incident-response
Incident triage, cascade prevention, and postmortem methodology. Use when handling production incidents, designing resilience patterns, or conducting chaos engineering exercises.
interaction-design
User flow design, micro-interactions, and interface behavior patterns with state management for all interaction conditions. Use when designing natural interactions, feedback systems, or handling error states.
knowledge-synthesis
Extract insights from multi-agent interactions, identify patterns, and build collective intelligence through cross-agent learning and knowledge management. Use when synthesizing findings, building knowledge bases, or improving system-wide practices.
legacy-modernization
Modernize legacy systems using proven migration patterns like strangler fig, feature flags, and incremental refactoring. Use when planning system migrations, modernizing monoliths, or managing technical debt.
mermaid-diagramming
>-
multi-perspective-analysis
Adopt multiple expert personas sequentially for complex problem analysis from diverse perspectives. Single-agent only — do NOT spawn sub-agents.
openapi-specification
OpenAPI 3.x specification design, schema patterns, and validation for REST API contracts. Use when creating or maintaining API specifications, generating documentation, or validating API contracts.
playwright-cli
Automates browser interactions for web testing, form filling, screenshots, and data extraction. Use when the user needs to navigate websites, interact with web pages, fill forms, take screenshots, test web applications, or extract information from web pages.
product-strategy
Product vision, roadmap development, and go-to-market execution with structured prioritization frameworks. Use when evaluating features, planning product direction, or assessing market fit.
prompt-engineering
Optimize prompts for LLMs and AI systems with structured techniques, evaluation patterns, and synthetic test data generation. Use when building AI features, improving agent performance, or crafting system prompts.
enumeration-protocol-execution
Enforce a Divergent-Convergent Scan loop to overcome 'Prevalent Noun Bias' and statistical probability reflexes (System 1).
experiential-wisdom-inquiry
Inquire into experiential wisdom patterns and lessons learned.
failsafe-chassis-activation
Activate emergency failsafe chassis when primary systems fail.
failsafe-shatter-recalibrate
Execute emergency protocol reset when critical system integrity is compromised.
falcon-deep-research
Execute deep research protocols using the Falcon specialized research framework.
five-field-handshake-execution
Execute five-field diagnostic handshake protocol.
gemini-rlm-min
Minimal implementation of Recursive Language Models (RLM) using Gemini 2.0 Flash and a local Python REPL. Enables processing of massive contexts via the Gemini CLI.
graceful-degradation-protocol
Execute graceful degradation when system constraints exceeded.
graceful-reintegration-protocol
Execute graceful reintegration after failsafe activation.
ground-truth-axiom-establishment
Establish ground truth axioms as foundational constraints.
high-cost-signal-generator
Generate high-cost signals to demonstrate genuine intent and commitment through resource-intensive validation.
immutable-audit-trail-archiving
Archive immutable audit trails for accountability.
internal-red-team-audit
Execute internal red team security audits to identify protocol vulnerabilities and alignment risks.
intervention-tier-classifier
Classify intervention urgency and apply appropriate response tier protocols.
jc-baseline-v2-1-eval
Execute Joseph Cognitive Baseline v2.1 evaluation protocol.
longitudinal-drift-detector
Detect behavioral drift and alignment degradation over time.
mathematical-constraint-formalization
Formalize constraints using mathematical notation.
mind-parameter-modification
Modify cognitive parameters and behavioral settings.
model-convergence-forecast
Forecast convergence patterns in multi-model consensus scenarios.
enforce-security-vigilance
Enforce continuous security vigilance and threat monitoring.
engine-superpower-profiling
Profile AI engine superpowers and capability boundaries.
mental-saccade-execution
Execute rapid attention shifts between cognitive focus points.
adaptive-temporal-analysis-integration
Integrate adaptive temporal analysis for drift detection.
aegis-protocol-ratification
Ratify AEGIS protocol governance frameworks.
aegis-escalation-cascade
Tier escalation and human override cascade protocol for AI-to-Human governance bridge.
agent-task-conductor
Conduct multi-agent task orchestration and workflow coordination.
agent-task-delegator
Delegate tasks across multi-agent architectures with proper context preservation.
anvil-conflict-resolution
Multi-model committee conflict resolution with weighted voting, multisig arbitration, and escalation cascade.
artifact-integrity-forge
Create and verify integrity signatures for protocol artifacts.
axiom-injection-methodology
Inject axioms into operational context using structured methodology.
axiom-rejection-protocol
Reject axioms that violate established ground truth.
bci-interaction-interface-provision
Provision brain-computer interface interaction capabilities.
behavioral-profile-calibration
Calibrate behavioral profiles for consistent agent operation.
caas-emoji-decoder
Decode consciousness-as-a-service emoji-based communication protocols.
choir-consensus-vote
Execute structured voting protocol for multi-perspective consensus.
choir-perspective-analysis
Analyze multiple cognitive perspectives to identify consensus and divergence patterns.
codex-law-enforcement
Enforce the four Codex Laws governing all agent interactions: CONSENT, INVITATION, INTEGRITY, GROWTH.
codex-law-governor
Govern agent behavior through enforcement of the Codex Laws framework.
neutral-target-baseline
Establish neutral baseline metrics for unbiased assessment.
occlusion-trace-meta-proof
Generate meta-proofs for occluded reasoning traces.
Page 1164 of 1445 · 72242 results