Add the marketplace
/plugin marketplace add ccf/claude-code-ccf-marketplaceInstall plugins
/pluginRun these commands in Claude Code to add this plugin to your environment. The marketplace must be added before you can install its plugins.
Quantitative analysis, algorithmic trading strategies, financial modeling, portfolio risk management, and ML-based asset management
First Principles Framework (FPF) for structured, auditable reasoning with hypothesis-driven decision making and evidence trails
Build high-quality MCP (Model Context Protocol) servers for LLM integrations with agent-centric design patterns
LLM application development: RAG systems, prompt engineering, AI agents, and production LLM patterns
Production-grade Bash scripting with defensive programming, POSIX compliance, and comprehensive testing
Technical documentation architecture: long-form docs, Mermaid diagrams, and documentation systems
Legacy system modernization: incremental migration, framework upgrades, and systematic refactoring
Monorepo architecture with Nx, Turborepo, and Bazel for large-scale project management
Event sourcing, CQRS patterns, and Temporal workflow orchestration for distributed systems
Threat modeling with STRIDE analysis, attack trees, and security requirement extraction
Quantitative analysis, algorithmic trading strategies, financial modeling, portfolio risk management, and ML-based asset management
Quantitative analysis, algorithmic trading strategies, financial modeling, portfolio risk management, and ML-based asset management
First Principles Framework (FPF) for structured, auditable reasoning with hypothesis-driven decision making and evidence trails
Build high-quality MCP (Model Context Protocol) servers for LLM integrations with agent-centric design patterns
LLM application development: RAG systems, prompt engineering, AI agents, and production LLM patterns
LLM application development: RAG systems, prompt engineering, AI agents, and production LLM patterns
LLM application development: RAG systems, prompt engineering, AI agents, and production LLM patterns
LLM application development: RAG systems, prompt engineering, AI agents, and production LLM patterns
LLM application development: RAG systems, prompt engineering, AI agents, and production LLM patterns
LLM application development: RAG systems, prompt engineering, AI agents, and production LLM patterns
LLM application development: RAG systems, prompt engineering, AI agents, and production LLM patterns
LLM application development: RAG systems, prompt engineering, AI agents, and production LLM patterns
LLM application development: RAG systems, prompt engineering, AI agents, and production LLM patterns
Production-grade Bash scripting with defensive programming, POSIX compliance, and comprehensive testing
Production-grade Bash scripting with defensive programming, POSIX compliance, and comprehensive testing
Production-grade Bash scripting with defensive programming, POSIX compliance, and comprehensive testing
Technical documentation architecture: long-form docs, Mermaid diagrams, and documentation systems
Technical documentation architecture: long-form docs, Mermaid diagrams, and documentation systems
Technical documentation architecture: long-form docs, Mermaid diagrams, and documentation systems
Technical documentation architecture: long-form docs, Mermaid diagrams, and documentation systems
Legacy system modernization: incremental migration, framework upgrades, and systematic refactoring
Legacy system modernization: incremental migration, framework upgrades, and systematic refactoring
Legacy system modernization: incremental migration, framework upgrades, and systematic refactoring
Legacy system modernization: incremental migration, framework upgrades, and systematic refactoring
Monorepo architecture with Nx, Turborepo, and Bazel for large-scale project management
Monorepo architecture with Nx, Turborepo, and Bazel for large-scale project management
Monorepo architecture with Nx, Turborepo, and Bazel for large-scale project management
Monorepo architecture with Nx, Turborepo, and Bazel for large-scale project management
Monorepo architecture with Nx, Turborepo, and Bazel for large-scale project management
Monorepo architecture with Nx, Turborepo, and Bazel for large-scale project management
Monorepo architecture with Nx, Turborepo, and Bazel for large-scale project management
Monorepo architecture with Nx, Turborepo, and Bazel for large-scale project management
Monorepo architecture with Nx, Turborepo, and Bazel for large-scale project management
Monorepo architecture with Nx, Turborepo, and Bazel for large-scale project management
Monorepo architecture with Nx, Turborepo, and Bazel for large-scale project management
Monorepo architecture with Nx, Turborepo, and Bazel for large-scale project management
Event sourcing, CQRS patterns, and Temporal workflow orchestration for distributed systems
Event sourcing, CQRS patterns, and Temporal workflow orchestration for distributed systems
Event sourcing, CQRS patterns, and Temporal workflow orchestration for distributed systems
Event sourcing, CQRS patterns, and Temporal workflow orchestration for distributed systems
Event sourcing, CQRS patterns, and Temporal workflow orchestration for distributed systems
Event sourcing, CQRS patterns, and Temporal workflow orchestration for distributed systems
Event sourcing, CQRS patterns, and Temporal workflow orchestration for distributed systems
Event sourcing, CQRS patterns, and Temporal workflow orchestration for distributed systems
Event sourcing, CQRS patterns, and Temporal workflow orchestration for distributed systems
Event sourcing, CQRS patterns, and Temporal workflow orchestration for distributed systems
Threat modeling with STRIDE analysis, attack trees, and security requirement extraction
Threat modeling with STRIDE analysis, attack trees, and security requirement extraction
Threat modeling with STRIDE analysis, attack trees, and security requirement extraction
Threat modeling with STRIDE analysis, attack trees, and security requirement extraction
Threat modeling with STRIDE analysis, attack trees, and security requirement extraction