@elizaos/skills 2.0.0-alpha.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +126 -0
- package/package.json +53 -0
- package/skills/1password/SKILL.md +70 -0
- package/skills/1password/references/cli-examples.md +29 -0
- package/skills/1password/references/get-started.md +17 -0
- package/skills/apple-notes/SKILL.md +77 -0
- package/skills/apple-reminders/SKILL.md +96 -0
- package/skills/bear-notes/SKILL.md +107 -0
- package/skills/bird/SKILL.md +224 -0
- package/skills/blogwatcher/SKILL.md +69 -0
- package/skills/blucli/SKILL.md +47 -0
- package/skills/bluebubbles/SKILL.md +131 -0
- package/skills/camsnap/SKILL.md +45 -0
- package/skills/canvas/SKILL.md +203 -0
- package/skills/clawhub/SKILL.md +77 -0
- package/skills/coding-agent/SKILL.md +284 -0
- package/skills/discord/SKILL.md +578 -0
- package/skills/eightctl/SKILL.md +50 -0
- package/skills/food-order/SKILL.md +48 -0
- package/skills/gemini/SKILL.md +43 -0
- package/skills/gifgrep/SKILL.md +79 -0
- package/skills/github/SKILL.md +77 -0
- package/skills/gog/SKILL.md +116 -0
- package/skills/goplaces/SKILL.md +52 -0
- package/skills/healthcheck/SKILL.md +245 -0
- package/skills/himalaya/SKILL.md +257 -0
- package/skills/himalaya/references/configuration.md +184 -0
- package/skills/himalaya/references/message-composition.md +199 -0
- package/skills/imsg/SKILL.md +74 -0
- package/skills/local-places/SERVER_README.md +101 -0
- package/skills/local-places/SKILL.md +102 -0
- package/skills/local-places/pyproject.toml +21 -0
- package/skills/local-places/src/local_places/__init__.py +2 -0
- package/skills/local-places/src/local_places/google_places.py +314 -0
- package/skills/local-places/src/local_places/main.py +65 -0
- package/skills/local-places/src/local_places/schemas.py +107 -0
- package/skills/mcporter/SKILL.md +61 -0
- package/skills/model-usage/SKILL.md +69 -0
- package/skills/model-usage/references/codexbar-cli.md +33 -0
- package/skills/model-usage/scripts/model_usage.py +310 -0
- package/skills/nano-banana-pro/SKILL.md +58 -0
- package/skills/nano-banana-pro/scripts/generate_image.py +184 -0
- package/skills/nano-pdf/SKILL.md +38 -0
- package/skills/notion/SKILL.md +172 -0
- package/skills/obsidian/SKILL.md +81 -0
- package/skills/openai-image-gen/SKILL.md +89 -0
- package/skills/openai-image-gen/scripts/gen.py +240 -0
- package/skills/openai-whisper/SKILL.md +38 -0
- package/skills/openai-whisper-api/SKILL.md +52 -0
- package/skills/openai-whisper-api/scripts/transcribe.sh +85 -0
- package/skills/openhue/SKILL.md +51 -0
- package/skills/oracle/SKILL.md +125 -0
- package/skills/ordercli/SKILL.md +78 -0
- package/skills/peekaboo/SKILL.md +190 -0
- package/skills/sag/SKILL.md +87 -0
- package/skills/security-ask-questions-if-underspecified/.claude-plugin/plugin.json +10 -0
- package/skills/security-ask-questions-if-underspecified/README.md +24 -0
- package/skills/security-ask-questions-if-underspecified/skills/ask-questions-if-underspecified/SKILL.md +85 -0
- package/skills/security-audit-context-building/.claude-plugin/plugin.json +10 -0
- package/skills/security-audit-context-building/README.md +58 -0
- package/skills/security-audit-context-building/commands/audit-context.md +21 -0
- package/skills/security-audit-context-building/skills/audit-context-building/SKILL.md +297 -0
- package/skills/security-audit-context-building/skills/audit-context-building/resources/COMPLETENESS_CHECKLIST.md +47 -0
- package/skills/security-audit-context-building/skills/audit-context-building/resources/FUNCTION_MICRO_ANALYSIS_EXAMPLE.md +355 -0
- package/skills/security-audit-context-building/skills/audit-context-building/resources/OUTPUT_REQUIREMENTS.md +71 -0
- package/skills/security-building-secure-contracts/.claude-plugin/plugin.json +10 -0
- package/skills/security-building-secure-contracts/README.md +241 -0
- package/skills/security-building-secure-contracts/skills/algorand-vulnerability-scanner/SKILL.md +284 -0
- package/skills/security-building-secure-contracts/skills/algorand-vulnerability-scanner/resources/VULNERABILITY_PATTERNS.md +405 -0
- package/skills/security-building-secure-contracts/skills/audit-prep-assistant/SKILL.md +409 -0
- package/skills/security-building-secure-contracts/skills/cairo-vulnerability-scanner/SKILL.md +329 -0
- package/skills/security-building-secure-contracts/skills/cairo-vulnerability-scanner/resources/VULNERABILITY_PATTERNS.md +722 -0
- package/skills/security-building-secure-contracts/skills/code-maturity-assessor/SKILL.md +218 -0
- package/skills/security-building-secure-contracts/skills/code-maturity-assessor/resources/ASSESSMENT_CRITERIA.md +355 -0
- package/skills/security-building-secure-contracts/skills/code-maturity-assessor/resources/EXAMPLE_REPORT.md +248 -0
- package/skills/security-building-secure-contracts/skills/code-maturity-assessor/resources/REPORT_FORMAT.md +33 -0
- package/skills/security-building-secure-contracts/skills/cosmos-vulnerability-scanner/SKILL.md +334 -0
- package/skills/security-building-secure-contracts/skills/cosmos-vulnerability-scanner/resources/VULNERABILITY_PATTERNS.md +740 -0
- package/skills/security-building-secure-contracts/skills/guidelines-advisor/SKILL.md +252 -0
- package/skills/security-building-secure-contracts/skills/guidelines-advisor/resources/ASSESSMENT_AREAS.md +329 -0
- package/skills/security-building-secure-contracts/skills/guidelines-advisor/resources/DELIVERABLES.md +118 -0
- package/skills/security-building-secure-contracts/skills/guidelines-advisor/resources/EXAMPLE_REPORT.md +298 -0
- package/skills/security-building-secure-contracts/skills/secure-workflow-guide/SKILL.md +161 -0
- package/skills/security-building-secure-contracts/skills/secure-workflow-guide/resources/EXAMPLE_REPORT.md +279 -0
- package/skills/security-building-secure-contracts/skills/secure-workflow-guide/resources/WORKFLOW_STEPS.md +132 -0
- package/skills/security-building-secure-contracts/skills/solana-vulnerability-scanner/SKILL.md +389 -0
- package/skills/security-building-secure-contracts/skills/solana-vulnerability-scanner/resources/VULNERABILITY_PATTERNS.md +669 -0
- package/skills/security-building-secure-contracts/skills/substrate-vulnerability-scanner/SKILL.md +298 -0
- package/skills/security-building-secure-contracts/skills/substrate-vulnerability-scanner/resources/VULNERABILITY_PATTERNS.md +791 -0
- package/skills/security-building-secure-contracts/skills/token-integration-analyzer/SKILL.md +362 -0
- package/skills/security-building-secure-contracts/skills/token-integration-analyzer/resources/ASSESSMENT_CATEGORIES.md +571 -0
- package/skills/security-building-secure-contracts/skills/token-integration-analyzer/resources/REPORT_TEMPLATES.md +141 -0
- package/skills/security-building-secure-contracts/skills/ton-vulnerability-scanner/SKILL.md +388 -0
- package/skills/security-building-secure-contracts/skills/ton-vulnerability-scanner/resources/VULNERABILITY_PATTERNS.md +595 -0
- package/skills/security-burpsuite-project-parser/.claude-plugin/plugin.json +10 -0
- package/skills/security-burpsuite-project-parser/README.md +103 -0
- package/skills/security-burpsuite-project-parser/commands/burp-search.md +18 -0
- package/skills/security-burpsuite-project-parser/skills/SKILL.md +358 -0
- package/skills/security-burpsuite-project-parser/skills/scripts/burp-search.sh +99 -0
- package/skills/security-claude-in-chrome-troubleshooting/.claude-plugin/plugin.json +8 -0
- package/skills/security-claude-in-chrome-troubleshooting/README.md +31 -0
- package/skills/security-claude-in-chrome-troubleshooting/skills/claude-in-chrome-troubleshooting/SKILL.md +251 -0
- package/skills/security-constant-time-analysis/.claude-plugin/plugin.json +9 -0
- package/skills/security-constant-time-analysis/README.md +381 -0
- package/skills/security-constant-time-analysis/commands/ct-check.md +20 -0
- package/skills/security-constant-time-analysis/ct_analyzer/__init__.py +49 -0
- package/skills/security-constant-time-analysis/ct_analyzer/analyzer.py +1284 -0
