Change persistent state with checkpoint and rollback support. Use when modifying files, updating databases, changing...
find ~/synaptiai/ -name "*.skill"
Split work across subagents with explicit contracts, interfaces, and merge strategies. Use when parallelizing tasks,...
Assign labels or categories to items based on characteristics. Use when categorizing entities, tagging content,...
Execute a composed workflow by name. Use when running predefined workflows, orchestrating multi-step processes, or...
Create a new artifact (text, code, plan, data) under specified constraints. Use when producing content, writing...
Execute the Debug Code Change workflow end-to-end with safety gates. Use when debugging code changes, investigating...
Watch and report current state of a target system, process, or entity. Use when monitoring status, inspecting live...
Produce a comprehensive audit trail of actions, tools used, changes made, and decision rationale. Use when recording...
Produce clear reasoning with assumptions, causal chains, and evidence. Use when clarifying decisions, teaching...
Compare multiple alternatives using explicit criteria, weighted scoring, and tradeoff analysis. Use when choosing...
Combine heterogeneous data sources into a unified model with conflict resolution, schema alignment, and provenance...
Anchor claims to evidence from authoritative sources. Use when validating assertions, establishing provenance,...
Find failure modes, edge cases, ambiguities, and exploit paths in plans, code, or designs. Use when reviewing...
Quantify values with uncertainty bounds. Use when estimating metrics, calculating risk scores, assessing magnitude,...
Create a safety checkpoint marker before mutation or execution steps. Use when about to modify files, execute plans,...
Break a goal into subgoals, constraints, and acceptance criteria. Use when planning complex work, creating work...
Establish cause-effect relationships between events or states. Use when analyzing root causes, mapping dependencies,...
Identify capability gaps and propose new skills with prioritization. Use when analyzing missing capabilities,...
Enforce policies, guardrails, and permission boundaries; refuse unsafe actions and apply least privilege. Use when...
Request clarification when input is ambiguous. Use when user request has missing parameters, conflicting...