@elizaos/skills 2.0.0-alpha.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +126 -0
- package/package.json +53 -0
- package/skills/1password/SKILL.md +70 -0
- package/skills/1password/references/cli-examples.md +29 -0
- package/skills/1password/references/get-started.md +17 -0
- package/skills/apple-notes/SKILL.md +77 -0
- package/skills/apple-reminders/SKILL.md +96 -0
- package/skills/bear-notes/SKILL.md +107 -0
- package/skills/bird/SKILL.md +224 -0
- package/skills/blogwatcher/SKILL.md +69 -0
- package/skills/blucli/SKILL.md +47 -0
- package/skills/bluebubbles/SKILL.md +131 -0
- package/skills/camsnap/SKILL.md +45 -0
- package/skills/canvas/SKILL.md +203 -0
- package/skills/clawhub/SKILL.md +77 -0
- package/skills/coding-agent/SKILL.md +284 -0
- package/skills/discord/SKILL.md +578 -0
- package/skills/eightctl/SKILL.md +50 -0
- package/skills/food-order/SKILL.md +48 -0
- package/skills/gemini/SKILL.md +43 -0
- package/skills/gifgrep/SKILL.md +79 -0
- package/skills/github/SKILL.md +77 -0
- package/skills/gog/SKILL.md +116 -0
- package/skills/goplaces/SKILL.md +52 -0
- package/skills/healthcheck/SKILL.md +245 -0
- package/skills/himalaya/SKILL.md +257 -0
- package/skills/himalaya/references/configuration.md +184 -0
- package/skills/himalaya/references/message-composition.md +199 -0
- package/skills/imsg/SKILL.md +74 -0
- package/skills/local-places/SERVER_README.md +101 -0
- package/skills/local-places/SKILL.md +102 -0
- package/skills/local-places/pyproject.toml +21 -0
- package/skills/local-places/src/local_places/__init__.py +2 -0
- package/skills/local-places/src/local_places/google_places.py +314 -0
- package/skills/local-places/src/local_places/main.py +65 -0
- package/skills/local-places/src/local_places/schemas.py +107 -0
- package/skills/mcporter/SKILL.md +61 -0
- package/skills/model-usage/SKILL.md +69 -0
- package/skills/model-usage/references/codexbar-cli.md +33 -0
- package/skills/model-usage/scripts/model_usage.py +310 -0
- package/skills/nano-banana-pro/SKILL.md +58 -0
- package/skills/nano-banana-pro/scripts/generate_image.py +184 -0
- package/skills/nano-pdf/SKILL.md +38 -0
- package/skills/notion/SKILL.md +172 -0
- package/skills/obsidian/SKILL.md +81 -0
- package/skills/openai-image-gen/SKILL.md +89 -0
- package/skills/openai-image-gen/scripts/gen.py +240 -0
- package/skills/openai-whisper/SKILL.md +38 -0
- package/skills/openai-whisper-api/SKILL.md +52 -0
- package/skills/openai-whisper-api/scripts/transcribe.sh +85 -0
- package/skills/openhue/SKILL.md +51 -0
- package/skills/oracle/SKILL.md +125 -0
- package/skills/ordercli/SKILL.md +78 -0
- package/skills/peekaboo/SKILL.md +190 -0
- package/skills/sag/SKILL.md +87 -0
- package/skills/security-ask-questions-if-underspecified/.claude-plugin/plugin.json +10 -0
- package/skills/security-ask-questions-if-underspecified/README.md +24 -0
- package/skills/security-ask-questions-if-underspecified/skills/ask-questions-if-underspecified/SKILL.md +85 -0
- package/skills/security-audit-context-building/.claude-plugin/plugin.json +10 -0
- package/skills/security-audit-context-building/README.md +58 -0
- package/skills/security-audit-context-building/commands/audit-context.md +21 -0
- package/skills/security-audit-context-building/skills/audit-context-building/SKILL.md +297 -0
- package/skills/security-audit-context-building/skills/audit-context-building/resources/COMPLETENESS_CHECKLIST.md +47 -0
- package/skills/security-audit-context-building/skills/audit-context-building/resources/FUNCTION_MICRO_ANALYSIS_EXAMPLE.md +355 -0
- package/skills/security-audit-context-building/skills/audit-context-building/resources/OUTPUT_REQUIREMENTS.md +71 -0
- package/skills/security-building-secure-contracts/.claude-plugin/plugin.json +10 -0
- package/skills/security-building-secure-contracts/README.md +241 -0
- package/skills/security-building-secure-contracts/skills/algorand-vulnerability-scanner/SKILL.md +284 -0
- package/skills/security-building-secure-contracts/skills/algorand-vulnerability-scanner/resources/VULNERABILITY_PATTERNS.md +405 -0
- package/skills/security-building-secure-contracts/skills/audit-prep-assistant/SKILL.md +409 -0
- package/skills/security-building-secure-contracts/skills/cairo-vulnerability-scanner/SKILL.md +329 -0
- package/skills/security-building-secure-contracts/skills/cairo-vulnerability-scanner/resources/VULNERABILITY_PATTERNS.md +722 -0
- package/skills/security-building-secure-contracts/skills/code-maturity-assessor/SKILL.md +218 -0
- package/skills/security-building-secure-contracts/skills/code-maturity-assessor/resources/ASSESSMENT_CRITERIA.md +355 -0
- package/skills/security-building-secure-contracts/skills/code-maturity-assessor/resources/EXAMPLE_REPORT.md +248 -0
- package/skills/security-building-secure-contracts/skills/code-maturity-assessor/resources/REPORT_FORMAT.md +33 -0
- package/skills/security-building-secure-contracts/skills/cosmos-vulnerability-scanner/SKILL.md +334 -0
- package/skills/security-building-secure-contracts/skills/cosmos-vulnerability-scanner/resources/VULNERABILITY_PATTERNS.md +740 -0
- package/skills/security-building-secure-contracts/skills/guidelines-advisor/SKILL.md +252 -0
- package/skills/security-building-secure-contracts/skills/guidelines-advisor/resources/ASSESSMENT_AREAS.md +329 -0
- package/skills/security-building-secure-contracts/skills/guidelines-advisor/resources/DELIVERABLES.md +118 -0
- package/skills/security-building-secure-contracts/skills/guidelines-advisor/resources/EXAMPLE_REPORT.md +298 -0
- package/skills/security-building-secure-contracts/skills/secure-workflow-guide/SKILL.md +161 -0
- package/skills/security-building-secure-contracts/skills/secure-workflow-guide/resources/EXAMPLE_REPORT.md +279 -0
- package/skills/security-building-secure-contracts/skills/secure-workflow-guide/resources/WORKFLOW_STEPS.md +132 -0
- package/skills/security-building-secure-contracts/skills/solana-vulnerability-scanner/SKILL.md +389 -0
- package/skills/security-building-secure-contracts/skills/solana-vulnerability-scanner/resources/VULNERABILITY_PATTERNS.md +669 -0
- package/skills/security-building-secure-contracts/skills/substrate-vulnerability-scanner/SKILL.md +298 -0
- package/skills/security-building-secure-contracts/skills/substrate-vulnerability-scanner/resources/VULNERABILITY_PATTERNS.md +791 -0
- package/skills/security-building-secure-contracts/skills/token-integration-analyzer/SKILL.md +362 -0
- package/skills/security-building-secure-contracts/skills/token-integration-analyzer/resources/ASSESSMENT_CATEGORIES.md +571 -0
- package/skills/security-building-secure-contracts/skills/token-integration-analyzer/resources/REPORT_TEMPLATES.md +141 -0
- package/skills/security-building-secure-contracts/skills/ton-vulnerability-scanner/SKILL.md +388 -0
- package/skills/security-building-secure-contracts/skills/ton-vulnerability-scanner/resources/VULNERABILITY_PATTERNS.md +595 -0
- package/skills/security-burpsuite-project-parser/.claude-plugin/plugin.json +10 -0
- package/skills/security-burpsuite-project-parser/README.md +103 -0
- package/skills/security-burpsuite-project-parser/commands/burp-search.md +18 -0
- package/skills/security-burpsuite-project-parser/skills/SKILL.md +358 -0
- package/skills/security-burpsuite-project-parser/skills/scripts/burp-search.sh +99 -0
- package/skills/security-claude-in-chrome-troubleshooting/.claude-plugin/plugin.json +8 -0
- package/skills/security-claude-in-chrome-troubleshooting/README.md +31 -0
