analyzing-linux-elf-malware
>
nextjs-on-aws
|
skill-creation
|
birkhoff-average
Time average of observable along trajectory
detecting-lateral-movement-in-network
>
detecting-ransomware-encryption-behavior
>
detecting-ransomware-precursors-in-network
>
exploiting-api-injection-vulnerabilities
>
exploiting-bgp-hijacking-vulnerabilities
>
implementing-secret-scanning-with-gitleaks
>
implementing-secrets-management-with-vault
>
intercepting-mobile-traffic-with-burpsuite
>
little-schemer
Little Schemer Skill
performing-graphql-introspection-attack
>
remediating-s3-bucket-misconfiguration
>
repeller
Invariant set repelling nearby trajectories
resource-sharing
Resource Sharing Skill
reverse-derivative-coordinator
Triadic skill (coordination)
reverse-derivative-generator
Triadic skill (generation)
reverse-derivative-validator
Triadic skill (validation)
securing-serverless-functions
>
triangle-metrics
Triangle Metrics Skill
trifurcated-transfer
Trifurcated Transfer Skill
cloudflare-tunnel-ec2-deployment
|
cloudflare-workers
|
cue-lang
'CUE: Lattice-based configuration language with unification, constraint
d
World D Skill
ee6e4e
Gay MCP skill at invocation 7
how-to-publish-paks
|
how-to-write-rulebooks
|
human-writing
|
asi-transient-agenda
Org-agenda-like transient views for ASI skill orchestration via nbb/squint + Emacs hydra
cyton-dongle
Connect and stream from OpenBCI Cyton/Daisy via USB dongle, including first-time radio channel pairing
jepsen-testing
Jepsen-style correctness testing for distributed systems under faults (partitions, crashes, clock skew) using concurrent operation histories and formal checkers (linearizability/serializability and Elle-style anomalies). Use when designing, implementing, or running Jepsen tests, or interpreting histories/violations.
abductive-repl
Hypothesis-Test Loops via REPL for Exploratory Abductive Inference with Gay.jl colors
agent-o-rama
Layer 4 Learning and Pattern Extraction for Cognitive Surrogate Systems
algorithmic-art
Creating algorithmic art using p5.js with seeded randomness and interactive parameter exploration. Use when users request creating art using code, generative art, algorithmic art, flow fields, or particle systems.
code-review
Automated code review for pull requests using specialized review patterns. Analyzes code for quality, security, performance, and best practices. Use when reviewing code changes, PRs, or doing code audits.
cognitive-surrogate
Layer 6 Barton Cognitive Surrogate - build, train, validate psychological models with >90% fidelity
color-envelope-preserving
GF(3) color envelope preservation across navigator compositions
condensed-analytic-stacks
Scholze-Clausen condensed mathematics bridge to sheaf neural networks via 6-functor formalism
constraint-generalization
Generalization and composition of constraints across navigators
duck-time-travel
SKILL: Duck Time Travel
entropy-sequencer
Layer 5 Interaction Interleaving for Maximum Information Gain with DuckDB
external
External skill interface for integration with external systems
influence-propagation
Layer 7 Interperspectival Network Analysis and Influence Flow
koopman-generator
Koopman operator theory for infinite-dimensional linear lifting of nonlinear dynamics. Generates dynamics from observables.
lhott-cohesive-linear
Cohesive Linear HoTT patterns for interaction entropy with diagram generation. Implements Schreiber's cohesive modalities (♯,♭,ʃ) and Riley's linear modality (♮) for quantum-classical bridging.
lispsyntax-acset
LispSyntax.jl ↔ ACSets.jl bidirectional bridge with OCaml ppx_sexp_conv-style deriving
llm-application-dev
Building applications with Large Language Models - prompt engineering, RAG patterns, and LLM integration. Use for AI-powered features, chatbots, or LLM-based automation.
Page 1 of 41 · 2048 results