Scan session logs for leaked credentials. Checks JSONL session files against known credential patterns and reports which AI provider received the data.
Skill for using the PlyDB CLI to perform SQL analysis of connected data sources. Use for SQL queries across heterogeneous databases and files such as Postgre...
Provides forensically-safe Linux threat detection, network and process analysis, integrity verification, controlled firewall and service remediation preservi...
--- name: large-codebase-workflow description: Best practices for using Claude Code with large, multi-part codebases --- # Large Codebase Workflow Guide ## Core Principle **Context is your scarcest
--- name: skill-scout description: Search, discover, compare, and install OpenClaw skills from ClawHub using CLI and web lookups. author: mohdalhashemi98-hue version: "1.0.0" tags: - discovery - c
Scans and fetches the most up-to-date documentation for coding tasks. Use when building integrations (e.g. OpenRouter), implementing third-party APIs, or whe...
Tool discovery and shell one-liner reference for sysadmin, DevOps, and security tasks. AUTO-CONSULT this skill when the user is: troubleshooting network issues, debugging processes, analyzing logs, wo
Forward Facebook Page inbox messages to your OpenClaw channel in real time. Requires: powershell/pwsh + openclaw CLI. Reads ~/.config/fb-page/credentials.jso...
Local-first data asset manager — scan, classify, and report on your data before deciding what to share. Use when user mentions scanning files, classifying da...
Runtime security hardening for OpenClaw agents. Protects against prompt injection, data exfiltration, credential leaks, and unauthorized operations. Use when setting up agent security, performing secu
Analyze TRON contracts: deploy info, hot methods, top callers, open-source status, transaction count. Use when user asks "contract verification", "contract s...
TRON network insights: new accounts, daily tx count, tx type distribution, hot tokens, hot contracts, top accounts by tx count or staked TRX. Use when user a...
GitHub Action for automated security scanning of agent workspaces. Detects exposed secrets, prompt/shell injection, and data exfiltration patterns in PRs and commits.
Get TRC20 token list on TRON with price, 24h change, 24h volume, market cap, holder count. Use when user asks "token list", "TRC20 list", "hot tokens", "tren...
Monitors system CPU and Memory usage, saves metrics to SQLite database, and generates Excel reports.
Systematic workspace reorganization for AI agent users. Scans workspace, builds safety-first reorganization plan, executes with zero data loss, and verifies...
--- name: scan-skill description: Deep security analysis of an individual skill before installation disable-model-invocation: true allowed-tools: Read, Glob, Grep, Bash context: fork --- # scan-skill
Immutable audit trail for autonomous agent operations. Log skill executions, data access, decisions, and budget changes with tamper-evident hashes. Essential...
Provides CI/CD pipeline templates and interactive setup for Java + Vue projects with GitLab CI or Jenkins, supporting linting, testing, building, Dockerizing...
Identify coins from photos using evidence-based visual checks, ranked candidates, mint-mark reasoning, and a reusable local catalog.
Complete Node.js client for Jupiter Prediction Market API. Use when building AI agents for prediction market trading, portfolio management, or automated trad...
Find markets where Simmer's AI consensus diverges from the real market price, then trade on the mispriced side using Kelly sizing. Scans for divergence, chec...
When the user wants to create competitor comparison or alternative pages for SEO and sales enablement. Also use when the user mentions 'alternative page,' 'v...
Your AI Chief Marketing Officer. Autonomous agent that runs your entire marketing — auto-posts to Twitter/X, Bluesky, Telegram, Discord, auto-engages with yo...