Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 1 addition & 3 deletions CLAUDE.md
Original file line number Diff line number Diff line change
Expand Up @@ -75,9 +75,7 @@ plugins/
---
name: skill-name # kebab-case, max 64 chars
description: "Third-person description of what it does and when to use it"
allowed-tools: # Optional: restrict to needed tools only
- Read
- Grep
allowed-tools: Read Grep # Optional: restrict to needed tools only
---
```

Expand Down
Original file line number Diff line number Diff line change
@@ -1,11 +1,7 @@
---
name: agentic-actions-auditor
description: "Audits GitHub Actions workflows for security vulnerabilities in AI agent integrations including Claude Code Action, Gemini CLI, OpenAI Codex, and GitHub AI Inference. Detects attack vectors where attacker-controlled input reaches AI agents running in CI/CD pipelines, including env var intermediary patterns, direct expression injection, dangerous sandbox configurations, and wildcard user allowlists. Use when reviewing workflow files that invoke AI coding agents, auditing CI/CD pipeline security for prompt injection risks, or evaluating agentic action configurations."
allowed-tools:
- Read
- Grep
- Glob
- Bash
allowed-tools: Read Grep Glob Bash
---

# Agentic Actions Auditor
Expand Down
Original file line number Diff line number Diff line change
@@ -1,9 +1,7 @@
---
name: burpsuite-project-parser
description: Searches and explores Burp Suite project files (.burp) from the command line. Use when searching response headers or bodies with regex patterns, extracting security audit findings, dumping proxy history or site map data, or analyzing HTTP traffic captured in a Burp project.
allowed-tools:
- Bash
- Read
allowed-tools: Bash Read
---

# Burp Project Parser
Expand Down
Original file line number Diff line number Diff line change
@@ -1,12 +1,7 @@
---
name: interpreting-culture-index
description: Interprets Culture Index (CI) surveys, behavioral profiles, and personality assessment data. Supports individual profile interpretation, team composition analysis (gas/brake/glue), burnout detection, profile comparison, hiring profiles, manager coaching, interview transcript analysis for trait prediction, candidate debrief, onboarding planning, and conflict mediation. Accepts extracted JSON or PDF input via OpenCV extraction script.
allowed-tools:
- Bash
- Read
- Grep
- Glob
- Write
allowed-tools: Bash Read Grep Glob Write
---

<essential_principles>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,12 +5,7 @@ description: >
Adapts analysis depth to codebase size, uses git history for context, calculates
blast radius, checks test coverage, and generates comprehensive markdown reports.
Automatically detects and prevents security regressions.
allowed-tools:
- Read
- Write
- Grep
- Glob
- Bash
allowed-tools: Read Write Grep Glob Bash
---

# Differential Security Review
Expand Down
Original file line number Diff line number Diff line change
@@ -1,15 +1,7 @@
---
name: dimensional-analysis
description: "Annotates codebases with dimensional analysis comments documenting units, dimensions, and decimal scaling. Use when someone asks to annotate units in a codebase, perform a dimensional analysis, or find vulnerabilities in a DeFi protocol, offchain code, or other blockchain-related codebase with arithmetic. Prevents dimensional mismatches and catches formula bugs early."
allowed-tools:
- Read
- Write
- Grep
- List
- Glob
- Task
- TodoRead
- TodoWrite
allowed-tools: Read Write Grep List Glob Task TodoRead TodoWrite
---

# Dimensional Analysis Skill
Expand Down
7 changes: 1 addition & 6 deletions plugins/dwarf-expert/skills/dwarf-expert/SKILL.md
Original file line number Diff line number Diff line change
@@ -1,12 +1,7 @@
---
name: dwarf-expert
description: Provides expertise for analyzing DWARF debug files and understanding the DWARF debug format/standard (v3-v5). Triggers when understanding DWARF information, interacting with DWARF files, answering DWARF-related questions, or working with code that parses DWARF data.
allowed-tools:
- Read
- Bash
- Grep
- Glob
- WebSearch
allowed-tools: Read Bash Grep Glob WebSearch
---
# Overview
This skill provides technical knowledge and expertise about the DWARF standard and how to interact with DWARF files. Tasks include answering questions about the DWARF standard, providing examples of various DWARF features, parsing and/or creating DWARF files, and writing/modifying/analyzing code that interacts with DWARF data.
Expand Down
Original file line number Diff line number Diff line change
@@ -1,11 +1,7 @@
---
name: entry-point-analyzer
description: Analyzes smart contract codebases to identify state-changing entry points for security auditing. Detects externally callable functions that modify state, categorizes them by access level (public, admin, role-restricted, contract-only), and generates structured audit reports. Excludes view/pure/read-only functions. Use when auditing smart contracts (Solidity, Vyper, Solana/Rust, Move, TON, CosmWasm) or when asked to find entry points, audit flows, external functions, access control patterns, or privileged operations.
allowed-tools:
- Read
- Grep
- Glob
- Bash
allowed-tools: Read Grep Glob Bash
---

# Entry Point Analyzer
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
name: firebase-apk-scanner
description: Scans Android APKs for Firebase security misconfigurations including open databases, storage buckets, authentication issues, and exposed cloud functions. Use when analyzing APK files for Firebase vulnerabilities, performing mobile app security audits, or testing Firebase endpoint security. For authorized security research only.
