fresh-eyes-review
Safe 69Review code before committing
by 2389-research
Critical bugs often escape despite passing tests. This skill enforces a mandatory final quality gate that catches security vulnerabilities, logic errors, and business rule bugs before code ships.
firebase-development-validate
Safe 69Validate Firebase code security and architecture
by 2389-research
Firebase projects often have misconfigurations that lead to security vulnerabilities. This skill provides a systematic validation checklist covering Firestore rules, functions architecture, authentication patterns, and production readiness checks.
binary-re-triage
Safe 69Identify binary architecture and dependencies
by 2389-research
Unknown binaries from embedded devices require quick identification before analysis. This skill runs rabin2 and file commands to extract architecture, libc type, and library dependencies in seconds.
binary-re-tool-setup
Medium Risk 63Set up reverse engineering tools
by 2389-research
Binary analysis requires properly installed tools. This skill provides installation guides for radare2, Ghidra, GDB, QEMU, and cross-compilation toolchains across Ubuntu, WSL2, macOS, and Arch Linux.
binary-re-synthesis
Safe 70Synthesize binary analysis findings into structured reports
by 2389-research
Binary reverse engineering produces scattered facts and hypotheses that are difficult to organize and present. This skill provides systematic synthesis methodology to compile findings into confidence-calibrated reports with traceable evidence chains for stakeholders.
binary-re-dynamic-analysis
Low Risk 66Analyze Binaries with Dynamic Runtime Tracing
by 2389-research
Security researchers need to observe actual binary behavior at runtime, not just static code. This skill provides safe, sandboxed execution with QEMU emulation, GDB debugging, and Frida hooking to trace syscalls, inspect memory, and validate reverse engineering hypotheses.
binary-re
Low Risk 67Analyze Unknown Binaries with Guided Reverse Engineering
by 2389-research
Binary reverse engineering is complex and requires specialized tools and methodologies. This skill provides Claude Code with step-by-step guidance for analyzing executables across architectures using industry-standard tools like radare2, QEMU, and Ghidra with proper safety protocols.
security-patterns
Safe 76Apply OWASP security patterns
by 0xDarkMatter
Write secure code by applying proven security patterns. This skill provides OWASP Top 10 guidelines, authentication patterns, input validation, and security headers implementation.
vibe-security
Safe 74Scan code for security vulnerabilities
by 0x8506
Code vulnerabilities like SQL injection and XSS create serious security risks. This skill automatically detects vulnerabilities across multiple languages and provides secure code fixes with explanations.