Skill | Added | Review |
|---|---|---|
yara-rule-authoring Guides authoring of high-quality YARA-X detection rules for malware identification. Use when writing, reviewing, or optimizing YARA rules. Covers naming conventions, string selection, performance optimization, migration from legacy YARA, and false positive reduction. Triggers on: YARA, YARA-X, malware detection, threat hunting, IOC, signature, crx module, dex module. | 94 1.61x Agent success vs baseline Impact 100% 1.61xAverage score across 3 eval scenarios Securityby Passed No known issues Reviewed: Version: a56045e | |
variant-analysis Find similar vulnerabilities and bugs across codebases using pattern-based analysis. Use when hunting bug variants, building CodeQL/Semgrep queries, analyzing security vulnerabilities, or performing systematic code audits after finding an initial issue. | 90 1.51x Agent success vs baseline Impact 100% 1.51xAverage score across 3 eval scenarios Securityby Passed No known issues Reviewed: Version: a56045e | |
wycheproof Wycheproof provides test vectors for validating cryptographic implementations. Use when testing crypto code for known attacks and edge cases. | 71 1.10x Agent success vs baseline Impact 96% 1.10xAverage score across 3 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: a56045e | |
testing-handbook-generator Meta-skill that analyzes the Trail of Bits Testing Handbook (appsec.guide) and generates Claude Code skills for security testing tools and techniques. Use when creating new skills based on handbook content. | 85 2.13x Agent success vs baseline Impact 92% 2.13xAverage score across 3 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: a56045e | |
ruzzy Ruzzy is a coverage-guided Ruby fuzzer by Trail of Bits. Use for fuzzing pure Ruby code and Ruby C extensions. | 85 1.92x Agent success vs baseline Impact 100% 1.92xAverage score across 3 eval scenarios Securityby Passed No known issues Reviewed: Version: a56045e | |
ossfuzz OSS-Fuzz provides free continuous fuzzing for open source projects. Use when setting up continuous fuzzing infrastructure or enrolling projects. | 83 1.20x Agent success vs baseline Impact 99% 1.20xAverage score across 3 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: a56045e | |
libfuzzer Coverage-guided fuzzer built into LLVM for C/C++ projects. Use for fuzzing C/C++ code that can be compiled with Clang. | 77 1.28x Agent success vs baseline Impact 96% 1.28xAverage score across 3 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: a56045e | |
libafl LibAFL is a modular fuzzing library for building custom fuzzers. Use for advanced fuzzing needs, custom mutators, or non-standard fuzzing targets. | 74 1.30x Agent success vs baseline Impact 98% 1.30xAverage score across 3 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: a56045e | |
harness-writing Techniques for writing effective fuzzing harnesses across languages. Use when creating new fuzz targets or improving existing harness code. | 71 1.35x Agent success vs baseline Impact 99% 1.35xAverage score across 3 eval scenarios Securityby Passed No known issues Reviewed: Version: a56045e | |
fuzzing-obstacles Techniques for patching code to overcome fuzzing obstacles. Use when checksums, global state, or other barriers block fuzzer progress. | 83 1.14x Agent success vs baseline Impact 96% 1.14xAverage score across 3 eval scenarios Securityby Passed No known issues Reviewed: Version: a56045e | |
fuzzing-dictionary Fuzzing dictionaries guide fuzzers with domain-specific tokens. Use when fuzzing parsers, protocols, or format-specific code. | 80 1.00x No change in agent success vs baseline Impact 83% 1.00xAverage score across 3 eval scenarios Securityby Passed No known issues Reviewed: Version: a56045e | |
constant-time-testing Constant-time testing detects timing side channels in cryptographic code. Use when auditing crypto implementations for timing vulnerabilities. | 65 1.41x Agent success vs baseline Impact 78% 1.41xAverage score across 3 eval scenarios Securityby Passed No known issues Reviewed: Version: a56045e | |
coverage-analysis Coverage analysis measures code exercised during fuzzing. Use when assessing harness effectiveness or identifying fuzzing blockers. | 77 1.21x Agent success vs baseline Impact 96% 1.21xAverage score across 3 eval scenarios Securityby Passed No known issues Reviewed: Version: a56045e | |
cargo-fuzz cargo-fuzz is the de facto fuzzing tool for Rust projects using Cargo. Use for fuzzing Rust code with libFuzzer backend. | 78 1.25x Agent success vs baseline Impact 90% 1.25xAverage score across 3 eval scenarios Securityby Passed No known issues Reviewed: Version: a56045e | |
