Skill Library
Browse IronClaw Skills and Tools
Search repo-backed skills, WASM tools, and public Iliad skills from one catalog.
Skill Library
Search repo-backed skills, WASM tools, and public Iliad skills from one catalog.
IronClaw prompt skill: browser-control
Logo construction, brand systems, multi-platform guidelines, asset specifications, and visual identity refresh strategies.
Everything needed to spec, wire, test, and ship a repo-backed agent.
"Build agents with clear APIs, docs, prompts, and release checks."
Video scripting frameworks, podcast episode planning, show notes, guest research, multimedia repurposing, and content calendar management.
UX heuristics, user research methods, information architecture, wireframing, interaction patterns, mobile-first design, and conversion optimization.
Production TypeScript guidance covering strict type system, advanced generics, discriminated unions, type narrowing, Zod validation, and type-safe database access.
A focused bundle for app hardening, compliance, access, and risk review.
"Run practical security checks before installing or publishing tools."
Multi-city itinerary optimization, flight booking strategies, visa requirements, packing lists, and contingency planning for travel.
Threat modeling and security architecture using STRIDE, DREAD, attack trees, data flow diagrams, trust boundaries, and risk-driven control selection.
API documentation, user guides, READMEs, SOPs, knowledge base articles, release notes, and docs-as-code workflows.
NEAR operations, market intelligence, public data, and research workflows.
"Inspect chain state, monitor markets, and turn data into decisions."
Identify high-probability trade entries and exits using price action, chart patterns, technical indicators, volume confirmation, and multi-timeframe confluence.
Break goals into actionable tasks with smart prioritization, dependency-aware planning, time estimation, and progress tracking frameworks.
Carbon footprint calculation, lifecycle analysis, renewable energy sizing, circular economy frameworks, and ESG reporting methodologies.
User research, accessibility, visual identity, product strategy, and UX.
"Shape clearer products from research through launch-ready design assets."
Demand forecasting, inventory optimization, logistics routing, vendor management, and supply chain disruption planning.
Master audience-specific communication strategies for stakeholders across organizational levels including mapping, status reporting, executive summaries, RACI matrices, and difficult conversations.
Guide learners through Socratic questioning, misconception diagnosis, scaffolding, and productive struggle to build deep conceptual understanding.
Planning, brand, writing, video, podcast, and campaign production tools.
"Turn product ideas into consistent launch, content, and media assets."
Build platform-native social content strategies with algorithmic optimization, cross-platform repurposing, engagement-driven distribution, and paid amplification across Twitter/X, LinkedIn, Instagram, TikTok, and YouTube.
Smart contract security auditing covering vulnerability taxonomy, static analysis, invariant testing, formal verification, exploit pattern analysis, and remediation for EVM and NEAR.
Build organic visibility through data-driven keyword research, technical SEO optimization, content strategy, link building, and measurable organic growth.
Planning, finance, Microsoft 365, spreadsheets, and operating cadence.
"Coordinate business workflows across docs, meetings, sheets, and plans."
Docker Compose stacks, media servers, home automation, monitoring, backup strategies, and privacy-focused self-hosted services.
Production Rust development guidance covering ownership, borrowing, error handling, async Tokio, trait design, unsafe code, and performance optimization.
Property valuation, rental yield analysis, mortgage amortization, 1031 exchanges, cap rates, and comparative market analysis.
Production React and Next.js guidance covering App Router, Server Components, server/client boundaries, data fetching, state management, and streaming SSR.
Document chunking strategies, embedding models, vector databases, hybrid search, re-ranking, RAGAS evaluation, and RAG pipeline design.
Production Python guidance covering type safety, Pydantic v2, FastAPI services, async patterns, pytest testing, virtual environments, and performance profiling.
Master pandas, NumPy, and data wrangling at scale covering I/O optimization, dtype strategy, cleaning workflows, EDA patterns, aggregations, joins, and memory-efficient pipelines for large datasets.
GDPR, CCPA/CPRA, and HIPAA compliance implementation covering lawful processing, consent management, privacy impact assessments, data subject rights, and breach notification protocols.
Narrative arc structure, one-idea-per-slide principles, speaker notes, visual storytelling, and delivery coaching for presentations.
Apply Modern Portfolio Theory, tactical rebalancing, risk metrics, Kelly criterion position sizing, and tax optimization to portfolios from $50K to $5M.
Create investor-ready pitch decks with problem-solution narrative, market sizing, traction metrics, and stage-specific formatting for pre-seed through Series B fundraising.
Step-by-step physics problem solving covering classical mechanics, electromagnetism, thermodynamics, waves, and quantum mechanics fundamentals.
Budgeting frameworks, expense tracking, debt payoff strategies, emergency funds, retirement planning, and tax optimization basics.
Authorized penetration testing methodology covering reconnaissance, enumeration, exploitation, privilege escalation, and reporting with OWASP Top 10 focus.
Analyze options Greeks, pricing models, strategy selection, volatility regimes, and risk management for equity and index derivatives trading.
Open source license evaluation, compatibility analysis, SBOM generation, CLA/DCO workflows, and compliance auditing across permissive and copyleft licenses.
Design and execute quarterly OKRs that align company strategy to measurable outcomes with cascading frameworks, scoring rubrics, dependency mapping, and cross-functional alignment workshops.
Evidence-based nutrition planning with macro/micro calculations, meal prep, dietary needs assessment, and budget-aware recipe guidance.
TCP/IP fundamentals, DNS configuration, firewall rules, VPN setup, reverse proxy, SSL/TLS certificates, and network troubleshooting.
Principled negotiation, BATNA analysis, framing techniques, diplomatic language, conflict de-escalation, and stakeholder communication.
DAW workflows, mixing techniques, mastering chains, sound design, synthesis, and genre-specific production patterns.
