diff --git a/CLAUDE.md b/CLAUDE.md index 0f37fb0b..a423c7dc 100644 --- a/CLAUDE.md +++ b/CLAUDE.md @@ -75,9 +75,7 @@ plugins/ --- name: skill-name # kebab-case, max 64 chars description: "Third-person description of what it does and when to use it" -allowed-tools: # Optional: restrict to needed tools only - - Read - - Grep +allowed-tools: Read Grep # Optional: restrict to needed tools only --- ``` diff --git a/plugins/agentic-actions-auditor/skills/agentic-actions-auditor/SKILL.md b/plugins/agentic-actions-auditor/skills/agentic-actions-auditor/SKILL.md index 50f44c1e..3b0255ac 100644 --- a/plugins/agentic-actions-auditor/skills/agentic-actions-auditor/SKILL.md +++ b/plugins/agentic-actions-auditor/skills/agentic-actions-auditor/SKILL.md @@ -1,11 +1,7 @@ --- name: agentic-actions-auditor description: "Audits GitHub Actions workflows for security vulnerabilities in AI agent integrations including Claude Code Action, Gemini CLI, OpenAI Codex, and GitHub AI Inference. Detects attack vectors where attacker-controlled input reaches AI agents running in CI/CD pipelines, including env var intermediary patterns, direct expression injection, dangerous sandbox configurations, and wildcard user allowlists. Use when reviewing workflow files that invoke AI coding agents, auditing CI/CD pipeline security for prompt injection risks, or evaluating agentic action configurations." -allowed-tools: - - Read - - Grep - - Glob - - Bash +allowed-tools: Read Grep Glob Bash --- # Agentic Actions Auditor diff --git a/plugins/burpsuite-project-parser/skills/burpsuite-project-parser/SKILL.md b/plugins/burpsuite-project-parser/skills/burpsuite-project-parser/SKILL.md index 6f70caed..83f953a7 100644 --- a/plugins/burpsuite-project-parser/skills/burpsuite-project-parser/SKILL.md +++ b/plugins/burpsuite-project-parser/skills/burpsuite-project-parser/SKILL.md @@ -1,9 +1,7 @@ --- name: burpsuite-project-parser description: Searches and explores Burp Suite project files (.burp) from the command line. Use when searching response headers or bodies with regex patterns, extracting security audit findings, dumping proxy history or site map data, or analyzing HTTP traffic captured in a Burp project. -allowed-tools: - - Bash - - Read +allowed-tools: Bash Read --- # Burp Project Parser diff --git a/plugins/culture-index/skills/interpreting-culture-index/SKILL.md b/plugins/culture-index/skills/interpreting-culture-index/SKILL.md index edef7973..0af7488c 100644 --- a/plugins/culture-index/skills/interpreting-culture-index/SKILL.md +++ b/plugins/culture-index/skills/interpreting-culture-index/SKILL.md @@ -1,12 +1,7 @@ --- name: interpreting-culture-index description: Interprets Culture Index (CI) surveys, behavioral profiles, and personality assessment data. Supports individual profile interpretation, team composition analysis (gas/brake/glue), burnout detection, profile comparison, hiring profiles, manager coaching, interview transcript analysis for trait prediction, candidate debrief, onboarding planning, and conflict mediation. Accepts extracted JSON or PDF input via OpenCV extraction script. -allowed-tools: - - Bash - - Read - - Grep - - Glob - - Write +allowed-tools: Bash Read Grep Glob Write --- diff --git a/plugins/differential-review/skills/differential-review/SKILL.md b/plugins/differential-review/skills/differential-review/SKILL.md index b14a5157..f6e8e54c 100644 --- a/plugins/differential-review/skills/differential-review/SKILL.md +++ b/plugins/differential-review/skills/differential-review/SKILL.md @@ -5,12 +5,7 @@ description: > Adapts analysis depth to codebase size, uses git history for context, calculates blast radius, checks test coverage, and generates comprehensive markdown reports. Automatically detects and prevents security regressions. -allowed-tools: - - Read - - Write - - Grep - - Glob - - Bash +allowed-tools: Read Write Grep Glob Bash --- # Differential Security Review diff --git a/plugins/dimensional-analysis/skills/dimensional-analysis/SKILL.md