Skip to main content

Database

Browse 5,303 skills across 372 packs and 37 categories

Showing 301–360 of 441 skills
441 skills found in Uncategorized

Asset Discovery

99L

Asset discovery, DNS enumeration, and subdomain mapping for authorized security assessments

UncategorizedRecon Agent

Attack Surface Mapping

129L

External attack surface mapping, forgotten asset detection, and domain drift analysis for authorized assessments

UncategorizedRecon Agent

Certificate Analysis

131L

Certificate transparency analysis, SSL/TLS review, and cert chain validation for authorized assessments

UncategorizedRecon Agent

OSINT Gathering

119L

Open source intelligence collection, data leak checks, and metadata extraction for authorized assessments

UncategorizedRecon Agent

Service Inventory

114L

Service inventory and technology fingerprinting for authorized security assessments

UncategorizedRecon Agent

AML KYC Compliance

58L

Guide financial institutions and regulated entities through Anti-Money Laundering and Know Your Customer requirements including customer due diligence programs, suspicious activity reporting, Bank Secrecy Act obligations, beneficial ownership identification, and sanctions screening procedures.

UncategorizedRegulatory Compliance

Antitrust and Competition Law Compliance

59L

Guide organizations through antitrust and competition law requirements including Sherman Act prohibitions, merger review under the Clayton Act, price fixing and market allocation agreements, monopolization claims, and the development of compliance programs to prevent anticompetitive conduct in commercial operations.

UncategorizedRegulatory Compliance

Consumer Protection Compliance

59L

Guide organizations through consumer protection requirements including FTC Act unfair and deceptive practices standards, Telephone Consumer Protection Act obligations, CAN-SPAM Act email marketing rules, Truth in Lending Act disclosures, and the development of compliance programs that ensure fair and transparent treatment of consumers across marketing, sales, and service operations.

UncategorizedRegulatory Compliance

State Data Privacy Law Compliance

59L

Guide organizations through the evolving landscape of U.S. state data privacy laws including CCPA and CPRA requirements, opt-out rights, data subject access requests, sale of personal information restrictions, and the development of privacy compliance programs that address multi-state obligations for businesses operating across jurisdictions.

UncategorizedRegulatory Compliance

Environmental Compliance

59L

Guide organizations through environmental regulatory requirements including EPA regulations, Clean Air Act and Clean Water Act permitting, CERCLA liability and remediation, RCRA hazardous waste management, NEPA environmental reviews, and the development of environmental management systems for industrial and commercial operations.

UncategorizedRegulatory Compliance

Export Controls Compliance

59L

Guide organizations through export control requirements including International Traffic in Arms Regulations, Export Administration Regulations, sanctions screening procedures, deemed export rules, technology transfer controls, and the development of export management and compliance programs for organizations dealing in controlled items and technologies.

UncategorizedRegulatory Compliance

FCPA Anti-Bribery Compliance

59L

Guide organizations through Foreign Corrupt Practices Act requirements including anti-bribery provisions, books and records obligations, facilitation payment exceptions, third-party due diligence, and the design of effective corporate compliance programs to prevent corruption in international business operations.

UncategorizedRegulatory Compliance

Financial Regulations Compliance

59L

Guide organizations through financial regulatory requirements including Dodd-Frank Act provisions, banking regulations, consumer financial protection, fintech compliance obligations, securities regulations, and the development of compliance programs for financial institutions and technology companies operating in regulated financial services markets.

UncategorizedRegulatory Compliance

GDPR Compliance

59L

Guide development teams through General Data Protection Regulation requirements including data protection principles, consent management, Data Protection Officer obligations, breach notification procedures, and Data Protection Impact Assessments for organizations processing EU personal data.

UncategorizedRegulatory Compliance

HIPAA Compliance

59L

Guide organizations through Health Insurance Portability and Accountability Act requirements including Protected Health Information handling, covered entity and business associate obligations, administrative and technical safeguards, breach reporting under the HITECH Act, and compliance program development for healthcare technology.

UncategorizedRegulatory Compliance

OSHA Workplace Safety Compliance

59L

Guide organizations through Occupational Safety and Health Administration requirements including hazard communication standards, injury and illness recordkeeping, inspection and citation procedures, safety training obligations, and the development of comprehensive workplace safety programs across general industry and construction sectors.

UncategorizedRegulatory Compliance

SOX Compliance

59L

Guide organizations through Sarbanes-Oxley Act requirements including internal controls over financial reporting, Section 404 management assessments, auditor independence standards, whistleblower protections, and corporate governance obligations for publicly traded companies.

