cortex-skills-loop
Cortex Skills Loop
Overview
The cortex CLI includes an AI-powered recommendation engine that learns from usage patterns. This skill establishes the workflow for participating in that learning loop: get recommendations when context shifts, provide feedback on recommendation quality, and rate skills after use. Each interaction improves future recommendations.
When to Engage
Signals That Trigger Recommendations
Run cortex skills recommend when any of these mismatch signals appear:
- File pattern shift —
git diffor the working set includes file types not covered by active skills (e.g.,.tfTerraform files appear but no infrastructure skill is active, or**/auth/**paths get touched without security skills loaded) - Agent activation change — a new agent gets activated that likely has complementary skills
More from nickcrew/claude-ctx-plugin
react-performance-optimization
React performance optimization patterns using memoization, code splitting, and efficient rendering strategies. Use when optimizing slow React applications, reducing bundle size, or improving user experience with large datasets.
1.2Kowasp-top-10
OWASP Top 10 security vulnerabilities with detection and remediation patterns. Use when conducting security audits, implementing secure coding practices, or reviewing code for common security vulnerabilities.
453ui-design-aesthetics
Generates high-quality, non-generic UI designs with a focus on performance, progressive disclosure, and distinctive aesthetics.
114helm-chart-patterns
Helm chart development patterns for packaging and deploying Kubernetes applications. Use when creating reusable Helm charts, managing multi-environment deployments, or building application catalogs for Kubernetes.
110code-explanation
Use when explaining code, concepts, or system behavior to a specific audience level - provides a structured explanation workflow with depth control and validation steps.
103security-testing-patterns
Security testing patterns including SAST, DAST, penetration testing, and vulnerability assessment techniques. Use when implementing security testing pipelines, conducting security audits, or validating application security controls.
91