argument-hint: [apk-file-or-directory]
allowed-tools: Bash({baseDir}/scanner.sh:*), Bash(apktool:*), Bash(curl:*), Read, Grep, Glob
allowed-tools: Bash({baseDir}/scanner.sh:*) Bash(apktool:*) Bash(curl:*) Read Grep Glob
disable-model-invocation: true
---

Expand Down
15 changes: 1 addition & 14 deletions plugins/fp-check/skills/fp-check/SKILL.md
Original file line number Diff line number Diff line change
@@ -1,20 +1,7 @@
---
name: fp-check
description: "Systematically verifies suspected security bugs to eliminate false positives. Produces TRUE POSITIVE or FALSE POSITIVE verdicts with documented evidence for each bug."
allowed-tools:
- Read
- Grep
- Glob
- LSP
- Bash
- Task
- Write
- Edit
- AskUserQuestion
- TaskCreate
- TaskUpdate
- TaskList
- TaskGet
allowed-tools: Read Grep Glob LSP Bash Task Write Edit AskUserQuestion TaskCreate TaskUpdate TaskList TaskGet
---

# False Positive Check
Expand Down
6 changes: 1 addition & 5 deletions plugins/git-cleanup/skills/git-cleanup/SKILL.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,11 +2,7 @@
name: git-cleanup
description: "Safely analyzes and cleans up local git branches and worktrees by categorizing them as merged, squash-merged, superseded, or active work."
disable-model-invocation: true
allowed-tools:
- Bash
- Read
- Grep
- AskUserQuestion
allowed-tools: Bash Read Grep AskUserQuestion
---

# Git Cleanup
Expand Down
Original file line number Diff line number Diff line change
@@ -1,11 +1,7 @@
---
name: insecure-defaults
description: "Detects fail-open insecure defaults (hardcoded secrets, weak auth, permissive security) that allow apps to run insecurely in production. Use when auditing security, reviewing config management, or analyzing environment variable handling."
allowed-tools:
- Read
- Grep
- Glob
- Bash
allowed-tools: Read Grep Glob Bash
---

# Insecure Defaults Detection
Expand Down
6 changes: 1 addition & 5 deletions plugins/let-fate-decide/skills/let-fate-decide/SKILL.md
Original file line number Diff line number Diff line change
@@ -1,11 +1,7 @@
---
name: let-fate-decide
description: "Draws 4 Tarot cards using os.urandom() to inject entropy into planning when prompts are vague or underspecified. Interprets the spread to guide next steps. Use when the user is nonchalant, feeling lucky, says 'let fate decide', makes Yu-Gi-Oh references ('heart of the cards'), demonstrates indifference about approach, or says 'try again' on a system with no changes. Also triggers on sufficiently ambiguous prompts where multiple approaches are equally valid."
allowed-tools:
- Bash
- Read
- Grep
- Glob
allowed-tools: Bash Read Grep Glob
---

# Let Fate Decide
Expand Down
Original file line number Diff line number Diff line change
@@ -1,12 +1,7 @@
---
name: seatbelt-sandboxer
description: "Generates minimal macOS Seatbelt sandbox configurations. Use when sandboxing, isolating, or restricting macOS applications with allowlist-based profiles."
allowed-tools:
- Read
- Write
- Bash
- Glob
- Grep
allowed-tools: Read Write Bash Glob Grep
---

# macOS Seatbelt Sandbox Profiling
Expand Down
7 changes: 1 addition & 6 deletions plugins/second-opinion/skills/second-opinion/SKILL.md
Original file line number Diff line number Diff line change
@@ -1,12 +1,7 @@
---
name: second-opinion
description: "Runs external LLM code reviews (OpenAI Codex or Google Gemini CLI) on uncommitted changes, branch diffs, or specific commits. Use when the user asks for a second opinion, external review, codex review, gemini review, or mentions /second-opinion."
allowed-tools:
- Bash
- Read
- Glob
- Grep
- AskUserQuestion
allowed-tools: Bash Read Glob Grep AskUserQuestion
---

# Second Opinion
Expand Down
Original file line number Diff line number Diff line change
@@ -1,14 +1,7 @@
---
name: semgrep-rule-creator
description: Creates custom Semgrep rules for detecting security vulnerabilities, bug patterns, and code patterns. Use when writing Semgrep rules or building custom static analysis detections.
allowed-tools:
- Bash
- Read
- Write
- Edit
- Glob
- Grep
- WebFetch
allowed-tools: Bash Read Write Edit Glob Grep WebFetch
---

# Semgrep Rule Creator
Expand Down
Original file line number Diff line number Diff line change
@@ -1,14 +1,7 @@
---
name: semgrep-rule-variant-creator
description: Creates language variants of existing Semgrep rules. Use when porting a Semgrep rule to specified target languages. Takes an existing rule and target languages as input, produces independent rule+test directories for each language.
