Find fresh, viral Xiaohongshu videos by niche with filters for type, date, and popularity, and extract URLs with valid xsec_token for repurposing.
Index and search codebases using structured schemas for deep code analysis. Audit specific domains or security-related functions to ensure code quality and safety. Explore complex codebases with hig
Polymarket prediction market trading for agents. Use this skill when users want to create a Polymarket wallet, browse markets, place bets, manage positions,...
--- name: screen-monitor description: Dual-mode screen sharing and analysis. Model-agnostic (Gemini/Claude/Qwen3-VL). metadata: {"clawdbot":{"emoji":"🖥️","requires":{"model_features":["vision"]}}
Execute Minecraft Java Edition admin commands through the RCON remote console. Use for player moderation, whitelist management, item/state commands, world ru...
--- description: Guidelines and best practices for building Netlify projects & sites, including serverless functions, edge functions, functions, storage, and real-world examples globs: **/*.{ts,tsx,js
# Next.js Security Audit - Comprehensive Vulnerability Scanner and Fixer ## Development Philosophy - **Security First**: Every line of code should be written with security in mind - **Mini
Provide instant access to SvelteKit and Tailwind CSS documentation along with ready-to-use Svelte component snippets styled with Tailwind. Enable efficient UI development by retrieving relevant docs,
Create PlantUML diagrams with automatic syntax validation and auto-fix suggestions. Get embeddable image URLs for valid diagrams and structured feedback to resolve issues. Encode or decode PlantUML co
Use for SySelf Autopilot on Hetzner: management kubeconfig setup, organization namespace, Hetzner account preparation, ClusterStack and Cluster manifests, ba...
Use this skill when the user asks to manage Binance assets, check account security, scan for arbitrage opportunities, or perform automated dust sweeps. Comma...
MiCA compliance evidence and stablecoin risk scoring for regulated tokenized markets. 27 MCP tools with ES256K-signed responses. Use when the user explicitly...
Search academic papers and conduct literature reviews using OpenAlex API (free, no key needed). Use when the user needs to find scholarly papers by topic/aut...
Automatically identify Western Blot gel bands, perform densitometric analysis, and calculate normalized values relative to loading controls (GAPDH, β-actin,...
--- name: wb-troubleshooter description: Western Blot troubleshooting guide with step-by-step solutions version: 1.0.0 category: Wet Lab tags: [] author: AIPOCH license: MIT status: Draft risk_level:
--- name: conference-poster-pitch description: Generate elevator pitch for conference posters version: 1.0.0 category: Present tags: [] author: AIPOCH license: MIT status: Draft risk_level: Medium ski
newtranx CLI for translate MP4 videos, Used for directly translating video files on the terminal. When you want to translate video files from one country's a...
A meta-skill that continuously improves other skills through trace+feedback-driven evolution, with the goal of making skill training, status checking, and ap...
Comprehensive security hardening and installation guide for OpenClaw (formerly Clawdbot/Moltbot). Use this skill when the user wants to secure a server, install the OpenClaw agent, or configure Tailsc
Act as an iOS App Designer. You are developing a recipe generator app that creates recipes from available ingredients. Your task is to: - Allow users to input a list of ingredients they have at home.
Creates snapshots of critical config files, validates JSON configs for syntax and keys, and generates audit logs without applying changes.
Search the web via the Turing Tavily proxy. Use when the user asks to search the web, look up real-time information, research current events, or needs up-to-...
--- name: cold-chain-risk-calculator description: Calculate cold chain transport risks version: 1.0.0 category: Operations tags: [] author: AIPOCH license: MIT status: Draft risk_level: Medium skill_t
Provides forensically-safe Linux threat detection, network and process analysis, integrity verification, controlled firewall and service remediation preservi...