Skip to main content

Database

Browse 4,557 skills across 394 packs and 37 categories

Showing 2641–2700 of 4,557 skills
4,557 skills found

Agent Tool Design Principles

266L

Design the tools that an LLM agent uses. Covers naming, parameter

Technology & EngineeringMulti Agent Orchestration

Evaluation-Driven Agent Development

177L

Build the eval suite that tells you whether changes to your agent

Technology & EngineeringMulti Agent Orchestration

Building Agent Workflows with LangGraph

214L

Use LangGraph (or equivalent state-machine frameworks) to express

Technology & EngineeringMulti Agent Orchestration

Designing Episodic Memory for Agents

265L

Build the episodic memory layer that stores specific past events and

Technology & EngineeringAgent Memory

Semantic Memory and User Modeling

280L

Build the agent's accumulated model of the user — preferences, expertise,

Technology & EngineeringAgent Memory

Short-Term vs Long-Term Agent Memory

200L

Design the memory architecture for a stateful agent — what's in

Technology & EngineeringAgent Memory

Vector-Backed Agent Memory with RAG

199L

Implement an agent memory system using a vector database with retrieval-

Technology & EngineeringAgent Memory

Databricks Delta Lake

203L

Technology & EngineeringDatabricks

Databricks Workflows & Jobs

293L

Technology & EngineeringDatabricks

Databricks MLflow

218L

Technology & EngineeringDatabricks

Databricks Notebooks

211L

Technology & EngineeringDatabricks

Databricks Delta Live Tables (DLT)

210L

Technology & EngineeringDatabricks

Databricks PySpark

187L

Technology & EngineeringDatabricks

Databricks SQL

229L

Technology & EngineeringDatabricks

Databricks Unity Catalog

205L

Technology & EngineeringDatabricks

HubSpot CRM API

316L

Technology & EngineeringHubspot

HubSpot CMS Hub

260L

Technology & EngineeringHubspot

HubSpot Custom Objects

202L

Technology & EngineeringHubspot

HubSpot Integrations

213L

Technology & EngineeringHubspot

HubSpot Marketing Hub

204L

Technology & EngineeringHubspot

HubSpot Operations Hub

200L

Technology & EngineeringHubspot

HubSpot Reporting & Analytics

200L

Technology & EngineeringHubspot

HubSpot Workflows

204L

Technology & EngineeringHubspot

Salesforce Administration

208L

Technology & EngineeringSalesforce

Salesforce Apex Development

321L

Technology & EngineeringSalesforce

Salesforce CPQ

208L

Technology & EngineeringSalesforce

Salesforce Flows

232L

Technology & EngineeringSalesforce

Salesforce Integration

209L

Technology & EngineeringSalesforce

Salesforce Lightning Web Components

293L

Technology & EngineeringSalesforce

Salesforce Service Cloud

247L

Technology & EngineeringSalesforce

Salesforce Apex Testing

301L

Technology & EngineeringSalesforce

api-auth-flows

139L

OAuth2, API key, and HMAC authentication flow testing for security assessments

Technology & EngineeringApi Security Agent

rate-limit-testing

146L

Rate limiting bypass testing, throttle evasion, and abuse prevention assessment

Technology & EngineeringApi Security Agent

schema-validation

155L

API schema validation testing, fuzzing, and type confusion attacks

Technology & EngineeringApi Security Agent

third-party-connectors

138L

Third-party API integration risk assessment and supply chain security testing

Technology & EngineeringApi Security Agent

token-handling

126L

JWT/OAuth token analysis, validation, and expiry testing for API security assessments

Technology & EngineeringApi Security Agent

webhook-security

146L

Webhook trust boundary testing, signature verification, and callback security

Technology & EngineeringApi Security Agent

aws-posture

153L

AWS security posture review including S3 exposure, IAM policies, and CloudTrail for authorized assessments

Technology & EngineeringCloud Security Agent

azure-posture

150L

Azure security assessment including Entra ID, NSGs, and Key Vault for authorized security assessments

Technology & EngineeringCloud Security Agent

cloud-logging-monitoring

150L

CloudTrail, Azure Monitor, and GCP logging coverage gap assessment for authorized security assessments

Technology & EngineeringCloud Security Agent

cloud-network-policy

152L

VPC rules, security groups, and cloud network segmentation assessment for authorized security assessments

Technology & EngineeringCloud Security Agent

cloud-storage-exposure

167L

Public bucket and blob detection, storage ACL review for authorized security assessments

Technology & EngineeringCloud Security Agent

gcp-posture

158L

GCP security review including service accounts, storage, and VPC for authorized security assessments

Technology & EngineeringCloud Security Agent

alert-quality

162L

Alert quality review, noise reduction, and detection tuning methodology

Technology & EngineeringDetection Logging Agent

detection-engineering

223L

Detection rule writing, SIGMA/YARA rule development, and behavioral detection

Technology & EngineeringDetection Logging Agent

forensic-readiness

140L

Forensic log retention assessment, evidence preservation, and attack traceability

Technology & EngineeringDetection Logging Agent

incident-response

204L

IR handoff quality assessment, playbook review, and communication evaluation

Technology & EngineeringDetection Logging Agent

siem-coverage

144L

SIEM coverage assessment, log source gaps, and detection blind spot analysis

Technology & EngineeringDetection Logging Agent

threat-hunting

186L

Proactive threat hunting methodology with hypothesis-driven search techniques

Technology & EngineeringDetection Logging Agent

container-security

157L

Container image hygiene, Kubernetes RBAC, and pod security assessment

Technology & EngineeringEndpoint Agent

edr-visibility

127L

EDR and antivirus coverage gap analysis and blind spot detection

Technology & EngineeringEndpoint Agent

local-privilege

147L

Local privilege escalation testing including SUID, sudo abuse, and service misconfiguration

Technology & EngineeringEndpoint Agent

os-hardening

144L

OS hardening assessment for Linux and Windows systems against CIS benchmarks

Technology & EngineeringEndpoint Agent

scheduled-task-abuse

161L

Cron job and scheduled task abuse risk assessment and service hijacking

Technology & EngineeringEndpoint Agent

software-inventory

143L

Software inventory anomaly detection, shadow IT discovery, and EOL software identification

Technology & EngineeringEndpoint Agent

exploitability-confirmation

136L

Exploitability confirmation and false positive reduction methodology

Technology & EngineeringExploit Validation Agent

impact-verification

144L

Impact verification, blast radius estimation, and business consequence assessment

Technology & EngineeringExploit Validation Agent

poc-execution

140L

Controlled proof-of-concept execution and safe vulnerability validation

Technology & EngineeringExploit Validation Agent

post-exploitation-mapping

157L

Post-exploitation risk mapping including pivot paths and persistence mechanisms

Technology & EngineeringExploit Validation Agent

vulnerability-assessment

165L

CVE matching, version risk analysis, and misconfiguration detection methodology

Technology & EngineeringExploit Validation Agent