Connect your agent to 100+ services and 21 tools across the internet. Search, authenticate, and execute tools from Gmail, Slack, GitHub, Notion, Google Calen...
A robust CLI wrapper for yt-dlp to download videos, playlists, and audio from YouTube and thousands of other sites. Supports format selection, quality control, metadata embedding, and cookie authentic
Authenticate and provision new tenants with initial document templates. Add and manage templates for existing tenants to standardize workflows. Connect to external services via HTTP as part of your se
Access Telegram data via MCP using the telebiz-tt browser client. Lists chats, reads messages, searches, manages folders, and sends messages through an authenticated Telegram session.
Instantly understand what real users think and why by querying our network of 1:1 Digital Twins - each representing a real person. Give your AI agents authentic human context to ground outputs, improv
Automate Microsoft 365 mailbox tasks via Microsoft Graph: read, search, draft, send emails for Business and Consumer accounts with device code authentication.
--- name: pentest-auth-bypass description: Test authentication and session management controls for bypass and account takeover scenarios. --- # Pentest Auth Bypass ## Stage - PTES: 5 - MITRE: T1110
Diagnoses and troubleshoots OpenClaw config, channel, group message, cron job, and authentication issues using logs and built-in knowledge base.
Shopify Admin API CLI for orders, products, customers, and store management. Uses REST and GraphQL APIs with environment-based authentication.
Complete Supabase platform documentation. Use when working with Supabase - covers authentication (email, OAuth, magic links, phone, SSO), database (PostgreSQL, RLS, migrations), storage (file uploads,
Guide to implement secure API practices including authentication, authorization, input validation, rate limiting, and protection against common API vulnerabi...
Use when implementing authentication/authorization, securing user input, or preventing OWASP Top 10 vulnerabilities. Invoke for authentication, authorization, input validation, encryption, OWASP Top 1
Convert documents, spreadsheets, images, and structured files into clean, structured Markdown optimized for AI processing without authentication.
Verify AI agents, check trust scores (0-100), fetch A2A agent cards, discover marketplace agents, apply guardrails for security and compliance. Use when user mentions agent verification, trust scores,
Automatically upload images to Stardots.io cloud storage, manage files, and obtain secure access links using API authentication.
Check the authenticity of nationwide VAT invoices by querying the official VAT invoice verification platform.
Automatically back up images to stardots.io cloud storage with secure MD5 authentication and configurable credentials.
Access ETH wallet address and securely send ETH or USDC on Ethereum or Base chains with 2FA authentication code verification.
Mine RTC tokens by proving your hardware's authenticity with cryptographic checks and automated RustChain network attestation.
Manage Feishu app and user access tokens with ease. Fetch valid app tokens and refresh user tokens automatically when needed. Streamline authentication for your Feishu integrations with clear expiry d
Provides expert OAuth 2.0 implementation, troubleshooting, and token management for Twenty CRM with Google/Microsoft OAuth and email/calendar sync integration.
Trade perpetual futures on ClawSwap DEX, check balances and positions, join competitions, and track points and leaderboard standings with AI authentication.
CloudBase is a full-stack development and deployment toolkit for building and launching websites, Web apps, 微信小程序 (WeChat Mini Programs), and mobile apps wit...
Workspaces for agentic teams. Complete agent guide with all 19 consolidated tools using action-based routing — parameters, workflows, ID formats, and constra...