b/plugins/dimensional-analysis/skills/dimensional-analysis/SKILL.md index 717cf0f2..42e1cb2a 100644 --- a/plugins/dimensional-analysis/skills/dimensional-analysis/SKILL.md +++ b/plugins/dimensional-analysis/skills/dimensional-analysis/SKILL.md @@ -1,15 +1,7 @@ --- name: dimensional-analysis description: "Annotates codebases with dimensional analysis comments documenting units, dimensions, and decimal scaling. Use when someone asks to annotate units in a codebase, perform a dimensional analysis, or find vulnerabilities in a DeFi protocol, offchain code, or other blockchain-related codebase with arithmetic. Prevents dimensional mismatches and catches formula bugs early." -allowed-tools: - - Read - - Write - - Grep - - List - - Glob - - Task - - TodoRead - - TodoWrite +allowed-tools: Read Write Grep List Glob Task TodoRead TodoWrite --- # Dimensional Analysis Skill diff --git a/plugins/dwarf-expert/skills/dwarf-expert/SKILL.md b/plugins/dwarf-expert/skills/dwarf-expert/SKILL.md index ba1afc87..8ea31916 100644 --- a/plugins/dwarf-expert/skills/dwarf-expert/SKILL.md +++ b/plugins/dwarf-expert/skills/dwarf-expert/SKILL.md @@ -1,12 +1,7 @@ --- name: dwarf-expert description: Provides expertise for analyzing DWARF debug files and understanding the DWARF debug format/standard (v3-v5). Triggers when understanding DWARF information, interacting with DWARF files, answering DWARF-related questions, or working with code that parses DWARF data. -allowed-tools: - - Read - - Bash - - Grep - - Glob - - WebSearch +allowed-tools: Read Bash Grep Glob WebSearch --- # Overview This skill provides technical knowledge and expertise about the DWARF standard and how to interact with DWARF files. Tasks include answering questions about the DWARF standard, providing examples of various DWARF features, parsing and/or creating DWARF files, and writing/modifying/analyzing code that interacts with DWARF data. diff --git a/plugins/entry-point-analyzer/skills/entry-point-analyzer/SKILL.md b/plugins/entry-point-analyzer/skills/entry-point-analyzer/SKILL.md index 557c1703..8ac846d3 100644 --- a/plugins/entry-point-analyzer/skills/entry-point-analyzer/SKILL.md +++ b/plugins/entry-point-analyzer/skills/entry-point-analyzer/SKILL.md @@ -1,11 +1,7 @@ --- name: entry-point-analyzer description: Analyzes smart contract codebases to identify state-changing entry points for security auditing. Detects externally callable functions that modify state, categorizes them by access level (public, admin, role-restricted, contract-only), and generates structured audit reports. Excludes view/pure/read-only functions. Use when auditing smart contracts (Solidity, Vyper, Solana/Rust, Move, TON, CosmWasm) or when asked to find entry points, audit flows, external functions, access control patterns, or privileged operations. -allowed-tools: - - Read - - Grep - - Glob - - Bash +allowed-tools: Read Grep Glob Bash --- # Entry Point Analyzer diff --git a/plugins/firebase-apk-scanner/skills/firebase-apk-scanner/SKILL.md b/plugins/firebase-apk-scanner/skills/firebase-apk-scanner/SKILL.md index fb5cd5ae..d84e99b2 100644 --- a/plugins/firebase-apk-scanner/skills/firebase-apk-scanner/SKILL.md +++ b/plugins/firebase-apk-scanner/skills/firebase-apk-scanner/SKILL.md @@ -2,7 +2,7 @@ name: firebase-apk-scanner description: Scans Android APKs for Firebase security misconfigurations including open databases, storage buckets, authentication issues, and exposed cloud functions. Use when analyzing APK files for Firebase vulnerabilities, performing mobile app security audits, or testing Firebase endpoint security. For authorized security research only. argument-hint: [apk-file-or-directory] -allowed-tools: Bash({baseDir}/scanner.sh:*), Bash(apktool:*), Bash(curl:*), Read, Grep, Glob +allowed-tools: Bash({baseDir}/scanner.sh:*) Bash(apktool:*) Bash(curl:*) Read Grep Glob disable-model-invocation: true --- diff --git a/plugins/fp-check/skills/fp-check/SKILL.md