- package/skills/security-claude-in-chrome-troubleshooting/skills/claude-in-chrome-troubleshooting/SKILL.md +251 -0
- package/skills/security-constant-time-analysis/.claude-plugin/plugin.json +9 -0
- package/skills/security-constant-time-analysis/README.md +381 -0
- package/skills/security-constant-time-analysis/commands/ct-check.md +20 -0
- package/skills/security-constant-time-analysis/ct_analyzer/__init__.py +49 -0
- package/skills/security-constant-time-analysis/ct_analyzer/analyzer.py +1284 -0
- package/skills/security-constant-time-analysis/ct_analyzer/script_analyzers.py +3081 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/__init__.py +1 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_analyzer.py +1397 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/bn_excerpt.js +205 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/decompose_constant_time.c +181 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/decompose_vulnerable.c +74 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/decompose_vulnerable.go +78 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/decompose_vulnerable.rs +92 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/vulnerable.cs +174 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/vulnerable.java +161 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/vulnerable.kt +181 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/vulnerable.php +140 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/vulnerable.py +252 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/vulnerable.rb +188 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/vulnerable.swift +199 -0
- package/skills/security-constant-time-analysis/ct_analyzer/tests/test_samples/vulnerable.ts +154 -0
- package/skills/security-constant-time-analysis/pyproject.toml +52 -0
- package/skills/security-constant-time-analysis/skills/constant-time-analysis/README.md +90 -0
- package/skills/security-constant-time-analysis/skills/constant-time-analysis/SKILL.md +219 -0
- package/skills/security-constant-time-analysis/skills/constant-time-analysis/references/compiled.md +129 -0
- package/skills/security-constant-time-analysis/skills/constant-time-analysis/references/javascript.md +136 -0
- package/skills/security-constant-time-analysis/skills/constant-time-analysis/references/kotlin.md +252 -0
- package/skills/security-constant-time-analysis/skills/constant-time-analysis/references/php.md +172 -0
- package/skills/security-constant-time-analysis/skills/constant-time-analysis/references/python.md +179 -0
- package/skills/security-constant-time-analysis/skills/constant-time-analysis/references/ruby.md +198 -0
- package/skills/security-constant-time-analysis/skills/constant-time-analysis/references/swift.md +288 -0
- package/skills/security-constant-time-analysis/skills/constant-time-analysis/references/vm-compiled.md +354 -0
- package/skills/security-constant-time-analysis/uv.lock +8 -0
- package/skills/security-culture-index/.claude-plugin/plugin.json +8 -0
- package/skills/security-culture-index/README.md +79 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/SKILL.md +293 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/references/anti-patterns.md +255 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/references/conversation-starters.md +408 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/references/interview-trait-signals.md +253 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/references/motivators.md +158 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/references/patterns-archetypes.md +147 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/references/primary-traits.md +307 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/references/secondary-traits.md +228 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/references/team-composition.md +148 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/scripts/check_deps.py +108 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/scripts/culture_index/__init__.py +20 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/scripts/culture_index/constants.py +122 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/scripts/culture_index/extract.py +187 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/scripts/culture_index/models.py +16 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/scripts/culture_index/opencv_extractor.py +520 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/scripts/extract_pdf.py +237 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/scripts/pyproject.toml +18 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/templates/burnout-report.md +113 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/templates/comparison-report.md +103 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/templates/hiring-profile.md +127 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/templates/individual-report.md +85 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/templates/predicted-profile.md +165 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/templates/team-report.md +109 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/workflows/analyze-team.md +188 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/workflows/coach-manager.md +267 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/workflows/compare-profiles.md +188 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/workflows/define-hiring-profile.md +220 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/workflows/detect-burnout.md +206 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/workflows/extract-from-pdf.md +121 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/workflows/interpret-individual.md +183 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/workflows/interview-debrief.md +234 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/workflows/mediate-conflict.md +306 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/workflows/plan-onboarding.md +322 -0
- package/skills/security-culture-index/skills/interpreting-culture-index/workflows/predict-from-interview.md +250 -0
- package/skills/security-differential-review/.claude-plugin/plugin.json +10 -0
- package/skills/security-differential-review/README.md +109 -0
- package/skills/security-differential-review/commands/diff-review.md +21 -0
- package/skills/security-differential-review/skills/differential-review/SKILL.md +220 -0
- package/skills/security-differential-review/skills/differential-review/adversarial.md +203 -0
- package/skills/security-differential-review/skills/differential-review/methodology.md +234 -0
- package/skills/security-differential-review/skills/differential-review/patterns.md +300 -0
- package/skills/security-differential-review/skills/differential-review/reporting.md +369 -0
- package/skills/security-dwarf-expert/.claude-plugin/plugin.json +10 -0
- package/skills/security-dwarf-expert/README.md +38 -0
- package/skills/security-dwarf-expert/skills/dwarf-expert/SKILL.md +93 -0
- package/skills/security-dwarf-expert/skills/dwarf-expert/reference/coding.md +31 -0
- package/skills/security-dwarf-expert/skills/dwarf-expert/reference/dwarfdump.md +50 -0
- package/skills/security-dwarf-expert/skills/dwarf-expert/reference/readelf.md +8 -0
- package/skills/security-entry-point-analyzer/.claude-plugin/plugin.json +10 -0
- package/skills/security-entry-point-analyzer/README.md +74 -0
- package/skills/security-entry-point-analyzer/commands/entry-points.md +18 -0
