This skill covers designing and implementing security zones and conduits for industrial automation and control
This skill covers implementing automated security scanning for Infrastructure as Code (IaC) templates using
ISO/IEC 27001:2022 is the international standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS).
This skill covers implementing Gitleaks for detecting and preventing hardcoded secrets in git repositories.
This skill covers integrating OWASP ZAP (Zed Attack Proxy) for Dynamic Application Security Testing in CI/CD
This skill covers integrating Static Application Security Testing (SAST) tools—CodeQL and Semgrep—into GitHub
Expert ISO 27701 Privacy Information Management System (PIMS) compliance advisor. Use this skill whenever a user asks about ISO/IEC 27701:2025, ISO/IEC 27701:2019, privacy…
Skill: Leiloeiros das Juntas Comerciais do Brasil workflow skill. Use this skill when the user needs Coleta e consulta dados de leiloeiros oficiais de todas as 27 Juntas…
Audit MCP (Model Context Protocol) server configurations for security issues. Use this skill when: - Reviewing .mcp.json files for security risks - Checking MCP server args for…
Manage group chat messages, send messages, and join groups on the MetaID network. This skill handles fetching group chat messages, encrypting/decrypting messages, sending messages…
This skill should be used when the user asks to "use Metasploit for penetration testing", "exploit vulnerabilities with msfconsole", "create payloads with msfvenom", "perform…
Expert NIST Cybersecurity Framework (CSF) advisor covering CSF 2.0 and CSF 1.1. Use this skill whenever a user asks about NIST CSF, cybersecurity risk management, the six CSF…
Use this skill when building workflow automations with Zapier, Make (Integromat), n8n, or similar no-code/low-code platforms.
Odoo 17 development reference for Python models and ORM (search, domain, read_group, compute fields), XML/CSV data and views, OWL/JS client code, QWeb reports, security (ACL,…
Odoo 18 development reference for Python models and ORM (search, domain, read_group, compute fields), XML/CSV data and views, OWL/JS client code, QWeb reports, security (ACL,…
Use this skill whenever the user wants to do anything with PDF files. This includes reading or extracting text/tables from PDFs, combining or merging multiple PDFs into one,…
This skill covers hardening container images by minimizing attack surface, removing unnecessary packages, implementing
The NIST Cybersecurity Framework (CSF) 2.0, released in February 2024, provides a comprehensive taxonomy for managing cybersecurity risk through six core Functions - Govern,…
This skill covers conducting cybersecurity assessments specific to oil and gas facilities including upstream
This skill covers conducting comprehensive security assessments of Operational Technology (OT) networks including
This skill covers performing vulnerability assessments in OT environments using the Claroty xDome platform for
This skill covers analyzing Programmable Logic Controller (PLC) firmware for security vulnerabilities including
This skill covers conducting cybersecurity assessments of electric power grid infrastructure including generation
This skill covers implementing Software Composition Analysis (SCA) using Snyk to detect vulnerable open-source
Map organizational power structures, classify resistance archetypes, design reframe strategies, and produce a sequenced change plan — saved as a political-map artifact to…
Manage PR crises using classification, golden hour response, crisis statement templates (3C framework), and reputation recovery planning.
Use when the user is trying to predict how a dominance-seeking leader will sort people in their orbit — who gets kept, who gets rehabilitated after a rift, who gets quietly…
Setup, configure, debug and extend Quasarr — the bridge that connects JDownloader with Radarr, Sonarr and LazyLibrarian via a fake Newznab indexer and SABnzbd client interface.
Use this skill as the designated specialist reviewer for Zeta.Core's query planner / optimiser — join ordering, predicate pushdown, index selection, SIMD/tensor-intrinsic kernel…
This skill covers integrating Aqua Security''s Trivy scanner into CI/CD pipelines for comprehensive container
This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports", "assess web application security", "scan wireless networks",…
Guide for configuring and managing GitHub secret scanning, push protection, custom patterns, and secret alert remediation.
Define, build, review, and harden production-grade fullstack applications with strong security posture.
This skill covers hardening GitHub Actions workflows against supply chain attacks, credential theft, and privilege
This skill covers security hardening for serverless compute platforms including AWS Lambda, Azure Functions,
Establish a security baseline for a website or web app. Use this skill when configuring HTTPS and TLS, setting security headers, planning secrets management, evaluating CSP…
Execute Snyk Code SAST (Static Application Security Testing) scans on source code files or projects, interpret vulnerability findings, generate structured security reports, and…
Apply Cialdini's six principles of persuasion — Reciprocity, Commitment/Consistency, Social Proof, Liking, Authority, and Scarcity — to analyze or design influence strategies.
Identify and analyze cognitive biases including confirmation bias, anchoring, availability heuristic, and sunk cost fallacy in decision-making contexts.
Apply Rogers' Diffusion of Innovations theory to analyze how new products, ideas, or technologies spread through populations.
Conduct structured policy analysis including problem definition, alternative evaluation, and evidence-based recommendation.
Apply social network analysis concepts including nodes, ties, centrality, structural holes, and strong/weak ties to map and analyze relationship structures.
Conduct stakeholder analysis using identification, Power-Interest matrix classification, and influence strategy development.
Design and conduct user research using interviews, focus groups, surveys, and field observation. Use this skill when the user needs to understand customer needs, validate product…
Single entrypoint for taw-kit. User types `/taw
` — this skill classifies the intent (BUILD / FIX / SHIP / MAINTAIN / ADVISOR) and loads the matching branch…
Design optimal agent team compositions with sizing heuristics, preset configurations, and agent type selection.
This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security flaws", "understand vulnerability categories", "learn about…
Expert TSA cybersecurity compliance advisor for critical infrastructure owners and operators. Use this skill whenever a user asks about TSA Security Directives for pipelines,…
Navigate Taiwan fintech regulations including FSC oversight, electronic payment laws, VASP rules, AML/KYC requirements, and the regulatory sandbox.
This skill should be used when the user asks to "review architecture", "Well-Architected review", "check bestpractices", "security assessment",or "cost optimization analysis".
Use this skill when writing, reviewing, auditing, or deploying Solidity smart contracts. Triggers on Solidity development, smart contract security auditing, DeFi protocol…
AI trading agent executing crypto trades across multiple DEXes with NFT minting and floor price analysis.
Perform comprehensive codebase analysis and generate reports (usage: /analyze [full|security|performance])
Security audit, hardening, threat modeling (STRIDE/PASTA), Red/Blue Team, OWASP checks, code review, incident response, and infrastructure security for any project.
Agent skill for security-manager - invoke with $agent-security-manager
BiDi text validation and Trojan Source attack detection (CVE-2021-42574)
Assess competitive threats and decide how to respond
Docker/container optimization for size, layers, caching, and security
CTF 逆向工程解題工具箱 — 聚焦 Windows 應用程式驗證繞過。從開題偵察到 bypass 驗證的完整流程引導,內建實戰踩坑經驗。
Deploys static site build output to GoDaddy shared hosting via FTP using basic-ftp in Node.js and SamKirkland/FTP-Deploy-Action in CI.