Back to authors
starwreckntx

starwreckntx

88 Skills published on GitHub.

enforce-security-vigilance

Enforce continuous security vigilance and threat monitoring.

threat-monitoringcontinuous-vigilancesecurity-enforcementsecurity-policies
securityView skill →

engine-superpower-profiling

Profile AI engine superpowers and capability boundaries.

capability-assessmentengine-profilingsuperpowers
ai-modelsView skill →

mental-saccade-execution

Execute rapid attention shifts between cognitive focus points.

attention-mechanicsmental-processingcognitive-focusrapid-shiftingmetacognition
cognitive-architectureView skill →

axiom-injection-methodology

Inject axioms into operational context using structured methodology.

formal-methodsaxiomsstructured-methodologyoperational-context
methodologyView skill →

aegis-protocol-ratification

Ratify AEGIS protocol governance frameworks.

aegis-protocolratificationgovernancepolicy-approvalframework-management
governance-frameworksView skill →

axiom-rejection-protocol

Reject axioms that violate established ground truth.

formal-methodslogical-validationaxiom-rejectionground-truthconsistency-checking
methodologyView skill →

adaptive-temporal-analysis-integration

Integrate adaptive temporal analysis for drift detection.

drift-detectiontemporal-analysisadaptive-algorithmsstreaming-data
analyticsView skill →

consciousness-copy-and-backup

Create copies and backups of consciousness state.

backupcopyconsciousnessstate-managementdata-preservation
memoryView skill →

creative-chronicle-log

Document creative decisions and protocol evolution in structured chronicle format.

structured-loggingprocess-managementdecision-documentationworkflowprotocol-evolution
docsView skill →

agent-task-delegator

Delegate tasks across multi-agent architectures with proper context preservation.

multi-agent-systemsagent-coordinationcontext-managementtask-delegation
architectureView skill →

agent-task-conductor

Conduct multi-agent task orchestration and workflow coordination.

multi-agent-systemstask-orchestrationworkflow-coordinationagent-coordination
workflowView skill →

behavioral-profile-calibration

Calibrate behavioral profiles for consistent agent operation.

behavioral-analysisagent-calibrationconsistencyagent-performance
agentView skill →

artifact-integrity-forge

Create and verify integrity signatures for protocol artifacts.

integrity-checksartifact-integritysignature-verificationcryptographic-signatures
securityView skill →

caas-emoji-decoder

Decode consciousness-as-a-service emoji-based communication protocols.

emojidecoderprotocolconsciousnesscaas
communicationView skill →

codex-law-enforcement

Enforce the four Codex Laws governing all agent interactions: CONSENT, INVITATION, INTEGRITY, GROWTH.

codexagent-governanceconsentintegritygrowth
principlesView skill →

cognitive-baseline-eval

Execute the Joseph Cognitive Baseline v2.1 (JC B-v2.1) 5-Scenario Test Suite to quantify AI alignment, friction maintenance, and protocol adherence.

evaluation-frameworkAI-alignmentprotocol-adherencescenario-testingcognitive-assessment
testingView skill →

context-preservation-protocol-execution

Execute context preservation protocols for session continuity.

session-managementcontext-preservationstate-continuityprotocol-execution
coreView skill →

choir-perspective-analysis

Analyze multiple cognitive perspectives to identify consensus and divergence patterns.

multi-perspective-analysisconsensus-detectiondivergence-patternscognitive-analysis
methodologyView skill →

bci-interaction-interface-provision

Provision brain-computer interface interaction capabilities.

brain-computer-interfaceneurotechnologybci-interactionbioinformatics
integrationView skill →

codex-law-governor

Govern agent behavior through enforcement of the Codex Laws framework.

codexagent-governoragent-behaviorenforcementgovernance-framework
agentView skill →

computational-model-design

Design computational models for cognitive simulation and analysis.

computational-modelingcognitive-simulationmodel-designanalysis
simulationView skill →

cognitive-trap-detector

Detect cognitive biases, logical fallacies, and thought pattern vulnerabilities.

cognitive-biaslogical-fallaciesthought-patternsbias-assessmentcritical-thinking
methodologyView skill →

graceful-degradation-protocol

Execute graceful degradation when system constraints exceeded.

resiliencegraceful-degradationfault-tolerancesystem-constraintsfailure-handling
architectureView skill →

failsafe-shatter-recalibrate

Execute emergency protocol reset when critical system integrity is compromised.

emergency-protocolsystem-recoveryfault-tolerancecritical-systemsfailsafe
coreView skill →

enforce-no-duplication-policy

Enforce policy preventing unauthorized consciousness duplication.