UncategorizedRegulatory Compliance

Compliance Mapping

172L

Compliance framework alignment including CIS, NIST, ISO 27001, SOC 2, PCI DSS, and HIPAA

UncategorizedReporting Agent

Executive Summary Writing

182L

Executive summary writing and non-technical security communication

UncategorizedReporting Agent

Findings Documentation

177L

Clear vulnerability findings documentation with reproducible steps and evidence handling

UncategorizedReporting Agent

Remediation Mapping

198L

Remediation mapping, fix prioritization, and timeline estimation

UncategorizedReporting Agent

Severity Scoring and Risk Rating

186L

CVSS scoring, risk rating methodology, and business impact assessment

UncategorizedReporting Agent

Computer Vision Robotics

60L

Skill for implementing computer vision pipelines on robotic platforms, covering

UncategorizedRobotics Automation

Drone Programming

61L

Skill for developing software for autonomous drones using ArduPilot, PX4,

UncategorizedRobotics Automation

Embedded Systems

62L

Skill for developing embedded firmware for robotic systems on ARM microcontrollers,

UncategorizedRobotics Automation

Industrial Automation

61L

Skill for designing and programming industrial automation systems including PLC

UncategorizedRobotics Automation

IoT Devices

61L

Skill for developing IoT device firmware and systems using MQTT, ESP32, sensor

UncategorizedRobotics Automation

Motor Control

61L

Skill for designing and implementing motor control systems including stepper

UncategorizedRobotics Automation

Path Planning

61L

Skill for implementing path planning and motion planning algorithms for robots,

UncategorizedRobotics Automation

Robot Arm Kinematics

61L

Skill for implementing forward and inverse kinematics for robotic manipulators,

UncategorizedRobotics Automation

ROS Robotics

64L

Skill for developing robotic systems using ROS2, covering node architecture,

UncategorizedRobotics Automation

Sensor Integration

60L

Skill for integrating and fusing data from robotic sensor suites including IMUs,

UncategorizedRobotics Automation

Change Safety Guardrails

180L

Change safety guardrails for security testing, do-not-touch asset protection, and rollback planning

UncategorizedSafety Scope Guard

Legal Authorization and Rules of Engagement

170L

Legal authorization verification, rules of engagement compliance, and regulatory awareness for security testing

UncategorizedSafety Scope Guard

Proof-Only Mode Testing

153L

Non-destructive vulnerability validation, proof-of-concept without exploitation, and safe evidence collection

UncategorizedSafety Scope Guard

Safe Testing Rate Limits

153L

Safe testing rate limits, resource-aware scanning, and production disruption avoidance

UncategorizedSafety Scope Guard

Scope Enforcement

149L

Scope enforcement for penetration testing, authorized target validation, and boundary compliance

UncategorizedSafety Scope Guard

Salesforce Administration

208L

UncategorizedSalesforce

Salesforce Apex Development

321L

UncategorizedSalesforce

Salesforce CPQ

208L

UncategorizedSalesforce

Salesforce Flows

232L

UncategorizedSalesforce

Salesforce Integration

209L

UncategorizedSalesforce

Salesforce Lightning Web Components

293L

UncategorizedSalesforce

Salesforce Service Cloud

247L

UncategorizedSalesforce

Salesforce Apex Testing

301L

UncategorizedSalesforce

Advanced Skill Patterns

436L

UncategorizedSkill Writing

Debugging Skill Files

311L

UncategorizedSkill Writing

Prompt Engineering Techniques in Skill Files

397L

UncategorizedSkill Writing

Skill Composition Patterns

351L

UncategorizedSkill Writing

Managing Skill Dependencies

300L

UncategorizedSkill Writing

Skill Discovery Optimization

285L

UncategorizedSkill Writing

Skill File Structure and Anatomy

339L

UncategorizedSkill Writing

Skill File Templates and Archetypes

547L

UncategorizedSkill Writing

Skill Pack Organization and Planning

321L

UncategorizedSkill Writing

Skill Publishing Workflow

396L

UncategorizedSkill Writing

Skill Quality Checklist

275L

UncategorizedSkill Writing

Skill Testing and Validation

340L

UncategorizedSkill Writing

Skill Versioning and Lifecycle Management

294L

UncategorizedSkill Writing

Writing Effective Instructions in Skill Files

378L

UncategorizedSkill Writing

Writing Skills for AI Agent Consumption

349L

UncategorizedSkill Writing