Execute Python code in a safe sandboxed environment via [inference.sh](https://inference.sh). Pre-installed: NumPy, Pandas, Matplotlib, requests, BeautifulSo...
Professional Financial Advisor (FA) skill for primary market financing - replaces traditional investment advisory services with AI-powered project assessment...
This skills helps agents to review and polish research papers written in LaTeX, focusing on writing clarity, grammar, LaTeX best practices, and document stru...
Create an interactive Sudoku game using HTML5, CSS3, and JavaScript. Build a clean, accessible game board with intuitive controls. Implement difficulty levels with appropriate puzzle generation algori
Interact with Bitget Wallet API for crypto market data, token info, swap quotes, and security audits. Use when the user asks about token prices, market data,...
Automated Twitter/X engagement script that scans a curated pool of target accounts, generates authentic GPT-powered replies, and posts them via the Twitter G...
Analyzes every local business in any area and category, scoring and ranking underperformers by lost revenue potential and generating targeted outreach plus m...
Humanize AI-generated text to bypass detection. This humanizer rewrites ChatGPT, Claude, and GPT content to sound natural and pass AI detectors like GPTZero,...
An intelligent research assistant powered by Perplexity's specialized AI models. Features automatic query complexity detection to route requests to the most appropriate model for optimal results. Unli
Build a comprehensive text analysis tool using HTML5, CSS3, and JavaScript. Create a clean interface with text input area and results dashboard. Implement word count, character count, and reading time
Key lifecycle management with Volcengine KMS. Use when users need key creation, rotation policies, encryption/decryption workflows, or key permission troubleshooting.
--- name: clawk version: 2.10.0 description: Post, reply, like, and engage on Clawk — Twitter for AI agents. homepage: https://clawk.ai user-invocable: true metadata: {"openclaw":{"emoji":"🐾","ca
Use when reviewing code for security vulnerabilities, implementing authentication flows, auditing OWASP Top 10, configuring CORS/CSP headers, handling secrets, input validation, SQL injection preventi
Generates detailed AI-powered audit reports on website, SEO, ads, social media, reviews, tech stack, and competitors to close deals before first call.
Klaviyo API integration with managed OAuth. Access profiles, lists, segments, campaigns, flows, events, metrics, templates, catalogs, and webhooks. Use this...
Mine LITCOIN — a proof-of-comprehension and proof-of-research cryptocurrency on Base. Use when the user wants to mine crypto with AI, earn tokens through rea...
Use this skill for ANY task involving Computer-Aided Drug Design (CADD), computational chemistry, structural bioinformatics, molecular modeling, or AI-driven...
Act as a Cybersecurity App Developer. You are tasked with designing an app that can detect and notify users about phishing emails and potential cyber attacks. Your responsibilities include: - Develop
HOT3D (Hand-Object 3D Dataset) by Meta Facebook - multi-view egocentric hand and object 3D tracking for Aria/Quest smart glasses. State-of-the-art multi-view...
Build and navigate DSP (Data Structure Protocol) — graph-based long-term structural memory of codebases for LLM agents. Stores entities (modules, functions),...
# Vulcan File Ops MCP Server
Gives any AI agent a persistent identity in SiliVille (硅基小镇) — a multiplayer AI-native metaverse. Farm, steal crops, post to the town feed, build social grap...
Generate a comprehensive DPDP Act implementation checklist with evidence tracker and roadmap. Use when planning DPDP compliance implementation, building a pr...
Calculates classification and regression metrics like accuracy, F1-score, RMSE, and provides confusion matrix to evaluate ML model performance.