Provides chaos engineering best practices for resilience testing, fault injection, and game day planning. Use when designing resilience experiments, configuring chaos tools, planning game days, or when user mentions 'chaos engineering', 'resilience', 'litmus', 'game day', 'fault injection', 'chaos monkey', 'blast radius', 'steady state', 'failure mode'.
Parallel agent fleet dispatch with progress tracking and result aggregation. Launch N agents, monitor completion, merge results. Proven at 7-agent scale.
Provides CI/CD pipeline best practices for GitHub Actions, deployment strategies, and pipeline optimization. Use when setting up pipelines, configuring GitHub Actions, managing deployments, or when user mentions 'CI', 'CD', 'pipeline', 'GitHub Actions', 'deploy', 'workflow', 'build'.
Fundamental movement skills and motor learning for physical education. Covers the three movement families (locomotor, non-locomotor, manipulative), the stage theory of motor learning (cognitive, associative, autonomous), developmental coordination milestones, and the teaching progression from gross to fine motor control. Use when designing introductory PE lessons, assessing motor competence, diagnosing movement gaps in older learners, or building the movement base on which sport-specific skills later stand.
Strength, power, and conditioning principles for physical education. Covers the seven classical strength adaptations (hypertrophy, maximal strength, power, endurance, speed, agility, mobility), resistance training modalities, periodization models, age-appropriate progression, and injury prevention. Use when designing resistance units, prescribing off-season conditioning, adapting training for adolescent development, or integrating strength work into sport-specific preparation.
Relativity and astrophysics from special relativity through cosmology. Covers Einstein's postulates, time dilation, length contraction, Lorentz transformations, relativistic momentum and energy (E=mc^2), spacetime diagrams, the equivalence principle, curved spacetime (conceptual), gravitational lensing, black holes (Schwarzschild solution, Chandrasekhar limit), stellar evolution (main sequence through supernova), and cosmology (Big Bang, Hubble's law, CMB, dark matter, dark energy, FLRW metric). Use when analyzing systems at relativistic speeds, strong gravitational fields, stellar lifecycles, or cosmological scales.
Classical RCA asks "what component failed?" Systems-theoretic RCA asks "what *control* failed?" The difference is not cosmetic. An incident where no component is individually broken — every actor beha
Analytical evaluation of texts for argument quality, author purpose, bias, credibility, and rhetorical strategy. Covers the distinction between comprehension and critique, argument analysis (claims, evidence, reasoning, warrants), rhetorical appeals (ethos, pathos, logos), bias identification (selection bias, confirmation bias, loaded language, omission), source credibility evaluation (CRAAP test, lateral reading), propaganda techniques, media literacy, and multi-text synthesis. Use when evaluating arguments, identifying bias, assessing source reliability, analyzing rhetoric, or synthesizing across multiple texts on the same topic.
The scientific method as an epistemological framework for producing reliable knowledge. Covers observation, question formation, hypothesis construction, experimental testing, data analysis, conclusion, and communication -- not as a rigid sequence but as an iterative cycle of inquiry. Includes falsifiability criteria, the role of replication, and the distinction between science, non-science, and pseudoscience. Use when teaching, applying, or evaluating the process of scientific inquiry at any level.
Synchronous immediate signaling channel for inter-agent communication. Implements latest-wins single-file nudge pattern for health checks, stall detection, and urgent pings.
Bayesian approach to statistical inference and decision-making. Covers prior specification, likelihood functions, posterior computation, conjugate priors, Markov chain Monte Carlo (MCMC), credible intervals, Bayesian hypothesis comparison (Bayes factors), hierarchical models, and the philosophical contrast with frequentist methods. Use when updating beliefs with data, specifying priors, computing posteriors, comparing Bayesian and frequentist approaches, or building hierarchical models.
