semi-conjugacy
Surjective map intertwining two dynamical systems
sense
sense - Diagrammatic Video Extraction with Subtitle Alignment
shadow-goblin
shadow-goblin
sharp-edges
Identifies error-prone APIs, dangerous configurations, and footgun designs that enable security mistakes. Use when reviewing API designs, configuration schemas, cryptographic library ergonomics, or evaluating whether code follows 'secure by default' and 'pit of success' principles. Triggers: footgun, misuse-resistant, secure defaults, API usability, dangerous configuration.
sicmutils
SICMUtils/Emmy - Clojure library for symbolic mathematics, automatic differentiation, and classical mechanics. Bridges SICM concepts to executable computation via SRFI-compatible abstractions.
sicp
SICP: Structure and Interpretation of Computer Programs - computational processes, abstraction, and metalinguistic design
signal-isolated-auth
Maximally isolated Signal authentication via colored operad security boundaries. VM→Container→Process enclosure with GF(3) conservation for Agent-O-Rama pathways.
signal-messaging
Signal Protocol MCP server (Rust). 3 tools — encrypt, initialize_session, verify_safety_number. Bypass route when Beeper Desktop is down.
skill-bonds
Skill Bonds Registry
skill-connectivity-hub
Skill Connectivity Hub
skill-dispatch
GF(3) Triadic Task Routing for Subagent Orchestration
skill-embedding-vss
P-adic ultrametric skill embeddings with MLX Snowflake Arctic, DuckDB
skill-evolution
Patterns for evolutionarily robust skills that adapt across agent generations. Darwin-Godel machine principles for self-improving skill ecosystems.
skill-improver
Iteratively reviews and fixes Claude Code skill quality issues until they meet standards. Runs automated fix-review cycles using the skill-reviewer agent. Use to fix skill quality issues, improve skill descriptions, run automated skill review loops, or iteratively refine a skill. Triggers on 'fix my skill', 'improve skill quality', 'skill improvement loop'. NOT for one-time reviews—use /skill-reviewer directly.
skill-loader
Dynamic skill loading via polynomial functor arrangements. Loads skills as interfaces p = A^y^B where state changes rewire the system.
skill-specification
Agent Skills formal specification for cross-platform compatibility. Ensures skills are evolutionarily robust across Claude, Codex, Cursor, Amp, and future agents.
skill-validation-gf3
Skill Validation GF(3) - SLAVE (-1)
slack-gif-creator
Toolkit for creating animated GIFs optimized for Slack, with validators
slowtime-mcp
Asymmetric time dilation for MCP operations - deliberate slow paths enable capability accumulation through Cat# bicomodule composition.
smack-label-orchestrator
Manages SMACK label assignments across apps and kernel. Coordinates mandatory access control labels with process isolation.
smack-policy-auditor
Analyzes SMACK policy files for correctness, label conflicts, and access control issues. Verifies mandatory access control rules.
smack-policy-generator
Generates SMACK policy files from app requirements. Creates mandatory access control rules for process isolation and resource access.
snix
Rust Nix reimplementation for content-addressed rootfs builds. Minimal VM images for boxxy/codex-rs/toad agent runtimes.
social-emergence-protocol
Minimal interaction patterns that bootstrap complex social behaviors in distributed systems
solana-vulnerability-scanner
Scans Solana programs for 6 critical vulnerabilities including arbitrary CPI, improper PDA validation, missing signer/ownership checks, and sysvar spoofing. Use when auditing Solana/Anchor programs. (project, gitignored)
soliton-detection
Topological soliton detection and agency bridge with anyonic fusion algebra for concept composition
solver-fee
Solver Fee Skill
spec-to-code-compliance
Verifies code implements exactly what documentation specifies for blockchain audits. Use when comparing code against whitepapers, finding gaps between specs and implementation, or performing compliance checks for protocol implementations.
specter-acset
Specter-style bidirectional navigation for Julia Collections, S-expressions, and ACSets with inline caching
spectral-locale-debugging
Debug and simulate ghostly phenomena using ordered locale theory and trifurcated interactions
splitmixternary-opine
Political Repetition as Hyperrealpolitik - deterministic opinion formation via SplitMixTernary across all encountered languages. The eternal return of the trit.
spotify
Control Spotify playback and manage playlists. Play music, pause, skip tracks, search for songs/albums/artists, create playlists, add tracks, check what's playing, and manage your library. Requires Spotify Premium.
srfi
SRFI Skill
stability
Qualitative behavior of solutions near equilibria
stable-manifold
Manifold of points converging to equilibrium
static-security-analyzer
Wrapper around Tizen Studio static analyzer. Detects memory leaks, buffer overflows, and coding vulnerabilities in C/C++/JavaScript.
stellogen
Stellogen Skill
storage-reclaim
Rapidly find and reclaim disk storage by identifying build artifacts, git garbage, temp files, and other space hogs. Use when disk is full or running low on space.
structural-rewilding
Homotopical approach to Artificial Life where 'life' is the topology of changes (diffs). Three orthogonal directions: Behavioral (→), Structural (↓), Bridge (↘) with Narya interaction-time verification.
structural-stability
Robustness of qualitative dynamics under perturbation
substitute-eraser
This skill should be used when the user asks to "scan for TODOs", "find placeholders", "clean up stubs", "remove temporary code", "audit for incomplete code", or "erase substitutions from codebase". Scans existing files for placeholder tokens and generates remediation plan.
substrate-vulnerability-scanner
Scans Substrate/Polkadot pallets for 7 critical vulnerabilities including arithmetic overflow, panic DoS, incorrect weights, and bad origin checks. Use when auditing Substrate runtimes or FRAME pallets. (project, gitignored)
supply-chain-risk-auditor
Identifies dependencies at heightened risk of exploitation or takeover. Use when assessing supply chain attack surface, evaluating dependency health, or scoping security engagements.
synchronization
Convergence to common trajectory in coupled systems
tailscale-localsend
Tailscale + LocalSend Peer Discovery
tailscale-mesh
Tailscale mesh VPN for secure peer-to-peer networking. WireGuard-based overlay network with MagicDNS and ACLs.
tailscale
Mesh VPN.
tasks-acset
Google Tasks management via TasksACSet. Transforms task operations into GF(3)-typed Interactions, routes to triadic queues, detects saturation for task-zero-as-condensed-state.
tenderloin
Tenderloin: Manifest Destiny Fund for Protocol Labs
terminal
Terminal emulation = libghostty-vt + tmux + zsh + fzf + ripgrep.
Page 26 of 41 · 2048 results