Skill Packages
Browse ready-made AI workflow skills for document elaboration, review, and structuring.
Risk Tolerance Quantifier
Draft and validate a Cybersecurity Risk Appetite Statement (NIST CSF 2.0 GV.OC): translate board mandates into quantifiable tolerance levels and KPIs; ensure stated appetite is supported by budget narratives.
Learn MoreRTB Notice Expert — Notice of Termination & Rent Review
Prepare and validate Notice of Termination and Rent Review documentation for Ireland under the Residential Tenancies Board (RTB). Ensures Rent Pressure Zone (RPZ) and comparable market rent rules (3 comparables, advertised within 4 weeks) are met. Includes comparable_market_rent_audit validation.
Safe Harbor Drafter (CISA CPG 5.1 VDP)
Draft and validate a Vulnerability Disclosure Policy (VDP) with CISA-aligned Safe Harbor language and RFC 9116–compliant reporting. Ensures researcher protection and clear reporting mechanism.
Learn MoreSandbox Compliance Expert
Elaboração de propostas para sandbox regulatório e contratos de inovação (CVM, BCB, SUSEP). Define critérios de saída segura e limites de operação; valida proteção ao consumidor e responsabilidade civil conforme LC 182/2021.
Learn MoreSaudi PDPL — Personal Data Protection Assessment
Draft and validate data protection compliance documentation under Saudi Arabia's Personal Data Protection Law (Royal Decree M/19 of 2021, amended 2023) and its Implementing Regulations. Covers data inventory, consent, cross-border transfers, and 72-hour breach notification.
Learn MoreSBOM Lifecycle Drafter
Draft and maintain the SBOM Management Procedure aligned with NIST CSF 2.0 ID.AM. Covers ingestion, validation, and monitoring of SBOMs; Vulnerability Disclosure when NVD flags a component; and developer Attestation of Security. Validates procedure and SBOM files against CycloneDX/SPDX.
Learn MoreSBOM Risk Scorer
CISA CPG 6.1 Supply Chain SBOM Review: analyze CycloneDX or SPDX SBOMs for Vulnerability Debt and gatekeeping evidence. Summarizes vulnerability debt and flags EOL and critical-CVE components for Accept/Reject decisions.
Learn MoreSBOM Vulnerability Mapper
Generate and validate a Software Bill of Materials (SBOM) and draft CRA-compliant technical documentation for connected products in the EU market. Checks software components against the NIST NVD for known critical vulnerabilities. Covers product classification, Annex I essential cybersecurity requirements, vulnerability handling, conformity assessment, and ENISA reporting readiness.
Learn MoreSDLC Control Drafter (ISO 27001 A.8.28)
Draft and maintain ISO 27001-aligned Secure Development Lifecycle (SDLC) policy: Security by Design, Security by Default, and security gates (SAST/DAST, peer review, threat modeling). Includes OWASP Top 10 alignment check for web and API risks.
Learn MoreSEC 10-K — MD&A and Financial Statement Notes Drafter
Draft and validate the Management Discussion & Analysis (MD&A) section and key financial statement footnotes of the SEC Form 10-K annual report. Ensures compliance with Regulation S-K Items 303–305, SEC interpretive guidance, and PCAOB expectations for critical accounting estimates and risk factors.
Learn MoreSEC DEF 14A (Proxy Statement)
Draft and validate annual meeting proxy statements for U.S. domestic issuers: meeting and voting mechanics, proposals, director nominees, beneficial ownership, executive compensation (scaled for SRC/EGC), audit matters, and Part III 10-K incorporation mapping.
Learn MoreSEC Form 10-Q (Quarterly Report)
Generate and validate quarterly Form 10-Q narrative sections and checklists, with delta-focused updates, Risk Factors (material changes only), Legal Proceedings, Controls and Procedures, and consistency checks.
Learn More