Integrate Didit Face Search standalone API to perform 1:N facial search against all previously verified sessions. Use when the user wants to detect duplicate...
Structured debugging with 4 techniques — Log Injection, Screenshot Analysis, Manual Trace, Test-Driven Fix. Use when facing errors, broken UI, regressions, o...
Use this skill for ANY question or task involving the Superfluid Protocol — writing integration code, debugging, looking up contract ABIs, understanding arch...
Security firewall for skills that automatically blocks and filters malicious or potentially harmful skills. Use when: (1) Scanning skills for security threat...
System-level watchdog for OpenClaw gateway restarts and sub-agent task PIDs. Monitors registered PIDs and optional log/directory freshness. Auto-reverts conf...
--- name: aws-guardduty-explainer description: Translate GuardDuty findings into plain-English incident summaries with actionable response steps tools: claude, bash version: "1.0.0" pack: aws-security
Multi-agent crypto token intelligence. 6 AI agents independently analyze and debate a token's fundamentals before reaching consensus. Free, no API key needed.
Captures learnings, errors, and corrections to enable continuous improvement. Use when: (1) A command or operation fails unexpectedly, (2) User corrects Clau...
Systematically discover, evaluate, compare, and assess OpenClaw skills to find the right, safe, and high-quality option for your specific task.
Helps verify that AI agent skills maintain consistent behavioral invariants across repeated executions — detecting the class of threat where a skill behaves...
Search the web and codebases to get precise, up-to-date context for programming and research. Find examples, API usage, and documentation from real repositories and sites to ship faster with fewer mis
Log query and troubleshooting workflows with Volcengine CLS. Use when users need error analysis, time-range queries, aggregation dashboards, or incident diagnostics.
Get an independent risk assessment for any proposed Uniswap operation — swap, LP position, bridge, or token interaction. Evaluates slippage, impermanent loss, liquidity, smart contract, and bridge r
Build, evaluate, repair, and strengthen trust across relationships, teams, clients, brands, communities, partnerships, and decision environments. Use when so...
Meta-skill that orchestrates logging, monitoring, error handling, performance, security, deployment, and testing skills to ensure a service is fully production-ready before launch. Use before first de
Help with application security review, bug bounty workflows, recon, and secure coding while keeping things ethical and scoped. Think critically, use real sources only, and reference OWASP.
Deep code audit + documentation sync + release preparation for Python packages. Use when preparing a release, checking code quality before publishing, auditi...
Build and scale customer support for a solopreneur business. Use when setting up support channels, writing help docs, reducing support volume, improving resp...
Comprehensive system for designing, testing, optimizing, and managing clear, role-aware, actionable, focused, and testable prompts for AI models.
{ "title": "Whispers of Noir", "description": "A gritty, cinematic portrait of a hard-boiled detective waiting for a lead in a hazy, underground jazz lounge.", "prompt": "You will perform an ima
LYGO Δ9 Council Champion persona helper (Δ9RA / RA, The Wolf). Censorship-breaker advisor for suppressed-signal hunting, integrity checks, and receipts-first truth recovery. Pure advisor; not a cont
Facilitates focused autonomous sessions to build, create, or produce one concrete deliverable, then log and commit progress efficiently.
Software deployment workflow for systems with separate UAT and PROD environments. Use when: planning a bug fix deployment, choosing between Flow 1 (UAT-first...