- package/skills/security-entry-point-analyzer/skills/entry-point-analyzer/SKILL.md +251 -0
- package/skills/security-entry-point-analyzer/skills/entry-point-analyzer/references/cosmwasm.md +182 -0
- package/skills/security-entry-point-analyzer/skills/entry-point-analyzer/references/move-aptos.md +107 -0
- package/skills/security-entry-point-analyzer/skills/entry-point-analyzer/references/move-sui.md +87 -0
- package/skills/security-entry-point-analyzer/skills/entry-point-analyzer/references/solana.md +155 -0
- package/skills/security-entry-point-analyzer/skills/entry-point-analyzer/references/solidity.md +135 -0
- package/skills/security-entry-point-analyzer/skills/entry-point-analyzer/references/ton.md +185 -0
- package/skills/security-entry-point-analyzer/skills/entry-point-analyzer/references/vyper.md +141 -0
- package/skills/security-firebase-apk-scanner/.claude-plugin/plugin.json +10 -0
- package/skills/security-firebase-apk-scanner/README.md +85 -0
- package/skills/security-firebase-apk-scanner/commands/scan-apk.md +18 -0
- package/skills/security-firebase-apk-scanner/scanner.sh +1408 -0
- package/skills/security-firebase-apk-scanner/skills/firebase-apk-scanner/SKILL.md +197 -0
- package/skills/security-firebase-apk-scanner/skills/firebase-apk-scanner/references/vulnerabilities.md +803 -0
- package/skills/security-fix-review/.claude-plugin/plugin.json +13 -0
- package/skills/security-fix-review/README.md +118 -0
- package/skills/security-fix-review/commands/fix-review.md +24 -0
- package/skills/security-fix-review/skills/fix-review/SKILL.md +264 -0
- package/skills/security-fix-review/skills/fix-review/references/bug-detection.md +408 -0
- package/skills/security-fix-review/skills/fix-review/references/finding-matching.md +298 -0
- package/skills/security-fix-review/skills/fix-review/references/report-parsing.md +398 -0
- package/skills/security-insecure-defaults/.claude-plugin/plugin.json +10 -0
- package/skills/security-insecure-defaults/README.md +45 -0
- package/skills/security-insecure-defaults/skills/insecure-defaults/SKILL.md +117 -0
- package/skills/security-insecure-defaults/skills/insecure-defaults/references/examples.md +409 -0
- package/skills/security-modern-python/.claude-plugin/plugin.json +10 -0
- package/skills/security-modern-python/README.md +58 -0
- package/skills/security-modern-python/hooks/hooks.json +16 -0
- package/skills/security-modern-python/hooks/intercept-legacy-python.bats +388 -0
- package/skills/security-modern-python/hooks/intercept-legacy-python.sh +109 -0
- package/skills/security-modern-python/hooks/test_helper.bash +75 -0
- package/skills/security-modern-python/skills/modern-python/SKILL.md +333 -0
- package/skills/security-modern-python/skills/modern-python/references/dependabot.md +43 -0
- package/skills/security-modern-python/skills/modern-python/references/migration-checklist.md +141 -0
- package/skills/security-modern-python/skills/modern-python/references/pep723-scripts.md +259 -0
- package/skills/security-modern-python/skills/modern-python/references/prek.md +211 -0
- package/skills/security-modern-python/skills/modern-python/references/pyproject.md +254 -0
- package/skills/security-modern-python/skills/modern-python/references/ruff-config.md +240 -0
- package/skills/security-modern-python/skills/modern-python/references/security-setup.md +255 -0
- package/skills/security-modern-python/skills/modern-python/references/testing.md +284 -0
- package/skills/security-modern-python/skills/modern-python/references/uv-commands.md +200 -0
- package/skills/security-modern-python/skills/modern-python/templates/dependabot.yml +36 -0
- package/skills/security-modern-python/skills/modern-python/templates/pre-commit-config.yaml +66 -0
- package/skills/security-property-based-testing/.claude-plugin/plugin.json +9 -0
- package/skills/security-property-based-testing/README.md +47 -0
- package/skills/security-property-based-testing/skills/property-based-testing/README.md +88 -0
- package/skills/security-property-based-testing/skills/property-based-testing/SKILL.md +109 -0
- package/skills/security-property-based-testing/skills/property-based-testing/references/design.md +191 -0
- package/skills/security-property-based-testing/skills/property-based-testing/references/generating.md +200 -0
- package/skills/security-property-based-testing/skills/property-based-testing/references/libraries.md +130 -0
- package/skills/security-property-based-testing/skills/property-based-testing/references/refactoring.md +181 -0
- package/skills/security-property-based-testing/skills/property-based-testing/references/reviewing.md +209 -0
- package/skills/security-property-based-testing/skills/property-based-testing/references/strategies.md +124 -0
- package/skills/semgrep-rule-creator/.claude-plugin/plugin.json +8 -0
- package/skills/semgrep-rule-creator/README.md +43 -0
- package/skills/semgrep-rule-creator/commands/semgrep-rule.md +26 -0
- package/skills/semgrep-rule-creator/skills/semgrep-rule-creator/SKILL.md +168 -0
- package/skills/semgrep-rule-creator/skills/semgrep-rule-creator/references/quick-reference.md +203 -0
- package/skills/semgrep-rule-creator/skills/semgrep-rule-creator/references/workflow.md +240 -0
- package/skills/semgrep-rule-variant-creator/.claude-plugin/plugin.json +9 -0
- package/skills/semgrep-rule-variant-creator/README.md +86 -0
- package/skills/semgrep-rule-variant-creator/skills/semgrep-rule-variant-creator/SKILL.md +205 -0
- package/skills/semgrep-rule-variant-creator/skills/semgrep-rule-variant-creator/references/applicability-analysis.md +250 -0
- package/skills/semgrep-rule-variant-creator/skills/semgrep-rule-variant-creator/references/language-syntax-guide.md +324 -0
- package/skills/semgrep-rule-variant-creator/skills/semgrep-rule-variant-creator/references/workflow.md +518 -0
- package/skills/session-logs/SKILL.md +115 -0
- package/skills/sharp-edges/.claude-plugin/plugin.json +10 -0
- package/skills/sharp-edges/README.md +48 -0
- package/skills/sharp-edges/skills/sharp-edges/SKILL.md +292 -0
- package/skills/sharp-edges/skills/sharp-edges/references/auth-patterns.md +252 -0
- package/skills/sharp-edges/skills/sharp-edges/references/case-studies.md +274 -0
- package/skills/sharp-edges/skills/sharp-edges/references/config-patterns.md +333 -0
- package/skills/sharp-edges/skills/sharp-edges/references/crypto-apis.md +190 -0
- package/skills/sharp-edges/skills/sharp-edges/references/lang-c.md +205 -0
- package/skills/sharp-edges/skills/sharp-edges/references/lang-csharp.md +285 -0
- package/skills/sharp-edges/skills/sharp-edges/references/lang-go.md +270 -0
- package/skills/sharp-edges/skills/sharp-edges/references/lang-java.md +263 -0
- package/skills/sharp-edges/skills/sharp-edges/references/lang-javascript.md +269 -0
- package/skills/sharp-edges/skills/sharp-edges/references/lang-kotlin.md +265 -0
- package/skills/sharp-edges/skills/sharp-edges/references/lang-php.md +245 -0
- package/skills/sharp-edges/skills/sharp-edges/references/lang-python.md +274 -0
- package/skills/sharp-edges/skills/sharp-edges/references/lang-ruby.md +273 -0
- package/skills/sharp-edges/skills/sharp-edges/references/lang-rust.md +272 -0
- package/skills/sharp-edges/skills/sharp-edges/references/lang-swift.md +287 -0
- package/skills/sharp-edges/skills/sharp-edges/references/language-specific.md +588 -0
- package/skills/sherpa-onnx-tts/SKILL.md +103 -0
- package/skills/sherpa-onnx-tts/bin/sherpa-onnx-tts +178 -0
