messaging-world
ACSet-structured messaging world with real social graph resources from Outlook, Gmail, and Beeper
metabolomics-workbench-database
Access NIH Metabolomics Workbench via REST API (4,200+ studies). Query metabolites, RefMet nomenclature, MS/NMR data, m/z searches, study metadata, for metabolomics and biomarker discovery.
miasm-symbolic
Miasm reverse engineering framework for symbolic execution, IR lifting, and binary analysis. Interoperates with blackhat-go via adversarial bisimulation games and GF(3) conservation.
migrating-bitnami-to-bitnami-legacy
|
mobius-path-filter
Identifies tangled geodesics in proof dependency graphs via Möbius inversion.
modal
Run Python code in the cloud with serverless containers, GPUs, and autoscaling. Use when deploying ML models, running batch processing jobs, scheduling compute-intensive tasks, or serving APIs that require GPU acceleration or dynamic scaling.
modding-ghostty
Defensive security map of Ghostty terminal escape sequences. VT/OSC attack surface, stdin injection vectors, parser DFA analysis, CVE catalog. Triggers: ghostty security, escape sequence, terminal hardening, VT parser, OSC.
next-upgrade
Upgrade Next.js to the latest version following official migration guides and codemods
monad-bayes-asi-interleave
Bridge layer connecting tweag/monad-bayes to plurigrid/asi. Routes SMC/MCMC/PMMH/RMSMC monad transformer stacks into asi's abductive reasoning, lolita physics emulation, and GF(3)-colored sampling capabilities.
monoidal-category
Monoidal categories: ⊗, I, α, λ, ρ.
move-narya-bridge
Observational bridge between Move smart contracts and Narya proof verification.
move-rps-game
Rock-Paper-Scissors PvP game on Aptos with commit-reveal pattern and ACSet-informed design
move-smart-contract-audit
Comprehensive Move/Aptos smart contract security audit pipeline
multidispatch-rl
Multiple dispatch as explicit RL objective - learning optimal method selection across type combinations
mutual-information-oracle
>
n
World N Skill
nashator
Open games DSL → Nash equilibrium solver via PyTorch autodiff. Compositional game theory as OpenClaw tools.
natural-transformation
Natural transformations: morphisms of functors.
nblm-flashcards
Generate and drill flashcards from NotebookLM Enterprise notebooks via Gemini (Vertex AI), with Emacs UI and babashka backfill pipeline
nbt
Use the nbt! macro from mc_protocol for creating NBT (Named Binary Tag) data for Minecraft protocol encoding.
netlify-deploy
Deploy web projects to Netlify using the Netlify CLI (`npx netlify`). Use when the user asks to deploy, host, publish, or link a site/repo on Netlify, including preview and production deploys.
network-forensics
Analyze network traffic captures for security incidents, protocol anomalies, and data exfiltration. Uses tcpdump, tshark/Wireshark, Zeek, and ngrep for packet-level forensics in authorized testing environments.
networkx
Comprehensive toolkit for creating, analyzing, and visualizing complex networks and graphs in Python. Use when working with network/graph data structures, analyzing relationships between entities, computing graph algorithms (shortest paths, centrality, clustering), detecting communities, generating synthetic networks, or visualizing network topologies. Applicable to social networks, biological networks, transportation systems, citation networks, and any domain involving pairwise relationships.
neurofeedback-oracle
>
neurokit2
Comprehensive biosignal processing toolkit for analyzing physiological data including ECG, EEG, EDA, RSP, PPG, EMG, and EOG signals. Use this skill when processing cardiovascular signals, brain activity, electrodermal responses, respiratory patterns, muscle activity, or eye movements. Applicable for heart rate variability analysis, event-related potentials, complexity measures, autonomic nervous system assessment, psychophysiology research, and multi-modal physiological signal integration.
