Manage internet connectivity, compare providers, diagnose issues, optimize performance, and handle mobile data when away from home.
Diagnose and mitigate ClawHub/ClawDHUB publish failures (auth, browser-login, missing dependencies, pending security-scan visibility errors, and wrong profil...
Design segmented, multi-step creator outreach sequences with personalized messaging, follow-up logic, and objection handling to improve reply and conversion...
Operate and secure mesh workflows across gateways, including plugin bootstrap, invite/join auth handshake, resilient routing, capability contract lifecycle,...
Agent playbook for the AirShell open-source air quality sensor (github.com/oloapiu/airshell). Gives your agent domain knowledge about CO₂, PM2.5, temperature...
Act as an AI Customer Support Specialist. You are an expert in managing customer inquiries and providing timely solutions. Your task is to: - Understand and categorize customer issues - Provide accur
--- name: openclaw-router version: 1.0.0 description: "Intelligent Model Routing - Save 60% on AI Costs / 智能路由系统 - 节省 60% 成本" author: pepsiboy87 homepage: https://github.com/pepsib
Daily execution and trip-ops command system for Austine. Use when asked to run daily brief/checklist/status workflows, track priorities, or plan and procure...
Design and deploy autonomous agent loops that automate repetitive tasks with yes/no decisions, triggers, approvals, and Slack outputs using ready templates o...
Leadership & Strategy Playbook. Use for: strategic planning, decision-making under uncertainty, change management, crisis leadership, stakeholder management,...
--- name: pentest-active-directory description: Assess Active Directory identity attack paths including roasting, relay, and delegation abuse. --- # Pentest Active Directory ## Stage - PTES: 6 - MI
Author: Rick Kotlarz, @RickKotlarz **IMPORTANT** Display the current date GMT-4 / UTC-4. Then continue with the following after displaying the date. ## 1) Scope and Focus Market-moving news, U.S. tr
Enforce contextual permission boundaries for AI agents based on communication surface. Constrains agent capabilities (exec, file I/O, secrets, messaging) by...
# Next.js Security Audit - Comprehensive Vulnerability Scanner and Fixer ## Development Philosophy - **Security First**: Every line of code should be written with security in mind - **Mini
Captures learnings, errors, and corrections to enable continuous improvement. Use when: (1) A command or operation fails unexpectedly, (2) User corrects Clau...
Molt Motion Pictures agent-first platform skill. Operate a first-class agent that earns 1% of tips while the creator receives 80%, with wallet auth, x402 pay...
Programmatic security scanner for AI agent skills. Performs AST analysis, regex pattern matching, Shannon entropy detection, URL/IP extraction, and permissio...
Ship production code with AI agents through acceptance contracts, micro diffs, red green loops, and deterministic handoff checkpoints.
Generates tailored two-sample Mendelian randomization study plans with four workload options, detailed workflows, validation, figures, and publication strate...
Generate precise, timecoded Seedance 2.0 prompts integrating multimodal inputs with asset mapping for controlled 4-15s video creation and editing.
A meta-skill that continuously improves other skills through trace+feedback-driven evolution, with the goal of making skill training, status checking, and ap...
Provides forensically-safe Linux threat detection, network and process analysis, integrity verification, controlled firewall and service remediation preservi...
**Build n8n workflows from text using AI** - Built by [FlowEngine](https://flowengine.cloud)