CtrlK
BlogDocsLog inGet started
Tessl Logo

binary-analysis-patterns

Comprehensive patterns and techniques for analyzing compiled binaries, understanding assembly code, and reconstructing program logic.

52

Quality

41%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./skills/binary-analysis-patterns/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

32%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

The description identifies a clear domain (binary/assembly analysis) but remains too high-level and abstract, reading more like a course catalog entry than an actionable skill description. It critically lacks a 'Use when...' clause and misses many natural trigger terms that users would employ when requesting reverse engineering help.

Suggestions

Add an explicit 'Use when...' clause, e.g., 'Use when the user asks about reverse engineering, disassembling binaries, analyzing malware, or understanding compiled executables.'

Include more natural trigger terms and file types users would mention: 'reverse engineering', 'disassembly', 'decompile', 'ELF', 'PE', '.exe', '.so', '.dll', 'x86', 'ARM', 'IDA', 'Ghidra'.

Replace vague phrases like 'comprehensive patterns and techniques' with specific concrete actions such as 'Disassemble executables, identify function boundaries, trace control flow, analyze calling conventions, and reconstruct high-level logic from machine code.'

DimensionReasoningScore

Specificity

Names the domain (reverse engineering/binary analysis) and some actions ('analyzing compiled binaries', 'understanding assembly code', 'reconstructing program logic'), but these are fairly high-level and not concrete specific actions like 'disassemble ELF executables, identify function boundaries, decompile control flow structures'.

2 / 3

Completeness

Describes what the skill covers at a high level but completely lacks any 'Use when...' clause or explicit trigger guidance for when Claude should select this skill. Per the rubric, a missing 'Use when...' clause caps completeness at 2, and the 'what' portion is also somewhat weak, warranting a score of 1.

1 / 3

Trigger Term Quality

Includes some relevant keywords like 'binaries', 'assembly code', and 'program logic', but misses many natural terms users would say such as 'reverse engineering', 'disassembly', 'decompile', 'malware analysis', 'ELF', 'PE', 'IDA', 'Ghidra', 'x86', 'ARM', or file extensions like '.exe', '.so'.

2 / 3

Distinctiveness Conflict Risk

The domain of binary analysis and assembly code is fairly niche and unlikely to conflict with most other skills, but the vague phrasing ('patterns and techniques', 'understanding', 'reconstructing') could overlap with general programming or security analysis skills without clear boundaries.

2 / 3

Total

7

/

12

Passed

Implementation

50%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This skill serves primarily as a reference guide for assembly patterns and binary analysis techniques. While the code examples are concrete and well-annotated, the skill suffers from being overly encyclopedic—much of this content (calling conventions, basic assembly patterns) is knowledge Claude already possesses. The actual instructional guidance is thin, with vague top-level instructions and a workflow section that lacks validation checkpoints.

Suggestions

Trim content Claude already knows (standard calling conventions, basic assembly patterns) and focus on non-obvious patterns, gotchas, and project-specific conventions that add unique value.

Replace the vague 'Instructions' section with concrete, actionable steps for common binary analysis tasks (e.g., 'When asked to analyze a binary: 1. Identify architecture with `file` command, 2. Extract strings with `strings -a`, 3. ...').

Add validation checkpoints to the Analysis Workflow, such as 'Verify struct layout by cross-referencing field accesses across at least 3 functions' or 'Confirm calling convention by checking register usage at call sites'.

Split the reference material into separate files (e.g., x86-patterns.md, arm-patterns.md, ghidra-scripts.md) and keep SKILL.md as a concise overview with navigation links.

DimensionReasoningScore

Conciseness

The skill is quite lengthy (~350 lines) and includes substantial reference material that Claude likely already knows (x86-64 calling conventions, basic assembly patterns, string operations). However, the content is presented efficiently with code blocks rather than prose explanations, and there's minimal hand-holding text. The 'Use this skill when' / 'Do not use this skill when' sections are boilerplate filler.

2 / 3

Actionability

The assembly code examples are concrete and well-annotated, and the Ghidra/IDA scripting examples are executable. However, much of the content is reference material (pattern recognition) rather than actionable instructions for specific tasks. The 'Instructions' section is vague ('Clarify goals, constraints, and required inputs') and doesn't provide concrete guidance on what to actually do during binary analysis.

2 / 3

Workflow Clarity

The 'Analysis Workflow' section at the end provides a 7-step sequence but lacks validation checkpoints or feedback loops. For binary analysis—where misidentification of types or structures can cascade—there are no verification steps (e.g., 'validate your struct layout by checking field access patterns across multiple functions'). The workflow is listed but not deeply developed.

2 / 3

Progressive Disclosure

There is one reference to 'resources/implementation-playbook.md' for detailed examples, which is good. However, the main file is a monolithic wall of reference material that could benefit from being split into separate files (e.g., x86 patterns, ARM patterns, tool-specific scripts). The content is organized with headers but everything is inline in one large document.

2 / 3

Total

8

/

12

Passed

Validation

90%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation10 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

10

/

11

Passed

Repository
sickn33/antigravity-awesome-skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.