'Implementing Zero Trust Network Access (ZTNA) in cloud environments by configuring identity-aware proxies, micro-segmentation,
Skills(SKILL.md)は、AIエージェント(Claude Code、Cursor、Codexなど)に特定の能力を追加するための設定ファイルです。
詳しく見る →'Implementing Zero Trust Network Access (ZTNA) in cloud environments by configuring identity-aware proxies, micro-segmentation,
Configure and execute agentless vulnerability scanning using network protocols, cloud snapshot analysis, and
Perform comprehensive security posture assessment of AWS accounts using ScoutSuite to enumerate resources, identify
Execute a phased DMARC rollout from p=none monitoring through p=quarantine to p=reject enforcement, ensuring
'Performs vulnerability remediation on endpoints by prioritizing CVEs based on risk scoring, deploying patches,
'Analyzes firmware images for embedded malware, backdoors, and unauthorized modifications targeting routers,
Perform forensic investigation of Linux system logs including syslog, auth.log, systemd journal, kern.log, and
Perform structured log source onboarding into SIEM platforms by configuring collectors, parsers, normalization,
'This skill covers conducting comprehensive security assessments of Operational Technology (OT) networks including
'This skill covers implementing Software Composition Analysis (SCA) using Snyk to detect vulnerable open-source
'Performs static analysis of Windows PE (Portable Executable) malware samples using PEStudio to examine file
Conduct wireless network security assessments using Kismet to detect rogue access points, hidden SSIDs, weak
Develop precise YARA rules for malware detection by identifying unique byte patterns, strings, and behavioral
'This skill provides step-by-step procedures for identifying and remediating Amazon S3 bucket misconfigurations
'Reverse engineers malware binaries using NSA''s Ghidra disassembler and decompiler to understand internal logic,
Tenable Nessus is the industry-leading vulnerability scanner used to identify security weaknesses across network
'This skill covers hardening GitHub Actions workflows against supply chain attacks, credential theft, and privilege
'This skill covers hardening and securing process historian servers (OSIsoft PI, Honeywell PHD, GE Proficy, AVEVA
>
>
>
>
This skill covers production-grade techniques for evaluating LLM outputs using LLMs as judges. It synthesizes research from academic papers, industry practices, and practical implementation experience
Context optimization extends the effective capacity of limited context windows through strategic compression, masking, caching, and partitioning. Effective optimization can double or triple effective
Verify every `\cite{...}` in a paper against three independent layers:
Write detailed embodiments for: **$ARGUMENTS**
Orchestrate large batches of ML experiments on SSH remote GPU servers with proper state tracking, OOM retry, stale cleanup, and wave transitions.
Compile the LaTeX paper and fix any issues: **$ARGUMENTS**
A kubectl/docker-style CLI for managing GPU compute jobs on the Qizhi (启智) platform.
Deploy and run ML experiment: $ARGUMENTS
Task: $ARGUMENTS
Release automation for Claw skills and website. Guides through version bumping, tagging, and release verification.
Security advisory feed package for OpenClaw-related threats and vulnerabilities. The upstream feed is updated daily; local automation is handled by clawsec-suite or the operator.
>
>
>
>
>
>
PCBWay PCB fabrication and assembly — turnkey/consigned assembly, design rules, ordering workflow. Alternative to JLCPCB for manufacturing. Use with KiCad. Use this skill when the user mentions PCBWay, needs turnkey assembly (PCBWay sources parts by MPN), has parts not available on LCSC, needs assembled boards with non-LCSC components, wants to compare PCBWay vs JLCPCB, or needs assembly with parts sourced globally rather than from LCSC only. For gerber/CPL export, stencil ordering, and BOM management, see the `bom` skill.
Operation-aware node configuration guidance. Use when configuring nodes, understanding property dependencies, determining required fields, choosing between get_node detail levels, or learning common configuration patterns by node type. Always use this skill when setting up node parameters — it explains which fields are required for each operation, how displayOptions control field visibility, and when to use patchNodeField for surgical edits vs full node updates.
Proven workflow architectural patterns from real n8n workflows. Use when building new workflows, designing workflow structure, choosing workflow patterns, planning workflow architecture, or asking about webhook processing, HTTP API integration, database operations, AI agent workflows, batch processing, or scheduled tasks. Always consult this skill when the user asks to create, build, or design an n8n workflow, automate a process, or connect services — even if they don't explicitly mention 'patterns'. Covers webhook, API, database, AI, batch processing, and scheduled automation architectures.
>
Search, install, update, sync, or publish agent skills with the ClawHub CLI and registry.
Use himalaya to list, read, search, compose, reply, forward, and organize IMAP/SMTP email.
Proposes exactly one personal side-project idea per invocation, sized to a 1-3 day MVP. Targets CLI, automation, LLM, DX, productivity, and data-viz angles; avoids clichés like TODO apps, weather apps, and pomodoro timers. Output is an 8-section brief including a ready-to-paste coding-agent prompt. Use for morning/daily idea rituals and weekend-hack ideation. Don't use for existing-product feature proposals (Spark), dialogue brainstorming (Riff), or prototype implementation (Forge).
>
Ethscriptions platform on Base L2. On-chain inscriptions for names, data, and websites.
> **目的**:讓 LLM 以標準化工具介面開發與調試本專案(app.js, index.html, server_qwen.py),可在 Ubuntu 終端啟動服務、自動化瀏覽器測試、讀取 F12 Console/Network 錯誤、模擬 UI 互動、自動修復 Bug 並記錄開發進度。
Use when: detecting target CTF platform type, collecting user credentials, and routing actions to the correct script under scripts/ by platform.