QQ 频道管理技能。查询频道列表、子频道、成员、发帖、公告、日程等操作。使用 qqbot_channel_api 工具代理 QQ 开放平台 HTTP 接口,自动处理 Token 鉴权。当用户需要查看频道、管理子频道、查询成员、发布帖子/公告/日程时使用。
Skills(SKILL.md)は、AIエージェント(Claude Code、Cursor、Codexなど)に特定の能力を追加するための設定ファイルです。
詳しく見る →QQ 频道管理技能。查询频道列表、子频道、成员、发帖、公告、日程等操作。使用 qqbot_channel_api 工具代理 QQ 开放平台 HTTP 接口,自动处理 Token 鉴权。当用户需要查看频道、管理子频道、查询成员、发布帖子/公告/日程时使用。
Mag-query sa opisyal na dokumentasyon ng Microsoft upang hanapin ang
Python project organization, module architecture, and public API design. Use when setting up new projects, organizing modules, defining public interfaces with __all__, or planning directory layouts.
'Get best practices for Entity Framework Core'
Pricing strategy for technical products. Use when choosing usage-based vs seat-based, designing freemium thresholds, structuring enterprise pricing conversations, deciding when to raise prices, or using price as a positioning signal.
Add iMessage channel integration via Chat SDK. Local (macOS) or remote (Photon API) mode.
Add Vercel deployment capability to NanoClaw agents. Installs the Vercel CLI in agent containers and sets up OneCLI credential injection for api.vercel.com. Use when the user wants agents to deploy web applications to Vercel.
Add WhatsApp Business Cloud API channel via Chat SDK. Official Meta API.
How to be rescued from a lonely island
Comprehensive toolkit for protein language models including ESM3 (generative multimodal protein design across sequence, structure, and function) and ESM C (efficient protein embeddings and representations). Use this skill when working with protein sequences, structures, or function prediction; designing novel proteins; generating protein embeddings; performing inverse folding; or conducting protein engineering tasks. Supports both local model usage and cloud-based Forge API for scalable inference.
Saves time by autonomously reading transcripts, synthesizing arguments, and generating direct jump-links to key moments.
description: Draft process letters and bid instructions for sell-side M&A processes. Covers initial indication of interest (IOI) instructions, final bid procedures, and management meeting logistics. T
Use the Malpedia platform and API to research malware family relationships, track variant evolution, link families
Investigate USB device connection history from Windows registry, event logs, and setupapi logs to track removable
'Responds to malware infections across enterprise endpoints by identifying the malware family, determining infection
Implement Microsoft's Enhanced Security Admin Environment (ESAE) tiered administration model for Active Directory.
'Configures host-based intrusion detection systems (HIDS) to monitor endpoint file integrity, system calls, and
'Configures pfSense firewall rules, NAT policies, VPN tunnels, and traffic shaping to enforce network segmentation,
'Configures Microsoft Defender for Endpoint (MDE) advanced protection settings including attack surface reduction
'Deploys and configures CrowdStrike Falcon EDR agents across enterprise endpoints to enable real-time threat
Detect and prevent API enumeration attacks including BOLA and IDOR exploitation by monitoring sequential identifier
Detect Kerberos Golden Ticket forgery by analyzing Windows Event ID 4769 for RC4 encryption downgrades (0x17),
Detect RDP brute force attacks by analyzing Windows Security Event Logs for failed authentication patterns (Event
Detect WMI event subscription persistence by analyzing Sysmon Event IDs 19, 20, and 21 for malicious EventFilter,
Systematically remove malware, backdoors, and attacker persistence mechanisms from infected systems while ensuring
'Executes authorized attack simulations against Active Directory environments to identify misconfigurations,
Harden the Docker daemon by configuring daemon.json with user namespace remapping, TLS authentication, rootless
'Hunt for malicious PowerShell activity by analyzing Script Block Logging (Event 4104), Module Logging (Event
Systematically hunt for adversary persistence mechanisms across Windows endpoints including registry, services,
Hunt for spearphishing campaign indicators across email logs, endpoint telemetry, and network data to detect
AES (Advanced Encryption Standard) is a symmetric block cipher standardized by NIST (FIPS 197) used to protect
Implement API abuse detection using token bucket, sliding window, and adaptive rate limiting algorithms to prevent
'Implements API rate limiting and throttling controls using token bucket, sliding window, and fixed window algorithms
Implement API Security Posture Management to continuously discover, classify, and score APIs based on risk while
'Implements full disk encryption using Microsoft BitLocker on Windows endpoints to protect data at rest from
Integrate FIRST's Exploit Prediction Scoring System (EPSS) API to prioritize vulnerability remediation based
Configure Fluentd and Fluent Bit for centralized log aggregation, routing, filtering, and enrichment across distributed
Kubernetes NetworkPolicies provide pod-level network segmentation by defining ingress and egress rules that control
'Detects and exploits ransomware kill switch mechanisms including mutex-based execution guards, domain-based
Deploy and configure Rapid7 InsightVM Security Console and Scan Engines for authenticated and unauthenticated
'This skill covers implementing Gitleaks for detecting and preventing hardcoded secrets in git repositories.
'Implements USB device control policies to restrict unauthorized removable media access on endpoints, preventing
Deploy and configure Velociraptor for scalable endpoint forensic artifact collection during incident response
Enumerate and audit Active Directory forest trust relationships using impacket for SID filtering analysis, trust
Conduct forensic investigations in cloud environments by collecting and analyzing logs, snapshots, and metadata
Analyze IP address reputation using the Shodan API to identify open ports, running services, known vulnerabilities,
Enrich malware file hashes using the VirusTotal API to retrieve detection rates, behavioral analysis, YARA matches,
Monitor paste sites like Pastebin and GitHub Gists for leaked credentials, API keys, and sensitive data dumps
>
>