Your AI development stack, curated

The best AI coding tools, MCP workflows, and Claude Code skills — organized for developers. From editor setup to production integrations.

Build your AI stack

Tools, MCP servers, and skills that work together — from editor to production.

AI Coding Tools
8+ tools indexed
Editor extensions, code completion, pair programming tools. Cursor, Windsurf, Copilot, and more.
MCP Servers
6+ MCP servers indexed
Connect your AI to GitHub, databases, browsers, search, and production infrastructure.
Claude Code Skills
6+ skills indexed
Reusable workflow modules for debugging, refactoring, code review, and planning.

MCP Servers

More →

Snowflake-managed MCP Server

Snowflake documents a Snowflake-hosted Model Context Protocol (MCP) endpoint that fronts governed Snowflake data and Cortex workloads without provisioning a separate MCP bridge VM. Administrators declare tools with SQL (`CREATE MCP SERVER`)—for example Cortex Search queries, Cortex Analyst chat-style messages, Cortex Agent executions, parameterized SQL runners, or custom tools backed by Snowflake-native functions—and clients authenticate using Snowflake OAuth against the MCP revision pinned in Snowflake release notes.

n8n MCP Server Trigger

The MCP Server Trigger is a first-party n8n core node that turns an n8n workflow into a Model Context Protocol server endpoint. Instead of chaining conventional trigger nodes, it connects only to tool nodes so remote MCP clients can list tools and invoke them over long-lived Server-Sent Events or streamable HTTP transports (stdio is explicitly unsupported). Each node exposes separate test and production MCP URLs, optional bearer or header authentication, and documentation explains how to proxy Claude Desktop through `npx mcp-remote` plus queue-mode caveats for multi-replica webhook deployments.

DuckDB MCP community extension (`duckdb_mcp`)

The DuckDB-distributed community extension `duckdb_mcp` embeds MCP client and server capabilities directly inside DuckDB. Installers load it via `INSTALL duckdb_mcp FROM community` followed by `LOAD duckdb_mcp`, after which SQL can attach remote MCP servers (stdio/TCP/WebSocket transports), enumerate resources (`mcp_list_resources`), invoke remote tools (`mcp_call_tool`), and wrap responses with `read_csv`/`read_json`/`read_parquet` URIs routed through `mcp://`. In reverse direction, DuckDB can publish tables, queries, and execution-bound tools (`mcp_publish_table`, `mcp_publish_query`, `mcp_publish_execution_tool`) while `mcp_server_start` exposes them to external MCP-compatible clients.

Neon MCP Server

Official Neon MCP integration exposes Neon Postgres projects to MCP-capable assistants via Streamable HTTP (`https://mcp.neon.tech/mcp`), legacy SSE (`https://mcp.neon.tech/sse`), or a locally launched `@neondatabase/mcp-server-neon` package. Documentation lists tools for project and branch lifecycle, SQL execution, migration rehearsal branches, slow-query diagnostics, Neon Auth provisioning, Data API setup, and embedded Neon docs retrieval—each mapped to Neon API operations.

Apify MCP Server

Apify documents an official Model Context Protocol server hosted at https://mcp.apify.com that speaks Streamable HTTP in line with the current MCP specification; Apify warns that SSE transport was deprecated for removal April 1, 2026. Hosted clients authenticate through browser OAuth or by supplying Bearer tokens sourced from Console → Settings → Integrations (`APIFY_TOKEN`), can pin tool bundles via URL query (`?tools=actors,docs,apify/rag-web-browser` style examples reproduce Apify wording), optionally append `telemetry-enabled=false`, and benefit from inferred structured-output schemas surfaced for Actor tooling on hosted endpoints unlike the default stdio server. When MCP clients refuse remote transports, docs recommend `npx -y @apify/actors-mcp-server` with `APIFY_TOKEN` for stdio, Node.js ≥18, and adherence to documented per-user throughput (Apify cites up to thirty requests per second across Actor runs plus storage/documentation calls). Specialized payment modes (open x402 on Base plus Skyfire) appear as optional adjunct pages inside the broader integration handbook.

Qdrant MCP Server

Official Qdrant MCP server implementation that gives AI agents a semantic memory layer backed by Qdrant vector search. It exposes MCP tools for storing information and retrieving relevant context, so assistants can persist and recall facts across sessions instead of relying only on short chat history.

