These are just starter examples you’ll find in the UI. Clone them, tweak them, or toss them and build your own with prompts, workflows, knowledge sources, agents, and MCP-connected tools.

  • CVEs Chart – Map CVEs and their relationships at a glance. Handy for briefings and “what touches what” checks.
  • Deobfuscate – Strip layers from scripts: decode strings and explain the steps in plain English.
  • Create Workflow – Automate a playbook: chain tools, agents, and MCPs; run it on demand; share it with the team/community.
  • APT Threat Report – Pull from VirusTotal and friends; correlate likely IoCs; output a concise report with sources and caveats.
  • Hash Research – Pivot from a hash across engines and intel: related samples, URLs, families, overlays, keep the trail (notes + provenance) tidy.

These are examples, not limits. The good stuff comes from what you and the community build next.