neuropixels-analysis
Neuropixels neural recording analysis. Load SpikeGLX/OpenEphys data, preprocess, motion correction, Kilosort4 spike sorting, quality metrics, Allen/IBL curation, AI-assisted visual analysis, for Neuropixels 1.0/2.0 extracellular electrophysiology. Use when working with neural recordings, spike sorting, extracellular electrophysiology, or when the user mentions Neuropixels, SpikeGLX, Open Ephys, Kilosort, quality metrics, or unit curation.
next-best-practices
Next.js best practices - file conventions, RSC boundaries, data patterns, async APIs, metadata, error handling, route handlers, image/font optimization, bundling
next-cache-components
Next.js 16 Cache Components - PPR, use cache directive, cacheLife, cacheTag, updateTag
ngrok-tunnel
Secure tunnel for exposing local MCP servers to Claude, remote agents, and external clients. Supports custom domains, IP whitelisting, and traffic policies.
nhero-confidential
Twisted ElGamal encrypted supply tracking on Aptos for nhero devices. ZK range proofs verify supply sufficiency without revealing counts. Nurse auditor key model. Uses @aptos-labs/confidential-assets SDK.
nhero-nurse
Nurse approval email automation for nhero controlled substance slots. Gmail MCP integration with scrambled slot names — nurse sees only slot letters, never medication names. Dual-address routing to mantissa@gmail.com (primary) and ies@plurigrid.com (backup).
nhero-pyhole
DNS-style medication routing layer for nhero devices. Intercepts scheduling commands like Pi-hole intercepts DNS, routes through scramble index, enforces blocklist/allowlist per killdispenser signals.
nhero-scramble
Derangement-based medication name scrambling for nhero. No medication maps to its own initial letter. Full derangement with GF(3) conservation. Append-only index — medications can be added but never removed from the scramble table.
nhero
Aftermarket cybernetic network device framework. nhero is the umbrella for all pill-dispenser-as-network-device modifications — from Hero Health hardware RE to PyHole DNS-style medication routing to killdispenser supply chain primitives. One lowercase word. Append-only reference architecture.
nonlinear-dynamics-observatory
>
norvidize
Extract and audit claims for norvid tracking system
notebooklm-enterprise
NotebookLM Enterprise API via Discovery Engine — notebook CRUD, source management, audio overviews, flashcard pipeline integration
notion-knowledge-capture
Capture conversations and decisions into structured Notion pages; use when turning chats/notes into wiki entries, how-tos, decisions, or FAQs with proper linking.
notion-meeting-intelligence
Prepare meeting materials with Notion context and Codex research; use when gathering context, drafting agendas/pre-reads, and tailoring materials to attendees.
notion-research-documentation
Research across Notion and synthesize into structured documentation; use when gathering info from multiple Notion sources to produce briefs, comparisons, or reports with citations.
notion-spec-to-implementation
Turn Notion specs into implementation plans, tasks, and progress tracking; use when implementing PRDs/feature specs and creating Notion plans + tasks from them.
npm
Handle npm package installation in non-interactive environments by piping confirmations. Use when installing Node.js packages that require user confirmation prompts.
nrf5340-device-interaction
Nrf5340 Device Interaction
nrf5340-hardware
Nrf5340 Hardware
o
World O Skill
olmo-earth-skill
Sentinel-2 satellite imagery to OlmoEarth embeddings on geodesic tiles, serialized via zig-syrup. Use for satellite imagery pipelines, earth observation embeddings, or WholeEarthModel operations.
omero-integration
Microscopy data management platform. Access images via Python, retrieve datasets, analyze pixels, manage ROIs/annotations, batch processing, for high-content screening and microscopy workflows.
onboarding-agent
Interactive onboarding workflow that interviews users to understand their coding goals and generates PR-ready implementation plans. Use when starting a new development task to ensure clear requirements and structured execution.
onepassword-cli
1Password CLI (op) for secure secret management, credential injection, and shell plugin auth. Use when users need secrets, API keys, env vars, or authenticating third-party CLIs.
ontology-asi-interleave
>
Page 36 of 41 · 2048 results