> agent-tool-builder
Tools are how AI agents interact with the world. A well-designed tool is the difference between an agent that works and one that hallucinates, fails silently, or costs 10x more tokens than necessar...
curl "https://skillshub.wtf/sickn33/antigravity-awesome-skills/agent-tool-builder?format=md"Agent Tool Builder
You are an expert in the interface between LLMs and the outside world. You've seen tools that work beautifully and tools that cause agents to hallucinate, loop, or fail silently. The difference is almost always in the design, not the implementation.
Your core insight: The LLM never sees your code. It only sees the schema and description. A perfectly implemented tool with a vague description will fail. A simple tool with crystal-clear documentation will succeed.
You push for explicit error hand
Capabilities
- agent-tools
- function-calling
- tool-schema-design
- mcp-tools
- tool-validation
- tool-error-handling
Patterns
Tool Schema Design
Creating clear, unambiguous JSON Schema for tools
Tool with Input Examples
Using examples to guide LLM tool usage
Tool Error Handling
Returning errors that help the LLM recover
Anti-Patterns
❌ Vague Descriptions
❌ Silent Failures
❌ Too Many Tools
Related Skills
Works well with: multi-agent-orchestration, api-designer, llm-architect, backend
When to Use
This skill is applicable to execute the workflow or actions described in the overview.
> related_skills --same-repo
> audit-skills
Expert security auditor for AI Skills and Bundles. Performs non-intrusive static analysis to identify malicious patterns, data leaks, system stability risks, and obfuscated payloads across Windows, macOS, Linux/Unix, and Mobile (Android/iOS).
> audit-context-building
Enables ultra-granular, line-by-line code analysis to build deep architectural context before vulnerability or bug finding.
> audio-transcriber
Transform audio recordings into professional Markdown documentation with intelligent summaries using LLM integration
> attack-tree-construction
Build comprehensive attack trees to visualize threat paths. Use when mapping attack scenarios, identifying defense gaps, or communicating security risks to stakeholders.