- package/skills/skill-creator/SKILL.md +370 -0
- package/skills/skill-creator/license.txt +202 -0
- package/skills/skill-creator/scripts/init_skill.py +378 -0
- package/skills/skill-creator/scripts/package_skill.py +111 -0
- package/skills/skill-creator/scripts/quick_validate.py +101 -0
- package/skills/slack/SKILL.md +144 -0
- package/skills/songsee/SKILL.md +49 -0
- package/skills/sonoscli/SKILL.md +46 -0
- package/skills/spec-to-code-compliance/.claude-plugin/plugin.json +10 -0
- package/skills/spec-to-code-compliance/README.md +67 -0
- package/skills/spec-to-code-compliance/commands/spec-compliance.md +22 -0
- package/skills/spec-to-code-compliance/skills/spec-to-code-compliance/SKILL.md +349 -0
- package/skills/spec-to-code-compliance/skills/spec-to-code-compliance/resources/COMPLETENESS_CHECKLIST.md +69 -0
- package/skills/spec-to-code-compliance/skills/spec-to-code-compliance/resources/IR_EXAMPLES.md +417 -0
- package/skills/spec-to-code-compliance/skills/spec-to-code-compliance/resources/OUTPUT_REQUIREMENTS.md +105 -0
- package/skills/spotify-player/SKILL.md +64 -0
- package/skills/static-analysis/.claude-plugin/plugin.json +8 -0
- package/skills/static-analysis/README.md +59 -0
- package/skills/static-analysis/skills/codeql/SKILL.md +315 -0
- package/skills/static-analysis/skills/sarif-parsing/SKILL.md +479 -0
- package/skills/static-analysis/skills/sarif-parsing/resources/jq-queries.md +162 -0
- package/skills/static-analysis/skills/sarif-parsing/resources/sarif_helpers.py +331 -0
- package/skills/static-analysis/skills/semgrep/SKILL.md +337 -0
- package/skills/summarize/SKILL.md +87 -0
- package/skills/testing-handbook-skills/.claude-plugin/plugin.json +8 -0
- package/skills/testing-handbook-skills/README.md +241 -0
- package/skills/testing-handbook-skills/scripts/pyproject.toml +8 -0
- package/skills/testing-handbook-skills/scripts/validate-skills.py +657 -0
- package/skills/testing-handbook-skills/skills/address-sanitizer/SKILL.md +341 -0
- package/skills/testing-handbook-skills/skills/aflpp/SKILL.md +640 -0
- package/skills/testing-handbook-skills/skills/atheris/SKILL.md +515 -0
- package/skills/testing-handbook-skills/skills/cargo-fuzz/SKILL.md +454 -0
- package/skills/testing-handbook-skills/skills/codeql/SKILL.md +549 -0
- package/skills/testing-handbook-skills/skills/constant-time-testing/SKILL.md +507 -0
- package/skills/testing-handbook-skills/skills/coverage-analysis/SKILL.md +607 -0
- package/skills/testing-handbook-skills/skills/fuzzing-dictionary/SKILL.md +297 -0
- package/skills/testing-handbook-skills/skills/fuzzing-obstacles/SKILL.md +426 -0
- package/skills/testing-handbook-skills/skills/harness-writing/SKILL.md +614 -0
- package/skills/testing-handbook-skills/skills/libafl/SKILL.md +625 -0
- package/skills/testing-handbook-skills/skills/libfuzzer/SKILL.md +795 -0
- package/skills/testing-handbook-skills/skills/ossfuzz/SKILL.md +426 -0
- package/skills/testing-handbook-skills/skills/ruzzy/SKILL.md +443 -0
- package/skills/testing-handbook-skills/skills/semgrep/SKILL.md +601 -0
- package/skills/testing-handbook-skills/skills/testing-handbook-generator/SKILL.md +372 -0
- package/skills/testing-handbook-skills/skills/testing-handbook-generator/agent-prompt.md +280 -0
- package/skills/testing-handbook-skills/skills/testing-handbook-generator/discovery.md +452 -0
- package/skills/testing-handbook-skills/skills/testing-handbook-generator/templates/domain-skill.md +504 -0
- package/skills/testing-handbook-skills/skills/testing-handbook-generator/templates/fuzzer-skill.md +454 -0
- package/skills/testing-handbook-skills/skills/testing-handbook-generator/templates/technique-skill.md +527 -0
- package/skills/testing-handbook-skills/skills/testing-handbook-generator/templates/tool-skill.md +366 -0
- package/skills/testing-handbook-skills/skills/testing-handbook-generator/testing.md +482 -0
- package/skills/testing-handbook-skills/skills/wycheproof/SKILL.md +533 -0
- package/skills/things-mac/SKILL.md +86 -0
- package/skills/tmux/SKILL.md +135 -0
- package/skills/tmux/scripts/find-sessions.sh +112 -0
- package/skills/tmux/scripts/wait-for-text.sh +83 -0
- package/skills/trello/SKILL.md +95 -0
- package/skills/variant-analysis/.claude-plugin/plugin.json +8 -0
- package/skills/variant-analysis/README.md +41 -0
- package/skills/variant-analysis/commands/variants.md +23 -0
- package/skills/variant-analysis/skills/variant-analysis/METHODOLOGY.md +327 -0
- package/skills/variant-analysis/skills/variant-analysis/SKILL.md +142 -0
- package/skills/variant-analysis/skills/variant-analysis/resources/codeql/cpp.ql +119 -0
- package/skills/variant-analysis/skills/variant-analysis/resources/codeql/go.ql +69 -0
- package/skills/variant-analysis/skills/variant-analysis/resources/codeql/java.ql +71 -0
- package/skills/variant-analysis/skills/variant-analysis/resources/codeql/javascript.ql +63 -0
- package/skills/variant-analysis/skills/variant-analysis/resources/codeql/python.ql +80 -0
- package/skills/variant-analysis/skills/variant-analysis/resources/semgrep/cpp.yaml +98 -0
- package/skills/variant-analysis/skills/variant-analysis/resources/semgrep/go.yaml +63 -0
- package/skills/variant-analysis/skills/variant-analysis/resources/semgrep/java.yaml +61 -0
- package/skills/variant-analysis/skills/variant-analysis/resources/semgrep/javascript.yaml +60 -0
- package/skills/variant-analysis/skills/variant-analysis/resources/semgrep/python.yaml +72 -0
- package/skills/variant-analysis/skills/variant-analysis/resources/variant-report-template.md +75 -0
- package/skills/video-frames/SKILL.md +46 -0
- package/skills/video-frames/scripts/frame.sh +81 -0
- package/skills/voice-call/SKILL.md +45 -0
- package/skills/wacli/SKILL.md +72 -0
- package/skills/weather/SKILL.md +54 -0
- package/skills/yara-authoring/.claude-plugin/plugin.json +9 -0
- package/skills/yara-authoring/README.md +131 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/SKILL.md +645 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/examples/MAL_Mac_ProtonRAT_Jan25.yar +99 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/examples/MAL_NPM_SupplyChain_Jan25.yar +170 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/examples/MAL_Win_Remcos_Jan25.yar +103 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/examples/SUSP_CRX_SuspiciousPermissions.yar +134 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/examples/SUSP_JS_Obfuscation_Jan25.yar +185 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/references/crx-module.md +214 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/references/dex-module.md +383 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/references/performance.md +333 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/references/strings.md +433 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/references/style-guide.md +257 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/references/testing.md +399 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/scripts/atom_analyzer.py +526 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/scripts/pyproject.toml +25 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/scripts/yara_lint.py +631 -0
- package/skills/yara-authoring/skills/yara-rule-authoring/workflows/rule-development.md +493 -0
|
@@ -0,0 +1,86 @@
|
|
|
1
|
+
# Semgrep Rule Variant Creator
|
|
2
|
+
|
|
3
|
+
A Claude Code skill for porting existing Semgrep rules to new target languages with proper applicability analysis and test-driven validation.