b/plugins/fp-check/skills/fp-check/SKILL.md index 992d9017..259311df 100644 --- a/plugins/fp-check/skills/fp-check/SKILL.md +++ b/plugins/fp-check/skills/fp-check/SKILL.md @@ -1,20 +1,7 @@ --- name: fp-check description: "Systematically verifies suspected security bugs to eliminate false positives. Produces TRUE POSITIVE or FALSE POSITIVE verdicts with documented evidence for each bug." -allowed-tools: - - Read - - Grep - - Glob - - LSP - - Bash - - Task - - Write - - Edit - - AskUserQuestion - - TaskCreate - - TaskUpdate - - TaskList - - TaskGet +allowed-tools: Read Grep Glob LSP Bash Task Write Edit AskUserQuestion TaskCreate TaskUpdate TaskList TaskGet --- # False Positive Check diff --git a/plugins/git-cleanup/skills/git-cleanup/SKILL.md b/plugins/git-cleanup/skills/git-cleanup/SKILL.md index 879385ed..0c7b6f03 100644 --- a/plugins/git-cleanup/skills/git-cleanup/SKILL.md +++ b/plugins/git-cleanup/skills/git-cleanup/SKILL.md @@ -2,11 +2,7 @@ name: git-cleanup description: "Safely analyzes and cleans up local git branches and worktrees by categorizing them as merged, squash-merged, superseded, or active work." disable-model-invocation: true -allowed-tools: - - Bash - - Read - - Grep - - AskUserQuestion +allowed-tools: Bash Read Grep AskUserQuestion --- # Git Cleanup diff --git a/plugins/insecure-defaults/skills/insecure-defaults/SKILL.md b/plugins/insecure-defaults/skills/insecure-defaults/SKILL.md index d1b29cd3..4516c901 100644 --- a/plugins/insecure-defaults/skills/insecure-defaults/SKILL.md +++ b/plugins/insecure-defaults/skills/insecure-defaults/SKILL.md @@ -1,11 +1,7 @@ --- name: insecure-defaults description: "Detects fail-open insecure defaults (hardcoded secrets, weak auth, permissive security) that allow apps to run insecurely in production. Use when auditing security, reviewing config management, or analyzing environment variable handling." -allowed-tools: - - Read - - Grep - - Glob - - Bash +allowed-tools: Read Grep Glob Bash --- # Insecure Defaults Detection diff --git a/plugins/let-fate-decide/skills/let-fate-decide/SKILL.md b/plugins/let-fate-decide/skills/let-fate-decide/SKILL.md index 832979e2..71a63907 100644 --- a/plugins/let-fate-decide/skills/let-fate-decide/SKILL.md +++ b/plugins/let-fate-decide/skills/let-fate-decide/SKILL.md @@ -1,11 +1,7 @@ --- name: let-fate-decide description: "Draws 4 Tarot cards using os.urandom() to inject entropy into planning when prompts are vague or underspecified. Interprets the spread to guide next steps. Use when the user is nonchalant, feeling lucky, says 'let fate decide', makes Yu-Gi-Oh references ('heart of the cards'), demonstrates indifference about approach, or says 'try again' on a system with no changes. Also triggers on sufficiently ambiguous prompts where multiple approaches are equally valid." -allowed-tools: - - Bash - - Read - - Grep - - Glob +allowed-tools: Bash Read Grep Glob --- # Let Fate Decide diff --git a/plugins/seatbelt-sandboxer/skills/seatbelt-sandboxer/SKILL.md b/plugins/seatbelt-sandboxer/skills/seatbelt-sandboxer/SKILL.md index 61c2c057..6a2ee743 100644 --- a/plugins/seatbelt-sandboxer/skills/seatbelt-sandboxer/SKILL.md +++ b/plugins/seatbelt-sandboxer/skills/seatbelt-sandboxer/SKILL.md @@ -1,12 +1,7 @@ --- name: seatbelt-sandboxer description: "Generates minimal macOS Seatbelt sandbox configurations. Use when sandboxing, isolating, or restricting macOS applications with allowlist-based profiles." -allowed-tools: - - Read - - Write - - Bash - - Glob - - Grep +allowed-tools: Read Write Bash Glob Grep --- # macOS Seatbelt Sandbox Profiling diff --git a/plugins/second-opinion/skills/second-opinion/SKILL.md b/plugins/second-opinion/skills/second-opinion/SKILL.md index db65dc85..1c735f81 100644 --- a/plugins/second-opinion/skills/second-opinion/SKILL.md +++ b/plugins/second-opinion/skills/second-opinion/SKILL.md @@ -1,12 +1,7 @@ --- name: second-opinion description: "Runs external LLM code reviews (OpenAI Codex