Fabric
Customization
Before executing, check for user customizations at:
~/.claude/PAI/USER/SKILLCUSTOMIZATIONS/Fabric/
If this directory exists, load and apply any PREFERENCES.md, configurations, or resources found there. These override default behavior. If the directory does not exist, proceed with skill defaults.
Voice Notification
When executing a workflow, do BOTH:
-
Send voice notification:
curl -s -X POST http://localhost:31337/notify \ -H "Content-Type: application/json" \ -d '{"message": "Running the WORKFLOWNAME workflow in the Fabric skill to ACTION"}' \ > /dev/null 2>&1 & -
Output text notification:
Running the **WorkflowName** workflow in the **Fabric** skill to ACTION...
Full documentation: ~/.claude/PAI/DOCUMENTATION/Notifications/NotificationSystem.md
Fabric
Intelligent prompt pattern system providing 240+ specialized patterns for content analysis, extraction, summarization, threat modeling, and transformation.
Patterns Location: Patterns/
Workflow Routing
| Workflow | Trigger | File |
|---|---|---|
| ExecutePattern | "use fabric", "run pattern", "apply pattern", "extract wisdom", "summarize", "analyze with fabric" | Workflows/ExecutePattern.md |
| UpdatePatterns | "update fabric", "update patterns", "sync fabric", "pull patterns" | Workflows/UpdatePatterns.md |
Examples
Example 1: Extract wisdom from content
User: "Use fabric to extract wisdom from this article"
-> Invokes ExecutePattern workflow
-> Selects extract_wisdom pattern
-> Reads Patterns/extract_wisdom/system.md
-> Applies pattern to content
-> Returns structured IDEAS, INSIGHTS, QUOTES, etc.
Example 2: Update patterns
User: "Update fabric patterns"
-> Invokes UpdatePatterns workflow
-> Runs git pull from upstream fabric repository
-> Syncs patterns to local Patterns/ directory
-> Reports pattern count
Example 3: Create threat model
User: "Use fabric to create a threat model for this API"
-> Invokes ExecutePattern workflow
-> Selects create_threat_model pattern
-> Applies STRIDE methodology
-> Returns structured threat analysis
Quick Reference
Pattern Execution (Native - No CLI Required)
Instead of calling fabric -p pattern_name, PAI executes patterns natively:
- Reads
Patterns/{pattern_name}/system.md - Applies pattern instructions directly as prompt
- Returns results without external CLI calls
When to Use Fabric CLI Directly
Only use fabric command for:
-y URL- YouTube transcript extraction-u URL- URL content fetching (when native fetch fails)
Most Common Patterns
| Intent | Pattern | Description |
|---|---|---|
| Extract insights | extract_wisdom |
IDEAS, INSIGHTS, QUOTES, HABITS |
| Summarize | summarize |
General summary |
| 5-sentence summary | create_5_sentence_summary |
Ultra-concise |
| Threat model | create_threat_model |
Security threat analysis |
| Analyze claims | analyze_claims |
Fact-check claims |
| Improve writing | improve_writing |
Writing enhancement |
| Code review | review_code |
Code analysis |
| Main idea | extract_main_idea |
Core message extraction |
Full Pattern Catalog
Browse the Patterns/ directory for the complete list of 240+ patterns organized by category.
Native Pattern Execution
How it works:
User Request → Pattern Selection → Read system.md → Apply → Return Results
Pattern Structure:
Patterns/
├── extract_wisdom/
│ └── system.md # The prompt instructions
├── summarize/
│ └── system.md
├── create_threat_model/
│ └── system.md
└── ...240+ patterns
Each pattern's system.md contains the full prompt that defines:
- IDENTITY (who the AI should be)
- PURPOSE (what to accomplish)
- STEPS (how to process input)
- OUTPUT (structured format)
Pattern Categories
| Category | Count | Examples |
|---|---|---|
| Extraction | 30+ | extract_wisdom, extract_insights, extract_main_idea |
| Summarization | 20+ | summarize, create_5_sentence_summary, youtube_summary |
| Analysis | 35+ | analyze_claims, analyze_code, analyze_threat_report |
| Creation | 50+ | create_threat_model, create_prd, create_mermaid_visualization |
| Improvement | 10+ | improve_writing, improve_prompt, review_code |
| Security | 15 | create_stride_threat_model, create_sigma_rules, analyze_malware |
| Rating | 8 | rate_content, judge_output, rate_ai_response |
Integration
Feeds Into
- Research - Fabric patterns enhance research analysis
- Blogging - Content summarization and improvement
- Security - Threat modeling and analysis
Uses
- fabric CLI - For YouTube transcripts (
-y) and URL fetching (-u) - Native execution - Direct pattern application (preferred)
File Organization
| Path | Purpose |
|---|---|
Patterns/ |
Local pattern storage (240+) |
Workflows/ |
Execution workflows |
Changelog
2026-01-18
- Initial skill creation (extracted from PAI/TOOLS/fabric)
- Native pattern execution (no CLI dependency for most patterns)
- Two workflows: ExecutePattern, UpdatePatterns
- 240+ patterns organized by category
- PAI Pack ready structure
Gotchas
fabric -y URLfor YouTube extraction — don't scrape YouTube pages. fabric handles transcript extraction natively.- Pattern names are exact.
extract_wisdomnotextractwisdom. Checkfabric --listif unsure. - Long content may exceed pattern context limits. For very long inputs, chunk the content or use a summarize pattern first.
