Discover and install skills, docs, and rules to enhance your AI agent's capabilities.
| Name | Contains | Score |
|---|---|---|
arcgis-authentication SaschaBrunnerCH/arcgis-maps-sdk-js-ai-context Implement authentication with ArcGIS using OAuth 2.0, API keys, and identity management. Use for accessing secured services, portal items, and user-specific content. | Skills | 85 Impact — Average score across 0 eval scenarios Securityby Risky Do not use without reviewing Reviewed: Version: d84407b |
analyzing-network-traffic-for-incidents mukul975/Anthropic-Cybersecurity-Skills Analyzes network traffic captures and flow data to identify adversary activity during security incidents, including command-and-control communications, lateral movement, data exfiltration, and exploitation attempts. Uses Wireshark, Zeek, and NetFlow analysis techniques. Activates for requests involving network traffic analysis, packet capture investigation, PCAP analysis, network forensics, C2 traffic detection, or exfiltration detection. | Skills | 85 Impact — Average score across 0 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: c15f73d |
analyzing-dns-logs-for-exfiltration mukul975/Anthropic-Cybersecurity-Skills Analyzes DNS query logs to detect data exfiltration via DNS tunneling, DGA domain communication, and covert C2 channels using entropy analysis, query volume anomalies, and subdomain length detection in SIEM platforms. Use when SOC teams need to identify DNS-based threats that bypass traditional network security controls. | Skills | 85 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: c15f73d |
automating-ioc-enrichment mukul975/Anthropic-Cybersecurity-Skills Automates the enrichment of raw indicators of compromise with multi-source threat intelligence context using SOAR platforms, Python pipelines, or TIP playbooks to reduce analyst triage time and standardize enrichment outputs. Use when building automated enrichment workflows integrated with SIEM alerts, email submission pipelines, or bulk IOC processing from threat feeds. Activates for requests involving SOAR enrichment, Cortex XSOAR, Splunk SOAR, TheHive, Python enrichment pipelines, or automated IOC processing. | Skills | 85 Impact — Average score across 0 eval scenarios Securityby Risky Do not use without reviewing Reviewed: Version: d388b31 |
analyzing-linux-elf-malware mukul975/Anthropic-Cybersecurity-Skills Analyzes malicious Linux ELF (Executable and Linkable Format) binaries including botnets, cryptominers, ransomware, and rootkits targeting Linux servers, containers, and cloud infrastructure. Covers static analysis, dynamic tracing, and reverse engineering of x86_64 and ARM ELF samples. Activates for requests involving Linux malware analysis, ELF binary investigation, Linux server compromise assessment, or container malware analysis. | Skills | 85 Impact — Average score across 0 eval scenarios Securityby Risky Do not use without reviewing Reviewed: Version: c15f73d |
analyzing-network-traffic-of-malware mukul975/Anthropic-Cybersecurity-Skills Analyzes network traffic generated by malware during sandbox execution or live incident response to identify C2 protocols, data exfiltration channels, payload downloads, and lateral movement patterns using Wireshark, Zeek, and Suricata. Activates for requests involving malware network analysis, C2 traffic decoding, malware PCAP analysis, or network-based malware detection. | Skills | 85 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: c15f73d |
analyzing-windows-event-logs-in-splunk mukul975/Anthropic-Cybersecurity-Skills Analyzes Windows Security, System, and Sysmon event logs in Splunk to detect authentication attacks, privilege escalation, persistence mechanisms, and lateral movement using SPL queries mapped to MITRE ATT&CK techniques. Use when SOC analysts need to investigate Windows-based threats, build detection queries, or perform forensic timeline analysis of Windows endpoints and domain controllers. | Skills | 85 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: c15f73d |
analyzing-command-and-control-communication mukul975/Anthropic-Cybersecurity-Skills Analyzes malware command-and-control (C2) communication protocols to understand beacon patterns, command structures, data encoding, and infrastructure. Covers HTTP, HTTPS, DNS, and custom protocol C2 analysis for detection development and threat intelligence. Activates for requests involving C2 analysis, beacon detection, C2 protocol reverse engineering, or command-and-control infrastructure mapping. | Skills | 85 Impact — Average score across 0 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: d388b31 |
