[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"extension-marketplace-trailofbits-skills-en":3,"guides-for-trailofbits-skills":2744,"similar-k17550d1ve8ghfmwc58xs69e3s86mn86-en":2745},{"_creationTime":4,"_id":5,"children":6,"community":918,"display":919,"evaluation":923,"identity":1142,"isFallback":1138,"parentExtension":1144,"providers":1145,"relations":1152,"repo":1153,"tags":2742,"workflow":2743},1778698175626.309,"k17550d1ve8ghfmwc58xs69e3s86mn86",[7,46,72,104,127,153,175,199,223,250,272,296,316,339,359,383,404,428,449,469,491,514,540,563,582,605,630,652,674,698,721,744,764,785,806,830,852,872,894],{"_creationTime":8,"_id":9,"community":10,"display":12,"identity":17,"providers":23,"relations":40,"tags":42,"workflow":43},1778698175626.3093,"k17cqjymcj0z68r5aknea5m10h86nj0k",{"reviewCount":11},0,{"description":13,"installMethods":14,"name":15,"sourceUrl":16},"Clarify ambiguous requirements by asking questions before implementing. Only when invoked explicitly.",{"claudeCode":15},"ask-questions-if-underspecified","https://github.com/trailofbits/skills",{"basePath":18,"githubOwner":19,"githubRepo":20,"locale":21,"slug":15,"type":22},"plugins/ask-questions-if-underspecified","trailofbits","skills","en","plugin",{"evaluate":24,"extract":35},{"promptVersionExtension":25,"promptVersionScoring":26,"score":27,"tags":28,"targetMarket":33,"tier":34},"3.0.0","4.4.0",97,[29,30,31,32],"clarification","requirements","workflow","prompt-engineering","global","verified",{"commitSha":36,"plugin":37},"HEAD",{"mcpCount":11,"provider":38,"skillCount":39},"classify",1,{"parentExtensionId":5,"repoId":41},"kd7d5sbrd9m157hjv9c7v4wfyn86mk2f",[29,32,30,31],{"evaluatedAt":44,"extractAt":45,"updatedAt":44},1778698219487,1778698175626,{"_creationTime":47,"_id":48,"community":49,"display":50,"identity":54,"providers":56,"relations":68,"tags":69,"workflow":70},1778698175626.3096,"k179xttmbhxds13pdmp4r8t2c586nn49",{"reviewCount":11},{"description":51,"installMethods":52,"name":53,"sourceUrl":16},"Build deep architectural context through ultra-granular code analysis before vulnerability hunting",{"claudeCode":53},"audit-context-building",{"basePath":55,"githubOwner":19,"githubRepo":20,"locale":21,"slug":53,"type":22},"plugins/audit-context-building",{"evaluate":57,"extract":66},{"promptVersionExtension":25,"promptVersionScoring":26,"score":58,"tags":59,"targetMarket":33,"tier":65},78,[60,61,62,63,64],"code-analysis","security-auditing","context-building","developer-tools","architecture","community",{"commitSha":36,"plugin":67},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[64,60,62,63,61],{"evaluatedAt":71,"extractAt":45,"updatedAt":71},1778698234030,{"_creationTime":73,"_id":74,"community":75,"display":76,"identity":80,"providers":82,"relations":100,"tags":101,"workflow":102},1778698175626.3098,"k17802emfqh8yp7rx4mjxtj7cs86m4n0",{"reviewCount":11},{"description":77,"installMethods":78,"name":79,"sourceUrl":16},"Comprehensive smart contract security toolkit based on Trail of Bits' Building Secure Contracts framework. Includes vulnerability scanners for 6 blockchains and 5 development guideline assistants.",{"claudeCode":79},"building-secure-contracts",{"basePath":81,"githubOwner":19,"githubRepo":20,"locale":21,"slug":79,"type":22},"plugins/building-secure-contracts",{"evaluate":83,"extract":97},{"promptVersionExtension":25,"promptVersionScoring":26,"score":84,"tags":85,"targetMarket":33,"tier":34},95,[86,87,88,89,90,91,92,93,94,95,96],"smart-contracts","security","auditing","solidity","rust","cairo","algorand","cosmos","substrate","solana","ton",{"commitSha":36,"plugin":98},{"mcpCount":11,"provider":38,"skillCount":99},11,{"parentExtensionId":5,"repoId":41},[92,88,91,93,90,87,86,95,89,94,96],{"evaluatedAt":103,"extractAt":45,"updatedAt":103},1778698248528,{"_creationTime":105,"_id":106,"community":107,"display":108,"identity":112,"providers":114,"relations":123,"tags":124,"workflow":125},1778698175626.31,"k176psfdnt6z4439ae4ktjft9x86nbn9",{"reviewCount":11},{"description":109,"installMethods":110,"name":111,"sourceUrl":16},"Search