Task Breakdown
Skill VerifiziertHelp neurodivergent users break down overwhelming tasks into manageable steps. Use when tasks feel paralyzing, when executive function is struggling, when someone can't start, or when the Wall of Awful has built up. Applies ADHD/autism-aware decomposition strategies.
This skill assists users with ADHD, autism, and other executive function challenges by applying ADHD/autism-aware decomposition strategies. It identifies diagnostic states of overwhelm and guides users through the DECOMPOSE method, offering structured templates and language for effective task management.
Compliance
- info:GDPRThe skill processes task descriptions which may contain personal data, but it does not explicitly submit this data to a third party; however, the LLM itself is an implicit third party.
Installation
npx skills add jwynia/agent-skillsFührt das Vercel skills CLI (skills.sh) via npx aus — benötigt Node.js lokal und mindestens einen installierten skills-kompatiblen Agent (Claude Code, Cursor, Codex, …). Setzt voraus, dass das Repo dem agentskills.io-Format folgt.
Ähnliche Erweiterungen
Day 2: 나만의 Context Sync 스킬 만들기
98AI Native Camp Day 2 Context Sync 스킬 만들기. 여러 외부 도구에서 컨텍스트를 수집하여 하나의 sync 문서로 만드는 나만의 스킬을 직접 구축한다. "2일차", "Day 2", "context sync", "컨텍스트 싱크", "sync 스킬", "스킬 만들기", "정보 수집 스킬" 요청에 사용.
File Organizer
98Organize and rename files based on content analysis
Google Sheets Automation
96Google Sheets automation workflows - data sync, task management, reporting dashboards, and multi-platform integrations
Feishu Task Management
95Feishu Task, tasklist, subtask, comment, and attachment management. Activate when user mentions tasks, tasklists, subtasks, task comments, task attachments, or task links.
Energy Management
95Help users manage their energy for sustained performance. Use when someone is feeling burned out, trying to find their zone of genius, scheduling for productivity, or identifying what drains vs energizes them.
Suspicious Email Analyzer
95Analyze emails for phishing, scam indicators, and security threats