fabric
Intelligent pattern selection for Fabric CLI. Automatically selects the right pattern from 242+ specialized prompts based on your intent - threat modeling, analysis, summarization, content creation, extraction, and more. USE WHEN processing content, analyzing data, creating summaries, threat modeling, or transforming text.
$ Installieren
git clone https://github.com/multicam/qara /tmp/qara && cp -r /tmp/qara/.claude/skills/fabric ~/.claude/skills/qara// tip: Run this command in your terminal to install the skill
name: fabric context: fork model: sonnet description: Intelligent pattern selection for Fabric CLI. Automatically selects the right pattern from 242+ specialized prompts based on your intent - threat modeling, analysis, summarization, content creation, extraction, and more. USE WHEN processing content, analyzing data, creating summaries, threat modeling, or transforming text.
Fabric Skill
Setup Check - Fabric Repository
IMPORTANT: Before using this skill, verify the Fabric repository is available:
# Check if Fabric exists
fabric --version && \
test -f ~/.config/fabric/patterns/pattern_explanations.md && echo 'Fabric is properly installed and configured'
If Fabric is not installed, alert the user, make sure it is installed.
When to Activate This Skill
Primary Use Cases:
- "Create a threat model for..."
- "Summarize this article/video/paper..."
- "Extract wisdom/insights from..."
- "Analyze this [code/malware/claims/debate]..."
- "Improve my writing/code/prompt..."
- "Create a [visualization/summary/report]..."
- "Rate/review/judge this content..."
The Goal: Select the RIGHT pattern from 242+ available patterns based on what you're trying to accomplish.
đŻ Pattern Selection Strategy
When a user requests Fabric processing, follow this decision tree:
1. Identify Intent Category
Threat Modeling & Security:
- Threat model â
create_threat_modelorcreate_stride_threat_model - Threat scenarios â
create_threat_scenarios - Security update â
create_security_update - Security rules â
create_sigma_rules,write_nuclei_template_rule,write_semgrep_rule - Threat analysis â
analyze_threat_report,analyze_threat_report_trends
Summarization:
- General summary â
summarize - 5-sentence summary â
create_5_sentence_summary - Micro summary â
create_micro_summaryorsummarize_micro - Meeting â
summarize_meeting - Paper/research â
summarize_paper - Video/YouTube â
youtube_summary - Newsletter â
summarize_newsletter - Code changes â
summarize_git_changesorsummarize_git_diff
Wisdom Extraction:
- General wisdom â
extract_wisdom - Article wisdom â
extract_article_wisdom - Book ideas â
extract_book_ideas - Insights â
extract_insightsorextract_insights_dm - Main idea â
extract_main_idea - Recommendations â
extract_recommendations - Controversial ideas â
extract_controversial_ideas
Analysis:
- Malware â
analyze_malware - Code â
analyze_codeorreview_code - Claims â
analyze_claims - Debate â
analyze_debate - Logs â
analyze_logs - Paper â
analyze_paper - Threat report â
analyze_threat_report - Product feedback â
analyze_product_feedback - Sales call â
analyze_sales_call
Content Creation:
- PRD â
create_prd - Design document â
create_design_document - User story â
create_user_story - Visualization â
create_visualization,create_mermaid_visualization,create_markmap_visualization - Essay â
write_essay - Report finding â
create_report_finding - Newsletter entry â
create_newsletter_entry
Improvement:
- Writing â
improve_writing - Academic writing â
improve_academic_writing - Prompt â
improve_prompt - Report finding â
improve_report_finding - Code â
review_code
Rating/Evaluation:
- AI response â
rate_ai_response - Content quality â
rate_content - Value assessment â
rate_value - General judgment â
judge_output
2. Execute Pattern
# Basic format
fabric [input] -p [selected_pattern]
# From URL
fabric -u "URL" -p [pattern]
# From YouTube
fabric -y "YOUTUBE_URL" -p [pattern]
# From file
cat file.txt | fabric -p [pattern]
# Direct text
fabric "your text here" -p [pattern]
đ Pattern Categories (242 Total)
Full pattern reference: read ${PAI_DIR}/skills/fabric/fabric-patterns-reference.md
| Category | Count | Common Patterns |
|---|---|---|
| Security & Threat Modeling | 15 | create_threat_model, create_stride_threat_model, analyze_incident |
| Summarization | 20 | summarize, create_5_sentence_summary, youtube_summary |
| Extraction | 30+ | extract_wisdom, extract_insights, extract_main_idea |
| Analysis | 35+ | analyze_claims, analyze_code, analyze_paper |
| Creation | 50+ | create_prd, create_mermaid_visualization, create_user_story |
| Improvement | 10 | improve_writing, improve_prompt, review_code |
| Rating | 8 | rate_content, judge_output, rate_ai_response |
đ Updating Patterns
The Fabric patterns exists in ~/.config/fabric/patterns/.