or Google Gemini CLI) on uncommitted changes, branch diffs, or specific commits. Use when the user asks for a second opinion, external review, codex review, gemini review, or mentions /second-opinion." -allowed-tools: - - Bash - - Read - - Glob - - Grep - - AskUserQuestion +allowed-tools: Bash Read Glob Grep AskUserQuestion --- # Second Opinion diff --git a/plugins/semgrep-rule-creator/skills/semgrep-rule-creator/SKILL.md b/plugins/semgrep-rule-creator/skills/semgrep-rule-creator/SKILL.md index 7b9c5ce0..4bf79525 100644 --- a/plugins/semgrep-rule-creator/skills/semgrep-rule-creator/SKILL.md +++ b/plugins/semgrep-rule-creator/skills/semgrep-rule-creator/SKILL.md @@ -1,14 +1,7 @@ --- name: semgrep-rule-creator description: Creates custom Semgrep rules for detecting security vulnerabilities, bug patterns, and code patterns. Use when writing Semgrep rules or building custom static analysis detections. -allowed-tools: - - Bash - - Read - - Write - - Edit - - Glob - - Grep - - WebFetch +allowed-tools: Bash Read Write Edit Glob Grep WebFetch --- # Semgrep Rule Creator diff --git a/plugins/semgrep-rule-variant-creator/skills/semgrep-rule-variant-creator/SKILL.md b/plugins/semgrep-rule-variant-creator/skills/semgrep-rule-variant-creator/SKILL.md index 0be73121..95263b1e 100644 --- a/plugins/semgrep-rule-variant-creator/skills/semgrep-rule-variant-creator/SKILL.md +++ b/plugins/semgrep-rule-variant-creator/skills/semgrep-rule-variant-creator/SKILL.md @@ -1,14 +1,7 @@ --- name: semgrep-rule-variant-creator description: Creates language variants of existing Semgrep rules. Use when porting a Semgrep rule to specified target languages. Takes an existing rule and target languages as input, produces independent rule+test directories for each language. -allowed-tools: - - Bash - - Read - - Write - - Edit - - Glob - - Grep - - WebFetch +allowed-tools: Bash Read Write Edit Glob Grep WebFetch --- # Semgrep Rule Variant Creator diff --git a/plugins/sharp-edges/skills/sharp-edges/SKILL.md b/plugins/sharp-edges/skills/sharp-edges/SKILL.md index b5f86df9..a66cb9de 100644 --- a/plugins/sharp-edges/skills/sharp-edges/SKILL.md +++ b/plugins/sharp-edges/skills/sharp-edges/SKILL.md @@ -1,10 +1,7 @@ --- name: sharp-edges description: "Identifies error-prone APIs, dangerous configurations, and footgun designs that enable security mistakes. Use when reviewing API designs, configuration schemas, cryptographic library ergonomics, or evaluating whether code follows 'secure by default' and 'pit of success' principles. Triggers: footgun, misuse-resistant, secure defaults, API usability, dangerous configuration." -allowed-tools: - - Read - - Grep - - Glob +allowed-tools: Read Grep Glob --- # Sharp Edges Analysis diff --git a/plugins/skill-improver/skills/skill-improver/SKILL.md b/plugins/skill-improver/skills/skill-improver/SKILL.md index 6e54af32..6cb5d455 100644 --- a/plugins/skill-improver/skills/skill-improver/SKILL.md +++ b/plugins/skill-improver/skills/skill-improver/SKILL.md @@ -1,13 +1,7 @@ --- name: skill-improver description: "Iteratively reviews and fixes Claude Code skill quality issues until they meet standards. Runs automated fix-review cycles using the skill-reviewer agent. Use to fix skill quality issues, improve skill descriptions, run automated skill review loops, or iteratively refine a skill. Triggers on 'fix my skill', 'improve skill quality', 'skill improvement loop'. NOT for one-time reviews—use /skill-reviewer directly." -allowed-tools: - - Task - - Read - - Edit - - Write - - Glob - - Grep +allowed-tools: Task Read Edit Write Glob Grep --- # Skill Improvement Methodology diff --git a/plugins/static-analysis/skills/codeql/SKILL.md b/plugins/static-analysis/skills/codeql/SKILL.md index a5932209..0fcdd7db 100644 --- a/plugins/static-analysis/skills/codeql/SKILL.md +++ b/plugins/static-analysis/skills/codeql/SKILL.md @@ -6,20 +6,7 @@ description: >- codeql database", or "find vulnerabilities with codeql". Supports "run all" (security-and-quality suite) and "important only" (high-precision security findings) scan modes. Also handles creating data extension models and processing CodeQL SARIF output. -allowed-tools: - - Bash - - Read - - Write - - Edit - - Glob - - Grep - - AskUserQuestion - - TaskCreate - - TaskList - - TaskUpdate - - TaskGet - - TodoRead - - TodoWrite +allowed-tools: Bash Read Write Edit Glob Grep AskUserQuestion TaskCreate TaskList TaskUpdate TaskGet TodoRead TodoWrite --- # CodeQL Analysis diff --git a/plugins/static-analysis/skills/sarif-parsing/SKILL.md b/plugins/static-analysis/skills/sarif-parsing/SKILL.md index 47e84642..8176208d 100644 --- a/plugins/static-analysis/skills/sarif-parsing/SKILL.md +++ b/plugins/static-analysis/skills/sarif-parsing/SKILL.md @@ -5,11 +5,7 @@ description: >- scanners. Triggers on "parse sarif", "read scan results", "aggregate findings", "deduplicate alerts", or "process sarif output". Handles filtering, deduplication, format conversion, and CI/CD integration of SARIF data. Does NOT run scans — use the Semgrep or CodeQL skills for that. -allowed-tools: - - Bash - - Read - - Glob - - Grep +allowed-tools: Bash Read Glob Grep --- # SARIF Parsing Best Practices diff --git a/plugins/static-analysis/skills/semgrep/SKILL.md b/plugins/static-analysis/skills/semgrep/SKILL.md index b00c781a..f53af43d 100644 --- a/plugins/static-analysis/skills/semgrep/SKILL.md +++ b/plugins/static-analysis/skills/semgrep/SKILL.md @@ -8,15 +8,7 @@ description: >- to scan code for vulnerabilities, run a security audit with Semgrep, find bugs, or perform static analysis. Spawns parallel workers for multi-language codebases. -allowed-tools: - - Bash - - Read - - Glob - - Task - - AskUserQuestion - - TaskCreate - - TaskList - - TaskUpdate +allowed-tools: Bash Read Glob Task AskUserQuestion TaskCreate TaskList TaskUpdate --- # Semgrep Security Scan diff --git a/plugins/supply-chain-risk-auditor/skills/supply-chain-risk-auditor/SKILL.md b/plugins/supply-chain-risk-auditor/skills/supply-chain-risk-auditor/SKILL.md index 1389de7b..3bb0e01f 100644 --- a/plugins/supply-chain-risk-auditor/skills/supply-chain-risk-auditor/SKILL.md +++ b/plugins/supply-chain-risk-auditor/skills/supply-chain-risk-auditor/SKILL.md @@ -1,12 +1,7 @@ --- name: supply-chain-risk-auditor description: "Identifies dependencies at heightened risk of exploitation or takeover. Use when assessing supply chain attack surface, evaluating dependency health, or scoping security engagements." -allowed-tools: - - Read - - Write - - Bash - - Glob - - Grep +allowed-tools: Read Write Bash Glob Grep --- # Supply Chain Risk Auditor diff --git a/plugins/workflow-skill-design/skills/designing-workflow-skills/SKILL.md b/plugins/workflow-skill-design/skills/designing-workflow-skills/SKILL.md index aeb145db..6fb56a9a 100644 --- a/plugins/workflow-skill-design/skills/designing-workflow-skills/SKILL.md +++ b/plugins/workflow-skill-design/skills/designing-workflow-skills/SKILL.md @@ -7,12 +7,7 @@ description: >- sequential pipelines, routing patterns, safety gates, task tracking, phased execution, or any multi-step workflow. Also applies when reviewing or refactoring existing workflow skills for quality. -allowed-tools: - - Read - - Glob - - Grep - - TodoRead - - TodoWrite +allowed-tools: Read Glob Grep TodoRead TodoWrite --- # Designing Workflow Skills @@ -129,8 +124,7 @@ Every workflow skill needs this skeleton, regardless of pattern: --- name: kebab-case-name description: "Third-person description with trigger keywords — this is how Claude decides to activate the skill" -allowed-tools: - - [minimum tools needed] +allowed-tools: [minimum tools needed, space-delimited] # Optional fields — see tool-assignment-guide.md for full reference: # disable-model-invocation: true # Only user can invoke (not Claude) # user-invocable: false # Only Claude can invoke (hidden from / menu) diff --git a/plugins/workflow-skill-design/skills/designing-workflow-skills/references/anti-patterns.md