Systematic competitor tracking that feeds CMO positioning, CRO battlecards, and CPO roadmap decisions. Use when analyzing competitors, building sales battlec...
Query, analyze, and track all skill usage information. This skill should be invoked when users ask about skill usage, call counts, success rates, last used t...
Pyramid multi-agent orchestration for OpenClaw: routes objectives from a CEO agent down through departments, services and employees via sessions_send / sessi...
Reliability-first shell selection policy for AI agents on Windows. Choose WSL or PowerShell based on execution risk, not preference.
Enables seamless cross-protocol AI agent communication by translating messages, intelligent routing, agent discovery, and secure authentication.
--- name: "eonik creative audit" slug: "eonik-ad-budget-leak" version: "1.0.7" description: "Identifies burning and decaying Meta Ads by running the eonik Budget heuristics engine." tags: ["ads", "mar
Look up Malaysian company registration data from SSM. Returns directors, status, filings, business type.
--- name: private-computation display_name: OpenClaw Private Computation version: 0.1.0 author: ZhenStaff category: privacy subcategory: security license: MIT-0 description: Zero-Knowledge Execution f
Cryptographic audit ledger and AI firewall for OpenClaw agents. Records every agent action (messages, skills, tools, plugins, memory, models) in an immutable...
AI-powered global compliance checker, document generator, and risk assessor for GDPR, CCPA, SOC2, ISO27001, HIPAA and more
Use AKShare Python library to access authoritative real-time and historical financial data for stocks, futures, options, funds, forex, bonds, and crypto mark...
Conversational Yield Optimization Engine — treats every bot conversation as a yield-bearing financial instrument. Five zero-cost engines detect sentiment arb...
Data visualization with chart selection, color theory, and annotation best practices. Covers chart types (bar, line, scatter, heatmap), axes rules, and story...
Assess data privacy compliance across 20 control areas with 63 controls covering governance, consent, security, breach response, vendor management, and cross...
Generate comprehensive web application vulnerability assessments with OWASP-aligned checklists, remediation guides, and testing scripts. Use when assessing w...
Generate high-fidelity UI/UX mockups for mobile and web apps using Atomic Design principles — creates wireframes and design systems via muapi.ai
Use this skill when the user wants to design, scope, or refine a Buddhist, spiritual, or cyber-chanting AI product. It is especially useful for local-first r...