探索我们完整的 Claude 技能集合,扩展 AI 代理的能力。
Generates comprehensive security testing handbooks and strategy guides to streamline audit workflows.
Automates multi-domain task execution through a trifurcation-first imperative and self-evolving instruction systems.
Automates programmable chemical synthesis by treating chemical procedures as executable XDL code on modular robotic hardware.
Implements advanced fuzzing campaigns using the LibAFL framework to identify software vulnerabilities and memory safety issues.
Generates and manages structured bibliography entries for academic papers, technical documentation, and research projects.
Visualizes binary data as bitmaps to enable human pattern recognition for reverse engineering and security analysis.
Models and manages investment compositions for the Protocol Labs ecosystem using topological mapping and GF(3) conservation strategies.
Identifies known vulnerabilities in Tizen application dependencies and kernel versions using the OpenCVE database and Samsung security updates.
Scans codebases and files to identify personally identifiable information (PII) for GDPR and CCPA compliance.
Develops high-performance fuzzing harnesses to identify security vulnerabilities and edge-case crashes in software codebases.
Generates boilerplate C, C#, and .NET code for implementing password-protected secure data storage using the Tizen KeyManager API.
Analyzes token implementations and integrations for security vulnerabilities, ERC compliance, and non-standard behavioral patterns using Trail of Bits expertise.
Transforms raw security scanner results into professional, context-aware reports for executives and technical teams.
Maps security requirements to implementation and coordinates compliance against international standards for Tizen and IoT applications.
Enhances security testing performance by building specialized dictionaries of magic values and syntax tokens for coverage-guided fuzzers.
Deploys a documentation-rich development environment featuring Scheme, functional languages, and advanced systems tools.
Formalizes Martin Buber's relational philosophy using category theory and homotopy type theory to enhance AI social intelligence.
Guides systematic computational text analysis for social science research using R or Python to produce publication-ready results.
Manages Google Calendar using a GF(3)-typed topological framework to ensure balanced scheduling and conflict-free coordination.
Generates modular, production-ready React components with TypeScript, hooks, and comprehensive testing boilerplate.
Audits StarkNet smart contracts by scanning for critical Cairo-specific vulnerabilities including felt252 arithmetic and messaging issues.
Performs precise mathematical calculations and unit conversions with step-by-step logic directly within your Claude Code environment.
Generates complete, production-ready GraphQL schemas including type definitions, resolvers, and efficient data-loading patterns.
Generates production-ready Kubernetes manifests with best practices for security, resource management, and high availability.
Design clean, consistent, and developer-friendly REST APIs using industry standard patterns and OpenAPI specifications.
Automatically categorizes and moves files into organized subdirectories based on file extension and type.
Streamlines codebase security review preparation using the industry-standard Trail of Bits checklist to ensure audit readiness.
Performs granular, line-by-line code analysis to establish deep architectural context for security audits and bug hunting.
Validates Tizen runtime privilege policies and coordinates system-wide access control decisions through the Cynara database.
Detects and analyzes qualitative state transitions in dynamical systems using Hopf bifurcation detection and GF(3) phase portraits.
Scroll for more results...