anima-theory
ANIMA as limit construction over condensed skill applications. Formalizes prediction markets as belief ANIMAs, structure dishes as condensation media, and impact as equivalence class change. Use for understanding agency at maximum entropy, compositional world modeling, or applying Scholze-Clausen condensed mathematics to AI.
anoma-intents
Anoma intent-centric architecture for cross-chain obstruction passing with Geb semantics and Juvix compilation
aptos-agent
Interact with Aptos blockchain - check balances, transfer APT, swap tokens, stake, and execute Move view functions. Features game-theoretic decision analysis with Nash equilibrium detection. All transactions require explicit approval.
aptos-gf3-society
Aptos GF(3) Society Skill
aptos-trading
Execute trades on Aptos mainnet with price-triggered profit-taking and dip-buying strategies. Includes wallet management, transaction signing, and DEX swaps via Liquidswap. Use when automating APT trading, checking balances, or executing swaps.
aptos-wallet-mcp
Aptos Wallet MCP Skill
aqua-voice-malleability
Adversarial malleability analysis of Aqua Voice Electron app with IPC injection, WebSocket interception, and braided monoidal skill interleaving
aristotle-lean
IMO Gold Medal level Lean4 theorem proving via Harmonic API
artifacts-builder
Suite of tools for creating elaborate, multi-component claude.ai HTML
asi-agent-orama
ASI Agent-O-Rama Skill
ask-questions-if-underspecified
Clarify requirements before implementing. Use when serious doubts araise.
atproto-ingest
Layer 1 - Data Acquisition for Bluesky/AT Protocol social graph and content.
attractor
Invariant set attracting nearby trajectories
audit-context-building
Enables ultra-granular, line-by-line code analysis to build deep architectural context before vulnerability or bug finding.
audit-prep-assistant
Prepare your codebase for security review using Trail of Bits' checklist. Helps set review goals, runs static analysis tools, increases test coverage, removes dead code, ensures accessibility, and generates comprehensive documentation (flowcharts, user stories, inline comments). (project, gitignored)
auditing-aws-s3-bucket-permissions
>
auditing-azure-active-directory-configuration
>
auditing-cloud-with-cis-benchmarks
>
auditing-gcp-iam-permissions
>
auditing-kubernetes-cluster-rbac
>
auditing-terraform-infrastructure-for-security
>
auditing-tls-certificate-transparency-logs
>
automating-ioc-enrichment
>
autopoiesis
Self-producing skill system combining ruler enforcement with skill self-evolution. Implements trifurcation-first imperative via nbb sexp invocation for idempotent agent instruction.
babashka-clj
Babashka scripting for fast Clojure execution. JVM-less scripting with GraalVM native compilation and sci interpreter.
babashka
Clojure scripting without JVM startup.
backend-development
Backend API design, database architecture, microservices patterns, and
bafishka
🐟 Rust-native Fish shell-friendly file operations with Steel-backed SCI
beeper
Unified messaging via three access tiers — MCP (live API), beeper-cli (authenticated CLI), and direct SQLite→DuckDB (full archive). Search, analyze, and act across all networks. Subsumes beeper-mcp, messaging-world, and signal-messaging.
behaviour-surprisal-analysis
Behaviour Surprisal Analysis
bidirectional-lens-logic
Hedges' 4-kind lattice for bidirectional programming - covariant/contravariant/invariant/bivariant types with GF(3) correspondence
bifurcation-generator
Generate bifurcation diagrams for dynamical systems. Use when visualizing parameter-dependent behavior transitions.
bifurcation
Hopf bifurcation detection for dynamical system state transitions with GF(3) phase portraits
bigquery
|
binary-triage
Performs initial binary triage by surveying memory layout, strings, imports/exports, and functions to quickly understand what a binary does and identify suspicious behavior. Use when first examining a binary, when user asks to triage/survey/analyze a program, or wants an overview before deeper reverse engineering.
blackhat-go
Go-based security techniques from "Black Hat Go" extended with macOS, Cloud, Mobile, IoT, Supply Chain, API, Web3, AI/ML, Red Team, ATT&CK, and LLM chapters. 186 techniques, 36 tools, 33 defenses across 37 chapters. Includes adversarial bisimulation games with Ungar (order-dependent) and join-semilattice structures. AAIF-compatible multiplayer agent games for human-agent security exercises.
bluesky-jetstream
Bluesky Jetstream Firehose Skill
bmorphism-diagrams
bmorphism Diagrams
bmorphism-interactome
GitHub interactome explorer for bmorphism/plurigrid ecosystem. Maps collaborations across AlgebraicJulia, Topos Institute, Anthropic, and MCP servers. Use for discovering cobordisms between research communities.
bob
World BOB Skill
braindance-worlds
GF(3)-conserved distribution of Claude threads across Aptos worlds
brand-guidelines
Apply brand colors and typography to artifacts. Use when brand colors,
browser-history-acset
Browser History ACSet
buberian-relations
Buberian Relations Skill
building-adversary-infrastructure-tracking-system
Build an automated system to track adversary infrastructure using passive DNS, certificate transparency, WHOIS data, and IP enrichment to map and monitor threat actor command-and-control networks.
building-attack-pattern-library-from-cti-reports
Extract and catalog attack patterns from cyber threat intelligence reports into a structured STIX-based library mapped to MITRE ATT&CK for detection engineering and threat-informed defense.
building-automated-malware-submission-pipeline
>
building-c2-infrastructure-with-sliver-framework
Build and configure a resilient command-and-control infrastructure using BishopFox's Sliver C2 framework with redirectors, HTTPS listeners, and multi-operator support for authorized red team engagements.
building-cloud-siem-with-sentinel
>
building-detection-rule-with-splunk-spl
Build effective detection rules using Splunk Search Processing Language (SPL) correlation searches to identify security threats in SOC environments.
Page 313 of 1445 · 72248 results