- package/skills/security-constant-time-analysis/ct_analyzer/script_analyzers.py +3081 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/__init__.py +1 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_analyzer.py +1397 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/bn_excerpt.js +205 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/decompose_constant_time.c +181 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/decompose_vulnerable.c +74 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/decompose_vulnerable.go +78 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/decompose_vulnerable.rs +92 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/vulnerable.cs +174 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/vulnerable.java +161 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/vulnerable.kt +181 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/vulnerable.php +140 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/vulnerable.py +252 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/vulnerable.rb +188 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/vulnerable.swift +199 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/vulnerable.ts +154 -0
- package/skills/security-constant-time-analysis/pyproject.toml +52 -0
- package/skills/security-constant-time-analysis/skills/constant-time-analysis/README.md +90 -0
- package/skills/security-constant-time-analysis/skills/constant-time-analysis/SKILL.md +219 -0
- package/skills/security-constant-time-analysis/skills/constant-time-analysis/references/compiled.md +129 -0
- package/skills/security-constant-time-analysis/skills/constant-time-analysis/references/javascript.md +136 -0
- package/skills/security-constant-time-analysis/skills/constant-time-analysis/references/kotlin.md +252 -0
- package/skills/security-constant-time-analysis/skills/constant-time-analysis/references/php.md +172 -0
- package/skills/security-constant-time-analysis/skills/constant-time-analysis/references/python.md +179 -0
- package/skills/security-constant-time-analysis/skills/constant-time-analysis/references/ruby.md +198 -0
- package/skills/security-constant-time-analysis/skills/constant-time-analysis/references/swift.md +288 -0
- package/skills/security-constant-time-analysis/skills/constant-time-analysis/references/vm-compiled.md +354 -0
- package/skills/security-constant-time-analysis/uv.lock +8 -0
- package/skills/security-culture-index/.claude-plugin/plugin.json +8 -0
- package/skills/security-culture-index/README.md +79 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/SKILL.md +293 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/references/anti-patterns.md +255 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/references/conversation-starters.md +408 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/references/interview-trait-signals.md +253 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/references/motivators.md +158 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/references/patterns-archetypes.md +147 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/references/primary-traits.md +307 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/references/secondary-traits.md +228 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/references/team-composition.md +148 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/scripts/check_deps.py +108 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/scripts/culture_index/__init__.py +20 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/scripts/culture_index/constants.py +122 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/scripts/culture_index/extract.py +187 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/scripts/culture_index/models.py +16 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/scripts/culture_index/opencv_extractor.py +520 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/scripts/extract_pdf.py +237 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/scripts/pyproject.toml +18 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/templates/burnout-report.md +113 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/templates/comparison-report.md +103 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/templates/hiring-profile.md +127 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/templates/individual-report.md +85 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/templates/predicted-profile.md +165 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/templates/team-report.md +109 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/workflows/analyze-team.md +188 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/workflows/coach-manager.md +267 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/workflows/compare-profiles.md +188 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/workflows/define-hiring-profile.md +220 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/workflows/detect-burnout.md +206 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/workflows/extract-from-pdf.md +121 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/workflows/interpret-individual.md +183 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/workflows/interview-debrief.md +234 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/workflows/mediate-conflict.md +306 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/workflows/plan-onboarding.md +322 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/workflows/predict-from-interview.md +250 -0
- package/skills/security-differential-review/.claude-plugin/plugin.json +10 -0
- package/skills/security-differential-review/README.md +109 -0
- package/skills/security-differential-review/commands/diff-review.md +21 -0
- package/skills/security-differential-review/skills/differential-review/SKILL.md +220 -0
- package/skills/security-differential-review/skills/differential-review/adversarial.md +203 -0
- package/skills/security-differential-review/skills/differential-review/methodology.md +234 -0
- package/skills/security-differential-review/skills/differential-review/patterns.md +300 -0
- package/skills/security-differential-review/skills/differential-review/reporting.md +369 -0
- package/skills/security-dwarf-expert/.claude-plugin/plugin.json +10 -0
- package/skills/security-dwarf-expert/README.md +38 -0
- package/skills/security-dwarf-expert/skills/dwarf-expert/SKILL.md +93 -0
- package/skills/security-dwarf-expert/skills/dwarf-expert/reference/coding.md +31 -0
- package/skills/security-dwarf-expert/skills/dwarf-expert/reference/dwarfdump.md +50 -0
- package/skills/security-dwarf-expert/skills/dwarf-expert/reference/readelf.md +8 -0
- package/skills/security-entry-point-analyzer/.claude-plugin/plugin.json +10 -0
- package/skills/security-entry-point-analyzer/README.md +74 -0
- package/skills/security-entry-point-analyzer/commands/entry-points.md +18 -0
- package/skills/security-entry-point-analyzer/skills/entry-point-analyzer/SKILL.md +251 -0
- package/skills/security-entry-point-analyzer/skills/entry-point-analyzer/references/cosmwasm.md +182 -0
- package/skills/security-entry-point-analyzer/skills/entry-point-analyzer/references/move-aptos.md +107 -0
- package/skills/security-entry-point-analyzer/skills/entry-point-analyzer/references/move-sui.md +87 -0
- package/skills/security-entry-point-analyzer/skills/entry-point-analyzer/references/solana.md +155 -0
- package/skills/security-entry-point-analyzer/skills/entry-point-analyzer/references/solidity.md +135 -0
- package/skills/security-entry-point-analyzer/skills/entry-point-analyzer/references/ton.md +185 -0
- package/skills/security-entry-point-analyzer/skills/entry-point-analyzer/references/vyper.md +141 -0
- package/skills/security-firebase-apk-scanner/.claude-plugin/plugin.json +10 -0
- package/skills/security-firebase-apk-scanner/README.md +85 -0
- package/skills/security-firebase-apk-scanner/commands/scan-apk.md +18 -0
- package/skills/security-firebase-apk-scanner/scanner.sh +1408 -0
- package/skills/security-firebase-apk-scanner/skills/firebase-apk-scanner/SKILL.md +197 -0
- package/skills/security-firebase-apk-scanner/skills/firebase-apk-scanner/references/vulnerabilities.md +803 -0
- package/skills/security-fix-review/.claude-plugin/plugin.json +13 -0
- package/skills/security-fix-review/README.md +118 -0
- package/skills/security-fix-review/commands/fix-review.md +24 -0
- package/skills/security-fix-review/skills/fix-review/SKILL.md +264 -0
- package/skills/security-fix-review/skills/fix-review/references/bug-detection.md +408 -0
- package/skills/security-fix-review/skills/fix-review/references/finding-matching.md +298 -0
- package/skills/security-fix-review/skills/fix-review/references/report-parsing.md +398 -0
- package/skills/security-insecure-defaults/.claude-plugin/plugin.json +10 -0
