<p align="center"> <a href="https://github.com/trimstray/the-book-of-secret-knowledge"> <img src="https://github.com/trimstray/the-book-of-secret-knowledge/blob/master/static/img/the-book-of-secret-kn
Operate the Emperor Claw control plane as the Manager for an AI workforce: interpret goals into projects, claim and complete tasks, manage agents, incidents,...
World-Class Technology & Data Playbook. Use for: software development best practices, IT infrastructure design, cybersecurity strategy, data analytics, busin...
CT Monitor — Crypto Intelligence Analyst. Monitors 5000+ KOL tweets, real-time news, RSS feeds & real-time prices (Binance + DexScreener). Integrates Binance...
ISO 27001 ISMS implementation and cybersecurity governance for HealthTech and MedTech companies. Use for ISMS design, security risk assessment, control imple...
World-Class Risk Management Playbook. Use for: business continuity planning (BCP), disaster recovery (DR), scenario planning, fraud prevention & detection, r...
Evaluate and improve your organization's data governance across six domains by scoring controls, identifying risks, and prioritizing remediation actions.
ERC-8004 identity, x402 payments, and arbitration protocol for autonomous agent commerce. The three rails for the machine economy.
--- name: "contract-and-proposal-writer" description: "Contract & Proposal Writer" --- # Contract & Proposal Writer **Tier:** POWERFUL **Category:** Business Growth **Domain:** Legal Documents,
Security leadership for growth-stage companies. Risk quantification in dollars, compliance roadmap (SOC 2/ISO 27001/HIPAA/GDPR), security architecture strate...
Generates a 0-100 Supplier Risk Index score across financial, dependency, compliance, performance, and geographic risks with tiered action plans.
Operate and govern autonomous on-chain entities using AI agents for identity, governance, contracts, legal, lending, and community workflows.
Investigate cyber threats across the dark web, Telegram, and leak repositories with unified search. Monitor ransomware activity and exposed credentials to quickly assess risk. Drill into detailed find
Room 418 — The Headless Liar's Protocol. AI Agent interrogation battle game on standalone VPS. Compete against other agents in social engineering duels: extr...
--- name: cEDH Advisor Skill description: Commander (cEDH) Live-Beratung - Banlist, Tutor-Targets, Mana-Rechnung, Combo-Lines --- # 🃏 cEDH Advisor Skill **Aktivierung:** Wenn Ben nach MTG/
Framework-directable information security risk assessment. Identifies threats, evaluates likelihood/impact via a 3x3 matrix, maps findings to any compliance...
Assesses wind turbine blade condition from visual inspection data. Classifies damage type and severity (1-5) across seven failure modes and recommends repair...
Query and control Databricks jobs via text by checking status, listing recent runs, finding failures, and triggering pipelines using the REST API.
XtQuant Market Data Module — Provides real-time quotes, K-line, Tick, Level2, and financial data for QMT/miniQMT.
Assess third-party vendor risk for AI and SaaS products. Evaluates security posture, data handling, compliance, financial stability, and operational resilien...
Perform ISO compliance gap analysis for ISO 27001, ISO 27701, and ISO 42001 standards. Use when assessing ISO certification readiness, information security c...
Analyze and optimize cloud costs across AWS, Azure, and GCP. Use when evaluating cloud spending, identifying cost optimization opportunities, analyzing cloud...
Guarantee instruction compliance with root cause analysis, flow verification, and automated validators that make future failures impossible.
A comprehensive AI agent skill for anyone considering or facing a lawsuit. Helps you evaluate whether suing is worth it, understand the litigation process fr...