Use when installing or configuring the WizTelemetry Data Pipeline (vector) extension for KubeSphere, which provides data collection, transformation, and routing for observability data including logs, auditing, events, and notifications
Skills(SKILL.md)は、AIエージェント(Claude Code、Cursor、Codexなど)に特定の能力を追加するための設定ファイルです。
詳しく見る →Use when installing or configuring the WizTelemetry Data Pipeline (vector) extension for KubeSphere, which provides data collection, transformation, and routing for observability data including logs, auditing, events, and notifications
Transforms plain text or markdown into well-structured, reader-friendly markdown. The goal is to help readers quickly grasp key points, highlights, and structure — without changing any original conten
Two dimensions: **layout** (information structure) × **style** (visual aesthetics). Freely combine any layout with any style.
Use the filesystem as the primary overflow layer for agent context because context windows are limited while tasks often require more information than fits in a single window. Files let agents store,
../../../agents/engineering/cs-wiki-linter.md
../../../commands/wiki-lint.md
When the user wants to create competitor comparison or alternative pages for SEO and sales enablement. Also use when the user mentions 'alternative page,' 'vs page,' 'competitor comparison,' 'comparison page,' '[Product] vs [Product],' '[Product] alternative,' 'competitive landing pages,' 'switch from competitor,' or 'comparison content.' Covers four formats: singular alternative, plural alternatives, you vs competitor, and competitor vs competitor. Emphasizes deep research, modular content architecture, and varied section types beyond feature tables.
../../../ra-qm-team/information-security-manager-iso27001/SKILL.md
Use when the user asks to track technical changes, create change records, manage TC lifecycles, or hand off work between AI sessions. Covers init/create/update/status/resume/close/export workflows for structured code change documentation.
> Originally contributed by [maximcoding](https://github.com/maximcoding) — enhanced and integrated by the claude-skills team.
Guidance for effectively searching Slack to find messages, files, channels, and people
Research a company using Common Room data. Triggers on 'research [company]', 'tell me about [domain]', 'pull up signals for [account]', 'what's going on with [company]', or any account-level question.
Convert laboratory instrument output files (PDF, CSV, Excel, TXT) to Allotrope Simple Model (ASM) JSON format or flattened 2D CSV. Use this skill when scientists need to standardize instrument data for LIMS systems, data lakes, or downstream analysis. Supports auto-detection of instrument types. Outputs include full ASM JSON, flattened CSV for easy import, and exportable Python code for data engineers. Common triggers include converting instrument files, standardizing lab data, preparing data for upload to LIMS/ELN systems, or generating parser code for production pipelines.
Guidance for composing well-formatted, effective Slack messages using mrkdwn syntax
Update, create, or reprioritize your product roadmap. Use when adding a new initiative and deciding what moves to make room, shifting priorities after new information comes in, moving timelines due to a dependency slip, or building a Now/Next/Later view from scratch.
Proactively extract critical values from tool results into working notes before automatic context pruning destroys them.
Build professional financial services data packs from various sources including CIMs, offering memorandums, SEC filings, web search, or MCP servers. Extract, normalize, and standardize financial data into investment committee-ready Excel workbooks with consistent structure, proper formatting, and documented assumptions. Use for M&A due diligence, private equity analysis, investment committee materials, and standardizing financial reporting across portfolio companies. Do not use for simple financial calculations or working with already-completed data packs.
comps-analysis
description: Structure and draft a Confidential Information Memorandum for sell-side M&A processes. Organizes company information into a professional, investor-ready document with consistent formattin
Update numbers across the deck. The deck is the source of truth for formatting; you're only changing values.
Document extraction pipeline architecture and patterns
>-
Compile the patent application into filing-ready format based on: **$ARGUMENTS**
'Analyzes malicious Linux ELF (Executable and Linkable Format) binaries including botnets, cryptominers, ransomware,
Analyze the NTFS Master File Table ($MFT) to recover metadata and content of deleted files by examining MFT record
'Parses Software Bill of Materials (SBOM) in CycloneDX and SPDX JSON formats to identify supply chain vulnerabilities
'Analyzes structured and unstructured threat intelligence feeds to extract actionable indicators, adversary tactics,
Analyze the threat landscape using MISP (Malware Information Sharing Platform) by querying event statistics,
Build comprehensive threat actor profiles using open-source intelligence (OSINT) techniques to document adversary
Deploy MISP (Malware Information Sharing Platform) to aggregate, correlate, and distribute threat intelligence
'Builds automated threat intelligence feed integration pipelines connecting STIX/TAXII feeds, open-source threat
MISP (Malware Information Sharing Platform) is an open-source threat intelligence platform for gathering, sharing,
Plan and execute authorized vishing (voice phishing) pretext calls to assess employee susceptibility to social
'Implementing Cloud Data Loss Prevention (DLP) using Amazon Macie, Azure Information Protection, and Google Cloud
'Implements data loss prevention policies using Microsoft Purview to protect sensitive information across Exchange
ISO/IEC 27001:2022 is the international standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). This skill covers the complete
Deploy and configure Suricata as a network intrusion prevention system with custom rules, Emerging Threats rulesets,
Implement automated user provisioning and deprovisioning using SCIM 2.0 protocol with Okta as the identity provider.
'Create, validate, and share STIX 2.1 threat intelligence objects using the stix2 Python library. Covers indicators,
STIX (Structured Threat Information eXpression) and TAXII (Trusted Automated eXchange of Intelligence Information)
Deploy and configure an OpenTAXII server to share and consume STIX-formatted cyber threat intelligence using
Recover files from disk images and unallocated space using Foremost's header-footer signature carving to extract
Use PyMISP to create, enrich, and share threat intelligence events on a MISP platform, including IOC management,
Recover deleted files from disk images and storage media using PhotoRec's file signature-based carving engine
>
>
>
This project is configured for autonomous AI agent workflows with human-in-the-loop approval.
>-
Bundle TypeScript and JavaScript libraries with blazing-fast speed powered by Rolldown. Use when building libraries, generating type declarations, bundling for multiple formats, or migrating from tsup.