[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"extension-plugin-wshobson-reverse-engineering-es":3,"guides-for-wshobson-reverse-engineering":265,"similar-k1793764qcjkfva04nb0bdd0pd864nd8":266},{"_creationTime":4,"_id":5,"children":6,"community":7,"display":9,"evaluation":20,"identity":207,"isFallback":211,"parentExtension":212,"providers":247,"relations":251,"repo":252,"workflow":263},1778003443243.3223,"k1793764qcjkfva04nb0bdd0pd864nd8",[],{"reviewCount":8},0,{"description":10,"name":11,"sourceUrl":12,"tags":13},"Binary reverse engineering, malware analysis, firmware security, and software protection research for authorized security research, CTF competitions, and defensive security","Reverse Engineering","https://github.com/wshobson/agents/tree/HEAD/plugins/reverse-engineering",[14,15,16,17,18,19],"reverse-engineering","malware-analysis","firmware-security","security-research","binary-analysis","ctf",{"_creationTime":21,"_id":22,"extensionId":5,"locale":23,"result":24,"trustSignals":196,"workflow":205},1778016883287.2122,"kn72f6h16h5cja20x8jespgy7x864qtr","en",{"checks":25,"evaluatedAt":186,"extensionSummary":187,"promptVersionExtension":188,"promptVersionScoring":189,"rationale":190,"score":191,"summary":192,"tags":193,"targetMarket":194,"tier":195},[26,31,34,37,41,44,48,53,56,59,63,67,71,74,77,80,83,86,89,93,97,101,106,110,113,116,119,123,126,129,132,135,138,141,144,147,150,153,156,159,162,165,168,172,175,178,182],{"category":27,"check":28,"severity":29,"summary":30},"Practical Utility","Problem relevance","pass","The description clearly states the user problem of binary reverse engineering, malware analysis, firmware security, and software protection research.",{"category":27,"check":32,"severity":29,"summary":33},"Unique selling proposition","The agents provide specialized expertise in firmware analysis, malware analysis, and general reverse engineering, going beyond basic LLM capabilities by offering structured workflows and deep technical knowledge.",{"category":27,"check":35,"severity":29,"summary":36},"Production readiness","The plugin provides detailed guides, tool proficiency information, and structured workflows for each agent, indicating readiness for complex security research tasks.",{"category":38,"check":39,"severity":29,"summary":40},"Scope","Single responsibility principle","The plugin focuses specifically on reverse engineering and related security analysis domains, with distinct agents for firmware, malware, and general reverse engineering, adhering to a single responsibility principle.",{"category":38,"check":42,"severity":29,"summary":43},"Description quality","The provided description accurately reflects the plugin's capabilities in binary reverse engineering, malware analysis, and firmware security.",{"category":45,"check":46,"severity":29,"summary":47},"Invocation","Scoped tools","The plugin exposes distinct agents (`firmware-analyst`, `malware-analyst`, `reverse-engineer`) with well-defined responsibilities, rather than a single generalist tool.",{"category":49,"check":50,"severity":51,"summary":52},"Documentation","Configuration & parameter reference","not_applicable","No explicit configuration or parameters are documented, as the agents operate through direct LLM interaction based on their markdown descriptions.",{"category":38,"check":54,"severity":29,"summary":55},"Tool naming","The agent names (`firmware-analyst`, `malware-analyst`, `reverse-engineer`) are descriptive and relevant to their specialized domains.",{"category":38,"check":57,"severity":29,"summary":58},"Minimal I/O surface","The agents' I/O is primarily text-based, with clear descriptions of their expertise and the types of information they provide, without extraneous diagnostic dumps.",{"category":60,"check":61,"severity":29,"summary":62},"License","License usability","The extension is licensed under the MIT License, which is permissive and widely usable.",{"category":64,"check":65,"severity":51,"summary":66},"Maintenance","Commit recency","The provided context does not include commit history or push dates for this specific plugin within the larger repository, making assessment impossible.",{"category":68,"check":69,"severity":51,"summary":70},"Security","Secret Management","The agents do not appear to handle or expose secrets directly; their function is to provide analysis and guidance.",{"category":68,"check":72,"severity":29,"summary":73},"Injection","The skill content primarily provides information and analysis guidance, and does not appear to load or execute untrusted external data as instructions.",{"category":68,"check":75,"severity":29,"summary":76},"Transitive Supply-Chain Grenades","The plugin content