- package/skills/security-insecure-defaults/README.md +45 -0
- package/skills/security-insecure-defaults/skills/insecure-defaults/SKILL.md +117 -0
- package/skills/security-insecure-defaults/skills/insecure-defaults/references/examples.md +409 -0
- package/skills/security-modern-python/.claude-plugin/plugin.json +10 -0
- package/skills/security-modern-python/README.md +58 -0
- package/skills/security-modern-python/hooks/hooks.json +16 -0
- package/skills/security-modern-python/hooks/intercept-legacy-python.bats +388 -0
- package/skills/security-modern-python/hooks/intercept-legacy-python.sh +109 -0
- package/skills/security-modern-python/hooks/test_helper.bash +75 -0
- package/skills/security-modern-python/skills/modern-python/SKILL.md +333 -0
- package/skills/security-modern-python/skills/modern-python/references/dependabot.md +43 -0
- package/skills/security-modern-python/skills/modern-python/references/migration-checklist.md +141 -0
- package/skills/security-modern-python/skills/modern-python/references/pep723-scripts.md +259 -0
- package/skills/security-modern-python/skills/modern-python/references/prek.md +211 -0
- package/skills/security-modern-python/skills/modern-python/references/pyproject.md +254 -0
- package/skills/security-modern-python/skills/modern-python/references/ruff-config.md +240 -0
- package/skills/security-modern-python/skills/modern-python/references/security-setup.md +255 -0
- package/skills/security-modern-python/skills/modern-python/references/testing.md +284 -0
- package/skills/security-modern-python/skills/modern-python/references/uv-commands.md +200 -0
- package/skills/security-modern-python/skills/modern-python/templates/dependabot.yml +36 -0
- package/skills/security-modern-python/skills/modern-python/templates/pre-commit-config.yaml +66 -0
- package/skills/security-property-based-testing/.claude-plugin/plugin.json +9 -0
- package/skills/security-property-based-testing/README.md +47 -0
- package/skills/security-property-based-testing/skills/property-based-testing/README.md +88 -0
- package/skills/security-property-based-testing/skills/property-based-testing/SKILL.md +109 -0
- package/skills/security-property-based-testing/skills/property-based-testing/references/design.md +191 -0
- package/skills/security-property-based-testing/skills/property-based-testing/references/generating.md +200 -0
- package/skills/security-property-based-testing/skills/property-based-testing/references/libraries.md +130 -0
- package/skills/security-property-based-testing/skills/property-based-testing/references/refactoring.md +181 -0
- package/skills/security-property-based-testing/skills/property-based-testing/references/reviewing.md +209 -0
- package/skills/security-property-based-testing/skills/property-based-testing/references/strategies.md +124 -0
- package/skills/semgrep-rule-creator/.claude-plugin/plugin.json +8 -0
- package/skills/semgrep-rule-creator/README.md +43 -0
- package/skills/semgrep-rule-creator/commands/semgrep-rule.md +26 -0
- package/skills/semgrep-rule-creator/skills/semgrep-rule-creator/SKILL.md +168 -0
- package/skills/semgrep-rule-creator/skills/semgrep-rule-creator/references/quick-reference.md +203 -0
- package/skills/semgrep-rule-creator/skills/semgrep-rule-creator/references/workflow.md +240 -0
- package/skills/semgrep-rule-variant-creator/.claude-plugin/plugin.json +9 -0
- package/skills/semgrep-rule-variant-creator/README.md +86 -0
- package/skills/semgrep-rule-variant-creator/skills/semgrep-rule-variant-creator/SKILL.md +205 -0
- package/skills/semgrep-rule-variant-creator/skills/semgrep-rule-variant-creator/references/applicability-analysis.md +250 -0
- package/skills/semgrep-rule-variant-creator/skills/semgrep-rule-variant-creator/references/language-syntax-guide.md +324 -0
- package/skills/semgrep-rule-variant-creator/skills/semgrep-rule-variant-creator/references/workflow.md +518 -0
- package/skills/session-logs/SKILL.md +115 -0
- package/skills/sharp-edges/.claude-plugin/plugin.json +10 -0
- package/skills/sharp-edges/README.md +48 -0
- package/skills/sharp-edges/skills/sharp-edges/SKILL.md +292 -0
- package/skills/sharp-edges/skills/sharp-edges/references/auth-patterns.md +252 -0
- package/skills/sharp-edges/skills/sharp-edges/references/case-studies.md +274 -0
- package/skills/sharp-edges/skills/sharp-edges/references/config-patterns.md +333 -0
- package/skills/sharp-edges/skills/sharp-edges/references/crypto-apis.md +190 -0
- package/skills/sharp-edges/skills/sharp-edges/references/lang-c.md +205 -0
- package/skills/sharp-edges/skills/sharp-edges/references/lang-csharp.md +285 -0
- package/skills/sharp-edges/skills/sharp-edges/references/lang-go.md +270 -0
- package/skills/sharp-edges/skills/sharp-edges/references/lang-java.md +263 -0
- package/skills/sharp-edges/skills/sharp-edges/references/lang-javascript.md +269 -0
- package/skills/sharp-edges/skills/sharp-edges/references/lang-kotlin.md +265 -0
- package/skills/sharp-edges/skills/sharp-edges/references/lang-php.md +245 -0
- package/skills/sharp-edges/skills/sharp-edges/references/lang-python.md +274 -0
- package/skills/sharp-edges/skills/sharp-edges/references/lang-ruby.md +273 -0
- package/skills/sharp-edges/skills/sharp-edges/references/lang-rust.md +272 -0
- package/skills/sharp-edges/skills/sharp-edges/references/lang-swift.md +287 -0
- package/skills/sharp-edges/skills/sharp-edges/references/language-specific.md +588 -0
- package/skills/sherpa-onnx-tts/SKILL.md +103 -0
- package/skills/sherpa-onnx-tts/bin/sherpa-onnx-tts +178 -0
- package/skills/skill-creator/SKILL.md +370 -0
- package/skills/skill-creator/license.txt +202 -0
- package/skills/skill-creator/scripts/init_skill.py +378 -0
- package/skills/skill-creator/scripts/package_skill.py +111 -0
- package/skills/skill-creator/scripts/quick_validate.py +101 -0
- package/skills/slack/SKILL.md +144 -0
- package/skills/songsee/SKILL.md +49 -0
- package/skills/sonoscli/SKILL.md +46 -0
- package/skills/spec-to-code-compliance/.claude-plugin/plugin.json +10 -0
- package/skills/spec-to-code-compliance/README.md +67 -0
- package/skills/spec-to-code-compliance/commands/spec-compliance.md +22 -0
- package/skills/spec-to-code-compliance/skills/spec-to-code-compliance/SKILL.md +349 -0
- package/skills/spec-to-code-compliance/skills/spec-to-code-compliance/resources/COMPLETENESS_CHECKLIST.md +69 -0
- package/skills/spec-to-code-compliance/skills/spec-to-code-compliance/resources/IR_EXAMPLES.md +417 -0
- package/skills/spec-to-code-compliance/skills/spec-to-code-compliance/resources/OUTPUT_REQUIREMENTS.md +105 -0
- package/skills/spotify-player/SKILL.md +64 -0
- package/skills/static-analysis/.claude-plugin/plugin.json +8 -0
- package/skills/static-analysis/README.md +59 -0
- package/skills/static-analysis/skills/codeql/SKILL.md +315 -0
- package/skills/static-analysis/skills/sarif-parsing/SKILL.md +479 -0
- package/skills/static-analysis/skills/sarif-parsing/resources/jq-queries.md +162 -0
- package/skills/static-analysis/skills/sarif-parsing/resources/sarif_helpers.py +331 -0
- package/skills/static-analysis/skills/semgrep/SKILL.md +337 -0
- package/skills/summarize/SKILL.md +87 -0
- package/skills/testing-handbook-skills/.claude-plugin/plugin.json +8 -0
- package/skills/testing-handbook-skills/README.md +241 -0
- package/skills/testing-handbook-skills/scripts/pyproject.toml +8 -0
- package/skills/testing-handbook-skills/scripts/validate-skills.py +657 -0
- package/skills/testing-handbook-skills/skills/address-sanitizer/SKILL.md +341 -0
- package/skills/testing-handbook-skills/skills/aflpp/SKILL.md +640 -0
- package/skills/testing-handbook-skills/skills/atheris/SKILL.md +515 -0
- package/skills/testing-handbook-skills/skills/cargo-fuzz/SKILL.md +454 -0
- package/skills/testing-handbook-skills/skills/codeql/SKILL.md +549 -0
- package/skills/testing-handbook-skills/skills/constant-time-testing/SKILL.md +507 -0
- package/skills/testing-handbook-skills/skills/coverage-analysis/SKILL.md +607 -0
- package/skills/testing-handbook-skills/skills/fuzzing-dictionary/SKILL.md +297 -0
- package/skills/testing-handbook-skills/skills/fuzzing-obstacles/SKILL.md +426 -0
- package/skills/testing-handbook-skills/skills/harness-writing/SKILL.md +614 -0
- package/skills/testing-handbook-skills/skills/libafl/SKILL.md +625 -0
- package/skills/testing-handbook-skills/skills/libfuzzer/SKILL.md +795 -0
- package/skills/testing-handbook-skills/skills/ossfuzz/SKILL.md +426 -0
