These are just starter examples you’ll find in the UI. Clone them, tweak them, or toss them and build your own with prompts, workflows, knowledge sources, agents, and MCP-connected tools.

- CVEs Chart – Map CVEs and their relationships at a glance. Handy for briefings and “what touches what” checks.
- Deobfuscate – Strip layers from scripts: decode strings and explain the steps in plain English.
- Create Workflow – Automate a playbook: chain tools, agents, and MCPs; run it on demand; share it with the team/community.
- APT Threat Report – Pull from VirusTotal and friends; correlate likely IoCs; output a concise report with sources and caveats.
- Hash Research – Pivot from a hash across engines and intel: related samples, URLs, families, overlays, keep the trail (notes + provenance) tidy.
These are examples, not limits. The good stuff comes from what you and the community build next.