Operate and secure mesh workflows across gateways, including plugin install/setup, health verification, invite/join bootstrap, and controlled execution tasks...
Executes combat operations in Structs. Covers attacks, raids, defense setup, and stealth positioning. Use when attacking enemy structs, raiding a planet for...
Provides NodeReal MegaNode blockchain infrastructure APIs for 25+ chains including BSC, Ethereum, opBNB, Optimism, Polygon, Arbitrum, and Klaytn. Covers stan...
Three-tier code quality defense: L1 quick scan, L2 deep audit (via bug-audit), L3 cross-validation with adversarial testing. 三级代码质量防线。
End-to-end KYC (Know Your Customer) identity verification for onboarding real users. Use when someone needs to perform KYC, onboard users with identity verif...
Manage retail and business banking workflows with payment operations, account controls, reconciliation, fraud response, and compliant communication.
Domain lending protocol on Solana. Domains become tokens. Tokens become collateral. Top holder controls the domain. Borrow SOL against your position -- but g...
Purchase data, airtime, and digital products for Nigerian phone numbers instantly using wallet balance with network and plan validation.
Manage tasks, projects, sections, and labels in Todoist from your workflow. Create, update, complete, and batch-edit items using natural language and flexible filters. Streamline daily planning, proje
A CLI tool that executes Python source code to manage todos via Linear's API. Creates tasks with natural language dates, priorities, and scheduling. This is...
Operations leadership for scaling companies. Process design, OKR execution, operational cadence, and scaling playbooks. Use when designing operations, settin...
Control macOS GUI apps visually — take screenshots, click, scroll, type. Use when the user asks to interact with any Mac desktop application's graphical inte...
Designs and implements backend systems including REST APIs, microservices, database architectures, authentication flows, and security hardening. Use when the...
Tamper-resistant audit watchdog for Clawdbot agents. Detects and logs suspicious filesystem activity with HMAC-chained evidence.
Place grocery orders on Instacart via browser automation. Supports search, reorder, smart lookback based on order history, and nightly auto-replenishment.
Self-improving memory architecture for OpenClaw agents. Structured memory files, nightly distillation, weekly synthesis, enforced principles (P0 for custom,...
Post to LinkedIn using the official API v2. Uses OAuth tokens so only post when explicitly asked or scheduled.
Bypass Cloudflare protection when scraping websites. Handle Turnstile challenges, Under Attack Mode, browser checks, and 403 blocks using residential proxies...
Execute ArcAgent bounty workflows end-to-end via MCP tools. Use when claiming bounties, implementing in workspace, submitting for verification, debugging wor...
Control PowerPoint app sessions, slides, notes, export, and presentation state with osascript workflows.
Control JOOX music playback via web browser automation. Search songs/artists/albums/playlists, play music, control playback, browse charts, manage playlists....
Set up automated trading on Polymarket. Covers wallet setup, token approvals, API authentication, market discovery, order placement, WebSocket feeds, and pos...
Use when working with Web5 CLI tool for decentralized identity, CKB wallet, DID management, PDS data operations, account creation, posting, profile updates
Access comprehensive market data to research stocks, companies, indexes, ETFs, crypto, forex, and macroeconomics. Retrieve real-time quotes, financial statements, ratios, technical indicators, news, S