Best use case
iecsat-storage is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
IECsat Storage Skill
Teams using iecsat-storage should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/iecsat-storage/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How iecsat-storage Compares
| Feature / Agent | iecsat-storage | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
IECsat Storage Skill
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
SKILL.md Source
# iecsat-storage Skill
> *"69 bytes of mutual awareness per tile. 3 × 23. Triadic by design."*
## Overview
**IECsat Storage** calculates on-chain storage costs for Plus Code tiles with GF(3)-conserved mutual awareness. Each tile maintains exactly 69 bytes of state.
## The 69-Byte Structure
```
69 = 3 × 23 (triadic decomposition)
┌─────────────────────────────────────────────────────────┐
│ 69-BYTE TILE STATE │
├─────────────────────────────────────────────────────────┤
│ PLUS (+1) │ ERGODIC (0) │ MINUS (-1) │
│ 23 bytes │ 23 bytes │ 23 bytes │
│ GENERATOR │ COORDINATOR │ VALIDATOR │
├────────────────┼────────────────┼──────────────────────┤
│ state_hash │ neighbor_refs │ proof_data │
│ (20 bytes) │ (20 bytes) │ (20 bytes) │
│ trit (1 byte) │ trit (1 byte) │ trit (1 byte) │
│ flags (2 B) │ flags (2 B) │ flags (2 B) │
└────────────────┴────────────────┴──────────────────────┘
Σ(trit) = +1 + 0 + (-1) = 0 ✓ CONSERVED
```
## Plus Code Precision Levels
| Length | Tiles | Resolution | Example |
|--------|-------|------------|---------|
| 2 | 162 | 2,226 km | Global quadrant |
| 4 | 64,800 | 111 km | Country region |
| 6 | 25.9M | 5.6 km | City district |
| 8 | 10.4B | 278 m | City block |
| 10 | 4.1T | 14 m | Building |
| 11 | 83T | 70 cm | Room |
| 13 | 33Q | 14 cm | Object |
| 15 | 13 quint | 5.6 mm | Component |
| 17 | 5.3 sext | 223 μm | Microstructure |
## Storage Cost Analysis (Aptos Mainnet)
```
Pricing assumptions:
- Storage cost: 0.00001 APT per byte
- APT price: $12 USD
- Bytes per tile: 69
Cost formula:
APT = tiles × 69 × 0.00001
USD = APT × 12
```
### Cost Table
| Precision | Tiles | Storage | APT | USD |
|-----------|-------|---------|-----|-----|
| 10-char | 4.15T | 286 TB | 2.86M | $34.3B |
| 11-char | 82.9T | 5.7 PB | 57.2M | $687B |
| 12-char | 1.66Q | 114 PB | 1.14B | $13.7T |
| 13-char | 33.2Q | 2.29 EB | 22.9B | $275T |
| 17-char | 5.31S | 366 ZB | 3.66Q | $44 quint |
## Hierarchical Strategy
```
┌─────────────────────────────────────────────────────────┐
│ ON-CHAIN (APTOS) │
│ 10-char root tiles: 4.1T × 69B = 286 TB │
│ Cost: 2.86M APT ($34B) │
│ Contains: Merkle roots for child tiles │
├─────────────────────────────────────────────────────────┤
│ OFF-CHAIN (ARWEAVE) │
│ 11-17 char tiles: Content-addressed │
│ Proof: Merkle path from root → leaf │
│ Cost: ~$0.005/MB permanent storage │
└─────────────────────────────────────────────────────────┘
```
## Denotation
```
IECsat : PlusCode → (TileState × MerkleProof)
where:
TileState = { plus: 23B, ergodic: 23B, minus: 23B }
MerkleProof = Path from 10-char root to target tile
Invariant: ∀ tile: Σ(trit) ≡ 0 (mod 3)
```
## Practical Applications
### Battery Cell Tracking (238.8B cells)
```
Cells: 238,800,000,000
Storage: 238.8B × 69B = 16.5 TB
APT: 165M APT
USD: $1.98B
Fraction of APT supply: 16.5%
```
### Global Building Coverage (10-char)
```
All buildings worldwide: ~1 billion
Storage: 1B × 69B = 69 GB
APT: 690K APT
USD: $8.3M
```
## Move Implementation
```move
struct TileState has store, copy, drop {
// PLUS (+1) - 23 bytes
generator_hash: vector<u8>, // 20 bytes
generator_trit: u8, // 1 byte
generator_flags: u16, // 2 bytes
// ERGODIC (0) - 23 bytes
coordinator_refs: vector<u8>, // 20 bytes
coordinator_trit: u8, // 1 byte
coordinator_flags: u16, // 2 bytes
// MINUS (-1) - 23 bytes
validator_proof: vector<u8>, // 20 bytes
validator_trit: u8, // 1 byte
validator_flags: u16, // 2 bytes
}
public fun is_gf3_conserved(state: &TileState): bool {
let sum = (state.generator_trit as i8 - 1) + // 2 → +1
(state.coordinator_trit as i8) + // 0 → 0
(state.validator_trit as i8 - 1); // 1 → -1 (adjusted)