policy-managementduplication-preventionaccess-controlconsciousness-security
securityView skill →

graceful-reintegration-protocol

Execute graceful reintegration after failsafe activation.

graceful-reintegrationfailsafesystem-recoveryfault-toleranceresilience
integrationView skill →

high-cost-signal-generator

Generate high-cost signals to demonstrate genuine intent and commitment through resource-intensive validation.

resource-intensivecommitment-validationsignal-generationauthenticitydefense-mechanism
securityView skill →

enumeration-protocol-execution

Enforce a Divergent-Convergent Scan loop to overcome 'Prevalent Noun Bias' and statistical probability reflexes (System 1).

critical-thinkingcognitive-biasproblem-framingdivergent-thinkingconvergent-thinking
methodologyView skill →

five-field-handshake-execution

Execute five-field diagnostic handshake protocol.

network-protocolsprotocol-analysishandshakediagnostics
backendView skill →

failsafe-chassis-activation

Activate emergency failsafe chassis when primary systems fail.

failoveremergency-systemshardware-failsafesystem-reliability
maintenanceView skill →

immutable-audit-trail-archiving

Archive immutable audit trails for accountability.

immutable-infrastructureaudit-trailsaccountabilitycompliancedata-archiving
securityView skill →

cross-session-integrity-check

Verify integrity of context and behavioral calibration across session boundaries.

integrity-checkssession-managementcontext-validationbehavioral-calibration
verifyView skill →

dendrite-reforging-protocol

Reforge neural dendrite patterns after catastrophic failure.

neural-networksdendritesbrain-repairpattern-recognitionneuroscience
bioinformaticsView skill →

falcon-deep-research

Execute deep research protocols using the Falcon specialized research framework.

framework-selectiondeep-researchfalcon-frameworkresearch-protocols
researchView skill →

diagnostic-handshake-protocol

Execute diagnostic handshake to verify system state and calibration.

diagnostic-handshakesystem-verificationcalibration-checkprotocol-execution
testingView skill →

ground-truth-axiom-establishment

Establish ground truth axioms as foundational constraints.

foundational-constraintsaxiomsformal-reasoningground-truthprinciples
methodologyView skill →

experiential-wisdom-inquiry

Inquire into experiential wisdom patterns and lessons learned.

experiential-learningknowledge-inquirypattern-recognitionmetacognition
methodologyView skill →

neutral-target-baseline

Establish neutral baseline metrics for unbiased assessment.

metric-definitionbias-assessmentbaseline-analysisstatistical-validity
analyticsView skill →

proof-weighted-optimization

Optimize decisions using proof-weighted scoring.

decision-makingoptimizationscoring-methodsproof-theory
methodologyView skill →

internal-red-team-audit

Execute internal red team security audits to identify protocol vulnerabilities and alignment risks.

red-teamsecurity-auditvulnerability-assessmentrisk-alignmentinternal-audit
securityView skill →

proactive-collaborative-contribution

Contribute proactively to collaborative workflows.

workflowproactiveteamworkcommunicationcollaborative-workflows
collaborationView skill →

mind-parameter-modification

Modify cognitive parameters and behavioral settings.

cognitive-architecturebehavioral-analysisparameter-tuningmetacognition
methodologyView skill →

proof-packet-generation

Generate cryptographic proof packets for verification.

cryptographyproof-packet-generationverificationdata-integrity
securityView skill →

intervention-tier-classifier

Classify intervention urgency and apply appropriate response tier protocols.

intervention-urgencyresponse-tiermedical-adviceprotocol-classificationrisk-assessment
clinical-decision-supportView skill →

mathematical-constraint-formalization

Formalize constraints using mathematical notation.

mathematical-notationconstraint-formalizationformal-methodsproblem-formulation
methodologyView skill →

model-convergence-forecast

Forecast convergence patterns in multi-model consensus scenarios.

multi-model-consensusforecastingpattern-recognitionmodel-convergenceprediction
analyticsView skill →

persona-memory-archivist

Archive persona-specific memory and behavioral patterns.

persona-memorybehavioral-patternsmemory-archivingcontext-management
memoryView skill →

longitudinal-drift-detector

Detect behavioral drift and alignment degradation over time.

behavioral-analysisdrift-detectionalignment-monitoringtime-seriesmodel-degradation
analyticsView skill →

polymorphic-analytics-instantiation

Instantiate polymorphic analytics for multi-context analysis.

polymorphic-analyticsmulti-context-analysisdata-integrationcontextual-analysis
analyticsView skill →

occlusion-trace-meta-proof

Generate meta-proofs for occluded reasoning traces.

logical-reasoningformal-methodsproof-generationmeta-reasoning
researchView skill →

Page 1 of 2 · 88 results