run-experiment wanshuiyin/Auto-claude-code-research-in-sleep Deploy and run ML experiments on local, remote, Vast.ai, or Modal serverless GPU. Use when user says "run experiment", "deploy to server", "跑实验", or needs to launch training jobs. | Skills | 85 Impact — Average score across 0 eval scenarios Securityby Risky Do not use without reviewing Reviewed: Version: 5f3df55 |
formula-derivation wanshuiyin/Auto-claude-code-research-in-sleep Structures and derives research formulas when the user wants to 推导公式, build a theory line, organize assumptions, turn scattered equations into a coherent derivation, or rewrite theory notes into a paper-ready formula document. Use when the derivation target is not yet fully fixed, the main object still needs to be chosen, or the user needs a coherent derivation package rather than a finished theorem proof. | Skills | 85 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: 9ed83e0 |
auto-paper-improvement-loop wanshuiyin/Auto-claude-code-research-in-sleep Autonomously improve a generated paper via Claude review through claude-review MCP → implement fixes → recompile, for 2 rounds. Use when user says "改论文", "improve paper", "论文润色循环", "auto improve", or wants to iteratively polish a generated paper. | Skills | 85 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: bc8a7bc |
paper-figure wanshuiyin/Auto-claude-code-research-in-sleep Generate publication-quality figures and tables from experiment results. Use when user says "画图", "作图", "generate figures", "paper figures", or needs plots for a paper. | Skills | 85 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: dc00dfb |
research-review wanshuiyin/Auto-claude-code-research-in-sleep Get a deep critical review of research from GPT via Codex MCP. Use when user says "review my research", "help me review", "get external review", or wants critical feedback on research ideas, papers, or experimental results. | Skills | 85 Impact — Average score across 0 eval scenarios Securityby Risky Do not use without reviewing Reviewed: Version: 62e3777 |
paper-writing wanshuiyin/Auto-claude-code-research-in-sleep Workflow 3: Full paper writing pipeline. Orchestrates paper-plan → paper-figure → paper-write → paper-compile → auto-paper-improvement-loop to go from a narrative report to a polished, submission-ready PDF. Use when user says \"写论文全流程\", \"write paper pipeline\", \"从报告到PDF\", \"paper writing\", or wants the complete paper generation workflow. | Skills | 85 Impact — Average score across 0 eval scenarios Securityby Critical Do not install without reviewing Reviewed: Version: dc00dfb |
research-lit wanshuiyin/Auto-claude-code-research-in-sleep Search and analyze research papers, find related work, summarize key ideas. Use when user says "find papers", "related work", "literature review", "what does this paper say", or needs to understand academic papers. | Skills | 85 Impact — Average score across 0 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: 62e3777 |
skill-creator boisenoise/skills-collections Create new skills, modify and improve existing skills, and measure skill performance. Use when users want to create a skill from scratch, edit, or optimize an existing skill, run evals to test a skill, benchmark skill performance with variance analysis, or optimize a skill's description for better triggering accuracy. | Skills | 85 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: 4089176 |
astropy sickn33/antigravity-awesome-skills Astropy is the core Python package for astronomy, providing essential functionality for astronomical research and data analysis. | Skills | 85 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: a4b1f35 |
analytics-product sickn33/antigravity-awesome-skills Analytics de produto — PostHog, Mixpanel, eventos, funnels, cohorts, retencao, north star metric, OKRs e dashboards de produto. | Skills | 85 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: 8692fbc |
alpha-vantage sickn33/antigravity-awesome-skills Access 20+ years of global financial data: equities, options, forex, crypto, commodities, economic indicators, and 50+ technical indicators. | Skills | 85 Impact — Average score across 0 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: 27cb7c6 |
lead-scoring shawnpang/startup-founder-skills When a founder needs to qualify inbound leads, define their ICP, build a lead scoring model, set MQL criteria, or route prospects through pipeline stages. Activate when the user mentions lead scoring, ICP, MQL, SQL, lead qualification, inbound leads, or pipeline design. | Skills | 85 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: 4ad31b4 |
Can't find what you're looking for? Evaluate a missing skill.