To see all available patterns:
ls ~/.config/fabric/patterns/
đĄ Usage Examples
Threat Modeling:
# User: "Create a threat model for our new API"
fabric "API that handles user authentication and payment processing" -p create_threat_model
Summarization:
# User: "Summarize this blog post"
fabric -u "https://example.com/blog-post" -p summarize
# User: "Give me a 5-sentence summary"
fabric -u "https://example.com/article" -p create_5_sentence_summary
Wisdom Extraction:
# User: "Extract wisdom from this video"
fabric -y "https://youtube.com/watch?v=..." -p extract_wisdom
# User: "What are the main ideas?"
fabric -u "URL" -p extract_main_idea
Analysis:
# User: "Analyze this code for issues"
fabric "$(cat code.py)" -p analyze_code
# User: "Analyze these security claims"
fabric "security claims text" -p analyze_claims
đŻ Pattern Selection Decision Matrix
| User Request Contains | Likely Intent | Recommended Patterns |
|---|---|---|
| "threat model" | Security modeling | create_threat_model, create_stride_threat_model |
| "summarize", "summary" | Summarization | summarize, create_5_sentence_summary |
| "extract wisdom", "insights" | Wisdom extraction | extract_wisdom, extract_insights |
| "analyze [X]" | Analysis | analyze_[X] (match X to pattern) |
| "improve", "enhance" | Improvement | improve_writing, improve_prompt |
| "create [visualization]" | Visualization | create_mermaid_visualization, create_markmap_visualization |
| "rate", "judge", "evaluate" | Rating | rate_content, judge_output |
| "main idea", "core message" | Core extraction | extract_main_idea, extract_core_message |
đ Advanced Usage
Pipe content through Fabric:
cat article.txt | fabric -p extract_wisdom
pbpaste | fabric -p summarize
curl -s "https://..." | fabric -p analyze_claims
Process YouTube videos:
# Fabric handles download + transcription + processing
fabric -y "https://youtube.com/watch?v=..." -p youtube_summary
Chain patterns (manual):
# Extract then summarize
fabric -u "URL" -p extract_wisdom > wisdom.txt
cat wisdom.txt | fabric -p create_5_sentence_summary
đ€ Model Selection
Comprehensive Model Guide: read ${PAI_DIR}/skils/fabric/fabric-model-reference.md
Quick Recommendations:
- High Volume/Free:
gemini-2.5-flash(free, ultra-fast) - Balanced Quality:
claude-sonnet-4-5-20250929(best general purpose, recommended) - Maximum Quality:
claude-opus-4-20250514(highest quality) - Reasoning Tasks:
gemini-2.0-flash-thinking-exp(extended thinking mode) - Cost Sensitive:
claude-3-5-haiku-20241022(ultra-low cost)
List Available Models: fabric --listmodels
Specify Model: fabric "content" -p pattern_name --model claude-sonnet-4-5-20250929
đ Supplementary Resources
Strategy Reference: read ${PAI_DIR}/skils/fabric/fabric-strategies-reference.md
Task-based pattern selection guide with workflows and test cases
Pattern Reference (Complete): read ${PAI_DIR}/skils/fabric/fabric-patterns-reference.md
Comprehensive categorized reference for all 240 patterns
Model Reference: read ${PAI_DIR}/skils/fabric/fabric-model-reference.md
Full Pattern List: ls ~/.config/fabric/patterns/
Fabric Documentation: https://github.com/danielmiessler/fabric
Pattern Templates: See ~/.config/fabric/patterns/official_pattern_template/
đ Key Insight
The skill's value is in selecting the RIGHT pattern for the task.
When user says "Create a threat model using Fabric", your job is to:
- Recognize "threat model" intent
- Know available options:
create_threat_model,create_stride_threat_model,create_threat_scenarios - Select the best match (usually
create_threat_modelunless STRIDE specified) - Execute:
fabric "[content]" -p create_threat_model
Not: "Here are the patterns, pick one"
Instead: "I'll use create_threat_model for this" â execute immediately
