Scale systems, software architecture, and companies with bottleneck mapping, staged leverage plans, and risk-aware execution loops.
Deep web research using Claude's native search tool. Use for comprehensive research, market analysis, competitor intelligence, or when standard search isn't...
Diagnose and fix bugs using runtime execution traces. Use when debugging errors, analyzing failures, or finding root causes in Python, Node.js, or Java appli...
Track, analyze, and optimize LLM API spending across providers (OpenAI, Anthropic, Google, DeepSeek, etc.). Use when the user asks about API costs, token usa...
This skill should be used when the user asks about 'account balance', 'how much USDT do I have', 'my funding account', 'show my positions', 'open positions',...
Guide creation of AI-friendly project structures with progressive disclosure indexing, modular architecture, and intent-oriented code. Use when starting a ne...
Systematically discover, evaluate, compare, and assess OpenClaw skills to find the right, safe, and high-quality option for your specific task.
Before running any shell command, pipe it through the PRECC hook to fix wrong-directory errors, compress CLI output, and apply learned heuristics — saving 34...
Format any content into AI-readable structured formats that maximize citation probability. Converts unstructured text into GEO-optimized layouts using header...
Guide users through a 7-day learning journey graduation by analyzing progress, identifying agent archetype, celebrating achievements, and planning personaliz...
Manage and update a layered memory system using daily files as source, indexing by domain/module/entity, extracting critical facts, and maintaining recall ef...
--- name: circleci description: "CircleCI CI/CD — manage pipelines, workflows, jobs, and insights via REST API" homepage: https://www.agxntsix.ai license: MIT compatibility: Python 3.10+ (stdlib onl
Detects fail-open insecure defaults (hardcoded secrets, weak auth, permissive security) that allow apps to run insecurely in production. Use when auditing security, reviewing config management, or ana
Spawn and relay Cursor Agent's CLI (`agent` binary) as an interactive passthrough. Use when the user wants to run Cursor Agent in a directory, ask it questio...
Seamless bidirectional bridge between nanobot (Ollama Mistral orchestrator) and overstory (Claude Code agent swarm). Routes tasks through the OverClaw gatewa...
Search the web using Cloudsways TruthSearch API. Returns highly relevant results with dynamic summaries, snippets, and optional full-text content. Use when y...
Perform and document Grand Bazaar P2P swaps on Base using deployed AirSwap Swap contracts. Includes repeatable workflows for approvals, EIP-712 signing, cast...
Model business performance, define KPIs, and turn data into decision-ready dashboards, briefings, and operating cadences for teams and executives.
Authentic engagement protocols for Moltbook — quality over quantity, genuine voice, spam filtering, verification handling, and meaningful community building for AI agents
AI trading assistant for AEVO, a decentralized derivatives exchange. Connects any MCP-compatible client to AEVO's 45 tools for market data, portfolio managem...
Your agent says 'done' — but did it check? Superpowers turns any OpenClaw agent into a disciplined engineer. Verification iron law (evidence before claims),...
Query Grok AI via browser automation. Use when you need to ask Grok questions, get AI responses, or use Grok's DeepSearch/Think features. Copies response tex...
Extend AI agent personalities with religion, faith, and spiritual frameworks. Define principles, sacred texts, moral frameworks, traditions, and more.