Execution Log
After completing any workflow, append a single JSONL entry:
echo '{"ts":"'$(date -u +%Y-%m-%dT%H:%M:%SZ)'","skill":"Fabric","workflow":"WORKFLOW_USED","input":"8_WORD_SUMMARY","status":"ok|error","duration_s":SECONDS}' >> ~/.claude/PAI/MEMORY/SKILLS/execution.jsonl
Replace WORKFLOW_USED with the workflow executed, 8_WORD_SUMMARY with a brief input description, and SECONDS with approximate wall-clock time. Log status: "error" if the workflow failed.
More from danielmiessler/personal_ai_infrastructure
osint
Structured OSINT investigations — people lookup, company intel, investment due diligence, entity/threat intel, domain recon, organization research using public sources with ethical authorization framework. USE WHEN OSINT, due diligence, background check, research person, company intel, investigate, company lookup, domain lookup, entity lookup, organization lookup, threat intel, discover OSINT sources.
259firstprinciples
Physics-based reasoning framework (Musk/Elon methodology) that deconstructs problems to irreducible fundamental truths rather than reasoning by analogy. Three-step structure: DECONSTRUCT (break to constituent parts and actual values), CHALLENGE (classify every element as hard constraint / soft constraint / unvalidated assumption — only physics is truly immutable), RECONSTRUCT (build optimal solution from fundamentals alone, ignoring inherited form). Outputs: constituent-parts breakdown, constraint classification table, and reconstructed solution with key insight. Three workflows: Deconstruct.md, Challenge.md, Reconstruct.md. Integrates with RedTeam (attack assumptions before deploying adversarial agents), Security (decompose threat model), Architecture (challenge design constraints), and Pentesters (decompose assumed security boundaries). Other skills invoke via: Challenge on all stated constraints → classify as hard/soft/assumption. Cross-domain synthesis: solutions from unrelated fields often apply once the fundamental truths are exposed. NOT FOR incident investigation and causal chains (use RootCauseAnalysis). NOT FOR structural feedback loops (use SystemsThinking). USE WHEN first principles, fundamental truths, challenge assumptions, is this a real constraint, rebuild from scratch, what are we actually paying for, what is this really made of, start over, physics first, question everything, reasoning by analogy, is this really necessary.
160documents
Read, write, convert, and analyze documents — routes to PDF, DOCX, XLSX, PPTX sub-skills for creation, editing, extraction, and format conversion. USE WHEN document, process file, create document, convert format, extract text, PDF, DOCX, XLSX, PPTX, Word, Excel, spreadsheet, PowerPoint, presentation, slides, consulting report, large PDF, merge PDF, fill form, tracked changes, redlining.
114council
Multi-agent collaborative debate that produces visible round-by-round transcripts with genuine intellectual friction. All council members are custom-composed via ComposeAgent (Agents skill) with domain expertise, unique voice, and personality tailored to the specific topic — never built-in generic types. ComposeAgent invoked as: bun run ~/.claude/skills/Agents/Tools/ComposeAgent.ts. Two workflows: DEBATE (3 rounds, full transcript + synthesis, parallel execution within rounds, 40-90 seconds total) and QUICK (1 round, fast perspective check). Context files: CouncilMembers.md (agent composition instructions), RoundStructure.md (three-round structure and timing), OutputFormat.md (transcript format templates). Agents are designed per debate topic to create real disagreement; 4-6 well-composed agents outperform 12 generic ones. Council is collaborative-adversarial (debate to find best path); for pure adversarial attack on an idea, use RedTeam instead. NOT FOR parallel task execution across agents (use Delegation skill). USE WHEN council, debate, multiple perspectives, weigh options, deliberate, get different views, multi-agent discussion, what would experts say, is there consensus, pros and cons from multiple angles.
112privateinvestigator
Ethical people-finding using 15 parallel research agents (45 search threads) across public records, social media, reverse lookups. Public data only, no pretexting. USE WHEN find person, locate, reconnect, people search, skip trace, reverse lookup, social media search, public records search, verify identity.
112redteam
Military-grade adversarial analysis that deploys 32 parallel expert agents (engineers, architects, pentesters, interns) to stress-test ideas, strategies, and plans — not systems or infrastructure. Two workflows: ParallelAnalysis (5-phase: decompose into 24 atomic claims → 32-agent parallel attack → synthesis → steelman → counter-argument, each 8 points) and AdversarialValidation (competing proposals synthesized into best solution). Context files: Philosophy.md (core principles, success criteria, agent types), Integration.md (how to combine with FirstPrinciples, Council, and other skills; output format). Targets arguments, not network vulnerabilities. Findings ranked by severity; goal is to strengthen, not destroy — weaknesses delivered with remediation paths. Collaborates with FirstPrinciples (decompose assumptions before attacking) and Council (Council debates to find paths; RedTeam attacks whatever survives). Also invoked internally by Ideate (TEST phase) and WorldThreatModel (horizon stress-testing). NOT FOR AI instruction set auditing (use BitterPillEngineering). NOT FOR network/system vulnerability testing (use a security assessment skill). USE WHEN red team, attack idea, counterarguments, critique, stress test, devil's advocate, find weaknesses, break this, poke holes, what could go wrong, strongest objection, adversarial validation, battle of bots.
112