SkillJavaScriptv1.0.0

pls-agent-tools

Digital Swiss Army knife for everyday labor that standard models can't handle out of the box.

0 downloads
mattvalenta
Updated Feb 22, 2026

Agent Tools - Universal Utility Belt

A collection of practical utilities for everyday agent operations.

File Operations

Safe File Manipulation

Always use trash instead of rm when possible:

trash /path/to/file  # Safer deletion (recoverable)

Bulk File Operations

# Rename files with pattern
for f in *.txt; do mv "$f" "${f/.txt/.md}"; done

# Find and delete files older than 7 days
find . -name "*.log" -mtime +7 -exec trash {} \;

# Copy with progress
rsync -av --progress src/ dest/

JSON/YAML Processing

JSON Operations (jq)

# Pretty print
jq '.' file.json

# Extract field
jq '.field' file.json

# Update field
jq '.field = "new_value"' file.json > tmp && mv tmp file.json

# Merge JSON files
jq -s 'add' file1.json file2.json

YAML Operations (yq)

# Read value
yq '.key' file.yaml

# Update value
yq '.key = "value"' -i file.yaml

# Convert YAML to JSON
yq -o=json '.' file.yaml

Text Processing

Common Patterns

# Search and replace in files
sed -i '' 's/old/new/g' file.txt

# Extract matches
grep -oP 'pattern' file.txt

# Count occurrences
grep -c 'pattern' file.txt

# Remove duplicate lines
sort file.txt | uniq > deduplicated.txt

# Extract column
awk '{print $2}' file.txt

System Utilities

Process Management

# Find process by name
ps aux | grep process_name

# Kill by port
lsof -ti:3000 | xargs kill -9

# Monitor resource usage
htop

Network Operations

# Check port availability
lsof -i :PORT

# Download with retry
curl --retry 3 -O URL

# Test endpoint
curl -X POST -H "Content-Type: application/json" -d '{"key":"value"}' URL

Encoding/Decoding

# Base64 encode/decode
echo "text" | base64
echo "dGV4dAo=" | base64 -d

# URL encode/decode
python3 -c "import urllib.parse; print(urllib.parse.quote('text'))"
python3 -c "import urllib.parse; print(urllib.parse.unquote('text%20here'))"

# JSON escape/unescape
jq -R . <<< 'string to escape'
jq -r . <<< '"escaped string"'

Date/Time Utilities

# Current timestamp
date +%s

# ISO format
date -u +"%Y-%m-%dT%H:%M:%SZ"

# Convert timestamp
date -r 1234567890

# Timezone conversion
TZ="America/Chicago" date

Validation Helpers

# Validate JSON
jq empty file.json && echo "Valid JSON"

# Validate YAML
python3 -c "import yaml; yaml.safe_load(open('file.yaml'))" && echo "Valid YAML"

# Check JSON schema
check-jsonschema --schemafile schema.json document.json

Quick Reference

TaskCommand
Safe deletetrash file
Find filesfind . -name "*.ext"
Search in filesgrep -r "pattern" .
Replace textsed -i '' 's/old/new/g'
JSON prettyjq '.'
YAML readyq '.key'
Port checklsof -i :PORT
Base64 decodebase64 -d
Free
Installation
Reviews

Sign in to leave a review.

No reviews yet. Be the first.