Initial commit

This commit is contained in:
Zhongwei Li
2025-11-29 18:50:55 +08:00
commit c87f7cab7b
8 changed files with 169 additions and 0 deletions

View File

@@ -0,0 +1,52 @@
---
name: detecting-data-anomalies
description: |
This skill empowers Claude to identify anomalies and outliers within datasets. It leverages the anomaly-detection-system plugin to analyze data, apply appropriate machine learning algorithms, and highlight unusual data points. Use this skill when the user requests anomaly detection, outlier analysis, or identification of unusual patterns in data. Trigger this skill when the user mentions "anomaly detection," "outlier analysis," "unusual data," or requests insights into data irregularities.
allowed-tools: Read, Bash, Grep, Glob
version: 1.0.0
---
## Overview
This skill allows Claude to utilize the anomaly-detection-system plugin to pinpoint unusual data points within a given dataset. It automates the process of anomaly detection, providing insights into potential errors, fraud, or other significant deviations from expected patterns.
## How It Works
1. **Data Analysis**: Claude analyzes the user's request and the provided data to understand the context and requirements for anomaly detection.
2. **Algorithm Selection**: Based on the data characteristics, Claude selects an appropriate anomaly detection algorithm (e.g., Isolation Forest, One-Class SVM).
3. **Anomaly Identification**: The selected algorithm is applied to the data, and potential anomalies are identified based on their deviation from the norm.
## When to Use This Skill
This skill activates when you need to:
- Identify fraudulent transactions in financial data.
- Detect unusual network traffic patterns that may indicate a security breach.
- Find manufacturing defects based on sensor data from production lines.
## Examples
### Example 1: Fraud Detection
User request: "Analyze this transaction data for potential fraud."
The skill will:
1. Use the anomaly-detection-system plugin to identify transactions that deviate significantly from typical spending patterns.
2. Highlight the potentially fraudulent transactions and provide a summary of their characteristics.
### Example 2: Network Security
User request: "Detect anomalies in network traffic to identify potential security threats."
The skill will:
1. Use the anomaly-detection-system plugin to analyze network traffic data for unusual patterns.
2. Identify potential security breaches based on deviations from normal network behavior.
## Best Practices
- **Data Preprocessing**: Ensure the data is clean, properly formatted, and scaled appropriately before applying anomaly detection algorithms.
- **Algorithm Selection**: Choose an anomaly detection algorithm that is suitable for the type of data and the specific characteristics of the anomalies you are trying to detect.
- **Threshold Tuning**: Carefully tune the threshold for anomaly detection to balance the trade-off between detecting true anomalies and minimizing false positives.
## Integration
This skill can be used in conjunction with other data analysis and visualization tools to provide a more comprehensive understanding of the data and the identified anomalies. It can also be integrated with alerting systems to automatically notify users when anomalies are detected.

View File

@@ -0,0 +1,7 @@
# Assets
Bundled resources for anomaly-detection-system skill
- [ ] visualization_templates/: Contains pre-designed templates for visualizing anomaly detection results.
- [ ] report_templates/: Provides templates for generating anomaly detection reports in various formats (e.g., PDF, HTML).
- [ ] example_datasets/: Includes sample datasets for testing and demonstrating the anomaly detection system.

View File

@@ -0,0 +1,8 @@
# References
Bundled resources for anomaly-detection-system skill
- [ ] anomaly_detection_algorithms.md: Provides a comprehensive overview of different anomaly detection algorithms (e.g., Isolation Forest, One-Class SVM, Local Outlier Factor) and their use cases.
- [ ] data_preprocessing_guide.md: Offers guidance on data cleaning, normalization, and feature engineering techniques to improve anomaly detection accuracy.
- [ ] performance_metrics.md: Explains various performance metrics (e.g., precision, recall, F1-score) for evaluating anomaly detection models.
- [ ] case_studies.md: Presents real-world case studies of anomaly detection applications in different industries.

View File

@@ -0,0 +1,8 @@
# Scripts
Bundled resources for anomaly-detection-system skill
- [ ] data_loader.py: Loads data from various sources (CSV, databases, APIs) into a standardized format for anomaly detection.
- [ ] algorithm_selector.py: Automatically selects the most appropriate anomaly detection algorithm based on the dataset characteristics.
- [ ] anomaly_visualizer.py: Generates visualizations (e.g., scatter plots, histograms) to highlight detected anomalies.
- [ ] report_generator.py: Creates a detailed report summarizing the detected anomalies, their severity, and potential causes.