and extract data from Burp Suite project files (.burp) for security analysis",{"claudeCode":111},"burpsuite-project-parser",{"basePath":113,"githubOwner":19,"githubRepo":20,"locale":21,"slug":111,"type":22},"plugins/burpsuite-project-parser",{"evaluate":115,"extract":121},{"promptVersionExtension":25,"promptVersionScoring":26,"score":58,"tags":116,"targetMarket":33,"tier":65},[117,87,118,119,120],"burpsuite","penetration-testing","data-extraction","analysis",{"commitSha":36,"plugin":122},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[120,117,119,118,87],{"evaluatedAt":126,"extractAt":45,"updatedAt":126},1778698262835,{"_creationTime":128,"_id":129,"community":130,"display":131,"identity":135,"providers":137,"relations":149,"tags":150,"workflow":151},1778698175626.3103,"k170mk2bj4chgs1h6c5ycy4wz186nj21",{"reviewCount":11},{"description":132,"installMethods":133,"name":134,"sourceUrl":16},"Diagnose and fix Claude in Chrome MCP extension connectivity issues",{"claudeCode":134},"claude-in-chrome-troubleshooting",{"basePath":136,"githubOwner":19,"githubRepo":20,"locale":21,"slug":134,"type":22},"plugins/claude-in-chrome-troubleshooting",{"evaluate":138,"extract":147},{"promptVersionExtension":25,"promptVersionScoring":26,"score":139,"tags":140,"targetMarket":33,"tier":65},65,[141,142,143,144,145,146],"troubleshooting","browser","chrome","macos","mcp","connectivity",{"commitSha":36,"plugin":148},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[142,143,146,144,145,141],{"evaluatedAt":152,"extractAt":45,"updatedAt":152},1778698278706,{"_creationTime":154,"_id":155,"community":156,"display":157,"identity":161,"providers":163,"relations":171,"tags":172,"workflow":173},1778698175626.3105,"k17cc83z9bedb6qagydrzq5zhx86mqtn",{"reviewCount":11},{"description":158,"installMethods":159,"name":160,"sourceUrl":16},"Detect compiler-induced timing side-channels in cryptographic code",{"claudeCode":160},"constant-time-analysis",{"basePath":162,"githubOwner":19,"githubRepo":20,"locale":21,"slug":160,"type":22},"plugins/constant-time-analysis",{"evaluate":164,"extract":169},{"promptVersionExtension":25,"promptVersionScoring":26,"score":27,"tags":165,"targetMarket":33,"tier":34},[87,166,60,167,168,63],"cryptography","side-channel","compiler",{"commitSha":36,"plugin":170},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[60,168,166,63,87,167],{"evaluatedAt":174,"extractAt":45,"updatedAt":174},1778698292969,{"_creationTime":176,"_id":177,"community":178,"display":179,"identity":183,"providers":185,"relations":195,"tags":196,"workflow":197},1778698175626.3108,"k1732fvn9zsnm0p6xmb6hssf7n86n9y6",{"reviewCount":11},{"description":180,"installMethods":181,"name":182,"sourceUrl":16},"Interprets Culture Index survey results for individuals and teams",{"claudeCode":182},"culture-index",{"basePath":184,"githubOwner":19,"githubRepo":20,"locale":21,"slug":182,"type":22},"plugins/culture-index",{"evaluate":186,"extract":193},{"promptVersionExtension":25,"promptVersionScoring":26,"score":187,"tags":188,"targetMarket":33,"tier":65},77,[189,182,190,191,192],"behavioral-assessment","data-analysis","hr-tools","psychometrics",{"commitSha":36,"plugin":194},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[189,182,190,191,192],{"evaluatedAt":198,"extractAt":45,"updatedAt":198},1778698307324,{"_creationTime":200,"_id":201,"community":202,"display":203,"identity":207,"providers":209,"relations":219,"tags":220,"workflow":221},1778698175626.311,"k17cc2rc01cq8603vp74z7qedd86m5kv",{"reviewCount":11},{"description":204,"installMethods":205,"name":206,"sourceUrl":16},"Debug Buttercup Kubernetes