aws-sdk-java-v2-core
About
This skill provides core patterns and best practices for configuring AWS SDK for Java 2.x service clients. Use it for setting up authentication, managing credentials, configuring timeouts, HTTP clients, and implementing AWS SDK best practices. It helps developers build robust, performant, and secure integrations with AWS services.
Quick Install
Claude Code
Recommendednpx skills add majiayu000/claude-skill-registry -a claude-code/plugin add https://github.com/majiayu000/claude-skill-registrygit clone https://github.com/majiayu000/claude-skill-registry.git ~/.claude/skills/aws-sdk-java-v2-coreCopy and paste this command in Claude Code to install this skill
GitHub Repository
Related Skills
network-security-setup
DevelopmentThis skill configures Claude Code sandbox network isolation by setting up trusted domain whitelists and custom access policies. It helps developers secure code execution by managing environment variables and preventing unauthorized network access. Use it to implement zero-trust architecture and prevent prompt injection attacks via network controls.
n8n-integration-testing-patterns
OtherThis skill provides testing patterns for n8n workflow integrations with external APIs. It covers API contract validation, authentication flows, rate limit handling, and error scenario testing. Use it when developing or validating n8n node integrations to ensure reliability.
sandbox-configurator
DevelopmentThe sandbox-configurator skill automatically configures Claude Code's execution environment with security boundaries for file system and network isolation. It enables developers to define trusted domains, manage file permissions, and control network access for secure code execution. Use this skill when you need to set up a secure, isolated sandbox for running untrusted code or building applications.
security-checklist
MetaThis skill provides security guidance for implementing measures or conducting audits. It delivers OWASP Top 10 mitigations, authentication patterns, input validation strategies, and compliance guidelines. Use it to ensure applications are protected against common vulnerabilities during development or review.
