Database
Browse 4,557 skills across 394 packs and 37 categories
Agent Tool Design Principles
266LDesign the tools that an LLM agent uses. Covers naming, parameter
Evaluation-Driven Agent Development
177LBuild the eval suite that tells you whether changes to your agent
Building Agent Workflows with LangGraph
214LUse LangGraph (or equivalent state-machine frameworks) to express
Designing Episodic Memory for Agents
265LBuild the episodic memory layer that stores specific past events and
Semantic Memory and User Modeling
280LBuild the agent's accumulated model of the user — preferences, expertise,
Short-Term vs Long-Term Agent Memory
200LDesign the memory architecture for a stateful agent — what's in
Vector-Backed Agent Memory with RAG
199LImplement an agent memory system using a vector database with retrieval-
Databricks Delta Lake
203LDatabricks Workflows & Jobs
293LDatabricks MLflow
218LDatabricks Notebooks
211LDatabricks Delta Live Tables (DLT)
210LDatabricks PySpark
187LDatabricks SQL
229LDatabricks Unity Catalog
205LHubSpot CRM API
316LHubSpot CMS Hub
260LHubSpot Custom Objects
202LHubSpot Integrations
213LHubSpot Marketing Hub
204LHubSpot Operations Hub
200LHubSpot Reporting & Analytics
200LHubSpot Workflows
204LSalesforce Administration
208LSalesforce Apex Development
321LSalesforce CPQ
208LSalesforce Flows
232LSalesforce Integration
209LSalesforce Lightning Web Components
293LSalesforce Service Cloud
247LSalesforce Apex Testing
301Lapi-auth-flows
139LOAuth2, API key, and HMAC authentication flow testing for security assessments
rate-limit-testing
146LRate limiting bypass testing, throttle evasion, and abuse prevention assessment
schema-validation
155LAPI schema validation testing, fuzzing, and type confusion attacks
third-party-connectors
138LThird-party API integration risk assessment and supply chain security testing
token-handling
126LJWT/OAuth token analysis, validation, and expiry testing for API security assessments
webhook-security
146LWebhook trust boundary testing, signature verification, and callback security
aws-posture
153LAWS security posture review including S3 exposure, IAM policies, and CloudTrail for authorized assessments
azure-posture
150LAzure security assessment including Entra ID, NSGs, and Key Vault for authorized security assessments
cloud-logging-monitoring
150LCloudTrail, Azure Monitor, and GCP logging coverage gap assessment for authorized security assessments
cloud-network-policy
152LVPC rules, security groups, and cloud network segmentation assessment for authorized security assessments
cloud-storage-exposure
167LPublic bucket and blob detection, storage ACL review for authorized security assessments
gcp-posture
158LGCP security review including service accounts, storage, and VPC for authorized security assessments
alert-quality
162LAlert quality review, noise reduction, and detection tuning methodology
detection-engineering
223LDetection rule writing, SIGMA/YARA rule development, and behavioral detection
forensic-readiness
140LForensic log retention assessment, evidence preservation, and attack traceability
incident-response
204LIR handoff quality assessment, playbook review, and communication evaluation
siem-coverage
144LSIEM coverage assessment, log source gaps, and detection blind spot analysis
threat-hunting
186LProactive threat hunting methodology with hypothesis-driven search techniques
container-security
157LContainer image hygiene, Kubernetes RBAC, and pod security assessment
edr-visibility
127LEDR and antivirus coverage gap analysis and blind spot detection
local-privilege
147LLocal privilege escalation testing including SUID, sudo abuse, and service misconfiguration
os-hardening
144LOS hardening assessment for Linux and Windows systems against CIS benchmarks
scheduled-task-abuse
161LCron job and scheduled task abuse risk assessment and service hijacking
software-inventory
143LSoftware inventory anomaly detection, shadow IT discovery, and EOL software identification
exploitability-confirmation
136LExploitability confirmation and false positive reduction methodology
impact-verification
144LImpact verification, blast radius estimation, and business consequence assessment
poc-execution
140LControlled proof-of-concept execution and safe vulnerability validation
post-exploitation-mapping
157LPost-exploitation risk mapping including pivot paths and persistence mechanisms
vulnerability-assessment
165LCVE matching, version risk analysis, and misconfiguration detection methodology