Analyzes RAM memory dumps from compromised systems using the Volatility framework to identify malicious processes, injected code, network connections, loaded modules, and extracted credentials. Supports Windows, Linux, and macOS memory forensics. Activates for requests involving memory forensics, RAM analysis, volatile data examination, process injection detection, or memory-resident malware investigation.
90
88%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Risky
Do not use without reviewing
Quality
Discovery
100%Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.
This is an excellent skill description that clearly articulates specific capabilities (analyzing RAM dumps, identifying malicious processes, injected code, network connections, etc.), names the specific tool (Volatility framework), and provides explicit trigger guidance with natural keywords. It uses proper third-person voice throughout and covers both the 'what' and 'when' comprehensively.
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | Lists multiple specific concrete actions: 'identify malicious processes, injected code, network connections, loaded modules, and extracted credentials' along with the specific tool (Volatility framework) and supported platforms. | 3 / 3 |
Completeness | Clearly answers both what ('Analyzes RAM memory dumps...to identify malicious processes, injected code, network connections, loaded modules, and extracted credentials') and when ('Activates for requests involving memory forensics, RAM analysis, volatile data examination, process injection detection, or memory-resident malware investigation'). | 3 / 3 |
Trigger Term Quality | Excellent coverage of natural terms a user would say: 'memory forensics', 'RAM analysis', 'volatile data examination', 'process injection detection', 'memory-resident malware', 'memory dumps', 'compromised systems', 'Volatility framework'. | 3 / 3 |
Distinctiveness Conflict Risk | Highly distinctive niche — memory forensics with the Volatility framework is a very specific domain unlikely to conflict with other skills. The trigger terms are domain-specific and clearly scoped. | 3 / 3 |
Total | 12 / 12 Passed |
Implementation
77%Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.
This is a strong, highly actionable skill with excellent workflow clarity and concrete, executable commands for each forensic analysis step. Its main weaknesses are moderate verbosity from definitional content Claude already knows (Key Concepts table, tool descriptions) and a monolithic structure that could benefit from splitting reference material into separate files. The scenario section and output format template are particularly valuable additions.
Suggestions
Remove or significantly trim the Key Concepts table and Tools & Systems section—Claude already knows these definitions and tool descriptions, and they consume significant token budget.
Split the detailed output format template and common scenarios into separate referenced files (e.g., REPORT_TEMPLATE.md, SCENARIOS.md) to improve progressive disclosure.
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | The skill is fairly comprehensive but includes some unnecessary content that Claude already knows, such as the Key Concepts table defining terms like 'Memory Forensics', 'Fileless Malware', and 'Process Hollowing'. The Tools & Systems section also explains what well-known tools are. However, the command examples themselves are lean and useful. The suspicious process indicators box and the detailed output format template add value. | 2 / 3 |
Actionability | The skill provides fully executable, copy-paste ready commands throughout all seven workflow steps. Every step includes specific Volatility 3 command-line invocations with real flags and arguments. The YARA scanning examples include inline rule syntax, and the scenario section provides a concrete step-by-step investigation approach. | 3 / 3 |
Workflow Clarity | The seven-step workflow is clearly sequenced from identification through reporting, following a logical forensic investigation order. Validation checkpoints are present (comparing pslist vs psscan for hidden processes, verifying dumped EXEs against disk, cross-referencing PIDs with process lists). The scenario section includes explicit pitfalls to avoid, serving as error-recovery guidance. | 3 / 3 |
Progressive Disclosure | The content is well-structured with clear headers and logical sections, but it's a monolithic document at roughly 200+ lines that could benefit from splitting detailed reference material (Key Concepts table, Tools & Systems, the full output format template) into separate files. No external file references are provided for deeper dives into specific topics like Linux/macOS memory analysis, which are mentioned in the description but absent from the content. | 2 / 3 |
Total | 10 / 12 Passed |
Validation
90%Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.
Validation — 10 / 11 Passed
Validation for skill structure
| Criteria | Description | Result |
|---|---|---|
frontmatter_unknown_keys | Unknown frontmatter key(s) found; consider removing or moving to metadata | Warning |
Total | 10 / 11 Passed | |
c15f73d
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.