Loading...
Loading...
Found 323 Skills
Multi-cloud security assessment skill for AWS, Azure, and GCP. This skill should be used when performing cloud security audits, scanning for misconfigurations, testing IAM policies, auditing storage permissions, and identifying privilege escalation paths. Triggers on requests to audit cloud security, scan AWS/Azure/GCP, check cloud misconfigurations, or perform cloud penetration testing.
Cloud security posture management and container security assessment for AWS, Azure, GCP, and Kubernetes.
Cloud & AI FinOps advisory skill. Structured cost optimization using the FinOps Foundation framework. Covers AWS, Azure, GCP, OCI, AI inference, and data platforms (Databricks, Snowflake). Use for: cloud costs, cost optimization, cloud spend, AI costs, cloud bill, FinOps assessment, GreenOps, right-sizing, commitment strategy, tagging governance.
Cloud infrastructure design and deployment patterns for AWS, Azure, and GCP. Use when designing cloud architectures, implementing IaC with Terraform, optimizing costs, or setting up multi-region deployments.
Execute Microsoft Graph API calls against Microsoft 365 tenants. Use when the user asks about Microsoft 365 data including users, groups, mail, calendar, Teams, SharePoint, OneDrive, Intune, Entra ID, or any Azure AD / Microsoft 365 administration task.
Use when migrating from AWS S3, Google Cloud Storage, or Azure Blob to Tigris — shadow buckets, bulk copy, SDK endpoint swap, zero-downtime migration
Configure an MCP server for GitHub Copilot with your Dataverse environment.
Use when generating multiple SDK variants from one repository. Covers workflow.yaml multi-target configuration, per-target gen.yaml, monorepo structure, versioning strategies. Triggers on "multi-target SDK", "multiple SDK variants", "Azure SDK variant", "GCP SDK", "cloud-specific SDK", "SDK monorepo".
Search and fetch Microsoft Learn documentation
Professional Skills and Methodologies for Cloud Security Audits
Detect compromised O365 and Google Workspace email accounts by analyzing inbox rule creation, suspicious sign-in locations, mail forwarding rules, and unusual API access patterns via Microsoft Graph and audit logs.