|
|
4
|
+
|
|
5
|
+
## Overview
|
|
6
|
+
|
|
7
|
+
This skill takes an existing Semgrep rule and one or more target languages, then generates independent rule variants for each applicable language. Each variant goes through a complete 4-phase cycle:
|
|
8
|
+
|
|
9
|
+
1. **Applicability Analysis** - Determine if the vulnerability pattern applies to the target language
|
|
10
|
+
2. **Test Creation** - Write test-first with vulnerable and safe cases
|
|
11
|
+
3. **Rule Creation** - Translate patterns and adapt for target language idioms
|
|
12
|
+
4. **Validation** - Ensure all tests pass before proceeding
|
|
13
|
+
|
|
14
|
+
## Prerequisites
|
|
15
|
+
|
|
16
|
+
- [Semgrep](https://semgrep.dev/docs/getting-started/) installed and available in PATH
|
|
17
|
+
- Existing Semgrep rule to port (in YAML)
|
|
18
|
+
- Target languages specified
|
|
19
|
+
|
|
20
|
+
## Usage
|
|
21
|
+
|
|
22
|
+
Invoke the skill when you want to port an existing Semgrep rule:
|
|
23
|
+
|
|
24
|
+
```
|
|
25
|
+
Port the sql-injection.yaml Semgrep rule to Go and Java
|
|
26
|
+
```
|
|
27
|
+
|
|
28
|
+
```
|
|
29
|
+
Create Semgrep rule variants of my-rule.yaml for TypeScript, Rust, and C#
|
|
30
|
+
```
|
|
31
|
+
|
|
32
|
+
```
|
|
33
|
+
Create the same Semgrep rule for JavaScript and Ruby
|
|
34
|
+
```
|
|
35
|
+
|
|
36
|
+
```
|
|
37
|
+
Port this Semgrep rule to Golang
|
|
38
|
+
```
|
|
39
|
+
|
|
40
|
+
## Output Structure
|
|
41
|
+
|
|
42
|
+
For each applicable target language, the skill produces:
|
|
43
|
+
|
|
44
|
+
```
|
|
45
|
+
<original-rule-id>-<language>/
|
|
46
|
+
├── <original-rule-id>-<language>.yaml # Ported rule
|
|
47
|
+
└── <original-rule-id>-<language>.<ext> # Test file
|
|
48
|
+
```
|
|
49
|
+
|
|
50
|
+
## Example
|
|
51
|
+
|
|
52
|
+
**Input:**
|
|
53
|
+
- Rule: `python-command-injection.yaml`
|
|
54
|
+
- Target languages: Go, Java
|
|
55
|
+
|
|
56
|
+
**Output:**
|
|
57
|
+
```
|
|
58
|
+
python-command-injection-golang/
|
|
59
|
+
├── python-command-injection-golang.yaml
|
|
60
|
+
└── python-command-injection-golang.go
|
|
61
|
+
|
|
62
|
+
python-command-injection-java/
|
|
63
|
+
├── python-command-injection-java.yaml
|
|
64
|
+
└── python-command-injection-java.java
|
|
65
|
+
```
|
|
66
|
+
|
|
67
|
+
## Key Differences from semgrep-rule-creator
|
|
68
|
+
|
|
69
|
+
| Aspect | semgrep-rule-creator | semgrep-rule-variant-creator |
|
|
70
|
+
|--------|---------------------|------------------------------|
|
|
71
|
+
| Input | Bug pattern description | Existing rule + target languages |
|
|
72
|
+
| Output | Single rule+test | Multiple rule+test directories |
|
|
73
|
+
| Workflow | Single creation cycle | Independent cycle per language |
|
|
74
|
+
| Phase 1 | Problem analysis | Applicability analysis |
|
|
75
|
+
|
|
76
|
+
## Skill Files
|
|
77
|
+
|
|
78
|
+
- `skills/semgrep-rule-variant-creator/SKILL.md` - Main entry point
|
|
79
|
+
- `skills/semgrep-rule-variant-creator/references/applicability-analysis.md` - Phase 1 guidance
|
|
80
|
+
- `skills/semgrep-rule-variant-creator/references/language-syntax-guide.md` - Pattern translation guidance
|
|
81
|
+
- `skills/semgrep-rule-variant-creator/references/workflow.md` - Detailed 4-phase workflow
|
|
82
|
+
|
|
83
|
+
## Related Skills
|
|
84
|
+
|
|
85
|
+
- **semgrep-rule-creator** - Create new Semgrep rules from scratch
|
|
86
|
+
- **static-analysis** - Run existing Semgrep rules against code
|
|
@@ -0,0 +1,205 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: semgrep-rule-variant-creator
|
|
3
|
+
description: Creates language variants of existing Semgrep rules. Use when porting a Semgrep rule to specified target languages. Takes an existing rule and target languages as input, produces independent rule+test directories for each language.
|
|
4
|
+
allowed-tools:
|
|
5
|
+
- Bash
|
|
6
|
+
- Read
|
|
7
|
+
- Write
|
|
8
|
+
- Edit
|
|
9
|
+
- Glob
|
|
10
|
+
- Grep
|
|
11
|
+
- WebFetch
|
|
12
|
+
---
|
|
13
|
+
|
|
14
|
+
# Semgrep Rule Variant Creator
|
|
15
|
+
|
|
16
|
+
Port existing Semgrep rules to new target languages with proper applicability analysis and test-driven validation.
|
|
17
|
+
|
|
18
|
+
## When to Use
|
|
19
|
+
|
|
20
|
+
**Ideal scenarios:**
|
|
21
|
+
- Porting an existing Semgrep rule to one or more target languages
|
|
22
|
+
- Creating language-specific variants of a universal vulnerability pattern
|
|
23
|
+
- Expanding rule coverage across a polyglot codebase
|
|
24
|
+
- Translating rules between languages with equivalent constructs
|
|
25
|
+
|
|
26
|
+
## When NOT to Use
|
|
27
|
+
|
|
28
|
+
Do NOT use this skill for:
|
|
29
|
+
- Creating a new Semgrep rule from scratch (use `semgrep-rule-creator` instead)
|
|
30
|
+
- Running existing rules against code
|
|
31
|
+
- Languages where the vulnerability pattern fundamentally doesn't apply
|
|
32
|
+
- Minor syntax variations within the same language
|
|
33
|
+
|
|
34
|
+
## Input Specification
|
|
35
|
+
|
|
36
|
+
This skill requires:
|
|
37
|
+
1. **Existing Semgrep rule** - YAML file path or YAML rule content
|
|
38
|
+
2. **Target languages** - One or more languages to port to (e.g., "Golang and Java")
|
|
39
|
+
|
|
40
|
+
## Output Specification
|
|
41
|
+
|
|
42
|
+
For each applicable target language, produces:
|
|
43
|
+
```
|
|
44
|
+
<original-rule-id>-<language>/
|
|
45
|
+
├── <original-rule-id>-<language>.yaml # Ported Semgrep rule
|
|
46
|
+
└── <original-rule-id>-<language>.<ext> # Test file with annotations
|
|
47
|
+
```
|
|
48
|
+
|
|
49
|
+
Example output for porting `sql-injection` to Go and Java:
|
|
50
|
+
```
|
|
51
|
+
sql-injection-golang/
|
|
52
|
+
├── sql-injection-golang.yaml
|
|
53
|
+
└── sql-injection-golang.go
|
|
54
|
+
|
|
55
|
+
sql-injection-java/
|
|
56
|
+
├── sql-injection-java.yaml
|
|
57
|
+
└── sql-injection-java.java
|
|
58
|
+
```
|
|
59
|
+
|
|
60
|
+
## Rationalizations to Reject
|
|
61
|
+
|
|
62
|
+
When porting Semgrep rules, reject these common shortcuts:
|
|
63
|
+
|
|
64
|
+
| Rationalization | Why It Fails | Correct Approach |
|
|
65
|
+
|-----------------|--------------|------------------|
|
|
66
|
+
| "Pattern structure is identical" | Different ASTs across languages | Always dump AST for target language |
|
|
67
|
+
| "Same vulnerability, same detection" | Data flow differs between languages | Analyze target language idioms |
|
|
68
|
+
| "Rule doesn't need tests since original worked" | Language edge cases differ | Write NEW test cases for target |
|
|
69
|
+
| "Skip applicability - it obviously applies" | Some patterns are language-specific | Complete applicability analysis first |
|
|
70
|
+
| "I'll create all variants then test" | Errors compound, hard to debug | Complete full cycle per language |
|
|
71
|
+
| "Library equivalent is close enough" | Surface similarity hides differences | Verify API semantics match |
|
|
72
|
+
| "Just translate the syntax 1:1" | Languages have different idioms | Research target language patterns |
|
|
73
|
+
|
|
74
|
+
## Strictness Level
|
|
75
|
+
|
|
76
|
+
This workflow is **strict** - do not skip steps:
|
|
77
|
+
- **Applicability analysis is mandatory**: Don't assume patterns translate
|
|
78
|
+
- **Each language is independent**: Complete full cycle before moving to next
|
|
79
|
+
- **Test-first for each variant**: Never write a rule without test cases
|
|
80
|
+
- **100% test pass required**: "Most tests pass" is not acceptable
|
|
81
|
+
|
|
82
|
+
## Overview
|
|
83
|
+
|
|
84
|
+
This skill guides the creation of language-specific variants of existing Semgrep rules. Each target language goes through an independent 4-phase cycle:
|
|
85
|
+
|
|
86
|
+
```
|
|
87
|
+
FOR EACH target language:
|
|
88
|
+
Phase 1: Applicability Analysis → Verdict
|
|
89
|
+
Phase 2: Test Creation (Test-First)
|
|
90
|
+
Phase 3: Rule Creation
|
|
91
|
+
Phase 4: Validation
|
|
92
|
+
(Complete full cycle before moving to next language)
|
|
93
|
+
```
|
|
94
|
+
|
|
95
|
+
## Foundational Knowledge
|
|
96
|
+
|
|
97
|
+
**The `semgrep-rule-creator` skill is the authoritative reference for Semgrep rule creation fundamentals.** While this skill focuses on porting existing rules to new languages, the core principles of writing quality rules remain the same.
