Discover and install skills, docs, and rules to enhance your AI agent's capabilities.
| Name | Contains | Score |
|---|---|---|
arcgis-widgets-ui SaschaBrunnerCH/arcgis-maps-sdk-js-ai-context Build map user interfaces with ArcGIS widgets, Map Components, and Calcite Design System. Use for adding legends, layer lists, search, tables, time sliders, and custom UI layouts. | Skills | 68 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: d84407b |
arcgis-authentication SaschaBrunnerCH/arcgis-maps-sdk-js-ai-context Implement authentication with ArcGIS using OAuth 2.0, API keys, and identity management. Use for accessing secured services, portal items, and user-specific content. | Skills | 68 Impact — Average score across 0 eval scenarios Securityby Risky Do not use without reviewing Reviewed: Version: d84407b |
aws-compliance-checker boisenoise/skills-collections Automated compliance checking against CIS, PCI-DSS, HIPAA, and SOC 2 benchmarks | Skills | 68 1.53x Agent success vs baseline Impact 100% 1.53xAverage score across 3 eval scenarios Securityby Passed No known issues Reviewed: Version: 0.0.1 |
analyzing-network-traffic-for-incidents mukul975/Anthropic-Cybersecurity-Skills Analyzes network traffic captures and flow data to identify adversary activity during security incidents, including command-and-control communications, lateral movement, data exfiltration, and exploitation attempts. Uses Wireshark, Zeek, and NetFlow analysis techniques. Activates for requests involving network traffic analysis, packet capture investigation, PCAP analysis, network forensics, C2 traffic detection, or exfiltration detection. | Skills | 68 Impact — Average score across 0 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: d388b31 |
analyzing-ios-app-security-with-objection mukul975/Anthropic-Cybersecurity-Skills Performs runtime mobile security exploration of iOS applications using Objection, a Frida-powered toolkit that enables security testers to interact with app internals without jailbreaking. Use when assessing iOS app security posture, bypassing client-side protections, dumping keychain items, inspecting filesystem storage, and evaluating runtime behavior. Activates for requests involving iOS security testing, Objection runtime analysis, Frida-based iOS assessment, or mobile runtime exploration. | Skills | 68 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: 77d5d9d |
analyzing-dns-logs-for-exfiltration mukul975/Anthropic-Cybersecurity-Skills Analyzes DNS query logs to detect data exfiltration via DNS tunneling, DGA domain communication, and covert C2 channels using entropy analysis, query volume anomalies, and subdomain length detection in SIEM platforms. Use when SOC teams need to identify DNS-based threats that bypass traditional network security controls. | Skills | 68 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: 0f429d0 |
automating-ioc-enrichment mukul975/Anthropic-Cybersecurity-Skills Automates the enrichment of raw indicators of compromise with multi-source threat intelligence context using SOAR platforms, Python pipelines, or TIP playbooks to reduce analyst triage time and standardize enrichment outputs. Use when building automated enrichment workflows integrated with SIEM alerts, email submission pipelines, or bulk IOC processing from threat feeds. Activates for requests involving SOAR enrichment, Cortex XSOAR, Splunk SOAR, TheHive, Python enrichment pipelines, or automated IOC processing. | Skills | 68 Impact — Average score across 0 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: 0f429d0 |
analyzing-linux-elf-malware mukul975/Anthropic-Cybersecurity-Skills Analyzes malicious Linux ELF (Executable and Linkable Format) binaries including botnets, cryptominers, ransomware, and rootkits targeting Linux servers, containers, and cloud infrastructure. Covers static analysis, dynamic tracing, and reverse engineering of x86_64 and ARM ELF samples. Activates for requests involving Linux malware analysis, ELF binary investigation, Linux server compromise assessment, or container malware analysis. | Skills | 68 Impact — Average score across 0 eval scenarios Securityby Risky Do not use without reviewing Reviewed: Version: 888bbe4 |
analyzing-network-traffic-of-malware mukul975/Anthropic-Cybersecurity-Skills Analyzes network traffic generated by malware during sandbox execution or live incident response to identify C2 protocols, data exfiltration channels, payload downloads, and lateral movement patterns using Wireshark, Zeek, and Suricata. Activates for requests involving malware network analysis, C2 traffic decoding, malware PCAP analysis, or network-based malware detection. | Skills | 68 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: c15f73d |