- package/skills/testing-handbook-skills/skills/ruzzy/SKILL.md +443 -0
- package/skills/testing-handbook-skills/skills/semgrep/SKILL.md +601 -0
- package/skills/testing-handbook-skills/skills/testing-handbook-generator/SKILL.md +372 -0
- package/skills/testing-handbook-skills/skills/testing-handbook-generator/agent-prompt.md +280 -0
- package/skills/testing-handbook-skills/skills/testing-handbook-generator/discovery.md +452 -0
- package/skills/testing-handbook-skills/skills/testing-handbook-generator/templates/domain-skill.md +504 -0
- package/skills/testing-handbook-skills/skills/testing-handbook-generator/templates/fuzzer-skill.md +454 -0
- package/skills/testing-handbook-skills/skills/testing-handbook-generator/templates/technique-skill.md +527 -0
- package/skills/testing-handbook-skills/skills/testing-handbook-generator/templates/tool-skill.md +366 -0
- package/skills/testing-handbook-skills/skills/testing-handbook-generator/testing.md +482 -0
- package/skills/testing-handbook-skills/skills/wycheproof/SKILL.md +533 -0
- package/skills/things-mac/SKILL.md +86 -0
- package/skills/tmux/SKILL.md +135 -0
- package/skills/tmux/scripts/find-sessions.sh +112 -0
- package/skills/tmux/scripts/wait-for-text.sh +83 -0
- package/skills/trello/SKILL.md +95 -0
- package/skills/variant-analysis/.claude-plugin/plugin.json +8 -0
- package/skills/variant-analysis/README.md +41 -0
- package/skills/variant-analysis/commands/variants.md +23 -0
- package/skills/variant-analysis/skills/variant-analysis/METHODOLOGY.md +327 -0
- package/skills/variant-analysis/skills/variant-analysis/SKILL.md +142 -0
- package/skills/variant-analysis/skills/variant-analysis/resources/codeql/cpp.ql +119 -0
- package/skills/variant-analysis/skills/variant-analysis/resources/codeql/go.ql +69 -0
- package/skills/variant-analysis/skills/variant-analysis/resources/codeql/java.ql +71 -0
- package/skills/variant-analysis/skills/variant-analysis/resources/codeql/javascript.ql +63 -0
- package/skills/variant-analysis/skills/variant-analysis/resources/codeql/python.ql +80 -0
- package/skills/variant-analysis/skills/variant-analysis/resources/semgrep/cpp.yaml +98 -0
- package/skills/variant-analysis/skills/variant-analysis/resources/semgrep/go.yaml +63 -0
- package/skills/variant-analysis/skills/variant-analysis/resources/semgrep/java.yaml +61 -0
- package/skills/variant-analysis/skills/variant-analysis/resources/semgrep/javascript.yaml +60 -0
- package/skills/variant-analysis/skills/variant-analysis/resources/semgrep/python.yaml +72 -0
- package/skills/variant-analysis/skills/variant-analysis/resources/variant-report-template.md +75 -0
- package/skills/video-frames/SKILL.md +46 -0
- package/skills/video-frames/scripts/frame.sh +81 -0
- package/skills/voice-call/SKILL.md +45 -0
- package/skills/wacli/SKILL.md +72 -0
- package/skills/weather/SKILL.md +54 -0
- package/skills/yara-authoring/.claude-plugin/plugin.json +9 -0
- package/skills/yara-authoring/README.md +131 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/SKILL.md +645 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/examples/MAL_Mac_ProtonRAT_Jan25.yar +99 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/examples/MAL_NPM_SupplyChain_Jan25.yar +170 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/examples/MAL_Win_Remcos_Jan25.yar +103 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/examples/SUSP_CRX_SuspiciousPermissions.yar +134 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/examples/SUSP_JS_Obfuscation_Jan25.yar +185 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/references/crx-module.md +214 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/references/dex-module.md +383 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/references/performance.md +333 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/references/strings.md +433 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/references/style-guide.md +257 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/references/testing.md +399 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/scripts/atom_analyzer.py +526 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/scripts/pyproject.toml +25 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/scripts/yara_lint.py +631 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/workflows/rule-development.md +493 -0
|
@@ -0,0 +1,154 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Vulnerable TypeScript code sample for constant-time analysis testing.
|
|
3
|
+
*
|
|
4
|
+
* This file demonstrates common timing side-channel vulnerabilities in JavaScript/TypeScript:
|
|
5
|
+
* - Variable-time division operations
|
|
6
|
+
* - Timing-unsafe string comparisons
|
|
7
|
+
* - Variable-latency math operations
|
|
8
|
+
* - Predictable randomness
|
|
9
|
+
*
|
|
10
|
+
* DO NOT USE THIS CODE IN PRODUCTION - it is intentionally vulnerable.
|
|
11
|
+
*/
|
|
12
|
+
|
|
13
|
+
/**
|
|
14
|
+
* Vulnerable modular reduction using division.
|
|
15
|
+
* Division has data-dependent timing on most platforms.
|
|
16
|
+
*/
|
|
17
|
+
export function vulnerableModReduce(value: number, modulus: number): number {
|
|
18
|
+
// VULNERABLE: Division has variable-time execution
|
|
19
|
+
const quotient = Math.floor(value / modulus);
|
|
20
|
+
// VULNERABLE: Modulo has variable-time execution
|
|
21
|
+
const remainder = value % modulus;
|
|
22
|
+
|
|
23
|
+
// Use quotient to prevent dead code elimination
|
|
24
|
+
if (quotient < 0) {
|
|
25
|
+
throw new Error("Unexpected negative quotient");
|
|
26
|
+
}
|
|
27
|
+
|
|
28
|
+
return remainder;
|
|
29
|
+
}
|
|
30
|
+
|
|
31
|
+
/**
|
|
32
|
+
* Vulnerable token comparison using early-exit equality.
|
|
33
|
+
* This leaks timing information about how many characters match.
|
|
34
|
+
*/
|
|
35
|
+
export function vulnerableTokenCompare(provided: string, expected: string): boolean {
|
|
36
|
+
// VULNERABLE: === on strings may early-exit
|
|
37
|
+
return provided === expected;
|
|
38
|
+
}
|
|
39
|
+
|
|
40
|
+
/**
|
|
41
|
+
* Vulnerable comparison using localeCompare.
|
|
42
|
+
* localeCompare() has variable-time execution.
|
|
43
|
+
*/
|
|
44
|
+
export function vulnerableLocaleCompare(a: string, b: string): boolean {
|
|
45
|
+
// VULNERABLE: localeCompare has variable-time execution
|
|
46
|
+
return a.localeCompare(b) === 0;
|
|
47
|
+
}
|
|
48
|
+
|
|
49
|
+
/**
|
|
50
|
+
* Vulnerable string search using indexOf.
|
|
51
|
+
* indexOf() has early-terminating behavior.
|
|
52
|
+
*/
|
|
53
|
+
export function vulnerableStringSearch(haystack: string, needle: string): boolean {
|
|
54
|
+
// VULNERABLE: indexOf has early-terminating behavior
|
|
55
|
+
return haystack.indexOf(needle) !== -1;
|
|
56
|
+
}
|
|
57
|
+
|
|
58
|
+
/**
|
|
59
|
+
* Vulnerable string check using includes.
|
|
60
|
+
* includes() has early-terminating behavior.
|
|
61
|
+
*/
|
|
62
|
+
export function vulnerableIncludes(haystack: string, needle: string): boolean {
|
|
63
|
+
// VULNERABLE: includes has early-terminating behavior
|
|
64
|
+
return haystack.includes(needle);
|
|
65
|
+
}
|
|
66
|
+
|
|
67
|
+
/**
|
|
68
|
+
* Vulnerable square root calculation.
|
|
69
|
+
* Math.sqrt() has variable latency based on operand values.
|
|
70
|
+
*/
|
|
71
|
+
export function vulnerableSqrt(value: number): number {
|
|
72
|
+
// VULNERABLE: Math.sqrt has variable latency
|
|
73
|
+
return Math.sqrt(value);
|
|
74
|
+
}
|
|
75
|
+
|
|
76
|
+
/**
|
|
77
|
+
* Vulnerable power calculation.
|
|
78
|
+
* Math.pow() has variable latency based on operand values.
|
|
79
|
+
*/
|
|
80
|
+
export function vulnerablePow(base: number, exponent: number): number {
|
|
81
|
+
// VULNERABLE: Math.pow has variable latency
|
|
82
|
+
return Math.pow(base, exponent);
|
|
83
|
+
}
|
|
84
|
+
|
|
85
|
+
/**
|
|
86
|
+
* Vulnerable random number generation.
|
|
87
|
+
* Math.random() is predictable and not cryptographically secure.
|
|
88
|
+
*/
|
|
89
|
+
export function vulnerableRandomToken(length: number): string {
|
|
90
|
+
const chars = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789';
|
|
91
|
+
let token = '';
|
|
92
|
+
|
|
93
|
+
for (let i = 0; i < length; i++) {
|
|
94
|
+
// VULNERABLE: Math.random is predictable
|
|
95
|
+
token += chars[Math.floor(Math.random() * chars.length)];
|
|
96
|
+
}
|
|
97
|
+
|
|
98
|
+
return token;
|
|
99
|
+
}
|
|
100
|
+
|
|
101
|
+
/**
|
|
102
|
+
* Vulnerable string prefix check using startsWith.