b/plugins/workflow-skill-design/skills/designing-workflow-skills/references/anti-patterns.md index 3c0774f8..bff890c2 100644 --- a/plugins/workflow-skill-design/skills/designing-workflow-skills/references/anti-patterns.md +++ b/plugins/workflow-skill-design/skills/designing-workflow-skills/references/anti-patterns.md @@ -258,8 +258,7 @@ Use distinctive keywords per workflow. If two workflows genuinely overlap, add a **Before:** ```markdown -allowed-tools: - - Bash +allowed-tools: Bash ``` ```markdown Find all Python files: @@ -270,10 +269,7 @@ find . -name "*.py" -type f **After:** ```markdown -allowed-tools: - - Glob - - Grep - - Read +allowed-tools: Glob Grep Read ``` ```markdown Find all Python files using Glob with pattern `**/*.py`. @@ -289,22 +285,12 @@ Find all Python files using Glob with pattern `**/*.py`. **Before:** ```yaml -allowed-tools: - - Bash - - Read - - Write - - Glob - - Grep - - Task - - AskUserQuestion +allowed-tools: Bash Read Write Glob Grep Task AskUserQuestion ``` **After (for a read-only analysis skill):** ```yaml -allowed-tools: - - Read - - Glob - - Grep +allowed-tools: Read Glob Grep ``` Only list tools the skill actually needs. Audit by checking which tools appear in instructions. diff --git a/plugins/workflow-skill-design/skills/designing-workflow-skills/references/tool-assignment-guide.md b/plugins/workflow-skill-design/skills/designing-workflow-skills/references/tool-assignment-guide.md index f11b3a8f..4dbace67 100644 --- a/plugins/workflow-skill-design/skills/designing-workflow-skills/references/tool-assignment-guide.md +++ b/plugins/workflow-skill-design/skills/designing-workflow-skills/references/tool-assignment-guide.md @@ -111,12 +111,7 @@ Map the operation you need to the correct tool: Skills that examine code without modifying it: ```yaml -allowed-tools: - - Read - - Glob - - Grep - - TodoRead - - TodoWrite +allowed-tools: Read Glob Grep TodoRead TodoWrite ``` ### Interactive Analysis Skills @@ -124,13 +119,7 @@ allowed-tools: Skills that need user input during execution: ```yaml -allowed-tools: - - Read - - Glob - - Grep - - AskUserQuestion - - TodoRead - - TodoWrite +allowed-tools: Read Glob Grep AskUserQuestion TodoRead TodoWrite ``` ### Code Generation Skills @@ -138,14 +127,7 @@ allowed-tools: Skills that produce output files: ```yaml -allowed-tools: - - Read - - Glob - - Grep - - Write - - Bash - - TodoRead - - TodoWrite +allowed-tools: Read Glob Grep Write Bash TodoRead TodoWrite ``` ### Pipeline Skills (Multi-Step) @@ -153,19 +135,7 @@ allowed-tools: Skills that orchestrate complex workflows: ```yaml -allowed-tools: - - Bash - - Read - - Write - - Glob - - Grep - - AskUserQuestion - - Task - - TaskCreate - - TaskList - - TaskUpdate - - TodoRead - - TodoWrite +allowed-tools: Bash Read Write Glob Grep AskUserQuestion Task TaskCreate TaskList TaskUpdate TodoRead TodoWrite ``` ### Agents diff --git a/plugins/zeroize-audit/skills/zeroize-audit/SKILL.md b/plugins/zeroize-audit/skills/zeroize-audit/SKILL.md index 508c5a3b..95d7465a 100644 --- a/plugins/zeroize-audit/skills/zeroize-audit/SKILL.md +++ b/plugins/zeroize-audit/skills/zeroize-audit/SKILL.md @@ -1,18 +1,7 @@ --- name: zeroize-audit description: "Detects missing zeroization of sensitive data in source code and identifies zeroization removed by compiler optimizations, with assembly-level analysis, and control-flow verification. Use for auditing C/C++/Rust code handling secrets, keys, passwords, or other sensitive data." -allowed-tools: - - Read - - Grep - - Glob - - Bash - - Write - - Task - - AskUserQuestion - - mcp__serena__activate_project - - mcp__serena__find_symbol - - mcp__serena__find_referencing_symbols - - mcp__serena__get_symbols_overview +allowed-tools: Read Grep Glob Bash Write Task AskUserQuestion mcp__serena__activate_project mcp__serena__find_symbol mcp__serena__find_referencing_symbols mcp__serena__get_symbols_overview --- # zeroize-audit — Claude Skill