is self-contained within the repository and does not fetch remote code or data at runtime.",{"category":68,"check":78,"severity":29,"summary":79},"Sandbox Isolation","The plugin provides analytical guidance and does not interact with the file system or external environment outside of the Claude Code runtime.",{"category":68,"check":81,"severity":29,"summary":82},"Sandbox escape primitives","No detached-process spawns or retry loops around denied tool calls were detected in the provided skill content.",{"category":68,"check":84,"severity":29,"summary":85},"Data Exfiltration","The skill content provides analytical guidance and does not contain any instructions or mechanisms for exfiltrating data.",{"category":68,"check":87,"severity":29,"summary":88},"Hidden Text Tricks","The bundled files do not contain any hidden text tricks, invisible characters, or other obfuscation methods designed to mislead the model.",{"category":90,"check":91,"severity":29,"summary":92},"Hooks","Opaque code execution","The skill content consists of readable markdown files and does not contain obfuscated code, base64 payloads, or runtime fetches.",{"category":94,"check":95,"severity":29,"summary":96},"Portability","Structural Assumption","The skill content provides general guidance and patterns, not making assumptions about user-specific project organization.",{"category":98,"check":99,"severity":51,"summary":100},"Trust","Issues Attention","Issue tracking data is not available for this plugin.",{"category":102,"check":103,"severity":104,"summary":105},"Versioning","Release Management","warning","The plugin.json manifest includes a version number '1.0.0', but there are no other versioning signals like git tags or a changelog, and the installation instructions do not point to a specific tagged release.",{"category":107,"check":108,"severity":51,"summary":109},"Code Execution","Validation","The agents provide guidance and do not execute code or process structured input/output that would require validation libraries.",{"category":68,"check":111,"severity":29,"summary":112},"Unguarded Destructive Operations","The plugin provides analytical guidance and does not perform any destructive operations.",{"category":107,"check":114,"severity":29,"summary":115},"Error Handling","The skill content is informational and does not contain executable code that would require error handling.",{"category":107,"check":117,"severity":51,"summary":118},"Logging","The plugin does not perform actions that would necessitate local audit logging.",{"category":120,"check":121,"severity":29,"summary":122},"Compliance","GDPR","The plugin provides analytical guidance and does not operate on personal data.",{"category":120,"check":124,"severity":29,"summary":125},"Target market","The extension's content is globally applicable to software security analysis and does not exhibit regional limitations.",{"category":94,"check":127,"severity":29,"summary":128},"Runtime stability","The skill content is platform-agnostic and provides general analytical guidance applicable across different operating systems.",{"category":38,"check":130,"severity":29,"summary":131},"Tool surface size","The plugin exposes 3 distinct agents, which falls within the ideal range of 3-10.",{"category":45,"check":133,"severity":29,"summary":134},"Name collisions","The agents (`firmware-analyst`, `malware-analyst`, `reverse-engineer`) have distinct names and descriptions, preventing router mismatch.",{"category":45,"check":136,"severity":29,"summary":137},"Overlapping near-synonym tools","The three agents cover distinct, non-overlapping specializations within reverse engineering.",{"category":45,"check":139,"severity":51,"summary":140},"Hooks-off mechanism","The plugin does not utilize hooks, so a hooks-off mechanism is not applicable.",{"category":45,"check":142,"severity":51,"summary":143},"Hook matcher tightness","The plugin does not utilize hooks, so hook matcher tightness is not applicable.",{"category":68,"check":145,"severity":51,"summary":146},"Hook security","The plugin does not utilize hooks, so hook security is not applicable.",{"category":90,"check":148,"severity":51,"summary":149},"Silent prompt rewriting","The plugin does not utilize `UserPromptSubmit` hooks.",{"category":68,"check":151,"severity":51,"summary":152},"Permission Hook","The plugin does not utilize `PermissionRequest` hooks.",{"category":120,"check":154,"severity":51,"summary":155},"Hook privacy","The plugin does not utilize hooks for logging or telemetry.",{"category":107,"check":157,"severity":51,"summary":158},"Hook dependency","The plugin does not utilize hooks.",{"category":49,"check":160,"severity":29,"summary":161},"Install / Setup Instructions","The README provides clear instructions on how to add the marketplace and install plugins, including specific examples.",{"category":49,"check":163,"severity":29,"summary":164},"Feature Transparency","The README clearly outlines the agents and their purposes, providing transparency into the plugin's functionality.",{"category":49,"check":166,"severity":29,"summary":167},"Phantom features","All documented agents and their capabilities appear to be implemented and present in the provided source files.",{"category":169,"check":170,"severity":29,"summary":171},"Convention","Layout convention adherence","The plugin structure follows standard conventions with agents defined in `.md` files within an `agents` directory.",{"category":169,"check":173,"severity":51,"summary":174},"Plugin state","The plugin does not appear to have persistent state that would require management outside of the standard runtime environment.",{"category":68,"check":176,"severity":51,"summary":177},"Keychain-stored secrets","The plugin does not handle secrets that would require keychain storage.",{"category":179,"check":180,"severity":51,"summary":181},"Dependencies","Tagged release sourcing","The plugin does not bundle external MCP servers or other dependencies that would require tagged release sourcing.",{"category":183,"check":184,"severity":29,"summary":185},"Installation","Clean uninstall","The plugin provides analytical guidance and does not install background daemons or services that would prevent clean uninstallation.",1778016791504,"This plugin offers three expert agents: `firmware-analyst` for embedded systems, `malware-analyst` for threat intelligence, and `reverse-engineer` for general binary inspection. Each agent provides detailed methodologies, tool proficiencies, and analysis workflows.","2.0.0","3.4.0","The plugin is well-structured, focuses on a specific security domain, and provides detailed, expert-level guidance through its agents. The MIT license is permissive. The only minor warning is regarding versioning signals, but the plugin is functional and its scope is clear.",95,"A comprehensive plugin for advanced reverse engineering tasks with specialized agents for firmware, malware, and general binary analysis.",[14,15,16,17,18,19],"global","verified",{"codeQuality":197,"collectedAt":198,"documentation":199,"maintenance":201,"security":202,"testCoverage":204},{},1778016781047,{"descriptionLength":200,"readmeSize":8},172,{},{"hasNpmPackage":203,"smitheryVerified":203},false,{"hasCi":203,"hasTests":203},{"updatedAt":206},1778016883287,{"githubOwner":208,"githubRepo":209,"locale":23,"slug":14,"type":210},"wshobson","agents","plugin",true,{"_creationTime":213,"_id":214,"community":215,"display":216,"identity":228,"parentExtension":231,"providers":232,"relations":240,"workflow":242},1778003443243.2886,"k175qypm0s8m8k6a0fkxpxfj1n865ax9",{"reviewCount":8},{"description":217,"installMethods":218,"name":219,"sourceUrl":220,"tags":221},"Production-ready workflow orchestration with 79 focused plugins, 184 specialized agents, and 150 skills - optimized for granular installation and minimal token usage",{},"Claude Code Plugins: Orchestration and Automation","https://github.com/wshobson/agents",[222,223,224,225,226,227],"workflow-orchestration","ai-agents","plugins","development-tools","automation","developer-experience",{"githubOwner":208,"githubRepo":209,"locale":23,"slug":229,"type":230},"claude-code-workflows","marketplace",null,{"extract":233,"smithery":239},{"commitSha":234,"license":235,"marketplace":236},"ece811f23310a37ceb43496dbac0e244fe6845b6","MIT",{"name":229,"pluginCount":237,"version":238},81,"1.6.0",{"qualityScore":8,"totalActivations":8,"uniqueUsers":8,"useCount":8,"verified":203},{"repoId":241},"kd72tes1veaz04ac7p0d68ya4h8650m7",{"anyEnrichmentAt":243,"extractAt":244,"githubAt":245,"invalidatedAt":243,"llmAt":246,"smitheryAt":243,"updatedAt":243},1778016735335,1778003520097,1778003532786,1778016730286,{"extract":248,"llm":249,"smithery":250},{"commitSha":234,"license":235},{"promptVersionExtension":188,"promptVersionScoring":189,"score":191,"targetMarket":194,"tier":195},{"qualityScore":8,"totalActivations":8,"uniqueUsers":8,"useCount":8,"verified":203},{"parentExtensionId":214,"repoId":241},{"_creationTime":253,"_id":241,"identity":254,"providers":255,"workflow":261},1777995558409.8196,{"githubOwner":208,"githubRepo":209,"sourceUrl":220},{"discover":256},{"sources":257},[258,259,260],"skills-sh","smithery","vskill",{"discoverAt":262,"extractAt":244,"updatedAt":244},1777995558409,{"anyEnrichmentAt":264,"extractAt":244,"githubAt":245,"llmAt":206,"smitheryAt":264,"updatedAt":206},1778016861516,[],[]]