Skip to main content
Create your own skills to teach me exactly how your team works. Write a playbook once, and I’ll follow it precisely every time the situation calls for it — no repeated instructions, no drift, no guessing. Think of your own skill as your team’s institutional knowledge, packaged so I can act on it. If we run weekly security reviews a certain way, investigate vulnerabilities with a specific checklist, or always notify a particular channel before closing a finding — that’s a skill worth capturing. Your skills follow the Agent Skills open standard, so they’re portable, versioned, and built to last.

How it works

When a conversation starts, I scan the skill catalog and ask: does any skill match what’s being asked? If yes, I load it immediately and follow the playbook it defines — before doing anything else. This means your custom workflows run consistently, every time, without anyone having to remind me.

Creating your own skill

Go to Settings → Pleri Skills and click New skill. You’ll need:
  • Name — a short slug used to identify the skill, e.g. weekly-k8s-review
  • Display name — the human-readable label shown in the UI, e.g. Weekly Kubernetes review
  • Description — the most important field. This is what I read to decide when to load the skill. Be specific about what triggers it and what it should not be used for
  • Instructions — the full playbook I follow once the skill is loaded. Use clear, step-by-step language
A good description includes explicit trigger phrases and an exclusion line. For example: “Use for weekly Kubernetes security reviews. Do NOT use for ad hoc cluster questions or one-off CVE lookups.”

Skill scope

Every skill has a scope that controls who can see and use it:
  • User — private to you. Only you can see, edit, and trigger this skill. Great for personal workflows, experiments, or role-specific playbooks you don’t need to share
  • Tenant — shared across your entire organization. Only admins can create or modify tenant skills, but they apply to every user automatically. Use these for agreed-upon team processes like escalation procedures or compliance checks
Tenant skills take precedence over user skills. If a user skill and a tenant skill share the same name, the tenant skill wins. This means admins can enforce organization-wide standards that individual users can’t accidentally override.
Start with a user-scoped skill to iterate quickly, then promote it to tenant scope once the team agrees on the process.

Template skills

Not sure where to start? The skill template gallery gives you pre-built playbooks you can install with one click. Each template is a fully written skill covering a common security workflow, ready to use out of the box or customize to fit your team. Go to Settings → Pleri Skills and click Templates to browse the gallery. Available templates include:
TemplateWhat it does
Incident Response RunbookStructured incident response following NIST SP 800-61 and SANS frameworks
Executive Risk ReportCxO-level risk summaries with trend analysis
Compliance AuditAudit against SOC 2, ISO 27001, PCI-DSS, NIST CSF, CIS Benchmarks, and HIPAA
Vulnerability TriageCVE investigation with CVSS scoring and composite risk assessment
Brand GuideEnforce brand voice, formatting, and terminology standards in reports
Weekly Security DigestStructured weekly summaries with metrics and trends
When you install a template, it creates a user-scoped copy you own. You can rename it, edit the instructions, attach your own files, or change the scope to tenant — the template is just a starting point.

Importing skills

You can import skills from external sources instead of building them from scratch. This is useful for sharing skills across teams, pulling in community playbooks, or migrating skills between environments.

Import from a zip file

Go to Settings → Pleri Skills and click Import. Upload a .zip file containing a SKILL.md at the root. The SKILL.md file uses frontmatter to define the skill metadata:
---
name: my-custom-skill
description: Use when asked to run a custom security check.
instructions: |
  1. Pull all open findings from the last 7 days
  2. Group by severity
  3. Post a summary to Slack
---
Any other files in the zip (scripts, references, assets) are automatically uploaded and attached to the skill.

Import from GitHub

You can also import directly from a GitHub repository URL. Just paste the repo URL and I’ll pull the skill definition from it. Supported formats:
  • https://github.com/owner/repo — imports from the repo root
  • https://github.com/owner/repo/tree/branch/subdirectory — imports from a specific subdirectory
The repository must contain a SKILL.md file at the target location.
If an imported skill has the same name as an existing skill, a numeric suffix is added automatically (e.g., my-skill becomes my-skill-2) so nothing gets overwritten.