deployments",{"claudeCode":206},"debug-buttercup",{"basePath":208,"githubOwner":19,"githubRepo":20,"locale":21,"slug":206,"type":22},"plugins/debug-buttercup",{"evaluate":210,"extract":217},{"promptVersionExtension":25,"promptVersionScoring":26,"score":211,"tags":212,"targetMarket":33,"tier":34},96,[213,214,215,216,141],"kubernetes","debugging","cli","devops",{"commitSha":36,"plugin":218},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[215,214,216,213,141],{"evaluatedAt":222,"extractAt":45,"updatedAt":222},1778698322524,{"_creationTime":224,"_id":225,"community":226,"display":227,"identity":232,"providers":234,"relations":246,"tags":247,"workflow":248},1778698175626.3113,"k17abqhhygeqwhkyd6f8yrv5ws86ntv5",{"reviewCount":11},{"description":228,"installMethods":229,"name":231,"sourceUrl":16},"Create pre-configured devcontainers with Claude Code and language-specific tooling",{"claudeCode":230},"devcontainer-setup","Devcontainer Setup Plugin",{"basePath":233,"githubOwner":19,"githubRepo":20,"locale":21,"slug":230,"type":22},"plugins/devcontainer-setup",{"evaluate":235,"extract":243},{"promptVersionExtension":25,"promptVersionScoring":26,"score":27,"tags":236,"targetMarket":33,"tier":34},[237,238,239,240,241,90,242,215],"devcontainers","docker","development-environments","python","node","go",{"commitSha":36,"license":244,"plugin":245},"CC-BY-SA-4.0",{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[215,237,239,238,242,241,240,90],{"evaluatedAt":249,"extractAt":45,"updatedAt":249},1778698341991,{"_creationTime":251,"_id":252,"community":253,"display":254,"identity":258,"providers":260,"relations":268,"tags":269,"workflow":270},1778698175626.3115,"k17c07h6sgskj5wkwysqjhc26986n4qc",{"reviewCount":11},{"description":255,"installMethods":256,"name":257,"sourceUrl":16},"Security-focused differential review of code changes with git history analysis and blast radius estimation",{"claudeCode":257},"differential-review",{"basePath":259,"githubOwner":19,"githubRepo":20,"locale":21,"slug":257,"type":22},"plugins/differential-review",{"evaluate":261,"extract":266},{"promptVersionExtension":25,"promptVersionScoring":26,"score":58,"tags":262,"targetMarket":33,"tier":65},[263,87,264,120,265],"code-review","git","vulnerability",{"commitSha":36,"plugin":267},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[120,263,264,87,265],{"evaluatedAt":271,"extractAt":45,"updatedAt":271},1778698368134,{"_creationTime":273,"_id":274,"community":275,"display":276,"identity":280,"providers":282,"relations":292,"tags":293,"workflow":294},1778698175626.3118,"k172jweprznb6fm1fg4bff9csd86m8n8",{"reviewCount":11},{"description":277,"installMethods":278,"name":279,"sourceUrl":16},"Scan Android APKs for Firebase security misconfigurations including open databases, storage buckets, authentication issues, and exposed cloud functions. For authorized security research only.",{"claudeCode":279},"firebase-apk-scanner",{"basePath":281,"githubOwner":19,"githubRepo":20,"locale":21,"slug":279,"type":22},"plugins/firebase-apk-scanner",{"evaluate":283,"extract":290},{"promptVersionExtension":25,"promptVersionScoring":26,"score":284,"tags":285,"targetMarket":33,"tier":34},98,[286,287,288,87,289],"android","apk","firebase","pentest",{"commitSha":36,"plugin":291},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[286,287,288,289,87],{"evaluatedAt":295,"extractAt":45,"updatedAt":295},1778698383409,{"_creationTime":297,"_id":298,"community":299,"display":300,"identity":304,"providers":306,"relations":312,"tags":313,"workflow":314},1778698175626.312,"k17a5b67fegq89wf90v6r11hcs86n04y",{"reviewCount":11},{"description":301,"installMethods":302,"name":303,"sourceUrl":16},"Intercepts GitHub URL fetches and curl/wget commands, redirecting to the authenticated gh CLI.",{"claudeCode":303},"gh-cli",{"basePath":305,"githubOwner":19,"githubRepo":20,"locale":21,"slug":303,"type":22},"plugins/gh-cli",{"evaluate":307,"extract":311},{"promptVersionExtension":25,"promptVersionScoring":26,"score":84,"tags":308,"targetMarket":33,"tier":65},[309,215,264,310,87],"github","authentication",{"commitSha":36},{"parentExtensionId":5,"repoId":41},[310,215,264,309,87],{"evaluatedAt":315,"extractAt":45,"updatedAt":315},1778698400404,{"_creationTime":317,"_id":318,"community":319,"display":320,"identity":324,"providers":326,"relations":335,"tags":336,"workflow":337},1778698175626.3123,"k176vn8mwtfe21seafewtftpfx86n8bh",{"reviewCount":11},{"description":321,"installMethods":322,"name":323,"sourceUrl":16},"Interact