Loading...
Loading...
Found 816 Skills
Use when creating, updating, or improving agent skills.
Compare two security audit reports to track remediation progress and identify new vulnerabilities.
Expert in data forensics, anomaly detection, audit trail analysis, fraud detection, and breach investigation
L3 Worker. Analyzes single pattern implementation, calculates 4 scores (compliance, completeness, quality, implementation), identifies gaps and issues. Usually invoked by ln-640, can also analyze a specific pattern on user request.
Application lifecycle audit worker (L3). Checks bootstrap initialization order, graceful shutdown, resource cleanup, signal handling, liveness/readiness probes. Returns findings with severity, location, effort, recommendations.
E2E Critical Coverage audit worker (L3). Validates E2E coverage for critical paths (Money 20+, Security 20+, Data 15+). Pure risk-based - no pyramid percentages.
Search and extract contact information for people or companies including names, phone numbers, emails, job titles, and LinkedIn profiles. Aggregates data from multiple sources and provides enriched contact details. Use when users need to find contact information, build prospect lists, or enrich existing contact data.
Master the AI tools that transform hiring and HR operations. From sourcing candidates to onboarding, find and retain great talent faster. Use when "hiring, recruiting, HR, talent, performance management, hr, recruiting, hiring, talent, people" mentioned.
Processes and guardrails for recruiting, scheduling, consent, and incentive fulfillment.
Use to manage legal, security, and procurement workflows for complex deals.
Use to review voice, visual, legal, and partner requirements before publishing social content.
Generate templated responses for common legal inquiries and identify when situations require individualized attention. Use when responding to routine legal questions — data subject requests, vendor inquiries, NDA requests, discovery holds — or when managing response templates.