Attaching files

Skills can carry supporting files — scripts, reference documents, or other assets your playbook depends on. Files live in three directories:
DirectoryPurpose
scripts/Executable scripts the skill can reference, e.g. a Python data extraction script
references/Supporting docs, checklists, or runbooks the skill should consult
assets/Other resources, templates, or data files
You can upload files directly from the Pleri Skills settings page, or ask me to create them for you.

Examples

Here are a few examples to show what’s possible.

Branded security reports

One of the most powerful uses of creating your own skills is producing reports that look like they came from your team, not a chatbot. Attach your brand guidelines as a reference file, point me to your logo, and I’ll apply your colour palette, typography, and layout rules every time I generate an HTML report.
Name: branded-security-report
Description: Use when asked to generate a security report, executive summary, or
  board-ready output. Do NOT use for quick chat summaries or Slack messages.

Instructions:
1. Load references/brand-guidelines.md for colour palette, fonts, and layout rules
2. Use the logo at https://cdn.example.com/logo/plerion-logo.png in the header
3. Structure the report with: executive summary, key findings, risk breakdown, recommended actions
4. Apply the primary colour (#FF6B35) to headings and severity badges
5. Include a footer with the report date and "Confidential — internal use only"
6. Output as HTML, ready to print or export to PDF
Attach your brand guidelines as references/brand-guidelines.md and I’ll read them every time this skill loads. Logos are referenced by URL for now — link to your CDN or any publicly accessible image.

Weekly Kubernetes security review

Name: weekly-k8s-review
Description: Use when asked to run a weekly Kubernetes security review. Covers
  cluster misconfigurations, RBAC risks, pod security, and image vulnerabilities.
  Do NOT use for ad hoc cluster questions.

Instructions:
1. Pull all open Kubernetes findings from the last 7 days
2. Group by severity: critical, high, medium
3. For each critical finding, check if a Jira ticket already exists — create one if not
4. Summarise the top 5 risks with recommended next steps
5. Post a summary to #security-reviews in Slack

CVE triage for Python services

Name: python-cve-triage
Description: Use when asked to triage or investigate a CVE affecting our Python
  services. Do NOT use for non-Python languages or general CVE lookups.

Instructions:
1. Search our code repositories for the affected package and version
2. List all impacted services with their current version and owner
3. Assess exploitability — is this actually reachable in our environment?
4. Draft a Jira ticket for each affected service with severity, impact, and a fix recommendation
5. Flag any service in production as P1

Production finding escalation

Name: prod-finding-escalation
Description: Use when a critical or high finding is detected in a production account.
  Triggers on phrases like "production finding", "prod alert", or "escalate finding".
  Do NOT use for staging or dev environments.

Instructions:
1. Confirm the finding is in a production-tagged account
2. Assess blast radius — what assets are affected?
3. Create a Jira P1 ticket assigned to the on-call engineer
4. Send a Slack message to #security-incidents with the finding summary and ticket link
5. Set a follow-up task to check status in 24 hours

Working with skills conversationally

You can also ask me to create, update, or manage skills directly in chat:
Create a skill that runs a daily check on our S3 buckets for public access.
It should notify #cloud-security if anything is found.
Show me all our skills and their current status.
Update the python-cve-triage skill to also check our Bitbucket repositories.

Smarter questions, better guidance

When a skill needs input from you before proceeding, I’ll ask structured questions with clear options to choose from. Each option includes a short label and a description explaining the trade-offs, so you can make an informed decision quickly. When it helps, I’ll show side-by-side previews of code snippets or configurations so you can visually compare approaches. You’ll also see contextual nudges throughout the UI that suggest relevant skills, highlight best practices, and guide you toward the right workflow for the task at hand.

Disabling a skill

If a skill is no longer relevant, you can disable it from the Pleri Skills settings page. Disabled skills stay saved but won’t appear in the catalog or be loaded by me — so you can safely pause them without losing the playbook.

Limitations

  • Text files only: Skill files currently support text-based formats — .md, .txt, .py, .sh, .js, .ts, .json, .yaml, .yml, .csv, .html, and .css. Binary files such as images, PDFs, and office documents are not supported yet. For logos and images, reference them by URL in your skill instructions instead.
  • File size: Individual files are capped at 400KB.
  • Logos by URL: Logo and image assets must be hosted externally and referenced as a URL in the skill instructions or brand guidelines file.