Show full session token usage, costs, TLDR savings, and hook activity
Agent Orchestration Rules
Search Mathlib for lemmas by type signature pattern
No Polling for Background Agents
Idempotent Redundancy
Graceful Degradation with Helpful Messages
Search past reasoning for relevant decisions and approaches
Never Use TaskOutput
This skill should be used when the user asks to "pentest AWS", "test AWS security", "enumerate IAM", "exploit cloud infrastructure", "AWS privilege escalation", "S3 bucket testing", "metadata...
OpenAI Codex CLI code review with GPT-5.2-Codex, CI/CD integration
Automated security validation for OWASP Top 10, CVE detection, and secrets scanning with confidence-scored vulnerability reports.
Use when completing tasks, implementing major features, or before merging to verify work meets requirements
Coding patterns and best practices for OneKey development. Use when writing React components, handling promises, error handling, or following code conventions. Triggers on react, component, hooks,...
Google Gemini CLI code review with Gemini 2.5 Pro, 1M token context, CI/CD integration
Automated code review against project conventions (CLAUDE.md) and best practices
Drupal security expertise. Auto-activates when writing forms, controllers, queries, or handling user input. Prevents XSS, SQL injection, and access bypass vulnerabilities.
CVE vulnerability testing coordinator that identifies technology stacks, researches known vulnerabilities, and tests applications for exploitable CVEs using public exploits and proof-of-concept code.
Security patterns for web forms including autocomplete attributes for password managers, CSRF protection, XSS prevention, and input sanitization. Use when implementing authentication forms,...
Documentation specialist for README, API docs, and code comments
This skill should be used when the user asks to "perform SMTP penetration testing", "enumerate email users", "test for open mail relays", "grab SMTP banners", "brute force email credentials", or...