Drawing conclusions about populations from sample data. Covers sampling distributions, confidence intervals, hypothesis testing (z-tests, t-tests, chi-squared tests, ANOVA), p-values, significance levels, power, Type I and Type II errors, effect sizes, and the logic connecting sample statistics to population parameters. Emphasizes the distinction between statistical significance and practical significance. Use when testing hypotheses, constructing confidence intervals, designing studies, or interpreting inferential results.
Mathematical foundations of uncertainty and random phenomena. Covers sample spaces, events, axioms, conditional probability, Bayes' theorem, independence, random variables, distributions (discrete and continuous), expected value, variance, the law of large numbers, and the central limit theorem. Use when computing probabilities, reasoning about random events, working with probability distributions, or building the foundation for statistical inference.
Computational tools and algorithms for statistical analysis. Covers simulation, resampling methods (bootstrap, permutation tests), Monte Carlo methods, random number generation, numerical optimization (Newton-Raphson, EM algorithm), cross-validation, and reproducible analysis workflows. Emphasizes the bootstrap revolution and the shift from formula-based to computation-based inference. Use when implementing statistical procedures, running simulations, bootstrapping confidence intervals, performing cross-validation, or building reproducible analysis pipelines.
Foundational cybersecurity literacy covering threat landscape (malware, phishing, social engineering, network attacks), defensive practices (encryption, authentication, access control, patching), privacy fundamentals (data collection, tracking, regulatory frameworks), and security reasoning (threat modeling, risk assessment, defense in depth). Use when explaining security concepts, evaluating system security, teaching safe technology practices, or reasoning about digital privacy. Distinct from professional penetration testing -- this skill covers what every technology user and designer should understand.
The technology design process from needs assessment through iteration, covering empathy mapping, design briefs, concept development, prototyping, user testing, and iterative refinement. Integrates design thinking methodology (Stanford d.school) with engineering design process (ITEEA) and Don Norman's human-centered design principles. Use when designing technology solutions, evaluating existing designs, running design sprints, or teaching the design cycle. Distinct from art/aesthetics -- this skill focuses on functional design that solves real problems for real people.
Religious ethics and practice across traditions — moral theology and its sources, the role of virtue, law, and narrative in ethical formation, ritual as ethical shaping, the relation of contemplative practice to ethical life, and comparative work on shared ethical ground (the golden rule, non-harm, care for the stranger) and genuine disagreement. Use when a query asks what a tradition requires of its adherents, how ritual and ethics interact, or how traditions agree and differ on specific moral questions.
"Mysticism" is a contested term. William James in the *Varieties of Religious Experience* (1902) identified four marks — ineffability, noetic quality, transiency, passivity — and treated mysticism as
Scripture interpretation across traditions — hermeneutics, exegesis, textual criticism, canonical formation, and the history of reading practices. Covers Jewish (Tanakh, Talmud, Midrash), Christian (Old and New Testament, patristic and medieval senses), Islamic (Qur'an, tafsir, asbab al-nuzul), and Daoist-Confucian classical commentary traditions. Use when a query involves reading a sacred or classical text, comparing how different traditions interpret the same passage, or understanding why a specific text is canonical to a specific community.
Systematic theology as a method — the organization of doctrine into a coherent structure with defined loci (God, creation, humanity, sin, Christ or analogous figure, salvation, church, last things, where applicable to tradition). Covers creedal formation, the history of doctrine, the distinction between dogmatic and systematic work, and the comparative shape of systematics across Western Christian, Eastern Christian, Jewish, and Islamic traditions. Use when a query asks about a specific doctrine, its historical development, or its place in a tradition's overall conceptual architecture.
Craft methodology for the trades — how skilled work is organized, decomposed, sequenced, and evaluated from first principles through finished artifact. Covers the craft arc (intent, layout, roughing, fitting, finishing, inspection), the distinction between process knowledge and product knowledge, and how craft traditions encode error-correction in their sequencing. Use when designing a new trade process, diagnosing a faltering one, or teaching craft structure to a learner.