analyzing-windows-event-logs-in-splunk mukul975/Anthropic-Cybersecurity-Skills Analyzes Windows Security, System, and Sysmon event logs in Splunk to detect authentication attacks, privilege escalation, persistence mechanisms, and lateral movement using SPL queries mapped to MITRE ATT&CK techniques. Use when SOC analysts need to investigate Windows-based threats, build detection queries, or perform forensic timeline analysis of Windows endpoints and domain controllers. | Skills | 68 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: c15f73d |
analyzing-command-and-control-communication mukul975/Anthropic-Cybersecurity-Skills Analyzes malware command-and-control (C2) communication protocols to understand beacon patterns, command structures, data encoding, and infrastructure. Covers HTTP, HTTPS, DNS, and custom protocol C2 analysis for detection development and threat intelligence. Activates for requests involving C2 analysis, beacon detection, C2 protocol reverse engineering, or command-and-control infrastructure mapping. | Skills | 68 Impact — Average score across 0 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: efbbbba |
research-lit wanshuiyin/Auto-claude-code-research-in-sleep Search and analyze research papers, find related work, summarize key ideas. Use when user says "find papers", "related work", "literature review", "what does this paper say", or needs to understand academic papers. | Skills | 68 Impact — Average score across 0 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: 5f3df55 |
ab-test-setup boisenoise/skills-collections Structured guide for setting up A/B tests with mandatory gates for hypothesis, metrics, and execution readiness. | Skills | 68 1.09x Agent success vs baseline Impact 100% 1.09xAverage score across 3 eval scenarios Securityby Passed No known issues Reviewed: Version: 0.0.1 |
skill-creator boisenoise/skills-collections Create new skills, modify and improve existing skills, and measure skill performance. Use when users want to create a skill from scratch, edit, or optimize an existing skill, run evals to test a skill, benchmark skill performance with variance analysis, or optimize a skill's description for better triggering accuracy. | Skills | 68 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: 4089176 |
astropy sickn33/antigravity-awesome-skills Astropy is the core Python package for astronomy, providing essential functionality for astronomical research and data analysis. | Skills | 68 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: 27cb7c6 |
analytics-product sickn33/antigravity-awesome-skills Analytics de produto — PostHog, Mixpanel, eventos, funnels, cohorts, retencao, north star metric, OKRs e dashboards de produto. | Skills | 68 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: 8692fbc |
alpha-vantage sickn33/antigravity-awesome-skills Access 20+ years of global financial data: equities, options, forex, crypto, commodities, economic indicators, and 50+ technical indicators. | Skills | 68 Impact — Average score across 0 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: a4b1f35 |
lead-scoring shawnpang/startup-founder-skills When a founder needs to qualify inbound leads, define their ICP, build a lead scoring model, set MQL criteria, or route prospects through pipeline stages. Activate when the user mentions lead scoring, ICP, MQL, SQL, lead qualification, inbound leads, or pipeline design. | Skills | 68 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: 4ad31b4 |
agiled-automation ComposioHQ/awesome-claude-skills Automate Agiled tasks via Rube MCP (Composio). Always search tools first for current schemas. | Skills | 68 4.00x Agent success vs baseline Impact 92% 4.00xAverage score across 3 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: 0.0.1 |
deepgram-go-text-to-speech deepgram/deepgram-go-sdk Use when writing or reviewing Go code in this repo that synthesizes audio with Speak v1 REST or Speak WebSockets. Route transcription work to deepgram-go-speech-to-text, voice conversation runtime work to deepgram-go-voice-agent, and repository maintenance work to deepgram-go-maintaining-sdk. | Skills | 68 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: b7c92f4 |
Can't find what you're looking for? Evaluate a missing skill.