org-babel-execution

Literate programming execution engine via org-babel for polyglot skill execution

16 stars

Best use case

org-babel-execution is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

Literate programming execution engine via org-babel for polyglot skill execution

Teams using org-babel-execution should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/org-babel-execution/SKILL.md --create-dirs "https://raw.githubusercontent.com/plurigrid/asi/main/plugins/asi/skills/org-babel-execution/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/org-babel-execution/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How org-babel-execution Compares

Feature / Agentorg-babel-executionStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Literate programming execution engine via org-babel for polyglot skill execution

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

SKILL.md Source

# Org-Babel Execution Engine

> **Transform asi from knowledge graph to execution engine via literate programming**

**Trit**: 0 (COORDINATOR - orchestrates execution across languages)

## Overview

Enables literate programming across Julia, Python, Clojure via org-babel.

## Core Concept

Embed executable code in narrative .org files:
- Execute in-place (C-c C-c)
- Tangle to extract source files (C-c C-v t)
- Pass data between languages
- Generate documentation with results

## Template

```org
#+TITLE: Skill Name
#+PROPERTY: header-args:julia :tangle Skill.jl

* Implementation
#+BEGIN_SRC julia
function skill_operation(input)
    # code here
end
#+END_SRC

* Tests
#+BEGIN_SRC julia :results output
@test skill_operation(42) == expected
#+END_SRC
```

## Related Skills

- `org` (0) - Org-mode syntax
- `emacs` (0) - Editor integration
- `julia-scientific` (+1) - Julia execution
- `python-development` (+1) - Python execution

Related Skills

securing-aws-lambda-execution-roles

16
from plurigrid/asi

Securing AWS Lambda execution roles by implementing least-privilege IAM policies, applying permission boundaries, restricting resource-based policies, using IAM Access Analyzer to validate permissions, and enforcing role scoping through SCPs.

hunting-for-lolbins-execution-in-endpoint-logs

16
from plurigrid/asi

Hunt for adversary abuse of Living Off the Land Binaries (LOLBins) by analyzing endpoint process creation logs for suspicious execution patterns of legitimate Windows system binaries used for malicious purposes.

hunting-for-anomalous-powershell-execution

16
from plurigrid/asi

Hunt for malicious PowerShell activity by analyzing Script Block Logging (Event 4104), Module Logging (Event 4103), and process creation events. The analyst parses Windows Event Log EVTX files to detect obfuscated commands, AMSI bypass attempts, encoded payloads, credential dumping keywords, and suspicious download cradles. Activates for requests involving PowerShell threat hunting, script block analysis, encoded command detection, or AMSI bypass identification.

detecting-suspicious-powershell-execution

16
from plurigrid/asi

Detect suspicious PowerShell execution patterns including encoded commands, download cradles, AMSI bypass attempts, and constrained language mode evasion.

detecting-mimikatz-execution-patterns

16
from plurigrid/asi

Detect Mimikatz execution through command-line patterns, LSASS access signatures, binary indicators, and in-memory detection of known modules.

analyzing-prefetch-files-for-execution-history

16
from plurigrid/asi

Parse Windows Prefetch files to determine program execution history including run counts, timestamps, and referenced files for forensic investigation.

zx-calculus

16
from plurigrid/asi

Coecke's ZX-calculus for quantum circuit reasoning via string diagrams with Z-spiders (green) and X-spiders (red)

zulip-cogen

16
from plurigrid/asi

Zulip Cogen Skill 🐸⚡

zls-integration

16
from plurigrid/asi

zls-integration skill

zig

16
from plurigrid/asi

zig skill

zig-syrup-bci

16
from plurigrid/asi

Multimodal BCI pipeline in Zig: DSI-24 EEG, fNIRS mBLL, eye tracking IVT, LSL sync, EDF read/write, GF(3) conservation

zig-programming

16
from plurigrid/asi

zig-programming skill