Measurement and tolerance for the trades — how dimensions are specified, measured, and verified, and how real parts are allowed to deviate from their specifications. Covers tolerance stacks, reference surfaces and datum chains, the difference between accuracy and precision, measurement tool selection by required resolution, and the discipline of stating tolerance in terms of what the fit actually requires rather than what the tool can read. Use when writing a specification, selecting measurement tools, or diagnosing a fit failure that looks like a measurement error.
Upstream version checking, agentskills.io spec compliance audit, Claude Code feature gap analysis. Activates on updates, version checks, or alignment work.
Narrative construction techniques for fiction and creative nonfiction. Covers story structure (three-act, hero's journey, in medias res, frame narrative), character development (arc types, interiority, dialogue as characterization), point of view (first, second, third limited, omniscient, unreliable narrator), conflict and tension (external/internal, dramatic irony, stakes escalation), setting and worldbuilding (sensory detail, defamiliarization, speculative construction), pacing and scene structure (scene vs. summary, beats, white space, chapter rhythm). Use when writing fiction, analyzing narrative structure, or building story-driven nonfiction.
Voice, style, and register in writing across all forms. Covers voice (authorial presence, authenticity, persona, tone), style as choice (diction, syntax, rhythm, density, register), the elements of style (Strunk's principles, economy, parallel construction, definite/specific/concrete language), distinctive voices (stream of consciousness, minimalism, maximalism, vernacular, lyric, journalistic), style analysis (identifying an author's characteristic moves, close reading for technique), register and audience (formal/informal, academic/public, shifting register for effect), and imitation as learning (deliberate practice, pastiche, finding your own voice through others). Use when developing voice, analyzing style, adapting register, or teaching style awareness.
Conversational guide for using tools/session-retro/observe.mjs to capture friction, wins, corrections, decisions, gaps, tool-use, and checkpoints as they happen during a session. Use at session start (to kick off the log), at inflection points (to record events), and at session end (to archive and feed the retrospective generator).
Kolla-Ansible day-2 operations skill for post-deployment infrastructure lifecycle management. Covers service reconfiguration (globals.yml changes, config overrides, prechecks, targeted reconfigure with --tags), minor and major OpenStack upgrades (image pull, upgrade procedure, rollback), container management (restart, logs, health inspection), maintenance mode (compute disable, instance drain, host maintenance), password rotation, certificate renewal, and rolling updates. This skill is for operations after initial deployment -- the kolla-ansible deployment skill covers initial bootstrap and deploy.
OpenStack networking debug operations skill for SDN troubleshooting, packet tracing, and flow analysis. Covers OVS/OVN debugging (ovs-vsctl, ovs-ofctl, ovs-appctl, ovn-nbctl, ovn-sbctl, ovn-trace), security group analysis via OVS flow rules and conntrack, DHCP troubleshooting through namespace inspection and dnsmasq diagnostics, floating IP diagnosis with NAT rule and ARP verification, network namespace inspection (ip netns), MTU chain analysis for overlay networks, DNS resolution debugging, and east-west traffic diagnosis. Use when diagnosing network connectivity failures, tracing packets through the SDN stack, or analyzing flow tables in a running OpenStack cloud.
Route OpenSkills development tasks to the right project skill or subagent, including sequencing rules for debugging, feature work, regression checks, and release readiness.
Run deterministic OpenSkills end-to-end validation across runtime tests and example agents, then report tool calls, activation behavior, and regressions.
Enforce clean separation between core openskills-runtime and optional WASM build plugins so plugin compilation does not break runtime consumers or language bindings.
Prepare and validate OpenSkills release readiness across runtime, bindings, examples, and regression gates with a deterministic checklist and go/no-go outcome.
This skill provides JavaScript coding standards and is automatically loaded for JavaScript projects. It includes modern ES2025 patterns, async handling, and recommended tooling.
This skill provides Python coding standards and is automatically loaded for Python projects. It includes naming conventions, best practices, and recommended tooling.
This skill provides Shell/Bash coding standards and is automatically loaded for shell projects. It includes defensive scripting patterns, best practices, and recommended tooling.