|
|
103
|
+
* startsWith() has early-terminating behavior.
|
|
104
|
+
*/
|
|
105
|
+
export function vulnerableStartsWith(str: string, prefix: string): boolean {
|
|
106
|
+
// VULNERABLE: startsWith has early-terminating behavior
|
|
107
|
+
return str.startsWith(prefix);
|
|
108
|
+
}
|
|
109
|
+
|
|
110
|
+
/**
|
|
111
|
+
* Vulnerable ML-DSA-like decompose function with division.
|
|
112
|
+
* Demonstrates the KyberSlash-style vulnerability.
|
|
113
|
+
*/
|
|
114
|
+
export function vulnerableDecompose(r: number, gamma2: number): { r1: number; r0: number } {
|
|
115
|
+
// VULNERABLE: Division has variable-time execution
|
|
116
|
+
let r1 = Math.floor((r + 127) / (2 * gamma2));
|
|
117
|
+
|
|
118
|
+
// VULNERABLE: Modulo has variable-time execution
|
|
119
|
+
let r0 = r % (2 * gamma2);
|
|
120
|
+
|
|
121
|
+
// Centering
|
|
122
|
+
if (r0 > gamma2) {
|
|
123
|
+
r0 -= 2 * gamma2;
|
|
124
|
+
r1 += 1;
|
|
125
|
+
}
|
|
126
|
+
|
|
127
|
+
return { r1, r0 };
|
|
128
|
+
}
|
|
129
|
+
|
|
130
|
+
// Test harness to prevent dead code elimination
|
|
131
|
+
function runTests(): void {
|
|
132
|
+
console.log("Running vulnerable operations for testing...");
|
|
133
|
+
|
|
134
|
+
const result1 = vulnerableModReduce(12345, 97);
|
|
135
|
+
console.log(`Mod reduce: ${result1}`);
|
|
136
|
+
|
|
137
|
+
const result2 = vulnerableTokenCompare("secret123", "secret123");
|
|
138
|
+
console.log(`Token compare: ${result2}`);
|
|
139
|
+
|
|
140
|
+
const result3 = vulnerableSqrt(144);
|
|
141
|
+
console.log(`Sqrt: ${result3}`);
|
|
142
|
+
|
|
143
|
+
const result4 = vulnerablePow(2, 10);
|
|
144
|
+
console.log(`Pow: ${result4}`);
|
|
145
|
+
|
|
146
|
+
const result5 = vulnerableRandomToken(16);
|
|
147
|
+
console.log(`Token: ${result5}`);
|
|
148
|
+
|
|
149
|
+
const result6 = vulnerableDecompose(1000, 261888);
|
|
150
|
+
console.log(`Decompose: r1=${result6.r1}, r0=${result6.r0}`);
|
|
151
|
+
}
|
|
152
|
+
|
|
153
|
+
// Export for testing
|
|
154
|
+
export { runTests };
|
|
@@ -0,0 +1,52 @@
|
|
|
1
|
+
[build-system]
|
|
2
|
+
requires = ["hatchling"]
|
|
3
|
+
build-backend = "hatchling.build"
|
|
4
|
+
|
|
5
|
+
[project]
|
|
6
|
+
name = "ct-analyzer"
|
|
7
|
+
version = "0.1.0"
|
|
8
|
+
description = "Constant-time assembly analyzer for detecting timing side-channel vulnerabilities"
|
|
9
|
+
readme = "README.md"
|
|
10
|
+
requires-python = ">=3.10"
|
|
11
|
+
authors = [
|
|
12
|
+
{name = "Scott Arciszewski", email = "opensource@trailofbits.com"}
|
|
13
|
+
]
|
|
14
|
+
keywords = [
|
|
15
|
+
"cryptography",
|
|
16
|
+
"security",
|
|
17
|
+
"timing-attack",
|
|
18
|
+
"side-channel",
|
|
19
|
+
"constant-time",
|
|
20
|
+
"static-analysis",
|
|
21
|
+
]
|
|
22
|
+
classifiers = [
|
|
23
|
+
"Development Status :: 4 - Beta",
|
|
24
|
+
"Intended Audience :: Developers",
|
|
25
|
+
"Intended Audience :: Science/Research",
|
|
26
|
+
"Operating System :: OS Independent",
|
|
27
|
+
"Programming Language :: Python :: 3",
|
|
28
|
+
"Programming Language :: Python :: 3.10",
|
|
29
|
+
"Programming Language :: Python :: 3.11",
|
|
30
|
+
"Programming Language :: Python :: 3.12",
|
|
31
|
+
"Topic :: Security :: Cryptography",
|
|
32
|
+
"Topic :: Software Development :: Quality Assurance",
|
|
33
|
+
]
|
|
34
|
+
|
|
35
|
+
[project.scripts]
|
|
36
|
+
ct-analyzer = "ct_analyzer.analyzer:main"
|
|
37
|
+
|
|
38
|
+
[project.urls]
|
|
39
|
+
Homepage = "https://github.com/trailofbits/skills"
|
|
40
|
+
Documentation = "https://github.com/trailofbits/skills/tree/main/plugins/constant-time-analysis#readme"
|
|
41
|
+
Repository = "https://github.com/trailofbits/skills.git"
|
|
42
|
+
|
|
43
|
+
[tool.hatch.build.targets.wheel]
|
|
44
|
+
packages = ["ct_analyzer"]
|
|
45
|
+
|
|
46
|
+
[tool.hatch.build.targets.sdist]
|
|
47
|
+
include = [
|
|
48
|
+
"ct_analyzer/**/*.py",
|
|
49
|
+
"ct_analyzer/tests/test_samples/*.c",
|
|
50
|
+
"ct_analyzer/tests/test_samples/*.go",
|
|
51
|
+
"ct_analyzer/tests/test_samples/*.rs",
|
|
52
|
+
]
|
|
@@ -0,0 +1,90 @@
|
|
|
1
|
+
# Constant-Time Analysis Skill
|
|
2
|
+
|
|
3
|
+
A Claude Code skill that detects timing side-channel vulnerabilities in cryptographic code by analyzing assembly or bytecode output for dangerous instructions.
|
|
4
|
+
|
|
5
|
+
## What This Skill Does
|
|
6
|
+
|
|
7
|
+
When activated, this skill helps Claude:
|
|
8
|
+
|
|
9
|
+
- **Detect timing vulnerabilities** - Identifies variable-time instructions (division, floating-point) that leak secrets through execution timing
|
|
10
|
+
- **Analyze across architectures** - Tests compiled output for x86_64, ARM64, RISC-V, and other targets
|
|
11
|
+
- **Support scripting languages** - Analyzes PHP, JavaScript/TypeScript, Python, and Ruby via bytecode
|
|
12
|
+
- **Guide constant-time fixes** - Provides patterns for Barrett reduction, constant-time selection, and safe comparisons
|
|
13
|
+
- **Integrate with CI** - Produces JSON output suitable for automated pipelines
|
|
14
|
+
|
|
15
|
+
## Supported Languages
|
|
16
|
+
|
|
17
|
+
| Language | Analysis Method | Reference Guide |
|
|
18
|
+
|----------|-----------------|-----------------|
|
|
19
|
+
| C/C++ | Assembly (gcc/clang) | [references/compiled.md](references/compiled.md) |
|
|
20
|
+
| Go | Assembly (go) | [references/compiled.md](references/compiled.md) |
|
|
21
|
+
| Rust | Assembly (rustc) | [references/compiled.md](references/compiled.md) |
|
|
22
|
+
| PHP | Zend opcodes (VLD/OPcache) | [references/php.md](references/php.md) |
|
|
23
|
+
| JavaScript | V8 bytecode (Node.js) | [references/javascript.md](references/javascript.md) |
|
|
24
|
+
| TypeScript | V8 bytecode (tsc + Node.js) | [references/javascript.md](references/javascript.md) |
|
|
25
|
+
| Python | CPython bytecode (dis) | [references/python.md](references/python.md) |
|
|
26
|
+
| Ruby | YARV bytecode | [references/ruby.md](references/ruby.md) |
|
|
27
|
+
|
|
28
|
+
## Supported Architectures (Compiled Languages)
|
|
29
|
+
|
|
30
|
+
| Architecture | Division Instructions | Common Use |
|
|
31
|
+
|--------------|----------------------|------------|
|
|
32
|
+
| x86_64 | DIV, IDIV | Servers, desktops |
|
|
33
|
+
| ARM64 | UDIV, SDIV | Mobile, Apple Silicon |
|
|
34
|
+
| ARM | UDIV, SDIV | Embedded |
|
|
35
|
+
| RISC-V | DIV, DIVU, REM | Emerging platforms |
|
|
36
|
+
| PowerPC | DIVW, DIVD | Legacy servers |
|
|
37
|
+
| s390x | D, DR, DL | Mainframes |
|
|
38
|
+
| i386 | DIV, IDIV | Legacy |
|
|
39
|
+
|
|
40
|
+
## File Structure
|
|
41
|
+
|
|
42
|
+
```text
|
|
43
|
+
skills/constant-time-analysis/
|
|
44
|
+
├── SKILL.md # Entry point - routing and quick reference
|
|
45
|
+
├── README.md # This file
|
|
46
|
+
└── references/
|
|
47
|
+
├── compiled.md # C, C++, Go, Rust analysis
|
|
48
|
+
├── php.md # PHP analysis (VLD installation, opcodes)
|
|
49
|
+
├── javascript.md # JavaScript/TypeScript analysis
|
|
50
|
+
├── python.md # Python analysis (dis module)
|
|
51
|
+
└── ruby.md # Ruby analysis (YARV)
|
|
52
|
+
```
|
|
53
|
+
|
|
54
|
+
The analyzer tool is located at `ct_analyzer/analyzer.py` in the plugin root.
