Red team tactics principles based on MITRE ATT&CK. Attack phases, detection evasion, reporting.
Red team tactics principles based on MITRE ATT&CK. Attack phases, detection evasion, reporting.
Red team tactics principles based on MITRE ATT&CK. Attack phases, detection evasion, reporting.
Red team tactics principles based on MITRE ATT&CK. Attack phases, detection evasion, reporting.
Red team tactics principles based on MITRE ATT&CK. Attack phases, detection evasion, reporting.
Red team tactics principles based on MITRE ATT&CK. Attack phases, detection evasion, reporting.
Red team tactics principles based on MITRE ATT&CK. Attack phases, detection evasion, reporting.
Decompose time series into trend, seasonal, and residual components. Use for forecasting, pattern analysis, and seasonality detection.
Do the work. Pre-flight, build, detect drift, salvage if needed. Use when you have a clear aim and are ready to implement.
Scan skills for threats before installing them. Trust scores, threat detection, and security badges for the agentic ecosystem.
Monitor model performance, detect data drift, concept drift, and anomalies in production using Prometheus, Grafana, and MLflow
Expert in detecting private information, secrets, API keys, credentials, and sensitive data in codebases before open sourcing
Automated security validation for OWASP Top 10, CVE detection, and secrets scanning with confidence-scored vulnerability reports.
Claude Code skill for detecting flaky test patterns that cause intermittent CI failures
Convert raw meeting notes to structured markdown or PDF with automatic section detection, action items extraction, and attendee parsing.
Detects violations of Clean Code principles and suggests refactorings. Use when reviewing code quality, improving readability, or refactoring methods, classes, and modules.
Split audio files by detecting silence gaps. Auto-segment podcasts into chapters, remove long silences, and export individual clips.
Implement computer vision tasks including image classification, object detection, segmentation, and pose estimation using PyTorch and TensorFlow
Detect and prevent state-visibility violations across execution contexts within a single transaction.
Run local safety scans on Agent Skills before publishing. Detects secrets, dangerous code patterns, and analyzes required permissions.