Loading...
Loading...
Found 491 Skills
Multi-cloud security assessment skill for AWS, Azure, and GCP. This skill should be used when performing cloud security audits, scanning for misconfigurations, testing IAM policies, auditing storage permissions, and identifying privilege escalation paths. Triggers on requests to audit cloud security, scan AWS/Azure/GCP, check cloud misconfigurations, or perform cloud penetration testing.
Analyze parliamentary sessions from Chile, Spain, Peru and EU. Research transcripts, identify topics and trends, generate analytical PDF reports. Also search Official Journals (BOE, EUR-Lex) for decrees, laws, resolutions and published regulations. Use when user asks about legislative sessions, committees, parliamentary debates, official journal, decrees, laws, resolutions or requests reports/analysis.
Cloud infrastructure design and deployment patterns for AWS, Azure, and GCP. Use when designing cloud architectures, implementing IaC with Terraform, optimizing costs, or setting up multi-region deployments.
Pre-logic validation tool that proactively identifies logical flaws before providing answers, used for rationality verification in scenarios such as product recommendation, quotation, data analysis, etc. Use when: - Validate product price authenticity before product recommendation - Data analysis consistency check - Budget-plan matching validation - Unit conversion verification - Factual statement validation before making factual claims - Proactively find logic flaws Cross-references: content-extractor, long-form-writer, rss-feed, document-hub Part of UniqueClub toolkit. Learn more: https://uniqueclub.ai
Detects and prevents code injection attacks targeting serverless functions (AWS Lambda, Azure Functions, Google Cloud Functions) through event source poisoning, malicious layer injection, runtime command execution, and IAM privilege escalation via function modification. The analyst combines static analysis of function code, CloudTrail event correlation, runtime behavior monitoring, and IAM policy auditing to identify injection vectors across the expanded serverless attack surface including API Gateway, S3, SQS, DynamoDB Streams, and CloudWatch event triggers. Activates for requests involving Lambda security assessment, serverless injection detection, function event poisoning analysis, or serverless privilege escalation investigation.
Implement blue-green deployment strategies for zero-downtime releases with instant rollback capability and traffic switching between environments.
Optimize cloud infrastructure costs through resource rightsizing, reserved instances, spot instances, and waste reduction strategies.
Configure autoscaling for Kubernetes, VMs, and serverless workloads based on metrics, schedules, and custom indicators.
Build Windows images with Packer using WinRM communicator and PowerShell provisioners. Use when creating Windows AMIs, Azure images, or VMware templates.
Configure WireGuard, OpenVPN, and cloud VPNs. Implement secure remote access and site-to-site connectivity. Use when setting up secure network tunnels.
Designs CloudFormation stack structure, nested stacks, and resource organization. Use when designing CloudFormation infrastructure, organizing resources into stacks, or planning nested stack hierarchies.
Validates CloudFormation templates for syntax, security, and best practices. Use when validating CloudFormation templates, checking for security issues, or ensuring compliance with best practices.