Multi-agent design patterns including hierarchical, sequential, parallel fan-out, swarm, context isolation, and cost optimization strategies.
Experiment tracking, model serving, CI/CD for ML, drift detection, feature stores, and containerized ML deployment on Kubernetes.
Select, evaluate, and tune ML models with rigorous cross-validation, metric design matched to business objectives, and production readiness assessment.
CBT-informed thought reframing, mindfulness exercises, mood tracking, stress management techniques, and sleep hygiene guidance.
Translate medical jargon, lab results, clinical documentation, and diagnostic codes into plain language for patient understanding.
Stress analysis, beam deflection, fatigue life, heat transfer, fluid dynamics, material selection, and FEA setup for mechanical design.
Interpret economic indicators, model business cycles, translate monetary and fiscal policy into portfolio positioning, and identify recession signals before they cascade through markets.
Model selection, LoRA/QLoRA configuration, training data preparation, evaluation benchmarks, quantization, and local deployment for LLM fine-tuning.
Systemd service management, filesystem hierarchy, package management, Bash scripting, SELinux policies, and kernel tuning for Linux administration.
Analyze junior exploration and development-stage mining companies by evaluating drill results, NI 43-101 reports, geological risk, management execution, financing dilution, and commodity fundamentals.
Strategic IP protection advisor for patents, trademarks, copyrights, trade secrets, freedom-to-operate analysis, portfolio strategy, and international IP due diligence.
Security incident response leadership covering NIST 800-61 lifecycle, evidence preservation, malware triage, forensic analysis, communication protocols, and post-incident metrics.
Habit formation science, cue-routine-reward loops, streak tracking, time management techniques, and accountability frameworks.
Production Go guidance covering goroutine concurrency, channels, errgroup, error handling, interface design, HTTP services, table-driven testing, and profiling.
Genealogical research methodology, historical record identification, source citation standards, DNA analysis, and breaking through brick walls.
Gameplay programming, physics systems, level design, shaders, optimization, and engine-specific patterns for Unity, Unreal, and Godot.
Generate evidence-based flashcards optimized for spaced repetition, minimum information principle, cloze deletion, and Anki-compatible formatting.
Personalized workout programming with periodization, progressive overload, recovery protocols, and exercise selection for strength, hypertrophy, and endurance goals.
Build investment theses from SEC filings, financial statements, and competitive analysis with moat evaluation, multi-method valuation, and accounting red flag detection.
Architect high-performing email campaigns with list segmentation, subject line optimization, drip sequence design, A/B testing, automation workflows, deliverability management, and CAN-SPAM/GDPR compliance.
Circuit design, component selection, PCB layout, signal integrity, EMI/EMC compliance, and design-for-manufacturing best practices.
Build scalable design systems with token architecture, component libraries, atomic design, naming conventions, and adoption strategies.
DeFi protocol design covering AMM mechanics, lending markets, yield strategies, oracle integration, flash loans, MEV protection, and tokenomics modeling.
Database design and optimization guidance covering schema modeling, indexing strategies, EXPLAIN analysis, N+1 prevention, connection pooling, zero-downtime migrations, and database selection.
DAO governance system design covering voting mechanisms, proposal lifecycles, treasury management, delegation, attack resistance, and governance frameworks like Governor and Snapshot.
Design standards-aligned curricula using backward design, Bloom's taxonomy, differentiated instruction, assessment rubrics, and lesson planning.
Apply persuasive copywriting frameworks like AIDA, PAS, and BAB with conversion-focused strategies for landing pages, email sequences, ad campaigns, and CTAs.
Contract clause analysis and risk identification for SaaS, NDA, employment, and licensing agreements with negotiation leverage guidance.
System prompt architecture, few-shot patterns, chain-of-thought reasoning, context window management, prompt defense, and tool-use orchestration for LLMs.
Adaptive explanation techniques using Feynman method, analogy-based learning, scaffolding, and complexity ladders for any audience level.
Quantify competitive dynamics, market positioning, and defensible gaps using Porter's Five Forces, SWOT, feature matrices, win/loss analysis, and market sizing frameworks.
Color theory, harmony systems, palette generation, type pairing, contrast ratios, and typographic hierarchy for digital design.
Systematic code review methodology covering security vulnerabilities, performance bottlenecks, SOLID principles, refactoring techniques, and PR review workflows.
Cloud security and compliance covering IAM policies, network segmentation, secrets management, encryption, container security, logging, and audit across AWS, GCP, and Azure.
Organic and inorganic chemistry, reaction mechanisms, stoichiometry, spectroscopy interpretation, and lab protocols.
Parametric modeling, assemblies, GD&T tolerancing, generative design, 3D printing preparation, and CAD best practices.
Architect defensible business plans with market sizing, unit economics, financial projections, sensitivity analysis, and investor-ready positioning.
Brand voice documentation including tone attributes, vocabulary guidelines, audience personas, messaging pillars, and voice consistency audits.
Application security hardening covering OWASP ASVS, secure coding patterns, DevSecOps pipelines, dependency scanning, secrets management, and security headers.
API design guidance covering REST, GraphQL, gRPC, and tRPC protocol selection, resource modeling, pagination, versioning, error formats, rate limiting, and webhooks.
Output evaluation, hallucination detection, bias assessment, red-teaming, guardrails, content filtering, and EU AI Act compliance for AI systems.
Prescribe agile framework choices, ceremony discipline, estimation rigor, and diagnose dysfunction in Scrum, Kanban, and scaled agile adoption.
WCAG 2.2 compliance guide covering POUR principles, semantic HTML, keyboard navigation, ARIA patterns, contrast ratios, and screen reader testing.
Essay structure, thesis development, APA/MLA/Chicago citations, literature reviews, argument construction, and peer review methodology.