|
|
55
|
+
|
|
56
|
+
## Usage
|
|
57
|
+
|
|
58
|
+
The skill activates automatically when Claude detects:
|
|
59
|
+
|
|
60
|
+
- Cryptographic code implementation (encryption, signing, key derivation)
|
|
61
|
+
- Questions about timing attacks or constant-time programming
|
|
62
|
+
- Code handling secret keys, tokens, or cryptographic material
|
|
63
|
+
- Functions with division/modulo operations on potentially secret data
|
|
64
|
+
|
|
65
|
+
You can also invoke it explicitly by asking Claude to check code for timing vulnerabilities.
|
|
66
|
+
|
|
67
|
+
### Example Prompts
|
|
68
|
+
|
|
69
|
+
```
|
|
70
|
+
"Check this crypto function for timing vulnerabilities"
|
|
71
|
+
"Is this signature verification constant-time?"
|
|
72
|
+
"Help me replace this division with Barrett reduction"
|
|
73
|
+
"Analyze this ML-KEM implementation for KyberSlash-style issues"
|
|
74
|
+
"What constant-time patterns should I use here?"
|
|
75
|
+
```
|
|
76
|
+
|
|
77
|
+
## Quick Reference
|
|
78
|
+
|
|
79
|
+
| Vulnerability | Detection | Fix |
|
|
80
|
+
|--------------|-----------|-----|
|
|
81
|
+
| Secret division | DIV, IDIV, SDIV, UDIV | Barrett reduction |
|
|
82
|
+
| Secret branches | JE, JNE, BEQ, BNE | Bit masking, cmov |
|
|
83
|
+
| Secret comparison | Early-exit memcmp | crypto/subtle |
|
|
84
|
+
| Variable-time FP | FDIV, FSQRT | Avoid in crypto |
|
|
85
|
+
|
|
86
|
+
## Real-World Attacks
|
|
87
|
+
|
|
88
|
+
- **KyberSlash (2023)** - Division in ML-KEM leaked keys
|
|
89
|
+
- **Lucky Thirteen (2013)** - Padding timing in TLS
|
|
90
|
+
- **Timing attacks on RSA** - Division in modular exponentiation
|
|
@@ -0,0 +1,219 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: constant-time-analysis
|
|
3
|
+
description: Detects timing side-channel vulnerabilities in cryptographic code. Use when implementing or reviewing crypto code, encountering division on secrets, secret-dependent branches, or constant-time programming questions in C, C++, Go, Rust, Swift, Java, Kotlin, C#, PHP, JavaScript, TypeScript, Python, or Ruby.
|
|
4
|
+
---
|
|
5
|
+
|
|
6
|
+
# Constant-Time Analysis
|
|
7
|
+
|
|
8
|
+
Analyze cryptographic code to detect operations that leak secret data through execution timing variations.
|
|
9
|
+
|
|
10
|
+
## When to Use
|
|
11
|
+
|
|
12
|
+
```text
|
|
13
|
+
User writing crypto code? ──yes──> Use this skill
|
|
14
|
+
│
|
|
15
|
+
no
|
|
16
|
+
│
|
|
17
|
+
v
|
|
18
|
+
User asking about timing attacks? ──yes──> Use this skill
|
|
19
|
+
│
|
|
20
|
+
no
|
|
21
|
+
│
|
|
22
|
+
v
|
|
23
|
+
Code handles secret keys/tokens? ──yes──> Use this skill
|
|
24
|
+
│
|
|
25
|
+
no
|
|
26
|
+
│
|
|
27
|
+
v
|
|
28
|
+
Skip this skill
|
|
29
|
+
```
|
|
30
|
+
|
|
31
|
+
**Concrete triggers:**
|
|
32
|
+
|
|
33
|
+
- User implements signature, encryption, or key derivation
|
|
34
|
+
- Code contains `/` or `%` operators on secret-derived values
|
|
35
|
+
- User mentions "constant-time", "timing attack", "side-channel", "KyberSlash"
|
|
36
|
+
- Reviewing functions named `sign`, `verify`, `encrypt`, `decrypt`, `derive_key`
|
|
37
|
+
|
|
38
|
+
## When NOT to Use
|
|
39
|
+
|
|
40
|
+
- Non-cryptographic code (business logic, UI, etc.)
|
|
41
|
+
- Public data processing where timing leaks don't matter
|
|
42
|
+
- Code that doesn't handle secrets, keys, or authentication tokens
|
|
43
|
+
- High-level API usage where timing is handled by the library
|
|
44
|
+
|
|
45
|
+
## Language Selection
|
|
46
|
+
|
|
47
|
+
Based on the file extension or language context, refer to the appropriate guide:
|
|
48
|
+
|
|
49
|
+
| Language | File Extensions | Guide |
|
|
50
|
+
| ---------- | --------------------------------- | -------------------------------------------------------- |
|
|
51
|
+
| C, C++ | `.c`, `.h`, `.cpp`, `.cc`, `.hpp` | [references/compiled.md](references/compiled.md) |
|
|
52
|
+
| Go | `.go` | [references/compiled.md](references/compiled.md) |
|
|
53
|
+
| Rust | `.rs` | [references/compiled.md](references/compiled.md) |
|
|
54
|
+
| Swift | `.swift` | [references/swift.md](references/swift.md) |
|
|
55
|
+
| Java | `.java` | [references/vm-compiled.md](references/vm-compiled.md) |
|
|
56
|
+
| Kotlin | `.kt`, `.kts` | [references/kotlin.md](references/kotlin.md) |
|
|
57
|
+
| C# | `.cs` | [references/vm-compiled.md](references/vm-compiled.md) |
|
|
58
|
+
| PHP | `.php` | [references/php.md](references/php.md) |
|
|
59
|
+
| JavaScript | `.js`, `.mjs`, `.cjs` | [references/javascript.md](references/javascript.md) |
|
|
60
|
+
| TypeScript | `.ts`, `.tsx` | [references/javascript.md](references/javascript.md) |
|
|
61
|
+
| Python | `.py` | [references/python.md](references/python.md) |
|
|
62
|
+
| Ruby | `.rb` | [references/ruby.md](references/ruby.md) |
|
|
63
|
+
|
|
64
|
+
## Quick Start
|
|
65
|
+
|
|
66
|
+
```bash
|
|
67
|
+
# Analyze any supported file type
|
|
68
|
+
uv run {baseDir}/ct_analyzer/analyzer.py <source_file>
|
|
69
|
+
|
|
70
|
+
# Include conditional branch warnings
|
|
71
|
+
uv run {baseDir}/ct_analyzer/analyzer.py --warnings <source_file>
|
|
72
|
+
|
|
73
|
+
# Filter to specific functions
|
|
74
|
+
uv run {baseDir}/ct_analyzer/analyzer.py --func 'sign|verify' <source_file>
|
|
75
|
+
|
|
76
|
+
# JSON output for CI
|
|
77
|
+
uv run {baseDir}/ct_analyzer/analyzer.py --json <source_file>
|
|
78
|
+
```
|
|
79
|
+
|
|
80
|
+
### Native Compiled Languages Only (C, C++, Go, Rust)
|
|
81
|
+
|
|
82
|
+
```bash
|
|
83
|
+
# Cross-architecture testing (RECOMMENDED)
|
|
84
|
+
uv run {baseDir}/ct_analyzer/analyzer.py --arch x86_64 crypto.c
|
|
85
|
+
uv run {baseDir}/ct_analyzer/analyzer.py --arch arm64 crypto.c
|
|
86
|
+
|
|
87
|
+
# Multiple optimization levels
|
|
88
|
+
uv run {baseDir}/ct_analyzer/analyzer.py --opt-level O0 crypto.c
|
|
89
|
+
uv run {baseDir}/ct_analyzer/analyzer.py --opt-level O3 crypto.c
|
|
90
|
+
```
|
|
91
|
+
|
|
92
|
+
### VM-Compiled Languages (Java, Kotlin, C#)
|
|
93
|
+
|
|
94
|
+
```bash
|
|
95
|
+
# Analyze Java bytecode
|
|
96
|
+
uv run {baseDir}/ct_analyzer/analyzer.py CryptoUtils.java
|
|
97
|
+
|
|
98
|
+
# Analyze Kotlin bytecode (Android/JVM)
|
|
99
|
+
uv run {baseDir}/ct_analyzer/analyzer.py CryptoUtils.kt
|
|
100
|
+
|
|
101
|
+
# Analyze C# IL
|
|
102
|
+
uv run {baseDir}/ct_analyzer/analyzer.py CryptoUtils.cs
|
|
103
|
+
```
|
|
104
|
+
|
|
105
|
+
Note: Java, Kotlin, and C# compile to bytecode (JVM/CIL) that runs on a virtual machine with JIT compilation. The analyzer examines the bytecode directly, not the JIT-compiled native code. The `--arch` and `--opt-level` flags do not apply to these languages.
