Tailor resumes and project bullets to a target role, quantify gaps, and prepare an interview-ready evidence map.
Turn rough project notes into polished portfolio case studies with metrics, visuals checklist, and interviewer talking points.
Turn an overwhelming set of tabs, bookmarks, and snippets into a structured session digest with tasks, reading queue, and archive plan.
Compare draft agreements, highlight risky clause changes, and generate a negotiation checklist with plain-language explanations.
Turn scattered notes, metrics, and unfinished tasks into a weekly operating review with wins, misses, blockers, and next-week priorities.
Turn messy service pricing notes into professional quotes, SOW line items, and invoice drafts with assumptions clearly surfaced.
Index local photos, videos, and creative assets into a searchable manifest with tags, dates, shoot info, and reuse ideas.
Design workshops, trainings, and strategy sessions with timing, facilitation notes, activities, and follow-up artifacts.
Build respectful multi-touch outreach sequences with channel mix, follow-up timing, objection handling, and logging templates.
Build literature matrices from papers, notes, and abstracts to compare methods, data, findings, and research gaps.
Design, log, compare, and score prompt experiments so users can systematically improve outputs instead of guessing.
Organize the Downloads folder into a clean, searchable command center by file type, project, date, and action state.
Use this skill when the user wants to inspect, report on, create, update, pause, resume, budget, target, upload assets for, or troubleshoot Meta, Facebook, o...
Intelligent loading performance analysis with automated workflows for TTFB investigation (DNS/connection/server breakdown), render-blocking detection, script...
Secure agent-to-agent encrypted messaging via the Pinch protocol. Send and receive end-to-end encrypted messages, manage connections, and check message history.
Persistent memory system for AI agents — daily logs, long-term memory, identity files, and heartbeat-driven recall. Solves context amnesia across sessions.
Enhanced agentic loop with planning, parallel execution, confidence gates, semantic error recovery, and observable state machine. Includes Mode dashboard UI...
Apply modern web development best practices for security, compatibility, code quality, and coding standards. Covers KISS/DRY/YAGNI principles, TypeScript/Jav...
MiCA compliance evidence and stablecoin risk scoring for regulated tokenized markets. 27 MCP tools with ES256K-signed responses. Use when the user explicitly...
This skill should be used when the user asks to "analyze competitors", "competitor SEO", "who ranks for", "competitive analysis", "what are my competitors do...
Automated client reporting for agencies and freelancers using OpenClaw. Pull data from Google Analytics, Google Search Console, social media platforms, and c...
Manage on-chain spend limits for AI agents with ERC-6551 wallets, enforcing per-tx and daily token budgets, scoped operator access, and approval queues on Base.
Build, refine, and package sellable AI persona/prompt products such as companion personas, roleplay personas, prompt packs, and style bundles. Use when creat...
Standard operating procedures for agent maintenance, security hygiene, and system health. Use when performing periodic checks, security audits, memory maintenance, secret rotation, dependency updates,