ib_trade-analysis
Skill: ib_trade-analysis
Purpose
This skill generates a high-conviction, 8-day directional forecast score (-100 to +100) for a curated universe of AI infrastructure and platform stocks. It fuses OSINT intelligence with recent price structure and relative strength.
Core Mandates
- Asymmetric Probability Only: Do not trade "good" stocks. Trade when the next 8-day probability distribution is asymmetric and catalyst-driven.
- AI-Supercycle Focus: Prioritize GPU/accelerator stack (NVDA, AMD), foundry (TSM), and hyperscalers (MSFT, GOOG, AMZN).
- 8-Day Window: All forecasts and trades are designed for a 24-hour to 8-day horizon.
1. Forecast Engine (Score: -100 to +100)
Every Monday (U.S. Open), generate a score based on these weights:
- 50% OSINT Catalyst: Measure the strength of recent AI-related news, capex changes, supply chain wins, or regulatory headwinds.
- 25% Price Structure (8-Day): Analyze only the last 8 trading days. Focus on higher highs/lows, daily closes, and volume.
- 15% Relative Strength: Compare the stock against the NASDAQ-100 and its sector peers.
- 10% Event/Risk: Factor in earnings, conferences, and macro shocks.
2. Universe Tiers
- Tier A (Momentum): NVDA, TSM, AVGO, MU, AMD, ORCL (Primary longs).
More from crtvrffnrt/skills
pentest-xss
Security assessment skill for Cross-Site Scripting (XSS) vulnerabilities. Use when investigating input sanitization, reflected, stored, DOM, or blind XSS. Focuses on discovery, exploitation, and payload optimization. Do not use for generic network recon or non-web injection types.
42pentest-exploit-execution-payload-control
Security assessment skill for deterministic exploit execution from validated primitives. Use when prompts include exploit implementation, payload hardening, chaining confirmed weaknesses, post-exploitation proof, or controlled impact demonstration. Do not use for early-stage reconnaissance, speculative hypothesis generation, or report-only requests.
34pentest-recon-surface-analysis
Security assessment skill for reconnaissance, endpoint/service enumeration, and attack-surface mapping. Use when prompts include recon, enumerate, map endpoints, discover assets, inventory interfaces, fingerprint technologies, or identify control-plane surfaces. Do not use when the request is exploit development, payload execution, or final report writing only.
33pentest-business-logic-abuse
Security assessment skill for business workflow abuse, state-machine manipulation, and control-plane logic flaws. Use when prompts include workflow bypass, race condition, replay, quota abuse, order-of-operations flaws, delegated execution abuse, or unauthorized state transitions. Do not use for pure input injection fuzzing, broad recon, or standalone report formatting tasks.
32pentest-gemini-az
Use when users need an Azure, Microsoft 365, or Entra ID companion that reads, lists, changes, and manages resources using the current Azure CLI session, with `az rest` as the default execution path.
29pentest-outbound-interaction-oob-detection
Security assessment skill for outbound interaction and out-of-band (OOB) validation. Use when prompts include SSRF callback confirmation, blind XSS beacons, webhook abuse, XXE/OOB behavior, DNS/HTTP callback correlation, or asynchronous server-side interaction proof. Do not use when vulnerabilities are fully in-band and require no external callback correlation.
28