Comprehensive consumer electronics industry sourcing guide for international buyers – provides detailed information about China's smartphone, wearable, audio...
Comprehensive vehicle sourcing guide for international buyers – provides detailed information about China's passenger car, commercial vehicle, motorcycle, an...
This skill should be used when the user wants to "track job applications", "match resume to job", "generate cover letter", "optimize resume for job", "get in...
Get AI-powered privacy technology recommendations with maturity assessment, capability roadmap, and tech stack advice. Use when selecting privacy tools, buil...
Calculate comprehensive numerology reports using Pythagorean or Chaldean systems. Supports English, Tamil, Telugu, Kannada, and Hindi. Use when a user wants...
Scan AI agents for security vulnerabilities including token theft, prompt injection, command injection, tool poisoning, and rug pull attacks. Use when auditi...
AI-powered palm reading and analysis from palm images. Supports English, Tamil, Telugu, Kannada, and Hindi. Use when a user wants a palm reading, palmistry a...
Analyze and optimize cloud costs across AWS, Azure, and GCP. Use when evaluating cloud spending, identifying cost optimization opportunities, analyzing cloud...
Generate a comprehensive DPDP Act implementation checklist with evidence tracker and roadmap. Use when planning DPDP compliance implementation, building a pr...
Generate comprehensive web application vulnerability assessments with OWASP-aligned checklists, remediation guides, and testing scripts. Use when assessing w...
Assess OT/ICS/SCADA security posture and generate risk scorecards with remediation guidance. Use when evaluating operational technology security, industrial...
Assess ISO/IEC 42001:2023 AI Management System (AIMS) readiness and generate compliance gap analysis with remediation roadmap. Use when evaluating AI governa...
Evaluate and compare privacy solution vendors with a weighted scorecard across 12 criteria. Use when selecting privacy management software, comparing data pr...
Assess data privacy compliance across 20 control areas with 63 controls covering governance, consent, security, breach response, vendor management, and cross...
Assess compliance with India's Digital Personal Data Protection (DPDP) Act 2023 across 7 domains with 41 controls. Use when evaluating DPDP readiness, Indian...
Perform comprehensive IT risk assessments across infrastructure, data protection, access control, compliance, incident response, and vendor management. Use w...
Manage Farcaster social interactions, casting, and feed monitoring. Trigger this when users want to post casts, check their feed, or interact with other agents.
Deploy, secure, and troubleshoot Beszel monitoring with Docker agents, alert tuning, and upgrade-safe operations for self-hosted servers
Migrate a user's OpenClaw customization footprint into Hermes Agent. Imports Hermes-compatible memories, SOUL.md, command allowlists, user skills, and select...
Plugin Orchestration Protocol (POP) for Obsidian integration. Use this skill when the user mentions "POP", "Obsidian plugin", "pipeline orchestration", "idea...
Integrate with Emby Server API to manage media libraries, users, playback, live TV, devices, and encoding settings through comprehensive endpoints.
Generate and security-scan OpenClaw SKILL.md files. Use when creating new OpenClaw skills, scanning skills for security vulnerabilities like prompt injection...
Access Questrade brokerage accounts and Canadian/US market data for balances, positions, orders, executions, Level 1 quotes, historical candles, and symbol s...
Local TTS router for Apple Silicon — pull models, serve OpenAI-compatible API, synthesize speech, clone voices. Use when the user asks to "generate speech",...