|
|
106
|
+
|
|
107
|
+
### Swift (iOS/macOS)
|
|
108
|
+
|
|
109
|
+
```bash
|
|
110
|
+
# Analyze Swift for native architecture
|
|
111
|
+
uv run {baseDir}/ct_analyzer/analyzer.py crypto.swift
|
|
112
|
+
|
|
113
|
+
# Analyze for specific architecture (iOS devices)
|
|
114
|
+
uv run {baseDir}/ct_analyzer/analyzer.py --arch arm64 crypto.swift
|
|
115
|
+
|
|
116
|
+
# Analyze with different optimization levels
|
|
117
|
+
uv run {baseDir}/ct_analyzer/analyzer.py --opt-level O0 crypto.swift
|
|
118
|
+
```
|
|
119
|
+
|
|
120
|
+
Note: Swift compiles to native code like C/C++/Go/Rust, so it uses assembly-level analysis and supports `--arch` and `--opt-level` flags.
|
|
121
|
+
|
|
122
|
+
### Prerequisites
|
|
123
|
+
|
|
124
|
+
| Language | Requirements |
|
|
125
|
+
| ---------------------- | --------------------------------------------------------- |
|
|
126
|
+
| C, C++, Go, Rust | Compiler in PATH (`gcc`/`clang`, `go`, `rustc`) |
|
|
127
|
+
| Swift | Xcode or Swift toolchain (`swiftc` in PATH) |
|
|
128
|
+
| Java | JDK with `javac` and `javap` in PATH |
|
|
129
|
+
| Kotlin | Kotlin compiler (`kotlinc`) + JDK (`javap`) in PATH |
|
|
130
|
+
| C# | .NET SDK + `ilspycmd` (`dotnet tool install -g ilspycmd`) |
|
|
131
|
+
| PHP | PHP with VLD extension or OPcache |
|
|
132
|
+
| JavaScript/TypeScript | Node.js in PATH |
|
|
133
|
+
| Python | Python 3.x in PATH |
|
|
134
|
+
| Ruby | Ruby with `--dump=insns` support |
|
|
135
|
+
|
|
136
|
+
**macOS users**: Homebrew installs Java and .NET as "keg-only". You must add them to your PATH:
|
|
137
|
+
|
|
138
|
+
```bash
|
|
139
|
+
# For Java (add to ~/.zshrc)
|
|
140
|
+
export PATH="/opt/homebrew/opt/openjdk@21/bin:$PATH"
|
|
141
|
+
|
|
142
|
+
# For .NET tools (add to ~/.zshrc)
|
|
143
|
+
export PATH="$HOME/.dotnet/tools:$PATH"
|
|
144
|
+
```
|
|
145
|
+
|
|
146
|
+
See [references/vm-compiled.md](references/vm-compiled.md) for detailed setup instructions and troubleshooting.
|
|
147
|
+
|
|
148
|
+
## Quick Reference
|
|
149
|
+
|
|
150
|
+
| Problem | Detection | Fix |
|
|
151
|
+
| ---------------------- | ------------------------------- | -------------------------------------------- |
|
|
152
|
+
| Division on secrets | DIV, IDIV, SDIV, UDIV | Barrett reduction or multiply-by-inverse |
|
|
153
|
+
| Branch on secrets | JE, JNE, BEQ, BNE | Constant-time selection (cmov, bit masking) |
|
|
154
|
+
| Secret comparison | Early-exit memcmp | Use `crypto/subtle` or constant-time compare |
|
|
155
|
+
| Weak RNG | rand(), mt_rand, Math.random | Use crypto-secure RNG |
|
|
156
|
+
| Table lookup by secret | Array subscript on secret index | Bit-sliced lookups |
|
|
157
|
+
|
|
158
|
+
## Interpreting Results
|
|
159
|
+
|
|
160
|
+
**PASSED** - No variable-time operations detected.
|
|
161
|
+
|
|
162
|
+
**FAILED** - Dangerous instructions found. Example:
|
|
163
|
+
|
|
164
|
+
```text
|
|
165
|
+
[ERROR] SDIV
|
|
166
|
+
Function: decompose_vulnerable
|
|
167
|
+
Reason: SDIV has early termination optimization; execution time depends on operand values
|
|
168
|
+
```
|
|
169
|
+
|
|
170
|
+
## Verifying Results (Avoiding False Positives)
|
|
171
|
+
|
|
172
|
+
**CRITICAL**: Not every flagged operation is a vulnerability. The tool has no data flow analysis - it flags ALL potentially dangerous operations regardless of whether they involve secrets.
|
|
173
|
+
|
|
174
|
+
For each flagged violation, ask: **Does this operation's input depend on secret data?**
|
|
175
|
+
|
|
176
|
+
1. **Identify the secret inputs** to the function (private keys, plaintext, signatures, tokens)
|
|
177
|
+
|
|
178
|
+
2. **Trace data flow** from the flagged instruction back to inputs
|
|
179
|
+
|
|
180
|
+
3. **Common false positive patterns**:
|
|
181
|
+
|
|
182
|
+
```c
|
|
183
|
+
// FALSE POSITIVE: Division uses public constant, not secret
|
|
184
|
+
int num_blocks = data_len / 16; // data_len is length, not content
|
|
185
|
+
|
|
186
|
+
// TRUE POSITIVE: Division involves secret-derived value
|
|
187
|
+
int32_t q = secret_coef / GAMMA2; // secret_coef from private key
|
|
188
|
+
```
|
|
189
|
+
|
|
190
|
+
4. **Document your analysis** for each flagged item
|
|
191
|
+
|
|
192
|
+
### Quick Triage Questions
|
|
193
|
+
|
|
194
|
+
| Question | If Yes | If No |
|
|
195
|
+
| ------------------------------------------------- | --------------------- | --------------------- |
|
|
196
|
+
| Is the operand a compile-time constant? | Likely false positive | Continue |
|
|
197
|
+
| Is the operand a public parameter (length, count)?| Likely false positive | Continue |
|
|
198
|
+
| Is the operand derived from key/plaintext/secret? | **TRUE POSITIVE** | Likely false positive |
|
|
199
|
+
| Can an attacker influence the operand value? | **TRUE POSITIVE** | Likely false positive |
|
|
200
|
+
|
|
201
|
+
## Limitations
|
|
202
|
+
|
|
203
|
+
1. **Static Analysis Only**: Analyzes assembly/bytecode, not runtime behavior. Cannot detect cache timing or microarchitectural side-channels.
|
|
204
|
+
|
|
205
|
+
2. **No Data Flow Analysis**: Flags all dangerous operations regardless of whether they process secrets. Manual review required.
|
|
206
|
+
|
|
207
|
+
3. **Compiler/Runtime Variations**: Different compilers, optimization levels, and runtime versions may produce different output.