|
|
98
|
+
|
|
99
|
+
Consult `semgrep-rule-creator` for guidance on:
|
|
100
|
+
- **When to use taint mode vs pattern matching** - Choosing the right approach for the vulnerability type
|
|
101
|
+
- **Test-first methodology** - Why tests come before rules and how to write effective test cases
|
|
102
|
+
- **Anti-patterns to avoid** - Common mistakes like overly broad or overly specific patterns
|
|
103
|
+
- **Iterating until tests pass** - The validation loop and debugging techniques
|
|
104
|
+
- **Rule optimization** - Removing redundant patterns after tests pass
|
|
105
|
+
|
|
106
|
+
When porting a rule, you're applying these same principles in a new language context. If uncertain about rule structure or approach, refer to `semgrep-rule-creator` first.
|
|
107
|
+
|
|
108
|
+
## Four-Phase Workflow
|
|
109
|
+
|
|
110
|
+
### Phase 1: Applicability Analysis
|
|
111
|
+
|
|
112
|
+
Before porting, determine if the pattern applies to the target language.
|
|
113
|
+
|
|
114
|
+
**Analysis criteria:**
|
|
115
|
+
1. Does the vulnerability class exist in the target language?
|
|
116
|
+
2. Does an equivalent construct exist (function, pattern, library)?
|
|
117
|
+
3. Are the semantics similar enough for meaningful detection?
|
|
118
|
+
|
|
119
|
+
**Verdict options:**
|
|
120
|
+
- `APPLICABLE` → Proceed with variant creation
|
|
121
|
+
- `APPLICABLE_WITH_ADAPTATION` → Proceed but significant changes needed
|
|
122
|
+
- `NOT_APPLICABLE` → Skip this language, document why
|
|
123
|
+
|
|
124
|
+
See [applicability-analysis.md]({baseDir}/references/applicability-analysis.md) for detailed guidance.
|
|
125
|
+
|
|
126
|
+
### Phase 2: Test Creation (Test-First)
|
|
127
|
+
|
|
128
|
+
**Always write tests before the rule.**
|
|
129
|
+
|
|
130
|
+
Create test file with target language idioms:
|
|
131
|
+
- Minimum 2 vulnerable cases (`ruleid:`)
|
|
132
|
+
- Minimum 2 safe cases (`ok:`)
|
|
133
|
+
- Include language-specific edge cases
|
|
134
|
+
|
|
135
|
+
```go
|
|
136
|
+
// ruleid: sql-injection-golang
|
|
137
|
+
db.Query("SELECT * FROM users WHERE id = " + userInput)
|
|
138
|
+
|
|
139
|
+
// ok: sql-injection-golang
|
|
140
|
+
db.Query("SELECT * FROM users WHERE id = ?", userInput)
|
|
141
|
+
```
|
|
142
|
+
|
|
143
|
+
### Phase 3: Rule Creation
|
|
144
|
+
|
|
145
|
+
1. **Analyze AST**: `semgrep --dump-ast -l <lang> test-file`
|
|
146
|
+
2. **Translate patterns** to target language syntax
|
|
147
|
+
3. **Update metadata**: language key, message, rule ID
|
|
148
|
+
4. **Adapt for idioms**: Handle language-specific constructs
|
|
149
|
+
|
|
150
|
+
See [language-syntax-guide.md]({baseDir}/references/language-syntax-guide.md) for translation guidance.
|
|
151
|
+
|
|
152
|
+
### Phase 4: Validation
|
|
153
|
+
|
|
154
|
+
```bash
|
|
155
|
+
# Validate YAML
|
|
156
|
+
semgrep --validate --config rule.yaml
|
|
157
|
+
|
|
158
|
+
# Run tests
|
|
159
|
+
semgrep --test --config rule.yaml test-file
|
|
160
|
+
```
|
|
161
|
+
|
|
162
|
+
**Checkpoint**: Output MUST show `All tests passed`.
|
|
163
|
+
|
|
164
|
+
For taint rule debugging:
|
|
165
|
+
```bash
|
|
166
|
+
semgrep --dataflow-traces -f rule.yaml test-file
|
|
167
|
+
```
|
|
168
|
+
|
|
169
|
+
See [workflow.md]({baseDir}/references/workflow.md) for detailed workflow and troubleshooting.
