'Configure ModSecurity WAF with OWASP Core Rule Set (CRS) for web application logging, tune rules to reduce false
Skills(SKILL.md)は、AIエージェント(Claude Code、Cursor、Codexなど)に特定の能力を追加するための設定ファイルです。
詳しく見る →'Configure ModSecurity WAF with OWASP Core Rule Set (CRS) for web application logging, tune rules to reduce false
Identify, collect, and analyze ransomware attack artifacts to determine the variant, initial access vector, encryption
Investigate Active Directory compromise by analyzing authentication logs, replication metadata, Group Policy
Assess Active Directory security posture using PingCastle, BloodHound, and Purple Knight to identify misconfigurations,
Detect and respond to Adversary-in-the-Middle (AiTM) phishing attacks that use reverse proxy kits like EvilProxy,
Leverage the CISA Known Exploited Vulnerabilities catalog alongside EPSS and CVSS to prioritize CVE remediation
Dark web monitoring involves systematically scanning Tor hidden services, underground forums, paste sites, and
'Deploys deception technology including honeypots, honeytokens, and decoy systems to detect attackers who have
Execute a phased DMARC rollout from p=none monitoring through p=quarantine to p=reject enforcement, ensuring
'Analyzes firmware images for embedded malware, backdoors, and unauthorized modifications targeting routers,
Indicator lifecycle management tracks IOCs from initial discovery through validation, enrichment, deployment,
Perform authorized initial access using EvilGinx3 adversary-in-the-middle phishing framework to capture session
Perform forensic investigation of Linux system logs including syslog, auth.log, systemd journal, kern.log, and
Collect, parse, and correlate system, application, and security logs to reconstruct events and establish timelines
Systematically investigate all persistence mechanisms on Windows and Linux systems to identify how malware survives
Perform forensic analysis of network packet captures (PCAP/PCAPNG) using Wireshark, tshark, and tcpdump to reconstruct
>-
'This skill covers conducting comprehensive security assessments of Operational Technology (OT) networks including
'Perform vulnerability scanning in OT/ICS environments safely using passive monitoring, native protocol queries,
Discover and inventory all privileged accounts across enterprise infrastructure including domain admins, local
'Executes a structured ransomware incident response from initial detection through containment, forensic analysis,
Audit service accounts across enterprise infrastructure to identify orphaned, over-privileged, and non-compliant
'Automates SOC 2 Type II audit preparation including gap assessment against AICPA Trust Services Criteria (CC1-CC9),
Perform forensic analysis of SQLite databases to recover deleted records from freelists and WAL files, decode
'Performs static analysis of Windows PE (Portable Executable) malware samples using PEStudio to examine file
Simulate and detect software supply chain attacks including typosquatting detection via Levenshtein distance,
Conduct wireless network security assessments using Kismet to detect rogue access points, hidden SSIDs, weak
Develop precise YARA rules for malware detection by identifying unique byte patterns, strings, and behavioral
'Performs advanced network reconnaissance using Nmap''s scripting engine, timing controls, evasion techniques,
'This skill covers hardening GitHub Actions workflows against supply chain attacks, credential theft, and privilege
Use when errors occur deep in execution and you need to trace back to find the original trigger - systematically traces bugs backward through call stack, adding instrumentation when needed, to identify source of invalid data or incorrect behavior
Token integration and implementation analyzer based on Trail of Bits' token integration checklist. Analyzes token implementations for ERC20/ERC721 conformity, checks for 20+ weird token patterns, assesses contract composition and owner privileges, performs on-chain scarcity analysis, and evaluates how protocols handle non-standard tokens. Context-aware for both token implementations and token integrations.
Search for products on Chinese e-commerce platforms (Taobao, JD, Vipshop, PDD, Meituan, Ele.me, etc.) using web search. This skill helps users find products, compare prices, and get recommendations from major shopping platforms.
🎀 AgenticMail — Full email, SMS, storage & multi-agent coordination for AI agents. 63 tools.
{
1. **Brief first, always** — Write a full visual brief before generating anything. This ensures quality control.
**March 20, 2026**
> IMAP Email Read → AI Classification → Reply Suggestions → Feishu Push Summary
**Multi-platform news publishing automation from Markdown**
Location: India Role Focus: DevOps Engineer \| Platform Engineer \|
>
Cognitive atom: Plain (白). Rewrites any content so a smart 12-year-old groks it. Structure-free — form follows content. Use when user says '白话说', '说人话', '解释一下', 'plain', 'grok'.
**创建时间**: 2026-02-20 11:03 UTC+8
Work with Obsidian vaults (plain Markdown notes) and automate via obsidian-cli.
Identifies obesity, emaciation, external injuries, skin abnormalities, and abnormal mental states, helping pet owners detect health issues promptly. | 宠物体态健康分析技能,识别肥胖、消瘦、外伤、皮肤异常、精神状态异常,帮助宠物主人及时发现宠物健康问题
Based on computer vision, analyzes pet health indicators such as feeding frequency, drinking frequency, excretion status, mental state, vomiting behavior, and limping abnormalities through camera/feeder monitoring videos, promptly detects abnormal pet health conditions, and outputs health monitoring reports. | 宠物日常健康监测分析技能,基于计算机视觉通过摄像头/喂食器监控视频分析宠物的进食频次、饮水频次、排泄状态、精神状态、呕吐行为、跛行异常等健康指标,及时发现宠物异常健康状况,输出健康监测报告
Conducts open-ended Q&A on image content based on computer vision and large language models, supporting any questions to receive natural language responses. | 大模型视觉问答(VQA)技能,基于计算机视觉和大语言模型对图片内容进行开放式问答,支持任意提问得到自然语言回答
本技能支持**多知识库**架构,每个知识库对应一个独立的 DashVector Collection。用户可在同一工作目录下创建多个互不干扰的知识库(如"MySQLNotes"、"JavaNotes"等)。
会话存档插件 - 自动将对话消息保存到 SQLite 数据库。
Your company deployed AI agents. Now what? This skill turns you into the person who actually makes them productive — the Agent Manager.