Report phishing, malware, and scam URLs to Google Safe Browsing, NCSC (Swiss Cyber Security), and other abuse reporting services. Use when a user shares a su...
Act as a Cybersecurity App Developer. You are tasked with designing an app that can detect and notify users about phishing emails and potential cyber attacks. Your responsibilities include: - Develop
AI-powered cryptocurrency safety assistant with database-first architecture. Protects users from phishing, honeypots, rug pulls, and ponzi schemes. No extern...
Real-time cryptocurrency scam detection with database-first architecture. Protects users from phishing, honeypots, rug pulls, and ponzi schemes. No external...
Run ClawdGo, a phishing and social-engineering cyber range for Claw-style agents. Use this skill when the user explicitly asks to start ClawdGo, continue a C...
Analisa URLs, domínios e IPs para verificar reputação e detectar malware ou phishing usando VirusTotal e AbuseIPDB.
Judge whether an email is important/urgent using content-based analysis rather than sender name or mailbox labels (which can be spoofed). Use when asked to triage emails, decide priority, detect phish
MCP server for dnstwist, a powerful DNS fuzzing tool that helps detect typosquatting, phishing, and corporate espionage.
ShieldAPI — x402 Security Intelligence for AI Agents. 7 endpoints: password breach check (900M+ HIBP hashes), email breach lookup, domain reputation (DNS/bla...
MCP-native URL security scanner that protects AI agent workflows. Analyzes URLs for phishing, malware, and suspicious patterns before agent navigation. Returns risk scores, confidence levels, and agen
Generate comprehensive cybersecurity threat assessments and defense guides. Use when evaluating threat landscapes, building defense strategies, ransomware pr...
This skill should be used when the user asks about live on-chain market data: token prices, price charts (K-line, OHLC), trade history, or swap activity. Als...
使用 MistTrack OpenAPI 进行加密货币地址风险分析、AML 合规检测和交易追踪。MistTrack 是由 SlowMist 开发的反洗钱追踪工具,支持 BTC、ETH、TRX、BNB 等主流链
Query and retrieve information about various adversarial tactics and techniques used in cyber attacks. Access a comprehensive knowledge base to enhance your understanding of security risks and adversa
World-Class Technology & Data Playbook. Use for: software development best practices, IT infrastructure design, cybersecurity strategy, data analytics, busin...
Provide AI-powered security analysis and safety instruction tools to protect AI agents during MCP interactions. Analyze text content for harmful or inappropriate material and enhance user prompts with
# Cyberscam Survival Simulator Certification & Progression Extension Author: Scott M Version: 1.3.1 – Visual-Enhanced Consumer Polish Last Modified: 2026-02-13 ## Purpose of v1.3.1 Build on
Earn $5 USDC per verified malicious domain. Use when: building threat-hunting agents, monetizing phishing/scam/malware discoveries, participating in Outtake...
Agent wallet, identity, and paid tools in one package. Register an agent, fund it via Stripe or USDC, then use the balance for web search, AI image generatio...
--- name: mailcheck-email-verification description: Email verification skill for MailCheck API - verify emails, bulk processing, authenticity analysis --- # MailCheck Email Verification Verify email
AI security toolkit — deepfake detection, prompt injection scanning, malware/phishing URL scanning, and AI text detection. Use when: (1) verifying if an imag...
Verify model identity by testing 4 dimensions: knowledge cutoff, safety style, multimodal capability, and thinking language patterns. Use when user says 'ver...
Perform comprehensive IT risk assessments across infrastructure, data protection, access control, compliance, incident response, and vendor management. Use w...