|
|
170
|
+
|
|
171
|
+
## Quick Reference
|
|
172
|
+
|
|
173
|
+
| Task | Command |
|
|
174
|
+
|------|---------|
|
|
175
|
+
| Run tests | `semgrep --test --config rule.yaml test-file` |
|
|
176
|
+
| Validate YAML | `semgrep --validate --config rule.yaml` |
|
|
177
|
+
| Dump AST | `semgrep --dump-ast -l <lang> <file>` |
|
|
178
|
+
| Debug taint flow | `semgrep --dataflow-traces -f rule.yaml file` |
|
|
179
|
+
|
|
180
|
+
|
|
181
|
+
## Key Differences from Rule Creation
|
|
182
|
+
|
|
183
|
+
| Aspect | semgrep-rule-creator | This skill |
|
|
184
|
+
|--------|---------------------|------------|
|
|
185
|
+
| Input | Bug pattern description | Existing rule + target languages |
|
|
186
|
+
| Output | Single rule+test | Multiple rule+test directories |
|
|
187
|
+
| Workflow | Single creation cycle | Independent cycle per language |
|
|
188
|
+
| Phase 1 | Problem analysis | Applicability analysis per language |
|
|
189
|
+
| Library research | Always relevant | Optional (when original uses libraries) |
|
|
190
|
+
|
|
191
|
+
## Documentation
|
|
192
|
+
|
|
193
|
+
**REQUIRED**: Before porting rules, read relevant Semgrep documentation:
|
|
194
|
+
|
|
195
|
+
- [Rule Syntax](https://semgrep.dev/docs/writing-rules/rule-syntax) - YAML structure and operators
|
|
196
|
+
- [Pattern Syntax](https://semgrep.dev/docs/writing-rules/pattern-syntax) - Pattern matching and metavariables
|
|
197
|
+
- [Pattern Examples](https://semgrep.dev/docs/writing-rules/pattern-examples) - Per-language pattern references
|
|
198
|
+
- [Testing Rules](https://semgrep.dev/docs/writing-rules/testing-rules) - Testing annotations
|
|
199
|
+
- [Trail of Bits Testing Handbook](https://appsec.guide/docs/static-analysis/semgrep/advanced/) - Advanced patterns
|
|
200
|
+
|
|
201
|
+
## Next Steps
|
|
202
|
+
|
|
203
|
+
- For applicability analysis guidance, see [applicability-analysis.md]({baseDir}/references/applicability-analysis.md)
|
|
204
|
+
- For language translation guidance, see [language-syntax-guide.md]({baseDir}/references/language-syntax-guide.md)
|
|
205
|
+
- For detailed workflow and examples, see [workflow.md]({baseDir}/references/workflow.md)
|
|
@@ -0,0 +1,250 @@
|
|
|
1
|
+
# Applicability Analysis
|
|
2
|
+
|
|
3
|
+
Phase 1 of the variant creation workflow. Before porting a rule, analyze whether the vulnerability pattern applies to the target language.
|
|
4
|
+
|
|
5
|
+
## Analysis Process
|
|
6
|
+
|
|
7
|
+
For EACH target language, answer these questions:
|
|
8
|
+
|
|
9
|
+
### 1. Does the Vulnerability Class Exist?
|
|
10
|
+
|
|
11
|
+
**Determine if the vulnerability type is possible in the target language.**
|
|
12
|
+
|
|
13
|
+
Examples:
|
|
14
|
+
- Buffer overflow: Applies to C/C++, may apply to Rust (in unsafe blocks), does NOT apply to Python/Java
|
|
15
|
+
- SQL injection: Applies to any language with database access
|
|
16
|
+
- XSS: Applies to any language generating HTML output
|
|
17
|
+
- Memory leak: Relevant in C/C++, less relevant in garbage-collected languages
|
|
18
|
+
- Type confusion: Relevant in dynamically typed languages, less relevant in strongly typed
|
|
19
|
+
|
|
20
|
+
### 2. Does an Equivalent Construct Exist?
|
|
21
|
+
|
|
22
|
+
**Identify what the original rule detects and find equivalents.**
|
|
23
|
+
|
|
24
|
+
Parse the original rule to identify:
|
|
25
|
+
- **Sinks**: What dangerous functions/methods does it detect?
|
|
26
|
+
- **Sources**: Where does tainted data originate?
|
|
27
|
+
- **Pattern type**: Is it taint-mode or pattern-matching?
|
|
28
|
+
|
|
29
|
+
Then research the target language:
|
|
30
|
+
- What are the equivalent dangerous functions?
|
|
31
|
+
- What are the common source patterns?
|
|
32
|
+
- Are there language-specific idioms to consider?
|
|
33
|
+
|
|
34
|
+
### 3. Are the Semantics Similar Enough?
|
|
35
|
+
|
|
36
|
+
**Verify the pattern translates meaningfully.**
|
|
37
|
+
|
|
38
|
+
Consider:
|
|
39
|
+
- Does the vulnerability manifest the same way?
|
|
40
|
+
- Are there language-specific mitigations that change detection needs?
|
|
41
|
+
- Would the ported rule provide actual security value?
|
|
42
|
+
|
|
43
|
+
## Verdict Format
|
|
44
|
+
|
|
45
|
+
Document your analysis for each target language:
|
|
46
|
+
|
|
47
|
+
```
|
|
48
|
+
TARGET: <language>
|
|
49
|
+
VERDICT: APPLICABLE | APPLICABLE_WITH_ADAPTATION | NOT_APPLICABLE
|
|
50
|
+
REASONING: <specific analysis>
|
|
51
|
+
ADAPTATIONS_NEEDED: <if APPLICABLE_WITH_ADAPTATION>
|
|
52
|
+
EQUIVALENT_CONSTRUCTS:
|
|
53
|
+
- Original: <function/pattern>
|
|
54
|
+
- Target: <equivalent function/pattern>
|
|
55
|
+
```
|
|
56
|
+
|
|
57
|
+
## Verdict Definitions
|
|
58
|
+
|
|
59
|
+
### APPLICABLE
|
|
60
|
+
|
|
61
|
+
The pattern translates directly with minor syntax adjustments.
|
|
62
|
+
|
|
63
|
+
**Criteria:**
|
|
64
|
+
- Equivalent constructs exist with same semantics
|
|
65
|
+
- Vulnerability manifests identically
|
|
66
|
+
- Detection logic remains the same
|
|
67
|
+
|
|
68
|
+
**Example:**
|
|
69
|
+
```
|
|
70
|
+
Original: Python os.system(user_input)
|
|
71
|
+
Target: Go exec.Command(user_input)
|
|
72
|
+
|
|
73
|
+
VERDICT: APPLICABLE
|
|
74
|
+
REASONING: Both execute shell commands with user input. Vulnerability is
|
|
75
|
+
identical (command injection). Detection logic (taint from input to exec)
|
|
76
|
+
translates directly.
|
|
77
|
+
```
|
|
78
|
+
|
|
79
|
+
### APPLICABLE_WITH_ADAPTATION
|
|
80
|
+
|
|
81
|
+
The pattern can be ported but requires significant changes.
|
|
82
|
+
|
|
83
|
+
**Criteria:**
|
|
84
|
+
- Vulnerability class exists but manifests differently
|
|
85
|
+
- Equivalent constructs exist but with different APIs
|
|
86
|
+
- Additional patterns needed for target language idioms
|
|
87
|
+
|
|
88
|
+
**Example:**
|
|
89
|
+
```
|
|
90
|
+
Original: Python pickle.loads(untrusted)
|
|
91
|
+
Target: Java ObjectInputStream.readObject()
|
|
92
|
+
|
|
93
|
+
VERDICT: APPLICABLE_WITH_ADAPTATION
|
|
94
|
+
REASONING: Both detect deserialization vulnerabilities but the APIs differ
|
|
95
|
+
significantly. Java requires detection of ObjectInputStream creation and
|
|
96
|
+
readObject() calls, not a single function call.
|
|
97
|
+
ADAPTATIONS_NEEDED:
|
|
98
|
+
- Different sink patterns (readObject vs loads)
|
|
99
|
+
- May need pattern-inside for ObjectInputStream context
|
|
100
|
+
- Consider readUnshared() variant
|
|
101
|
+
```
|
|
102
|
+
|
|
103
|
+
### NOT_APPLICABLE
|
|
104
|
+
|
|
105
|
+
The pattern should not be ported to this language.
