Discover and install skills to enhance your AI agent's capabilities.
| Name | Contains | Score |
|---|---|---|
tamagui-best-practices NeverSight/skills_feed Provides Tamagui patterns for config v4, compiler optimization, styled context, and cross-platform styling. Must use when working with Tamagui projects (tamagui.config.ts, @tamagui imports). | Skills | 85 Impact Pending Average score across 0 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: ff04dc7 |
yellow-best-practices NeverSight/skills_feed Yellow Network and Nitrolite (ERC-7824) development best practices for building state channel applications. Use when building apps with Yellow SDK, implementing state channels, connecting to ClearNodes, managing off-chain transactions, or working with application sessions. | Skills | 85 Impact Pending Average score across 0 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: 9afd0f9 |
arcgis-performance SaschaBrunnerCH/arcgis-maps-sdk-js-ai-context Optimize ArcGIS Maps SDK for JavaScript applications for speed, memory, and bundle size. Use for improving map initialization, data loading, query efficiency, large dataset handling, and view rendering performance in both 2D and 3D. | Skills | 85 Impact Pending Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: d84407b |
arcgis-widgets-ui SaschaBrunnerCH/arcgis-maps-sdk-js-ai-context Build map user interfaces with ArcGIS widgets, Map Components, and Calcite Design System. Use for adding legends, layer lists, search, tables, time sliders, and custom UI layouts. | Skills | 85 Impact Pending Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: d84407b |
arcgis-authentication SaschaBrunnerCH/arcgis-maps-sdk-js-ai-context Implement authentication with ArcGIS using OAuth 2.0, API keys, and identity management. Use for accessing secured services, portal items, and user-specific content. | Skills | 85 Impact Pending Average score across 0 eval scenarios Securityby Risky Do not use without reviewing Reviewed: Version: d84407b |
docx majiayu000/claude-skill-registry Comprehensive document creation, editing, and analysis with support for tracked changes, comments, formatting preservation, and text extraction. When Claude needs to work with professional documents (.docx files) for: (1) Creating new documents, (2) Modifying or editing content, (3) Working with tracked changes, (4) Adding comments, or any other document tasks | Skills | 85 Impact Pending Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: dabfdae |
analyzing-network-traffic-for-incidents mukul975/Anthropic-Cybersecurity-Skills Analyzes network traffic captures and flow data to identify adversary activity during security incidents, including command-and-control communications, lateral movement, data exfiltration, and exploitation attempts. Uses Wireshark, Zeek, and NetFlow analysis techniques. Activates for requests involving network traffic analysis, packet capture investigation, PCAP analysis, network forensics, C2 traffic detection, or exfiltration detection. | Skills | 85 Impact Pending Average score across 0 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: 4ae0be7 |
analyzing-linux-elf-malware mukul975/Anthropic-Cybersecurity-Skills Analyzes malicious Linux ELF (Executable and Linkable Format) binaries including botnets, cryptominers, ransomware, and rootkits targeting Linux servers, containers, and cloud infrastructure. Covers static analysis, dynamic tracing, and reverse engineering of x86_64 and ARM ELF samples. Activates for requests involving Linux malware analysis, ELF binary investigation, Linux server compromise assessment, or container malware analysis. | Skills | 85 Impact Pending Average score across 0 eval scenarios Securityby Risky Do not use without reviewing Reviewed: Version: 4ae0be7 |
analyzing-network-traffic-of-malware mukul975/Anthropic-Cybersecurity-Skills Analyzes network traffic generated by malware during sandbox execution or live incident response to identify C2 protocols, data exfiltration channels, payload downloads, and lateral movement patterns using Wireshark, Zeek, and Suricata. Activates for requests involving malware network analysis, C2 traffic decoding, malware PCAP analysis, or network-based malware detection. | Skills | 85 Impact Pending Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: 4ae0be7 |
analyzing-windows-event-logs-in-splunk mukul975/Anthropic-Cybersecurity-Skills Analyzes Windows Security, System, and Sysmon event logs in Splunk to detect authentication attacks, privilege escalation, persistence mechanisms, and lateral movement using SPL queries mapped to MITRE ATT&CK techniques. Use when SOC analysts need to investigate Windows-based threats, build detection queries, or perform forensic timeline analysis of Windows endpoints and domain controllers. | Skills | 85 Impact Pending Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: 4ae0be7 |
