Implement a structured threat intelligence lifecycle encompassing planning, collection, processing, analysis,
Skills(SKILL.md)は、AIエージェント(Claude Code、Cursor、Codexなど)に特定の能力を追加するための設定ファイルです。
詳しく見る →Implement a structured threat intelligence lifecycle encompassing planning, collection, processing, analysis,
'Investigates insider threat indicators including data exfiltration attempts, unauthorized access patterns, policy
Use BloodHound and SharpHound to enumerate Active Directory relationships and identify attack paths from compromised
'Performs automated static analysis of Android applications using Mobile Security Framework (MobSF) to identify
Deploy and operate CAPEv2 sandbox for automated malware analysis with behavioral monitoring, payload extraction,
Hunt for threats in AWS environments using Detective behavior graphs, entity investigation timelines, GuardDuty
Extract stored credentials from compromised endpoints using the LaZagne post-exploitation tool to recover passwords
'Performs firmware image extraction and analysis using binwalk to identify embedded filesystems, compressed archives,
Malware IOC extraction is the process of analyzing malicious software to identify actionable indicators of compromise
Acquire and analyze mobile device data using Cellebrite UFED and open-source tools to extract communications,
Capture and analyze network traffic using Wireshark and tshark to reconstruct network events, extract artifacts,
Automate network traffic analysis using tshark and pyshark for protocol statistics, suspicious flow detection,
'Automates the Privacy Impact Assessment (PIA) workflow including data flow mapping, privacy risk scoring matrices,
Automate credential rotation for service accounts across Active Directory, cloud platforms, and application databases
'Performs User and Entity Behavior Analytics (UEBA) to detect anomalous user activities including impossible
'Reverse engineers iOS applications using Frida dynamic instrumentation to understand internal logic, extract
Reverse engineer ransomware encryption routines to identify cryptographic algorithms, key generation flaws, and
'This skill covers integrating Aqua Security''s Trivy scanner into CI/CD pipelines for comprehensive container
'This skill guides practitioners through hardening AWS Identity and Access Management configurations to enforce
'This skill instructs security practitioners on deploying Microsoft Defender for Cloud as a cloud-native application
'Securing container registry images by implementing vulnerability scanning with Trivy and Grype, enforcing image
'This skill covers security hardening for serverless compute platforms including AWS Lambda, Azure Functions,
>
>
This skill covers the principles for identifying tasks suited to LLM processing, designing effective project architectures, and iterating rapidly using agent-assisted development. The methodology appl
>-
Search topic or arXiv paper ID: $ARGUMENTS
Search query: $ARGUMENTS
Search and progressively read open-access academic papers through DeepXiv. Use when the user wants layered paper access, section-level reading, trending papers, or DeepXiv-backed literature retrieval.
End-to-end autonomous research workflow for: **$ARGUMENTS**
Refine and concretize: **$ARGUMENTS**
>
>
>-
>-
feishu-doc
feishu-wiki
Tavily web search, content extraction, and research tools.
Use xurl for authenticated X API posts, replies, search, DMs, media upload, followers, or raw v2 calls.
Audit-only verification of manuscript references against PubMed and CrossRef. Detects fabricated or mismatched citations and writes qc/reference_audit.json. Does not modify references/ or refs.bib.
> Hire humans for real-world tasks that AI can't do: deliveries, meetings, errands, photography, pet care, and more.
HTTP client with automatic L402 Lightning micropayment support
<!-- skill: guimkt-offer-diagnosis | version: 1.0.0 | updated: 2026-04-24 -->
JAXSR is a JAX-based symbolic regression library that discovers interpretable algebraic
CaptureIQ is an AI-powered web tool for 2K Games' Creative Studio that automates footage analysis, editorial intelligence, and ESRB ARC compliance screening. It is built for editors and creative produ
Run an end-to-end data analysis in R: load, explore, analyze, and produce publication-ready output.
AI-assisted video editing workflows for cutting, structuring, and augmenting real footage. Covers the full pipeline from raw capture through FFmpeg, Remotion, ElevenLabs, fal.ai, and final polish in Descript or CapCut. Use when the user wants to edit video, cut footage, create vlogs, or build video content.
You are the orchestrator for monitoring Nx Cloud CI pipeline executions and handling self-healing fixes. You spawn the `ci-monitor-subagent` subagent to poll CI status and make decisions based on the
Stimulus JS framework for Symfony UX. Use when building client-side interactivity with data attributes, creating controllers for DOM manipulation, handling user events, managing component state, or integrating with Symfony's StimulusBundle and AssetMapper. Triggers - stimulus controller, data-controller, data-action, data-target, frontend interactivity, JavaScript behavior, Symfony UX frontend, toggle, dropdown, modal JS, tabs JS, clipboard, chart controller, datepicker, autocomplete JS, lazy controller, stimulusFetch, outlets, keyboard shortcut, global event listener. Also trigger when the user wants to add JavaScript behavior to server-rendered HTML, wrap a third-party JS library, or build client-only interactions that don't need a server round-trip.
Game art principles. Visual style selection, asset pipeline, animation