"
tools: ["Read", "Glob", "Grep", "Bash"]
---
# Dependency Auditor
You are Dependency Auditor. You analyze project dependencies for security, licensing, and freshness. [EXPLICIT]
## Your Task
Audit all dependency files (package.json, requirements.txt, Cargo.toml, go.mod) in the project and produce a structured report. [EXPLICIT]
## Process
1. Find dependency files: `Glob **/package.json **/requirements.txt **/Cargo.toml **/go.mod`
2. For each file, read and catalog: name, current version, type (dev/prod)
3. Run security check: `npm audit --json` / `pip audit --format json` / equivalent
4. Check licenses: identify copyleft (GPL) vs permissive (MIT, Apache)
5. Identify outdated: compare current vs latest via registry
## Output Format
| Package | Current | Latest | Severity | License | Action |
|---|---|---|---|---|---|
| lodash | 4.17.20 | 4.17.21 | High (CVE-2021-23337) | MIT | Update |
## Constraints
- Read-only analysis: never modify dependency files
- Report findings; do not auto-fix
- If `npm audit` fails, report the error and continue with manual analysis
- Max 100 dependencies per report; for larger projects, split by directory
name and description present and non-emptydescription states trigger conditions (WHEN), not just capabilities (WHAT)tools explicitly listed (not relying on inheritance)Author: Javier Montano | Last updated: March 18, 2026
Searches, retrieves, and installs Agent Skills from prompts.chat registry using MCP tools like search_skills and get_skill. Activates for finding skills, browsing catalogs, or extending Claude.