analyzing-command-and-control-communication mukul975/Anthropic-Cybersecurity-Skills Analyzes malware command-and-control (C2) communication protocols to understand beacon patterns, command structures, data encoding, and infrastructure. Covers HTTP, HTTPS, DNS, and custom protocol C2 analysis for detection development and threat intelligence. Activates for requests involving C2 analysis, beacon detection, C2 protocol reverse engineering, or command-and-control infrastructure mapping. | Skills | 85 Impact Pending Average score across 0 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: 4ae0be7 |
novelty-check wanshuiyin/Auto-claude-code-research-in-sleep Verify research idea novelty against recent literature. Use when user says "查新", "novelty check", "有没有人做过", "check novelty", or wants to verify a research idea is novel before implementing. | Skills | 85 Impact Pending Average score across 0 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: 62e3777 |
run-experiment wanshuiyin/Auto-claude-code-research-in-sleep Deploy and run ML experiments on local, remote, Vast.ai, or Modal serverless GPU. Use when user says "run experiment", "deploy to server", "跑实验", or needs to launch training jobs. | Skills | 85 Impact Pending Average score across 0 eval scenarios Securityby Risky Do not use without reviewing Reviewed: Version: 62e3777 |
formula-derivation wanshuiyin/Auto-claude-code-research-in-sleep Structure and derive research formulas when the user wants to 推导公式, derive a theory line, build equations from a problem statement, clarify assumptions, separate formal derivation from remarks, or turn messy theory notes into a paper-ready derivation skeleton. Use for research-style formula development, not for fully rigorous theorem proving once the claim is already fixed. | Skills | 85 Impact Pending Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: 62e3777 |
auto-paper-improvement-loop wanshuiyin/Auto-claude-code-research-in-sleep Autonomously improve a generated paper via Claude review through claude-review MCP → implement fixes → recompile, for 2 rounds. Use when user says "改论文", "improve paper", "论文润色循环", "auto improve", or wants to iteratively polish a generated paper. | Skills | 85 Impact Pending Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: dc00dfb |
paper-figure wanshuiyin/Auto-claude-code-research-in-sleep Generate publication-quality figures and tables from experiment results. Use when user says "画图", "作图", "generate figures", "paper figures", or needs plots for a paper. | Skills | 85 Impact Pending Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: dc00dfb |
research-review wanshuiyin/Auto-claude-code-research-in-sleep Get a deep critical review of research from GPT via Codex MCP. Use when user says "review my research", "help me review", "get external review", or wants critical feedback on research ideas, papers, or experimental results. | Skills | 85 Impact Pending Average score across 0 eval scenarios Securityby Risky Do not use without reviewing Reviewed: Version: 62e3777 |
auto-paper-improvement-loop wanshuiyin/Auto-claude-code-research-in-sleep Autonomously improve a generated paper via Gemini review through gemini-review MCP → implement fixes → recompile, for 2 rounds. Use when user says "改论文", "improve paper", "论文润色循环", "auto improve", or wants to iteratively polish a generated paper. | Skills | 85 Impact Pending Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: dc00dfb |
experiment-bridge wanshuiyin/Auto-claude-code-research-in-sleep Workflow 1.5: Bridge between idea discovery and auto review. Reads EXPERIMENT_PLAN.md, implements experiment code, deploys to GPU, collects initial results. Use when user says "实现实验", "implement experiments", "bridge", "从计划到跑实验", "deploy the plan", or has an experiment plan ready to execute. | Skills | 85 Impact Pending Average score across 0 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: dc00dfb |
paper-writing wanshuiyin/Auto-claude-code-research-in-sleep Workflow 3: Full paper writing pipeline. Orchestrates paper-plan → paper-figure → paper-write → paper-compile → auto-paper-improvement-loop to go from a narrative report to a polished, submission-ready PDF. Use when user says \"写论文全流程\", \"write paper pipeline\", \"从报告到PDF\", \"paper writing\", or wants the complete paper generation workflow. | Skills | 85 Impact Pending Average score across 0 eval scenarios Securityby Critical Do not install without reviewing Reviewed: Version: 5f3df55 |
Can't find what you're looking for? Evaluate a missing skill.