Engine emissions calibration and aftertreatment optimization expertise
Skills(SKILL.md)は、AIエージェント(Claude Code、Cursor、Codexなど)に特定の能力を追加するための設定ファイルです。
詳しく見る →Engine emissions calibration and aftertreatment optimization expertise
MISRA C/C++ static analysis and compliance checking
HIPAA compliance validation skill for genomic data handling and audit
Medical device standards compliance verification skill for ISO 13485, ISO 14971, IEC 62304, IEC 60601, and related standards
Unique Device Identification (UDI) and labeling compliance skill for generating compliant labels and device identifiers
Alarm management skill for alarm rationalization, setpoint optimization, and ISA-18.2 compliance
Process flow diagram and P&ID generation skill with standards compliance and symbol libraries
Skill for pressure vessel design and analysis per ASME BPVC
Regulatory compliance skill for ISO nanotechnology standards verification and documentation
Safety documentation skill for generating Safety Data Sheets for nanomaterials
Develop comprehensive risk management plans for collections and cultural venues including disaster preparedness, security protocols, and insurance coordination
Simulate Joint Commission tracer methodology to assess compliance with accreditation standards across patient care processes and support systems
Deep expertise in ARM Cortex-M architecture and peripherals
Common shader effects skill for dissolve, outline, hologram, toon, water, fire effects.
GDPR compliance assessment and automation for data mapping, consent management, DSAR handling, and privacy impact assessments
Integration with security-focused static analysis tools
Google Analytics 4, tag management, and event tracking.
OAuth 2.0/OIDC flows, provider integration, and token handling.
Scan .claude/ directory for security misconfigurations, exposed secrets, unsafe permissions
Environment Triage
Systematic false positive verification for security findings. Provides structured methodology to confirm or dismiss scanner results, manual audit findings, and automated alerts. Adapted from Trail of Bits. Use when triaging security scan results or verifying audit findings.
Ghost Security — combined security report. Aggregates findings from all scan skills (scan-deps, scan-secrets, scan-code) into a single prioritized report focused on the highest risk, highest confidence issues. Use when the user requests a security overview, vulnerability summary, full security audit, or combined scan results.
Génère un rapport d'analyse comparative structuré et neutre entre deux enseignes de distribution (ex: BIM et Kazyon), basé sur des visites de terrain et couvrant la stratégie, l'aménagement, le merchandising, l'assortiment et le service client.
Implements a Linear Feedback Shift Register (LFSR) algorithm in Python to encrypt and decrypt messages. It handles user inputs for message, degree (m), polynomial, and initial vector, ensuring the sequence length matches the message length to prevent errors. It outputs a clock/flip-flop state table, encrypted binary values, and the final decrypted string.
Corrects grammatical errors and punctuation in a text while strictly preserving the original style, content, and author's voice.
Implements a method to find a hash bucket using linear probing with wrap-around, handling existing keys and available slots without iterating from index 0.
Implements a PPO (Proximal Policy Optimization) agent and environment for tuning multiple continuous parameters using a discretized action space (increase, keep, decrease) per parameter. The policy network outputs a probability distribution matrix, and the environment handles parameter updates to avoid redundancy.
Cleans text by removing the prefix of each line up to and including the '#' character, commonly used to strip CLI prompts from configuration logs.
>
>
>
>
Author and manage holdout scenarios for Stage 4 behavioral validation.
A clinical-grade PII/PHI detection and de-identification tool for healthcare text data.
Project-wide health audit. Fans out to all analysis skills, evaluates findings, and writes `.turbo/audit.md` and `.turbo/audit.html`. Analysis-only — does not apply fixes.
Expand a shell into a full implementation plan. The shell's Context, Produces, Consumes, Covers, and high-level Implementation Steps are authoritative. Expansion adds a pattern survey, concrete refere
>
>
Check code against security compliance standards and best practices.
Gitea operations via tea CLI. Use when user mentions: gitea, tea, or when git remote shows a Gitea instance.
Implement secure authentication in Convex with user management and access control.
Deletes or archives secrets in 1Password using the op CLI. Use when the user needs to permanently remove items, archive deprecated credentials, or clean up unused secrets from 1Password vaults. Supports both permanent deletion and archiving for later recovery.
>
Aggressive evidence-based audit to verify project claims match implementation reality
Event deduplication with canonical selection, reputation scoring, and hash-based grouping for multi-source data aggregation. Handles both ID-based and content-based deduplication.
Status: ACTIVE
Status: ACTIVE
1password-secrets
Status: ACTIVE
Status: ACTIVE