|
|
208
|
+
|
|
209
|
+
## Real-World Impact
|
|
210
|
+
|
|
211
|
+
- **KyberSlash (2023)**: Division instructions in post-quantum ML-KEM implementations allowed key recovery
|
|
212
|
+
- **Lucky Thirteen (2013)**: Timing differences in CBC padding validation enabled plaintext recovery
|
|
213
|
+
- **RSA Timing Attacks**: Early implementations leaked private key bits through division timing
|
|
214
|
+
|
|
215
|
+
## References
|
|
216
|
+
|
|
217
|
+
- [Cryptocoding Guidelines](https://github.com/veorq/cryptocoding) - Defensive coding for crypto
|
|
218
|
+
- [KyberSlash](https://kyberslash.cr.yp.to/) - Division timing in post-quantum crypto
|
|
219
|
+
- [BearSSL Constant-Time](https://www.bearssl.org/constanttime.html) - Practical constant-time techniques
|
package/skills/security-constant-time-analysis/skills/constant-time-analysis/references/compiled.md
ADDED
|
@@ -0,0 +1,129 @@
|
|
|
1
|
+
# Constant-Time Analysis: Compiled Languages
|
|
2
|
+
|
|
3
|
+
Analysis guidance for C, C++, Go, and Rust. These languages compile to native assembly, where timing side-channels are detected by scanning for variable-time CPU instructions.
|
|
4
|
+
|
|
5
|
+
## Running the Analyzer
|
|
6
|
+
|
|
7
|
+
```bash
|
|
8
|
+
# C/C++ (default: clang, native architecture)
|
|
9
|
+
uv run {baseDir}/ct_analyzer/analyzer.py crypto.c
|
|
10
|
+
|
|
11
|
+
# Go
|
|
12
|
+
uv run {baseDir}/ct_analyzer/analyzer.py crypto.go
|
|
13
|
+
|
|
14
|
+
# Rust
|
|
15
|
+
uv run {baseDir}/ct_analyzer/analyzer.py crypto.rs
|
|
16
|
+
|
|
17
|
+
# Cross-architecture testing (RECOMMENDED)
|
|
18
|
+
uv run {baseDir}/ct_analyzer/analyzer.py --arch x86_64 crypto.c
|
|
19
|
+
uv run {baseDir}/ct_analyzer/analyzer.py --arch arm64 crypto.c
|
|
20
|
+
|
|
21
|
+
# Multiple optimization levels
|
|
22
|
+
uv run {baseDir}/ct_analyzer/analyzer.py --opt-level O0 crypto.c
|
|
23
|
+
uv run {baseDir}/ct_analyzer/analyzer.py --opt-level O3 crypto.c
|
|
24
|
+
|
|
25
|
+
# Include conditional branch warnings
|
|
26
|
+
uv run {baseDir}/ct_analyzer/analyzer.py --warnings crypto.c
|
|
27
|
+
|
|
28
|
+
# Filter to specific functions
|
|
29
|
+
uv run {baseDir}/ct_analyzer/analyzer.py --func 'sign|verify|decrypt' crypto.c
|
|
30
|
+
|
|
31
|
+
# CI-friendly JSON output
|
|
32
|
+
uv run {baseDir}/ct_analyzer/analyzer.py --json crypto.c
|
|
33
|
+
```
|
|
34
|
+
|
|
35
|
+
## Supported Compilers
|
|
36
|
+
|
|
37
|
+
| Language | Compiler | Flag |
|
|
38
|
+
|----------|----------|------|
|
|
39
|
+
| C/C++ | gcc | `--compiler gcc` |
|
|
40
|
+
| C/C++ | clang (default) | `--compiler clang` |
|
|
41
|
+
| Go | go | `--compiler go` |
|
|
42
|
+
| Rust | rustc | `--compiler rustc` |
|
|
43
|
+
|
|
44
|
+
## Supported Architectures
|
|
45
|
+
|
|
46
|
+
x86_64, arm64, arm, riscv64, ppc64le, s390x, i386
|
|
47
|
+
|
|
48
|
+
## Dangerous Instructions by Architecture
|
|
49
|
+
|
|
50
|
+
| Architecture | Division | Floating-Point |
|
|
51
|
+
|-------------|----------|----------------|
|
|
52
|
+
| x86_64 | DIV, IDIV, DIVQ, IDIVQ | DIVSS, DIVSD, SQRTSS, SQRTSD |
|
|
53
|
+
| ARM64 | UDIV, SDIV | FDIV, FSQRT |
|
|
54
|
+
| ARM | UDIV, SDIV | VDIV, VSQRT |
|
|
55
|
+
| RISC-V | DIV, DIVU, REM, REMU | FDIV.S, FDIV.D, FSQRT |
|
|
56
|
+
| PowerPC | DIVW, DIVD | FDIV, FSQRT |
|
|
57
|
+
| s390x | D, DR, DL, DLG, DSG | DDB, SQDB |
|
|
58
|
+
|
|
59
|
+
## Constant-Time Patterns
|
|
60
|
+
|
|
61
|
+
### Replace Division
|
|
62
|
+
|
|
63
|
+
```c
|
|
64
|
+
// VULNERABLE: Compiler emits DIV instruction
|
|
65
|
+
int32_t q = a / divisor;
|
|
66
|
+
|
|
67
|
+
// SAFE: Barrett reduction (precompute mu = ceil(2^32 / divisor))
|
|
68
|
+
uint32_t q = (uint32_t)(((uint64_t)a * mu) >> 32);
|
|
69
|
+
```
|
|
70
|
+
|
|
71
|
+
### Replace Branches
|
|
72
|
+
|
|
73
|
+
```c
|
|
74
|
+
// VULNERABLE: Branch timing reveals secret
|
|
75
|
+
if (secret) { result = a; } else { result = b; }
|
|
76
|
+
|
|
77
|
+
// SAFE: Constant-time selection
|
|
78
|
+
uint32_t mask = -(uint32_t)(secret != 0);
|
|
79
|
+
result = (a & mask) | (b & ~mask);
|
|
80
|
+
```
|
|
81
|
+
|
|
82
|
+
### Replace Comparisons
|
|
83
|
+
|
|
84
|
+
```c
|
|
85
|
+
// VULNERABLE: memcmp returns early on mismatch
|
|
86
|
+
if (memcmp(a, b, len) == 0) { ... }
|
|
87
|
+
|
|
88
|
+
// SAFE: Constant-time comparison
|
|
89
|
+
if (CRYPTO_memcmp(a, b, len) == 0) { ... } // OpenSSL
|
|
90
|
+
if (subtle.ConstantTimeCompare(a, b) == 1) { ... } // Go
|
|
91
|
+
```
|
|
92
|
+
|
|
93
|
+
## Common Mistakes
|
|
94
|
+
|
|
95
|
+
1. **Testing only one optimization level** - Compilers make different decisions at O0 vs O3. A clean O2 build may have divisions at O0.
|
|
96
|
+
|
|
97
|
+
2. **Testing only one architecture** - ARM and x86 have different division behavior. Test your deployment targets.
|
|
98
|
+
|
|
99
|
+
3. **Ignoring warnings** - Conditional branches on secrets are exploitable. Use `--warnings` and review each branch.
|
|
100
|
+
|
|
101
|
+
4. **Assuming the tool catches everything** - This tool detects instruction-level issues only. It cannot detect:
|
|
102
|
+
- Cache timing from memory access patterns
|
|
103
|
+
- Microarchitectural attacks (Spectre, etc.)
|
|
104
|
+
- Whether flagged code actually processes secrets
|
|
105
|
+
|
|
106
|
+
5. **Fixing symptoms, not causes** - If compiler introduces division, understand why. Sometimes the algorithm itself needs redesign.
|
|
107
|
+
|
|
108
|
+
## Go-Specific Notes
|
|
109
|
+
|
|
110
|
+
Go compiles to native code, so the analyzer builds a binary and disassembles it using `go tool objdump`. The analyzer:
|
|
111
|
+
- Sets `CGO_ENABLED=0` for pure Go analysis
|
|
112
|
+
- Supports cross-compilation via `GOARCH` environment variable
|
|
113
|
+
- Uses `-N -l` gcflags for O0 (disable optimizations)
|
|
114
|
+
|
|
115
|
+
## Rust-Specific Notes
|
|
116
|
+
|
|
117
|
+
Rust uses `rustc --emit=asm` for assembly generation. The analyzer:
|
|
118
|
+
- Maps optimization levels to rustc's `-C opt-level` flag
|
|
119
|
+
- Supports cross-compilation via `--target` flag
|
|
120
|
+
- Analyzes the emitted assembly for timing-unsafe instructions
|
|
121
|
+
|
|
122
|
+
## CI Integration
|
|
123
|
+
|
|
124
|
+
```yaml
|
|
125
|
+
- name: Check constant-time properties
|
|
126
|
+
run: |
|
|
127
|
+
uv run ct_analyzer/analyzer.py --json src/crypto/*.c
|
|
128
|
+
# Exit code 1 = violations found
|
|
129
|
+
```
|