Claude Code Skills

More →

OWASP GenAI LLM Top 10 (v1.1) threat review checklist

Maps the authoritative OWASP "Top 10 for Large Language Model Applications" (version 1.1) taxonomy—LLM01 Prompt Injection through LLM10 Model Theft—into an actionable readiness checklist for architects red-teaming Retrieval-Augmented Generation, Agents, plugins, training pipelines, or hosted inference gateways. Official project pages summarize each risk bucket (prompt injection bypassing safeguards, unchecked outputs enabling downstream exploits, poisoned corpora distorting reasoning, abusive workloads starving capacity, brittle supply-chain dependencies, sensitive data resurfacing inside generations, excessively privileged plugins/agents/autonomy, misplaced trust producing compliance failures, loss of proprietary model weights via API abuse). The skill pairs each category with tangible controls (policy, monitoring, toolchain limits) anchored to genai.owasp.org releases rather than anecdotes.

Postmortem trigger and root-cause taxonomy

Distills Appendix C (“Results of Postmortem Analysis”) from Google’s SRE workbook: it explains why Google catalogs standardized postmortem fields—linking outages to observable triggers versus deeper root-cause categories—so reliability leaders can prioritize systemic fixes rather than anecdotal fixes. The appendix cites a multi-year corpus (labeled 2010–2017 in the workbook) highlighting that binary pushes accounted for roughly 37% of outage triggers while configuration pushes were about 31%, with additional slices for user-behavior spikes, pipelines, upstream providers, performance decay, capacity, and hardware. A companion table correlates outages with qualitative root causes such as faulty software (~41%), development-process gaps (~20%), emergent complexity (~17%), deployment planning weaknesses (~7%), and network failures (~3%). Teams use these distributions to sanity-check whether their incident queues skew differently and to steer investment into the failure classes that statistically dominate historically.

Example SLO document authoring

Operationalizes Appendix A from Google’s SRE workbook by translating the illustrative “Example Game Service” SLO dossier into a checklist teams can mimic: articulate the user-facing workload, nominate rolling measurement windows (the appendix uses four weeks), pair each subsystem with tightly defined SLIs (availability from load balancers excluding 5xx, latency percentile gates, freshness for derived tables, correctness via probers, completeness for pipelines), cite explicit numerator/denominator language, rationalize rounding policies, quantify per-objective error budgets, and cite the sibling error budget policy for enforcement.

Error budget policy drafting

Translates Google’s worked example error-budget policy into a repeatable playbook for tying release tempo to measured reliability: define goals (protect users from repeated SLO misses while preserving innovation incentives), spell out what happens when the rolling window consumes its budget (freeze changes except urgent defects or security work), codify outage investigation thresholds, and document escalation paths when stakeholders disagree about budget math.

NIST AI Risk Management Framework (AI RMF 1.0) lifecycle checklist

Anchors facilitation workshops to NIST's voluntary Artificial Intelligence Risk Management Framework (AI RMF 1.0, formally NIST.AI.100-1 with DOI https://doi.org/10.6028/NIST.AI.100-1): the playbook issued alongside the Framework emphasizes structuring programs around the mutually reinforcing core functions GOVERN → MAP → MEASURE → MANAGE rather than improvising unrelated security tickets. NIST contemporaneously publishes companion assets such as the Trustworthy AI Resource Center playbook (airc.nist.gov), roadmap, crosswalks, and—for generative workloads—the Generative Artificial Intelligence Profile (NIST AI 600-1, July 26, 2024, DOI https://doi.org/10.6028/NIST.AI.600-1)—so teams can reconcile novel failure modes against documented categories of trustworthiness. This operational skill folds those authoritative layers into scripted prompts for cross-functional councils that must evidence documentation, escalation paths, quantitative trustworthiness analyses, prioritized mitigations, and alignment with externally referenced stakeholder expectations—not marketing slides.

Creating and maintaining Cursor skills

Defines how to author, revise, and validate SKILL.md files so agent skills stay executable, scoped, and testable. It focuses on turning vague know-how into reusable operational instructions with clear triggers, deterministic steps, and verification checks.

AI News

All news →