with and understand the DWARF debugging format",{"claudeCode":323},"dwarf-expert",{"basePath":325,"githubOwner":19,"githubRepo":20,"locale":21,"slug":323,"type":22},"plugins/dwarf-expert",{"evaluate":327,"extract":333},{"promptVersionExtension":25,"promptVersionScoring":26,"score":328,"tags":329,"targetMarket":33,"tier":65},90,[214,330,331,63,332],"dwarf","elf","binary-analysis",{"commitSha":36,"plugin":334},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[332,214,63,330,331],{"evaluatedAt":338,"extractAt":45,"updatedAt":338},1778698415891,{"_creationTime":340,"_id":341,"community":342,"display":343,"identity":347,"providers":349,"relations":355,"tags":356,"workflow":357},1778698175626.3125,"k17b68n9kjrfskh0wwmn2cwarx86me9s",{"reviewCount":11},{"description":344,"installMethods":345,"name":346,"sourceUrl":16},"Analyzes smart contract codebases to identify state-changing entry points for security auditing. Detects externally callable functions that modify state, categorizes them by access level, and generates structured audit reports.",{"claudeCode":346},"entry-point-analyzer",{"basePath":348,"githubOwner":19,"githubRepo":20,"locale":21,"slug":346,"type":22},"plugins/entry-point-analyzer",{"evaluate":350,"extract":353},{"promptVersionExtension":25,"promptVersionScoring":26,"score":211,"tags":351,"targetMarket":33,"tier":34},[86,87,88,89,352,60],"vyper",{"commitSha":36,"plugin":354},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[88,60,87,86,89,352],{"evaluatedAt":358,"extractAt":45,"updatedAt":358},1778698432076,{"_creationTime":360,"_id":361,"community":362,"display":363,"identity":367,"providers":369,"relations":379,"tags":380,"workflow":381},1778698175626.3127,"k17fp6rvnj78nprw4fgq5308nn86mgth",{"reviewCount":11},{"description":364,"installMethods":365,"name":366,"sourceUrl":16},"Configures mewt or muton mutation testing campaigns — scopes targets, tunes timeouts, and optimizes long-running runs. Use when the user mentions mewt, muton, mutation testing, or wants to configure or optimize a mutation testing campaign.",{"claudeCode":366},"mutation-testing",{"basePath":368,"githubOwner":19,"githubRepo":20,"locale":21,"slug":366,"type":22},"plugins/mutation-testing",{"evaluate":370,"extract":377},{"promptVersionExtension":25,"promptVersionScoring":26,"score":371,"tags":372,"targetMarket":33,"tier":65},75,[366,373,374,375,63,376],"mewt","muton","testing","configuration",{"commitSha":36,"plugin":378},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[376,63,373,366,374,375],{"evaluatedAt":382,"extractAt":45,"updatedAt":382},1778698446734,{"_creationTime":384,"_id":385,"community":386,"display":387,"identity":391,"providers":393,"relations":400,"tags":401,"workflow":402},1778698175626.313,"k174294v9wha552awhxrv175md86n2ax",{"reviewCount":11},{"description":388,"installMethods":389,"name":390,"sourceUrl":16},"Property-based testing guidance for multiple languages and smart contracts",{"claudeCode":390},"property-based-testing",{"basePath":392,"githubOwner":19,"githubRepo":20,"locale":21,"slug":390,"type":22},"plugins/property-based-testing",{"evaluate":394,"extract":398},{"promptVersionExtension":25,"promptVersionScoring":26,"score":27,"tags":395,"targetMarket":33,"tier":34},[375,390,86,240,396,90,242,397,89,352],"javascript","java",{"commitSha":36,"plugin":399},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[242,397,396,390,240,90,86,89,375,352],{"evaluatedAt":403,"extractAt":45,"updatedAt":403},1778698460075,{"_creationTime":405,"_id":406,"community":407,"display":408,"identity":412,"providers":414,"relations":424,"tags":425,"workflow":426},1778698175626.3132,"k1757483sd0rdv04r5773w2tb986mb9g",{"reviewCount":11},{"description":409,"installMethods":410,"name":411,"sourceUrl":16},"Create custom Semgrep rules for detecting bug patterns and security