allowed-tools:
- Bash
- Read
- Write
- Edit
- Glob
- Grep
- WebFetch
allowed-tools: Bash Read Write Edit Glob Grep WebFetch
---

# Semgrep Rule Variant Creator
Expand Down
5 changes: 1 addition & 4 deletions plugins/sharp-edges/skills/sharp-edges/SKILL.md
Original file line number Diff line number Diff line change
@@ -1,10 +1,7 @@
---
name: sharp-edges
description: "Identifies error-prone APIs, dangerous configurations, and footgun designs that enable security mistakes. Use when reviewing API designs, configuration schemas, cryptographic library ergonomics, or evaluating whether code follows 'secure by default' and 'pit of success' principles. Triggers: footgun, misuse-resistant, secure defaults, API usability, dangerous configuration."
allowed-tools:
- Read
- Grep
- Glob
allowed-tools: Read Grep Glob
---

# Sharp Edges Analysis
Expand Down
8 changes: 1 addition & 7 deletions plugins/skill-improver/skills/skill-improver/SKILL.md
Original file line number Diff line number Diff line change
@@ -1,13 +1,7 @@
---
name: skill-improver
description: "Iteratively reviews and fixes Claude Code skill quality issues until they meet standards. Runs automated fix-review cycles using the skill-reviewer agent. Use to fix skill quality issues, improve skill descriptions, run automated skill review loops, or iteratively refine a skill. Triggers on 'fix my skill', 'improve skill quality', 'skill improvement loop'. NOT for one-time reviews—use /skill-reviewer directly."
allowed-tools:
- Task
- Read
- Edit
- Write
- Glob
- Grep
allowed-tools: Task Read Edit Write Glob Grep
---

# Skill Improvement Methodology
Expand Down
15 changes: 1 addition & 14 deletions plugins/static-analysis/skills/codeql/SKILL.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,20 +6,7 @@ description: >-
codeql database", or "find vulnerabilities with codeql". Supports "run all" (security-and-quality
suite) and "important only" (high-precision security findings) scan modes. Also handles
creating data extension models and processing CodeQL SARIF output.
allowed-tools:
- Bash
- Read
- Write
- Edit
- Glob
- Grep
- AskUserQuestion
- TaskCreate
- TaskList
- TaskUpdate
- TaskGet
- TodoRead
- TodoWrite
allowed-tools: Bash Read Write Edit Glob Grep AskUserQuestion TaskCreate TaskList TaskUpdate TaskGet TodoRead TodoWrite
---

# CodeQL Analysis
Expand Down
6 changes: 1 addition & 5 deletions plugins/static-analysis/skills/sarif-parsing/SKILL.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,11 +5,7 @@ description: >-
scanners. Triggers on "parse sarif", "read scan results", "aggregate findings", "deduplicate
alerts", or "process sarif output". Handles filtering, deduplication, format conversion, and
CI/CD integration of SARIF data. Does NOT run scans — use the Semgrep or CodeQL skills for that.
allowed-tools:
- Bash
- Read
- Glob
- Grep
allowed-tools: Bash Read Glob Grep
---

# SARIF Parsing Best Practices
Expand Down
10 changes: 1 addition & 9 deletions plugins/static-analysis/skills/semgrep/SKILL.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,15 +8,7 @@ description: >-
to scan code for vulnerabilities, run a security audit with Semgrep, find
bugs, or perform static analysis. Spawns parallel workers for multi-language
codebases.
allowed-tools:
- Bash
- Read
- Glob
- Task
- AskUserQuestion
- TaskCreate
- TaskList
- TaskUpdate
allowed-tools: Bash Read Glob Task AskUserQuestion TaskCreate TaskList TaskUpdate
---

# Semgrep Security Scan
Expand Down
Original file line number Diff line number Diff line change
@@ -1,12 +1,7 @@
---
name: supply-chain-risk-auditor
description: "Identifies dependencies at heightened risk of exploitation or takeover. Use when assessing supply chain attack surface, evaluating dependency health, or scoping security engagements."
allowed-tools:
- Read
- Write
- Bash
- Glob
- Grep
allowed-tools: Read Write Bash Glob Grep
---

# Supply Chain Risk Auditor
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,12 +7,7 @@ description: >-
sequential pipelines, routing patterns, safety gates, task tracking,
phased execution, or any multi-step workflow. Also applies when
reviewing or refactoring existing workflow skills for quality.
allowed-tools:
- Read
- Glob
- Grep
- TodoRead
- TodoWrite
allowed-tools: Read Glob Grep TodoRead TodoWrite
---

# Designing Workflow Skills
Expand Down Expand Up @@ -129,8 +124,7 @@ Every workflow skill needs this skeleton, regardless of pattern:
---
name: kebab-case-name
description: "Third-person description with trigger keywords — this is how Claude decides to activate the skill"
allowed-tools:
- [minimum tools needed]
allowed-tools: [minimum tools needed, space-delimited]
# Optional fields — see tool-assignment-guide.md for full reference:
# disable-model-invocation: true # Only user can invoke (not Claude)
# user-invocable: false # Only Claude can invoke (hidden from / menu)
Expand Down
Loading