From agent-capability-standard
Determine whether a specific pattern, entity, or condition exists in the given data. Use when searching for patterns, checking existence, validating presence, or finding signals.
npx claudepluginhub synaptiai/synapti-marketplace --plugin agent-capability-standardThis skill is limited to using the following tools:
Scan data sources to determine whether a specified pattern, entity, or condition is present. Detection is binary (present/absent) with associated signal strength.
Guides Next.js Cache Components and Partial Prerendering (PPR) with cacheComponents enabled. Implements 'use cache', cacheLife(), cacheTag(), revalidateTag(), static/dynamic optimization, and cache debugging.
Guides building MCP servers enabling LLMs to interact with external services via tools. Covers best practices, TypeScript/Node (MCP SDK), Python (FastMCP).
Generates original PNG/PDF visual art via design philosophy manifestos for posters, graphics, and static designs on user request.
Scan data sources to determine whether a specified pattern, entity, or condition is present. Detection is binary (present/absent) with associated signal strength.
Success criteria:
Compatible schemas:
schemas/output_schema.yaml| Parameter | Required | Type | Description |
|---|---|---|---|
target | Yes | string|object | The data source to scan (file path, URL, or structured data) |
pattern | Yes | string|regex | The pattern, entity type, or condition to detect |
threshold | No | object | Detection sensitivity settings (e.g., min_matches, confidence_floor) |
scope | No | string | Limit search to specific regions (e.g., "functions", "imports", "comments") |
Define detection criteria: Clarify exactly what constitutes a positive detection
Scan target systematically: Search the target data for matching signals
Evaluate signal strength: For each match, assess how strongly it indicates true presence
Assess false positive risk: Determine likelihood that detections are spurious
Ground claims: Attach evidence anchors to all detection signals
file:line for file-based targetsFormat output: Structure results according to the output contract below
Return a structured object:
detected: boolean # True if pattern/entity was found
target_type: string # What was being detected (e.g., "security vulnerability", "deprecated API")
signals:
- signal: string # Description of what was found
strength: low | medium | high # Signal strength
location: string # file:line or path where found
false_positive_risk: low | medium | high # Likelihood of spurious detection
confidence: number # 0.0-1.0 based on evidence quality
evidence_anchors: array[string] # File:line references
assumptions: array[string] # Explicit assumptions made
next_actions: array[string] # 0-3 suggested follow-ups if uncertain
| Field | Type | Description |
|---|---|---|
detected | boolean | True if the target pattern/entity was found |
target_type | string | Category of what was searched for |
signals | array | List of individual detection signals with strength |
false_positive_risk | enum | Assessment of detection reliability |
confidence | number | 0.0-1.0 based on evidence completeness |
evidence_anchors | array[string] | File:line references or tool outputs |
assumptions | array[string] | Explicitly stated assumptions |
Input:
target: src/api/user_controller.py
pattern: "SQL injection pattern"
threshold:
min_matches: 1
Output:
detected: true
target_type: "SQL injection vulnerability"
signals:
- signal: "String concatenation in SQL query with user input"
strength: high
location: "src/api/user_controller.py:47"
- signal: "Raw SQL execution without parameterization"
strength: medium
location: "src/api/user_controller.py:52"
false_positive_risk: low
confidence: 0.85
evidence_anchors:
- "src/api/user_controller.py:47"
- "src/api/user_controller.py:52"
assumptions:
- "User input flows from request.params to query variable"
- "No input sanitization in calling function"
next_actions:
- "Verify data flow from user input to SQL query"
- "Check for parameterized query alternatives in codebase"
Evidence pattern: Grep for SQL keywords combined with string formatting patterns, then Read to verify context.
Input:
target: src/
pattern: "componentWillMount|componentWillReceiveProps"
scope: "*.jsx,*.tsx"
Output:
detected: true
target_type: "deprecated React lifecycle method"
signals:
- signal: "componentWillMount usage"
strength: high
location: "src/components/Dashboard.jsx:23"
false_positive_risk: low
confidence: 0.95
evidence_anchors:
- "src/components/Dashboard.jsx:23"
assumptions:
- "Project uses React 16.3+ where these methods are deprecated"
next_actions:
- "Migrate to componentDidMount or useEffect hook"
detected boolean matching signal presenceVerification tools: Read (to verify file:line references exist)
mutation: falserequires_checkpoint: falserequires_approval: falserisk: lowCapability-specific rules:
Commonly follows:
inspect - Detection often follows initial observation of a systemsearch - Detection may refine broad search resultsCommonly precedes:
identify - Positive detection often leads to classification of what was foundestimate-risk - Detection of anomalies feeds into risk assessmentplan - Detected issues may trigger remediation planningAnti-patterns:
identify instead)estimate instead)Workflow references:
reference/composition_patterns.md#risk-assessment for detection in risk workflowsreference/composition_patterns.md#observe-model-act for detection in agentic loops