atheris Atheris is a coverage-guided Python fuzzer based on libFuzzer. Use for fuzzing pure Python code and Python C extensions. | 73 1.33x Agent success vs baseline Impact 95% 1.33xAverage score across 3 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: a56045e | |
aflpp AFL++ is a fork of AFL with better fuzzing performance and advanced features. Use for multi-core fuzzing of C/C++ projects. | 77 Impact — No eval scenarios have been run Securityby Advisory Suggest reviewing before use Reviewed: Version: a56045e | |
semgrep Run Semgrep static analysis scan on a codebase using parallel subagents. Supports two scan modes — "run all" (full ruleset coverage) and "important only" (high-confidence security vulnerabilities). Automatically detects and uses Semgrep Pro for cross-file taint analysis when available. Use when asked to scan code for vulnerabilities, run a security audit with Semgrep, find bugs, or perform static analysis. Spawns parallel workers for multi-language codebases. | 94 Impact — No eval scenarios have been run Securityby Advisory Suggest reviewing before use Reviewed: Version: a56045e | |
address-sanitizer AddressSanitizer detects memory errors during fuzzing. Use when fuzzing C/C++ code to find buffer overflows and use-after-free bugs. | 85 1.39x Agent success vs baseline Impact 85% 1.39xAverage score across 3 eval scenarios Securityby Passed No known issues Reviewed: Version: a56045e | |
sarif-parsing Parses and processes SARIF files from static analysis tools like CodeQL, Semgrep, or other scanners. Triggers on "parse sarif", "read scan results", "aggregate findings", "deduplicate alerts", or "process sarif output". Handles filtering, deduplication, format conversion, and CI/CD integration of SARIF data. Does NOT run scans — use the Semgrep or CodeQL skills for that. | 89 Impact — No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: a56045e | |
codeql Scans a codebase for security vulnerabilities using CodeQL's interprocedural data flow and taint tracking analysis. Triggers on "run codeql", "codeql scan", "codeql analysis", "build codeql database", or "find vulnerabilities with codeql". Supports "run all" (security-and-quality + security-experimental suites) and "important only" (high-precision security findings) scan modes. Also handles creating data extension models and processing CodeQL SARIF output. | 94 Impact — No eval scenarios have been run Securityby Advisory Suggest reviewing before use Reviewed: Version: a56045e | |
spec-to-code-compliance Verifies code implements exactly what documentation specifies for blockchain audits. Use when comparing code against whitepapers, finding gaps between specs and implementation, or performing compliance checks for protocol implementations. | 81 1.65x Agent success vs baseline Impact 96% 1.65xAverage score across 3 eval scenarios Securityby Risky Do not use without reviewing Reviewed: Version: a56045e | |
sharp-edges Identifies error-prone APIs, dangerous configurations, and footgun designs that enable security mistakes. Use when reviewing API designs, configuration schemas, cryptographic library ergonomics, or evaluating whether code follows 'secure by default' and 'pit of success' principles. Triggers: footgun, misuse-resistant, secure defaults, API usability, dangerous configuration. | 94 Impact — No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: a56045e | |
semgrep-rule-variant-creator Creates language variants of existing Semgrep rules. Use when porting a Semgrep rule to specified target languages. Takes an existing rule and target languages as input, produces independent rule+test directories for each language. | 85 Impact — No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: a56045e | |
semgrep-rule-creator Creates custom Semgrep rules for detecting security vulnerabilities, bug patterns, and code patterns. Use when writing Semgrep rules or building custom static analysis detections. | 90 Impact — No eval scenarios have been run Securityby Passed No known issues Reviewed: Version: a56045e | |
property-based-testing Provides guidance for property-based testing across multiple languages and smart contracts. Use when writing tests, reviewing code with serialization/validation/parsing patterns, designing features, or when property-based testing would provide stronger coverage than example-based tests. | 79 1.07x Agent success vs baseline Impact 97% 1.07xAverage score across 3 eval scenarios Securityby Passed No known issues Reviewed: Version: a56045e |