vulnerabilities",{"claudeCode":411},"semgrep-rule-creator",{"basePath":413,"githubOwner":19,"githubRepo":20,"locale":21,"slug":411,"type":22},"plugins/semgrep-rule-creator",{"evaluate":415,"extract":422},{"promptVersionExtension":25,"promptVersionScoring":26,"score":416,"tags":417,"targetMarket":33,"tier":65},79,[418,87,419,420,421],"semgrep","code-quality","static-analysis","rule-creation",{"commitSha":36,"plugin":423},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[419,421,87,418,420],{"evaluatedAt":427,"extractAt":45,"updatedAt":427},1778698474810,{"_creationTime":429,"_id":430,"community":431,"display":432,"identity":436,"providers":438,"relations":445,"tags":446,"workflow":447},1778698175626.3135,"k17ct13je72101mcte0a3kk1bd86me3e",{"reviewCount":11},{"description":433,"installMethods":434,"name":435,"sourceUrl":16},"Creates language variants of existing Semgrep rules with proper applicability analysis and test-driven validation",{"claudeCode":435},"semgrep-rule-variant-creator",{"basePath":437,"githubOwner":19,"githubRepo":20,"locale":21,"slug":435,"type":22},"plugins/semgrep-rule-variant-creator",{"evaluate":439,"extract":443},{"promptVersionExtension":25,"promptVersionScoring":26,"score":440,"tags":441,"targetMarket":33,"tier":65},94,[418,87,60,421,442],"porting",{"commitSha":36,"plugin":444},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[60,442,421,87,418],{"evaluatedAt":448,"extractAt":45,"updatedAt":448},1778698488344,{"_creationTime":450,"_id":451,"community":452,"display":453,"identity":457,"providers":459,"relations":465,"tags":466,"workflow":467},1778698175626.3137,"k17frxtdtqk3gwd40hc7szkjv986n2p2",{"reviewCount":11},{"description":454,"installMethods":455,"name":456,"sourceUrl":16},"Identify error-prone APIs, dangerous configurations, and footgun designs that enable security mistakes",{"claudeCode":456},"sharp-edges",{"basePath":458,"githubOwner":19,"githubRepo":20,"locale":21,"slug":456,"type":22},"plugins/sharp-edges",{"evaluate":460,"extract":463},{"promptVersionExtension":25,"promptVersionScoring":26,"score":371,"tags":461,"targetMarket":33,"tier":65},[87,462,376,263,63],"api-analysis",{"commitSha":36,"plugin":464},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[462,263,376,63,87],{"evaluatedAt":468,"extractAt":45,"updatedAt":468},1778698508836,{"_creationTime":470,"_id":471,"community":472,"display":473,"identity":476,"providers":478,"relations":487,"tags":488,"workflow":489},1778698175626.314,"k178vsfspabbz5kyq3236f2fwh86mh5m",{"reviewCount":11},{"description":474,"installMethods":475,"name":420,"sourceUrl":16},"Static analysis toolkit with CodeQL, Semgrep, and SARIF parsing for security vulnerability detection",{"claudeCode":420},{"basePath":477,"githubOwner":19,"githubRepo":20,"locale":21,"slug":420,"type":22},"plugins/static-analysis",{"evaluate":479,"extract":484},{"promptVersionExtension":25,"promptVersionScoring":26,"score":480,"tags":481,"targetMarket":33,"tier":65},93,[420,87,482,418,483],"codeql","sarif",{"commitSha":36,"plugin":485},{"mcpCount":11,"provider":38,"skillCount":486},3,{"parentExtensionId":5,"repoId":41},[482,483,87,418,420],{"evaluatedAt":490,"extractAt":45,"updatedAt":490},1778698526980,{"_creationTime":492,"_id":493,"community":494,"display":495,"identity":499,"providers":501,"relations":510,"tags":511,"workflow":512},1778698175626.3142,"k17d7xtcaje68vacakf949ydas86nmcy",{"reviewCount":11},{"description":496,"installMethods":497,"name":498,"sourceUrl":16},"Specification-to-code compliance checker for blockchain audits with evidence-based alignment analysis",{"claudeCode":498},"spec-to-code-compliance",{"basePath":500,"githubOwner":19,"githubRepo":20,"locale":21,"slug":498,"type":22},"plugins/spec-to-code-compliance",{"evaluate":502,"extract":508},{"promptVersionExtension":25,"promptVersionScoring":26,"score":284,"tags":503,"targetMarket":33,"tier":34},[504,505,506,86,60,507],"blockchain","audit","compliance","documentation",{"commitSha":36,"plugin":509},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[505,504,60,506,507,86],{"evaluatedAt":513,"extractAt":45,"updatedAt":513},1778698543312,{"_creationTime":515,"_id":516,"community":517,"display":518,"identity":522,"providers":524,"relations":536,"tags":537,"workflow":538},1778698175626.3145,"k176ez4mtxadj21gyz10edtjws86n0gz",{"reviewCount":11},{"description":519,"installMethods":520,"name":521,"sourceUrl":16},"Skills