Turn "offline media" into a structured relink instead of a scavenger hunt
Projects go offline after moving drives, renaming folders, or mixing proxy and original relinks. This recipe builds a file index across your search roots, suggests path mappings, warns about proxy mismatches, and gives you editor-specific steps to complete the relink.
Create a skill called "Relink Rescue". Ask me for: - old_root_path (or old volume name) - one or more search_roots - whether proxies exist, and their proxy_root path Then: 1) Scan/search for candidate matches by filename. 2) Produce a mapping CSV with confidence scores. 3) Warn if matches are likely proxies. 4) Give me editor-specific steps to complete relinking.
This skill indexes filenames across the drives or folders you point it at, matches them
against your offline clips, and produces a relink map with confidence scores. It flags
candidates that live under a proxies folder so you don't accidentally relink to the wrong
media tier.
Auto-generate proxies the moment footage lands
Choppy playback, laggy scrubbing, and unusable timelines — even on strong machines — often comes down to editing long-GOP or heavy codecs at high resolution without proxies. This recipe generates proxies automatically whenever new camera originals appear, so every project starts edit-ready instead of debug-ready.
A pre-export gate that prevents accidentally delivering proxies
You finish a cut in proxy mode and later discover the export or grading pass used proxy media instead of originals. Quality loss, wrong color decisions, and a wasted delivery. This recipe adds a repeatable pre-export check so you never ship from the wrong media tier.
From isolated to connected in 30 days
Motherhood is lonely by default. This recipe builds a 30-day plan to create repeatable, low-effort social connection — with scripts for invites, follow-ups, and a backup plan for introverts.
Local-first AI assistant that automates small daily tasks safely on your device
A personal, local-first AI assistant that automates small daily tasks—organizing files, setting reminders, and monitoring system events—without touching sensitive data or taking risky actions without your approval.