SSL/TLS certificate lifecycle management encompasses the full process of requesting, issuing, deploying, monitoring,
Skills(SKILL.md)は、AIエージェント(Claude Code、Cursor、Codexなど)に特定の能力を追加するための設定ファイルです。
詳しく見る →SSL/TLS certificate lifecycle management encompasses the full process of requesting, issuing, deploying, monitoring,
Assess SSL/TLS server configurations using the sslyze Python library to evaluate cipher suites, certificate chains,
'Performs static analysis of Windows PE (Portable Executable) malware samples using PEStudio to examine file
Simulate and detect software supply chain attacks including typosquatting detection via Levenshtein distance,
'Performs proactive threat hunting in Elastic Security SIEM using KQL/EQL queries, detection rules, and Timeline
Build comprehensive forensic super-timelines using Plaso (log2timeline) to correlate events across file systems,
Perform comprehensive Windows forensic artifact analysis using Eric Zimmerman's open-source EZ Tools suite including
Conduct wireless network security assessments using Kismet to detect rogue access points, hidden SSIDs, weak
Develop precise YARA rules for malware detection by identifying unique byte patterns, strings, and behavioral
'Executes structured recovery from a ransomware incident following NIST and CISA frameworks, including environment
'This skill provides step-by-step procedures for identifying and remediating Amazon S3 bucket misconfigurations
'Reverse engineers malware binaries using NSA''s Ghidra disassembler and decompiler to understand internal logic,
Tenable Nessus is the industry-leading vulnerability scanner used to identify security weaknesses across network
'Performs advanced network reconnaissance using Nmap''s scripting engine, timing controls, evasion techniques,
'Securing API Gateway endpoints with AWS WAF by configuring managed rule groups for OWASP Top 10 protection,
'Securing AWS Lambda execution roles by implementing least-privilege IAM policies, applying permission boundaries,
'This skill covers hardening GitHub Actions workflows against supply chain attacks, credential theft, and privilege
'This skill covers hardening and securing process historian servers (OSIsoft PI, Honeywell PHD, GE Proficy, AVEVA
'This skill covers implementing secure remote access to OT/ICS environments for operators, engineers, and vendors
Threat actor infrastructure tracking involves monitoring and mapping adversary-controlled assets including command-and-control
Classify and prioritize security incidents using structured IR playbooks to determine severity, assign response
'Performs initial triage of security incidents to determine severity, scope, and required response actions using
>
>
>
>
>
>
>
Instructions for AI coding agents working on the React on Rails codebase.
Use when errors occur deep in execution and you need to trace back to find the original trigger - systematically traces bugs backward through call stack, adding instrumentation when needed, to identify source of invalid data or incorrect behavior
Describes how to use abilities. Read before any conversation.
Use when design is complete and you need detailed implementation tasks for engineers with zero codebase context - creates comprehensive implementation plans with exact file paths, complete code examples, and verification steps assuming engineer has minimal domain knowledge
Use this whenever you need to create an isolated workspace.
<required>
Release workflow for the client release group. Supports two modes: **interactive** (default) and **autonomous**.
Enables ultra-granular, line-by-line code analysis to build deep architectural context before vulnerability or bug finding.
Token integration and implementation analyzer based on Trail of Bits' token integration checklist. Analyzes token implementations for ERC20/ERC721 conformity, checks for 20+ weird token patterns, assesses contract composition and owner privileges, performs on-chain scarcity analysis, and evaluates how protocols handle non-standard tokens. Context-aware for both token implementations and token integrations.
Configures Python projects with modern tooling (uv, ruff, ty). Use when creating projects, writing standalone scripts, or migrating from pip/Poetry/mypy/black.
Find similar vulnerabilities and bugs across codebases using pattern-based analysis. Use when hunting bug variants, building CodeQL/Semgrep queries, analyzing security vulnerabilities, or performing systematic code audits after finding an initial issue.
>-
UnoCSS instant atomic CSS engine, superset of Tailwind CSS. Use when configuring UnoCSS, writing utility rules, shortcuts, or working with presets like Wind, Icons, Attributify.
Vue Router 4 patterns, navigation guards, route params, and route-component lifecycle interactions.
Apply VueUse composables where appropriate to build concise, maintainable Vue.js / Nuxt features.
Operation-aware node configuration guidance. Use when configuring nodes, understanding property dependencies, determining required fields, choosing between get_node detail levels, or learning common configuration patterns by node type. Always use this skill when setting up node parameters — it explains which fields are required for each operation, how displayOptions control field visibility, and when to use patchNodeField for surgical edits vs full node updates.
Proven workflow architectural patterns from real n8n workflows. Use when building new workflows, designing workflow structure, choosing workflow patterns, planning workflow architecture, or asking about webhook processing, HTTP API integration, database operations, AI agent workflows, batch processing, or scheduled tasks. Always consult this skill when the user asks to create, build, or design an n8n workflow, automate a process, or connect services — even if they don't explicitly mention 'patterns'. Covers webhook, API, database, AI, batch processing, and scheduled automation architectures.
Instructions for adding new message types to the safe-output messages system
Documentation Brief description for SEO and navigation
Using Skillz MCP Server with Docker
Charlie Munger's multidisciplinary thinking and mental models — the framework of Berkshire Hathaway's architect, built from rationality, inversion, patience, and the lollapalooza effect.