from the Trail of Bits Application Security Testing Handbook (appsec.guide)",{"claudeCode":521},"testing-handbook-skills",{"basePath":523,"githubOwner":19,"githubRepo":20,"locale":21,"slug":521,"type":22},"plugins/testing-handbook-skills",{"evaluate":525,"extract":532},{"promptVersionExtension":25,"promptVersionScoring":26,"score":526,"tags":527,"targetMarket":33,"tier":34},99,[528,529,507,530,531],"code-generation","security-testing","automation","handbook",{"commitSha":36,"license":533,"plugin":534},"a8270f6209a7573677312231b941402431218673",{"mcpCount":11,"provider":38,"skillCount":535},15,{"parentExtensionId":5,"repoId":41},[530,528,507,531,529],{"evaluatedAt":539,"extractAt":45,"updatedAt":539},1778698552460,{"_creationTime":541,"_id":542,"community":543,"display":544,"identity":549,"providers":551,"relations":559,"tags":560,"workflow":561},1778698175626.3147,"k17208vnntn8bxg0xzjnwtmntx86mctp",{"reviewCount":11},{"description":545,"installMethods":546,"name":548,"sourceUrl":16},"Builds multi-language source code graphs for security analysis: call graphs, attack surface mapping, blast radius, taint propagation, complexity hotspots, and entry point enumeration. Generates Mermaid diagrams (call graphs, class hierarchies, dependency maps, heatmaps). Compares code graph snapshots for structural diff and evolution analysis. Runs graph-informed mutation testing triage (genotoxic). Generates mutation-driven test vectors (vector-forge). Extracts crypto protocol message flows and converts Mermaid diagrams to ProVerif models. Projects SARIF and weAudit findings onto code graphs. Use when analyzing call paths, mapping attack surface, visualizing code architecture, triaging survived mutants, generating cryptographic test vectors, diagramming crypto protocols, formally verifying protocols, or augmenting audits with static analysis findings.",{"claudeCode":547},"trailmark","Trailmark Plugin",{"basePath":550,"githubOwner":19,"githubRepo":20,"locale":21,"slug":547,"type":22},"plugins/trailmark",{"evaluate":552,"extract":556},{"promptVersionExtension":25,"promptVersionScoring":26,"score":211,"tags":553,"targetMarket":33,"tier":34},[60,87,554,420,240,555],"graph","diagramming",{"commitSha":36,"license":244,"plugin":557},{"mcpCount":11,"provider":38,"skillCount":558},10,{"parentExtensionId":5,"repoId":41},[60,555,554,240,87,420],{"evaluatedAt":562,"extractAt":45,"updatedAt":562},1778698572161,{"_creationTime":564,"_id":565,"community":566,"display":567,"identity":571,"providers":573,"relations":578,"tags":579,"workflow":580},1778698175626.315,"k170y4bwhetcmpkttqzby3tpfn86n3e8",{"reviewCount":11},{"description":568,"installMethods":569,"name":570,"sourceUrl":16},"Find similar vulnerabilities and bugs across codebases using pattern-based analysis",{"claudeCode":570},"variant-analysis",{"basePath":572,"githubOwner":19,"githubRepo":20,"locale":21,"slug":570,"type":22},"plugins/variant-analysis",{"evaluate":574,"extract":576},{"promptVersionExtension":25,"promptVersionScoring":26,"score":416,"tags":575,"targetMarket":33,"tier":65},[87,265,60,570,418,482],{"commitSha":36,"plugin":577},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[60,482,87,418,570,265],{"evaluatedAt":581,"extractAt":45,"updatedAt":581},1778698585973,{"_creationTime":583,"_id":584,"community":585,"display":586,"identity":590,"providers":592,"relations":601,"tags":602,"workflow":603},1778698175626.3152,"k174zsks0npe65kjj3c5q3nd3x86mht1",{"reviewCount":11},{"description":587,"installMethods":588,"name":589,"sourceUrl":16},"Comprehensive C/C++ security code review with specialized bug-finding agents covering memory safety, type safety, concurrency, and Linux/Windows userspace-specific