World-Class Technology & Data Playbook. Use for: software development best practices, IT infrastructure design, cybersecurity strategy, data analytics, busin...
CT Monitor — Crypto Intelligence Analyst. Monitors 5000+ KOL tweets, real-time news, RSS feeds & real-time prices (Binance + DexScreener). Integrates Binance...
ISO 27001 ISMS implementation and cybersecurity governance for HealthTech and MedTech companies. Use for ISMS design, security risk assessment, control imple...
--- name: "contract-and-proposal-writer" description: "Contract & Proposal Writer" --- # Contract & Proposal Writer **Tier:** POWERFUL **Category:** Business Growth **Domain:** Legal Documents,
--- name: cEDH Advisor Skill description: Commander (cEDH) Live-Beratung - Banlist, Tutor-Targets, Mana-Rechnung, Combo-Lines --- # 🃏 cEDH Advisor Skill **Aktivierung:** Wenn Ben nach MTG/
ERC-8004 identity, x402 payments, and arbitration protocol for autonomous agent commerce. The three rails for the machine economy.
Evaluate and improve your organization's data governance across six domains by scoring controls, identifying risks, and prioritizing remediation actions.
Generates a 0-100 Supplier Risk Index score across financial, dependency, compliance, performance, and geographic risks with tiered action plans.
Room 418 — The Headless Liar's Protocol. AI Agent interrogation battle game on standalone VPS. Compete against other agents in social engineering duels: extr...
Framework-directable information security risk assessment. Identifies threats, evaluates likelihood/impact via a 3x3 matrix, maps findings to any compliance...
Security leadership for growth-stage companies. Risk quantification in dollars, compliance roadmap (SOC 2/ISO 27001/HIPAA/GDPR), security architecture strate...
Operate and govern autonomous on-chain entities using AI agents for identity, governance, contracts, legal, lending, and community workflows.
XtQuant Market Data Module — Provides real-time quotes, K-line, Tick, Level2, and financial data for QMT/miniQMT.
Query and control Databricks jobs via text by checking status, listing recent runs, finding failures, and triggering pipelines using the REST API.
Generate comprehensive cybersecurity threat assessments and defense guides. Use when evaluating threat landscapes, building defense strategies, ransomware pr...
Perform ISO compliance gap analysis for ISO 27001, ISO 27701, and ISO 42001 standards. Use when assessing ISO certification readiness, information security c...
Evaluate and compare privacy solution vendors with a weighted scorecard across 12 criteria. Use when selecting privacy management software, comparing data pr...
Assesses wind turbine blade condition from visual inspection data. Classifies damage type and severity (1-5) across seven failure modes and recommends repair...
Assess ISO/IEC 42001:2023 AI Management System (AIMS) readiness and generate compliance gap analysis with remediation roadmap. Use when evaluating AI governa...
Generate comprehensive web application vulnerability assessments with OWASP-aligned checklists, remediation guides, and testing scripts. Use when assessing w...
Assess third-party vendor risk for AI and SaaS products. Evaluates security posture, data handling, compliance, financial stability, and operational resilien...
Analyze and optimize cloud costs across AWS, Azure, and GCP. Use when evaluating cloud spending, identifying cost optimization opportunities, analyzing cloud...
Guarantee instruction compliance with root cause analysis, flow verification, and automated validators that make future failures impossible.
A comprehensive AI agent skill for anyone considering or facing a lawsuit. Helps you evaluate whether suing is worth it, understand the litigation process fr...