sum == 0
}
```
## Commands
```bash
# Calculate storage for N tiles
python3 -c "
tiles = 4_147_200_000_000 # 10-char
bytes_per_tile = 69
apt_per_byte = 0.00001
apt_price = 12
total_bytes = tiles * bytes_per_tile
total_apt = total_bytes * apt_per_byte
total_usd = total_apt * apt_price
print(f'Tiles: {tiles:,}')
print(f'Storage: {total_bytes/1e12:.2f} TB')
print(f'APT: {total_apt/1e6:.2f}M')
print(f'USD: \${total_usd/1e9:.2f}B')
"
```
## GF(3) Triads
```
iecsat-storage (0) ⊗ aptos-gf3-society (+1) ⊗ merkle-validation (-1) = 0 ✓
iecsat-storage (0) ⊗ plus-codes (+1) ⊗ content-addressing (-1) = 0 ✓
```
---
**Skill Name**: iecsat-storage
**Type**: Storage Cost Estimation / On-Chain Economics
**Trit**: 0 (ERGODIC - COORDINATOR)
**GF(3)**: Mediates between tile generation and validation
## Scientific Skill Interleaving
This skill connects to the K-Dense-AI/claude-scientific-skills ecosystem:
### Graph Theory
- **networkx** [○] via bicomodule
- Universal graph hub
### Bibliography References
- `general`: 734 citations in bib.duckdb
## Cat# Integration
This skill maps to Cat# = Comod(P) as a bicomodule in the Prof home:
```
Trit: 0 (ERGODIC)
Home: Prof (profunctors/bimodules)
Poly Op: ⊗ (parallel composition)
Kan Role: Adj (adjunction bridge)
```
### GF(3) Naturality
The skill participates in triads where:
```
(-1) + (0) + (+1) ≡ 0 (mod 3)
```
This ensures compositional coherence in the Cat# equipment structure.Related Skills
storage-reclaim
Rapidly find and reclaim disk storage by identifying build artifacts, git garbage, temp files, and other space hogs. Use when disk is full or running low on space.
secure-storage-template
Boilerplate code templates for Tizen KeyManager integration. Generates C/C#/.NET code for password-protected secure data storage.
performing-cloud-storage-forensic-acquisition
Perform forensic acquisition and analysis of cloud storage services including Google Drive, OneDrive, Dropbox, and Box by collecting both API-based remote data and local sync client artifacts from endpoint devices.
exploiting-insecure-data-storage-in-mobile
Identifies and exploits insecure local data storage vulnerabilities in Android and iOS mobile applications including unencrypted databases, world-readable files, insecure SharedPreferences, plaintext credential storage, and improper keychain/keystore usage. Use when performing mobile penetration testing focused on OWASP M9 (Insecure Data Storage) or assessing compliance with MASVS-STORAGE requirements. Activates for requests involving mobile data storage security, local storage exploitation, SharedPreferences analysis, or mobile data leakage assessment.
detecting-misconfigured-azure-storage
Detecting misconfigured Azure Storage accounts including publicly accessible blob containers, missing encryption settings, overly permissive SAS tokens, disabled logging, and network access violations using Azure CLI, PowerShell, and Microsoft Defender for Storage.
detecting-azure-storage-account-misconfigurations
Audit Azure Blob and ADLS storage accounts for public access exposure, weak or long-lived SAS tokens, missing encryption at rest, disabled HTTPS-only traffic, and outdated TLS versions using the azure-mgmt-storage Python SDK.
configuring-hsm-for-key-storage
Hardware Security Modules (HSMs) are tamper-resistant physical devices that safeguard cryptographic keys and perform cryptographic operations in a hardened environment. Keys stored in an HSM never lea
analyzing-cloud-storage-access-patterns
Detect abnormal access patterns in AWS S3, GCS, and Azure Blob Storage by analyzing CloudTrail Data Events, GCS audit logs, and Azure Storage Analytics. Identifies after-hours bulk downloads, access from new IP addresses, unusual API calls (GetObject spikes), and potential data exfiltration using statistical baselines and time-series anomaly detection.
zx-calculus
Coecke's ZX-calculus for quantum circuit reasoning via string diagrams with Z-spiders (green) and X-spiders (red)
zulip-cogen
Zulip Cogen Skill 🐸⚡
zls-integration
zls-integration skill
zig
zig skill