issues",{"claudeCode":589},"c-review",{"basePath":591,"githubOwner":19,"githubRepo":20,"locale":21,"slug":589,"type":22},"plugins/c-review",{"evaluate":593,"extract":599},{"promptVersionExtension":25,"promptVersionScoring":26,"score":371,"tags":594,"targetMarket":33,"tier":65},[595,595,87,263,420,596,597,598],"c","vulnerabilities","linux","windows",{"commitSha":36,"plugin":600},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[595,263,597,87,420,596,598],{"evaluatedAt":604,"extractAt":45,"updatedAt":604},1778698612571,{"_creationTime":606,"_id":607,"community":608,"display":609,"identity":613,"providers":615,"relations":626,"tags":627,"workflow":628},1778698175626.3154,"k179z2nzmnqtzts9j79dqb7pfs86nf9f",{"reviewCount":11},{"description":610,"installMethods":611,"name":612,"sourceUrl":16},"Modern Python best practices. Use when creating new Python projects, and writing Python scripts, or migrating existing projects from legacy tools.",{"claudeCode":612},"modern-python",{"basePath":614,"githubOwner":19,"githubRepo":20,"locale":21,"slug":612,"type":22},"plugins/modern-python",{"evaluate":616,"extract":624},{"promptVersionExtension":25,"promptVersionScoring":26,"score":27,"tags":617,"targetMarket":33,"tier":34},[240,618,619,620,621,622,623,375,87],"development","tooling","uv","ruff","linting","formatting",{"commitSha":36,"plugin":625},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[618,623,622,240,621,87,375,619,620],{"evaluatedAt":629,"extractAt":45,"updatedAt":629},1778698630047,{"_creationTime":631,"_id":632,"community":633,"display":634,"identity":638,"providers":640,"relations":648,"tags":649,"workflow":650},1778698175626.3157,"k17aymcdavmk441xrzdvzsyjnn86ncg3",{"reviewCount":11},{"description":635,"installMethods":636,"name":637,"sourceUrl":16},"Detects insecure default configurations including hardcoded credentials, fallback secrets, weak authentication defaults, and dangerous values in production",{"claudeCode":637},"insecure-defaults",{"basePath":639,"githubOwner":19,"githubRepo":20,"locale":21,"slug":637,"type":22},"plugins/insecure-defaults",{"evaluate":641,"extract":646},{"promptVersionExtension":25,"promptVersionScoring":26,"score":642,"tags":643,"targetMarket":33,"tier":65},85,[87,376,60,644,645],"vulnerability-detection","secrets",{"commitSha":36,"plugin":647},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[60,376,645,87,644],{"evaluatedAt":651,"extractAt":45,"updatedAt":651},1778698644001,{"_creationTime":653,"_id":654,"community":655,"display":656,"identity":660,"providers":662,"relations":670,"tags":671,"workflow":672},1778698175626.316,"k17d2hrecnyvdswwj4cdhae0ts86n8a5",{"reviewCount":11},{"description":657,"installMethods":658,"name":659,"sourceUrl":16},"Runs code reviews using external LLM CLIs (OpenAI Codex, Google Gemini) on uncommitted changes, branch diffs, or specific commits. Bundles Codex's built-in MCP server for direct tool access.",{"claudeCode":659},"second-opinion",{"basePath":661,"githubOwner":19,"githubRepo":20,"locale":21,"slug":659,"type":22},"plugins/second-opinion",{"evaluate":663,"extract":668},{"promptVersionExtension":25,"promptVersionScoring":26,"score":211,"tags":664,"targetMarket":33,"tier":34},[263,665,666,667,215,145],"llm","codex","gemini",{"commitSha":36,"plugin":669},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[215,263,666,667,665,145],{"evaluatedAt":673,"extractAt":45,"updatedAt":673},1778698659302,{"_creationTime":675,"_id":676,"community":677,"display":678,"identity":682,"providers":684,"relations":694,"tags":695,"workflow":696},1778698175626.3162,"k174qqcjmxmeq0phfjczvbdzcd86n27b",{"reviewCount":11},{"description":679,"installMethods":680,"name":681,"sourceUrl":16},"YARA-X detection rule authoring with linting and quality