developer-growth-analysis
Analyzes your recent Claude Code chat history to identify coding patterns,
differential-review
Security-focused code review of diffs and pull requests using Trail of Bits expertise.
dimensional-analysis
Annotates codebases with dimensional analysis comments documenting units, dimensions, and decimal scaling. Use when someone asks to annotate units in a codebase, perform a dimensional analysis, or find vulnerabilities in a DeFi protocol, offchain code, or other blockchain-related codebase with arithmetic. Prevents dimensional mismatches and catches formula bugs early.
discopy-operads
DiscoPy Operads Skill
discopy
DisCoPy: Python library for computing with string diagrams - monoidal
discrete-backprop
Gradient-free optimization via discrete perturbations and trit-based learning
doc-coauthoring
Guide users through a structured workflow for co-authoring documentation.
docs-acset
Google Docs/Sheets management via ACSet condensation. Transforms documents into GF(3)-typed Interactions, tracks comments/cells, detects saturation when all comments resolved. Use for document workflows, spreadsheet automation, or applying ANIMA principles to Workspace documents.
docx
Comprehensive document creation, editing, and analysis with support for
domain-name-brainstormer
Generates creative domain name ideas for your project and checks availability
drive-acset
Google Drive management via DriveACSet schema with GF(3) triadic routing. Transforms files/folders into typed Interactions, routes to queue fibers, detects saturation for organized-drive-as-condensed-state.
duck-agent
DuckDB file discovery agent with verified absolute paths
duckdb-ies
Layer 4: IES Interactome Analytics with GF(3) Momentum Tracking
duckdb-quadruple-interleave
Chaotic interleaving across local DuckDB databases modeled as coupled quadruple pendula. Random walks both BETWEEN databases and WITHIN tables for context injection.
duckdb-spatial
DuckDB Spatial Skill
duckdb-timetravel
Layer 3: Temporal Versioning and ACSet Schema Generation for DuckDB
ducklake-walk
Ergodic random walks over DuckLake lakehouses with GF(3) triadic concurrent walkers. Society-of-mind coordination for schema exploration.
dune-analytics
Query Dune Analytics API for blockchain data, pyUSD flows, stablecoin metrics, and on-chain analytics. Use when analyzing DeFi protocols, token flows, or building dashboards.
dwarf-expert
Provides expertise for analyzing DWARF debug files and understanding the DWARF debug format/standard (v3-v5). Triggers when understanding DWARF information, interacting with DWARF files, answering DWARF-related questions, or working with code that parses DWARF data.
dynamic-sufficiency-goblin
Self-regulating Goblins actor implementing Ivan Illich's dynamic sufficiency
dynamic-sufficiency
Causal state gating via ε-machine. Coworld observer that prevents action
dynamical-system-functor
Categorical structure of dynamical systems
effective-topos
FloxHub publication `bmorphism/effective-topos` - a comprehensive development
eigenvalue-stability
Stability classification via Jacobian eigenvalues
elisp
Emacs Lisp reference (106K lines info).
emacs-color-chain
Control Emacs via deterministic Gay-MCP color chains — seed-derived palettes drive buffer themes, mode-line, org headers, and window focus
emacs-info
Emacs Info documentation system. Navigate and query Info manuals for Emacs, Elisp, and GNU tools.
emacs
Emacs ecosystem = elisp + org + gnus + tramp + eglot.
entropy-sim2real
Entropy-driven sim2real transfer. Uses maximum entropy RL, domain randomization, and information-theoretic bridging to close the reality gap.
entry-point-analyzer
Analyzes smart contract codebases to identify state-changing entry points for security auditing. Detects externally callable functions that modify state, categorizes them by access level (public, admin, role-restricted, contract-only), and generates structured audit reports. Excludes view/pure/read-only functions. Use when auditing smart contracts (Solidity, Vyper, Solana/Rust, Move, TON, CosmWasm) or when asked to find entry points, audit flows, external functions, access control patterns, or privileged operations.
enzyme-autodiff
Enzyme.jl Automatic Differentiation Skill
equilibrium
Fixed points where vector field vanishes
eradicating-malware-from-infected-systems
Systematically remove malware, backdoors, and attacker persistence mechanisms from infected systems while ensuring complete eradication and preventing re-infection.
ergodicity
Time averages equal space averages
evaluating-threat-intelligence-platforms
>
evla-vla
EdgeVLA - Open-source edge vision-language-action model for robotics. Standardizes Open-X Embodiment datasets for consistent VLA training and deployment.
ewig-editor
The eternal text editor — Didactic Ersatz Emacs demonstrating immutable
exa-search
Use Exa for semantic/neural web search. Exa understands context and returns high-quality results. Use this skill when you need to search the web for documentation, research, or any information that requires understanding meaning rather than just keyword matching. NEVER substitute web_search for Exa - they serve completely different purposes.
excellence-gradient
Measure quality. Descend toward excellence. No binary gates—only vectors.
executing-active-directory-attack-simulation
>
executing-phishing-simulation-campaign
>
executing-red-team-engagement-planning
Red team engagement planning is the foundational phase that defines scope, objectives, rules of engagement (ROE), threat model selection, and operational timelines before any offensive testing begins.
executing-red-team-exercise
>
exo-distributed
Distributed LLM inference across Apple Silicon clusters with exo. Run models across Mac Studios via Thunderbolt RDMA, auto peer discovery, and MLX sharding. Use for multi-device inference, model parallelism, or building LLM clusters.
exploiting-active-directory-certificate-services-esc1
Exploit misconfigured Active Directory Certificate Services (AD CS) ESC1 vulnerability to request certificates as high-privileged users and escalate domain privileges during authorized red team assessments.
exploiting-active-directory-with-bloodhound
BloodHound is a graph-based Active Directory reconnaissance tool that uses graph theory to reveal hidden and unintended relationships within AD environments. Red teams use BloodHound to identify attac
exploiting-broken-function-level-authorization
>
exploiting-broken-link-hijacking
Discover and exploit broken link hijacking vulnerabilities by identifying references to expired domains, decommissioned cloud resources, and dead external services that can be claimed by an attacker.
exploiting-constrained-delegation-abuse
Exploit Kerberos Constrained Delegation misconfigurations in Active Directory to impersonate privileged users via S4U2self and S4U2proxy extensions for lateral movement and privilege escalation.
exploiting-deeplink-vulnerabilities
>
Page 310 of 1445 · 72246 results