Researchers Security
Skill Verified ActiveResearches malware analysis, CVEs, attribution reports, and hacker community sources. Use when the album subject involves cybersecurity incidents or threat actors.
To provide detailed and verified cybersecurity research for projects involving incidents or threat actors, going beyond general LLM capabilities.
Features
- Researches malware analysis reports
- Investigates CVE details and exploit documentation
- Analyzes attribution reports and hacker community sources
- Follows a structured source hierarchy for reliable information
- Documents findings with full citations and flags items for verification
Use Cases
- Use when researching cybersecurity incidents for music projects.
- Use when investigating specific CVEs and their technical details.
- Use when understanding threat actors and their methodologies.
- Use when gathering background information on hacker communities or historical breaches.
Non-Goals
- Performing live system intrusion or penetration testing.
- Providing real-time threat hunting or incident response.
- Generating legal advice or definitive attribution without human verification.
Installation
First, add the marketplace
/plugin marketplace add bitwize-music-studio/claude-ai-music-skills/plugin install claude-ai-music-skills@bitwize-musicQuality Score
VerifiedTrust Signals
Similar Extensions
Find Cybersecurity Firm
100Use whenever the user wants to find, shortlist, vet, or enrich US cybersecurity firms — pen-testing/red team, security audits, vCISO, SOC 2 readiness, incident response, managed SOC, IAM, cloud security, and AppSec. Triggers on "find me a pen-testing firm for our SOC 2 audit", "shortlist three vCISO services for our healthcare-tech startup", "we need an incident response retainer", or "pull contact info for these 8 security firm domains", even when described indirectly (we got breached, prepare us for the compliance audit, get us SOC 2 ready). Drives the ServiceGraph API (api.servicegraph.co) — a 100k+ US firm catalog filterable by industry, services, location, size, ratings. Skip in-house security hires, "how do I patch CVE-X" or "configure firewall Y" DIY questions, security-product reviews (CrowdStrike vs SentinelOne, etc.), generic security knowledge questions, consumer/personal security advice, non-US firms, individual freelancers and bug-bounty hunters.
External Context
100Invoke parallel document-specialist agents for external web searches and documentation lookup
ARA Research Manager
100Records research provenance as a post-task epilogue, scanning conversation history at the end of a coding or research session to extract decisions, experiments, dead ends, claims, heuristics, and pivots, and writing them into the ara/ directory with user-vs-AI provenance tags. Use as a session epilogue — never during execution — to maintain a faithful, auditable trace of how a research project actually evolved.
Journey Mapping
100Build customer journey maps and service blueprints that visualize the end-to-end user experience including touchpoints, emotions, friction, and underlying systems. Use this skill whenever the user wants to map a customer journey, build a service blueprint, identify friction across an experience, align teams on the user experience, or visualize touchpoints and pain points. Triggers on customer journey, journey map, service blueprint, user journey, experience map, touchpoint analysis, friction map, journey audit, end-to-end experience, customer experience map. Also triggers when the team has departmental views of users but no shared map of what the experience actually feels like.
Manus
100Delegate complex, long-running tasks to Manus AI agent for autonomous execution. Use when user says 'use manus', 'delegate to manus', 'send to manus', 'have manus do', 'ask manus', 'check manus sessions', or when tasks require deep web research, market analysis, product comparisons, stock analysis, competitive research, document generation, data analysis, or multi-step workflows that benefit from autonomous agent execution with parallel processing.
Market Sizing
100TAM/SAM/SOM market sizing analysis. Uses web search and research tools to produce a structured analysis with data sources, assumptions, calculations, and confidence ranges. Triggers on: "calculate TAM", "size the market", "market opportunity".