|
|
106
|
+
|
|
107
|
+
**Criteria:**
|
|
108
|
+
- Vulnerability class doesn't exist in target language
|
|
109
|
+
- No equivalent construct exists
|
|
110
|
+
- Pattern would be meaningless or misleading
|
|
111
|
+
|
|
112
|
+
**Example:**
|
|
113
|
+
```
|
|
114
|
+
Original: C buffer overflow detection
|
|
115
|
+
Target: Python
|
|
116
|
+
|
|
117
|
+
VERDICT: NOT_APPLICABLE
|
|
118
|
+
REASONING: Python handles memory management automatically. Buffer overflows
|
|
119
|
+
in the traditional C sense don't exist. The vulnerability class is not
|
|
120
|
+
present in the target language.
|
|
121
|
+
```
|
|
122
|
+
|
|
123
|
+
## Common Applicability Patterns
|
|
124
|
+
|
|
125
|
+
### Always Translate (Language-Agnostic Vulnerabilities)
|
|
126
|
+
|
|
127
|
+
These vulnerability classes exist across most languages:
|
|
128
|
+
- SQL injection (any language with DB access)
|
|
129
|
+
- Command injection (any language with shell execution)
|
|
130
|
+
- Path traversal (any language with file operations)
|
|
131
|
+
- SSRF (any language with HTTP clients)
|
|
132
|
+
- XSS (any language generating HTML)
|
|
133
|
+
|
|
134
|
+
### Sometimes Translate (Context-Dependent)
|
|
135
|
+
|
|
136
|
+
These require careful analysis:
|
|
137
|
+
- Deserialization: Different mechanisms per language
|
|
138
|
+
- Cryptographic weaknesses: Language-specific crypto libraries
|
|
139
|
+
- Race conditions: Depends on concurrency model
|
|
140
|
+
- Integer overflow: Depends on type system
|
|
141
|
+
|
|
142
|
+
### Rarely Translate (Language-Specific)
|
|
143
|
+
|
|
144
|
+
These are often NOT_APPLICABLE for other languages:
|
|
145
|
+
- Memory corruption (C/C++ specific)
|
|
146
|
+
- Type juggling (PHP specific)
|
|
147
|
+
- Prototype pollution (JavaScript specific)
|
|
148
|
+
- GIL-related issues (Python specific)
|
|
149
|
+
|
|
150
|
+
## Library-Specific Rules
|
|
151
|
+
|
|
152
|
+
When the original rule targets a third-party library:
|
|
153
|
+
|
|
154
|
+
### Step 1: Identify the Library's Purpose
|
|
155
|
+
|
|
156
|
+
What functionality does the library provide?
|
|
157
|
+
- ORM / Database access
|
|
158
|
+
- HTTP client/server
|
|
159
|
+
- Serialization
|
|
160
|
+
- Templating
|
|
161
|
+
- etc.
|
|
162
|
+
|
|
163
|
+
### Step 2: Research Target Language Ecosystem
|
|
164
|
+
|
|
165
|
+
For the target language, identify:
|
|
166
|
+
- Standard library equivalents
|
|
167
|
+
- Popular third-party libraries with same functionality
|
|
168
|
+
- Language-specific idioms for this functionality
|
|
169
|
+
|
|
170
|
+
### Step 3: Decide on Scope
|
|
171
|
+
|
|
172
|
+
Options:
|
|
173
|
+
- **Native constructs only**: Port to standard library equivalents
|
|
174
|
+
- **Popular library**: Port to the most common library in target ecosystem
|
|
175
|
+
- **Multiple variants**: Create separate rules for multiple libraries
|
|
176
|
+
|
|
177
|
+
**Recommendation**: Start with standard library or most popular option. Additional library variants can be created separately if needed.
|
|
178
|
+
|
|
179
|
+
## Analysis Checklist
|
|
180
|
+
|
|
181
|
+
Before proceeding past Phase 1:
|
|
182
|
+
|
|
183
|
+
- [ ] Parsed original rule and identified pattern type
|
|
184
|
+
- [ ] Identified sinks, sources, and sanitizers (if taint mode)
|
|
185
|
+
- [ ] Researched equivalent constructs in target language
|
|
186
|
+
- [ ] Documented verdict with specific reasoning
|
|
187
|
+
- [ ] If APPLICABLE_WITH_ADAPTATION, listed required changes
|
|
188
|
+
- [ ] If NOT_APPLICABLE, documented clear explanation
|
|
189
|
+
|
|
190
|
+
## Example Analysis
|
|
191
|
+
|
|
192
|
+
**Original Rule**: Python command injection via subprocess
|
|
193
|
+
|
|
194
|
+
```yaml
|
|
195
|
+
rules:
|
|
196
|
+
- id: python-command-injection
|
|
197
|
+
mode: taint
|
|
198
|
+
languages: [python]
|
|
199
|
+
pattern-sources:
|
|
200
|
+
- pattern: request.args.get(...)
|
|
201
|
+
pattern-sinks:
|
|
202
|
+
- pattern: subprocess.call($CMD, shell=True, ...)
|
|
203
|
+
```
|
|
204
|
+
|
|
205
|
+
**Target**: Go
|
|
206
|
+
|
|
207
|
+
```
|
|
208
|
+
TARGET: Go
|
|
209
|
+
VERDICT: APPLICABLE_WITH_ADAPTATION
|
|
210
|
+
|
|
211
|
+
REASONING:
|
|
212
|
+
- Command injection exists in Go (vulnerability class present)
|
|
213
|
+
- Go uses exec.Command() and exec.CommandContext() for command execution
|
|
214
|
+
- Go doesn't have shell=True equivalent; commands run directly by default
|
|
215
|
+
- Shell execution in Go requires explicit bash -c wrapping
|
|
216
|
+
|
|
217
|
+
EQUIVALENT_CONSTRUCTS:
|
|
218
|
+
- Original sink: subprocess.call(cmd, shell=True)
|
|
219
|
+
- Target sinks:
|
|
220
|
+
- exec.Command("bash", "-c", cmd)
|
|
221
|
+
- exec.Command("sh", "-c", cmd)
|
|
222
|
+
- exec.Command(cmd) when cmd comes from user input
|
|
223
|
+
|
|
224
|
+
ADAPTATIONS_NEEDED:
|
|
225
|
+
1. Different sink patterns for Go's exec package
|
|
226
|
+
2. Source patterns need Go HTTP handler equivalents (r.URL.Query(), r.FormValue())
|
|
227
|
+
3. Consider both direct exec.Command and shell-wrapped variants
|
|
228
|
+
```
|
|
229
|
+
|
|
230
|
+
**Target**: Java
|
|
231
|
+
|
|
232
|
+
```
|
|
233
|
+
TARGET: Java
|
|
234
|
+
VERDICT: APPLICABLE
|
|
235
|
+
|
|
236
|
+
REASONING:
|
|
237
|
+
- Command injection exists in Java (vulnerability class present)
|
|
238
|
+
- Java uses Runtime.exec() and ProcessBuilder for command execution
|
|
239
|
+
- Direct equivalent functionality available
|
|
240
|
+
|
|
241
|
+
EQUIVALENT_CONSTRUCTS:
|
|
242
|
+
- Original sink: subprocess.call(cmd, shell=True)
|
|
243
|
+
- Target sinks:
|
|
244
|
+
- Runtime.getRuntime().exec(cmd)
|
|
245
|
+
- new ProcessBuilder(cmd).start()
|
|
246
|
+
|
|
247
|
+
ADAPTATIONS_NEEDED:
|
|
248
|
+
- Source patterns need Java servlet equivalents (request.getParameter())
|
|
249
|
+
- Consider both Runtime.exec and ProcessBuilder patterns
|
|
250
|
+
```
|