analysis",{"claudeCode":681},"yara-authoring",{"basePath":683,"githubOwner":19,"githubRepo":20,"locale":21,"slug":681,"type":22},"plugins/yara-authoring",{"evaluate":685,"extract":692},{"promptVersionExtension":25,"promptVersionScoring":26,"score":187,"tags":686,"targetMarket":33,"tier":65},[687,688,689,690,691,622],"yara","malware-detection","threat-hunting","security-analysis","rule-authoring",{"commitSha":36,"plugin":693},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[622,688,691,690,689,687],{"evaluatedAt":697,"extractAt":45,"updatedAt":697},1778698677626,{"_creationTime":699,"_id":700,"community":701,"display":702,"identity":706,"providers":708,"relations":717,"tags":718,"workflow":719},1778698175626.3164,"k1791v61e55705h68216dwgwb586nmx8",{"reviewCount":11},{"description":703,"installMethods":704,"name":705,"sourceUrl":16},"Safely analyzes and cleans up local git branches and worktrees by categorizing them as merged, squash-merged, superseded, or active work.",{"claudeCode":705},"git-cleanup",{"basePath":707,"githubOwner":19,"githubRepo":20,"locale":21,"slug":705,"type":22},"plugins/git-cleanup",{"evaluate":709,"extract":715},{"promptVersionExtension":25,"promptVersionScoring":26,"score":710,"tags":711,"targetMarket":33,"tier":65},76,[264,712,63,215,713,714],"cleanup","branches","worktrees",{"commitSha":36,"plugin":716},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[713,712,215,63,264,714],{"evaluatedAt":720,"extractAt":45,"updatedAt":720},1778698691490,{"_creationTime":722,"_id":723,"community":724,"display":725,"identity":729,"providers":731,"relations":740,"tags":741,"workflow":742},1778698175626.3167,"k17afqecpvybp2abxgxhsm6knx86mhmn",{"reviewCount":11},{"description":726,"installMethods":727,"name":728,"sourceUrl":16},"Teaches design patterns for workflow-based Claude Code skills and provides a review agent for auditing existing skills",{"claudeCode":728},"workflow-skill-design",{"basePath":730,"githubOwner":19,"githubRepo":20,"locale":21,"slug":728,"type":22},"plugins/workflow-skill-design",{"evaluate":732,"extract":738},{"promptVersionExtension":25,"promptVersionScoring":26,"score":733,"tags":734,"targetMarket":33,"tier":65},88,[735,31,736,88,737],"skill-design","review","claude-code",{"commitSha":36,"plugin":739},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[88,737,736,735,31],{"evaluatedAt":743,"extractAt":45,"updatedAt":743},1778698709560,{"_creationTime":745,"_id":746,"community":747,"display":748,"identity":752,"providers":754,"relations":760,"tags":761,"workflow":762},1778698175626.317,"k170659d5h9dr2rcvwrwkvbe6x86ng9e",{"reviewCount":11},{"description":749,"installMethods":750,"name":751,"sourceUrl":16},"Generate minimal macOS Seatbelt sandbox configurations for applications",{"claudeCode":751},"seatbelt-sandboxer",{"basePath":753,"githubOwner":19,"githubRepo":20,"locale":21,"slug":751,"type":22},"plugins/seatbelt-sandboxer",{"evaluate":755,"extract":758},{"promptVersionExtension":25,"promptVersionScoring":26,"score":84,"tags":756,"targetMarket":33,"tier":34},[144,87,757,376],"sandbox",{"commitSha":36,"plugin":759},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[376,144,757,87],{"evaluatedAt":763,"extractAt":45,"updatedAt":763},1778698723922,{"_creationTime":765,"_id":766,"community":767,"display":768,"identity":772,"providers":774,"relations":781,"tags":782,"workflow":783},1778698175626.3171,"k17bx7wp86sa3s7w1va2wx6rzh86mqw9",{"reviewCount":11},{"description":769,"installMethods":770,"name":771,"sourceUrl":16},"Audit supply-chain threat landscape of project dependencies for exploitation or takeover risk",{"claudeCode":771},"supply-chain-risk-auditor",{"basePath":773,"githubOwner":19,"githubRepo":20,"locale":21,"slug":771,"type":22},"plugins/supply-chain-risk-auditor",{"evaluate":775,"extract":779},{"promptVersionExtension":25,"promptVersionScoring":26,"score":187,"tags":776,"targetMarket":33,"tier":65},[777,778,87,88,309],"dependency-analysis","supply-chain",{"commitSha":36,"plugin":780},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[88,777,309,87,778],{"evaluatedAt":784,"extractAt":45,"updatedAt":784},1778698737134,{"_creationTime":786,"_id":787,"community":788,"display":789,"identity":793,"providers":795,"relations":802,"tags":803,"workflow":804},1778698175626.3174,"k17ekkp77n2b6x8fssw07jj4yd86m814",{"reviewCount":11},{"description":790,"installMethods":791,"name":792,"sourceUrl":16},"Detects missing or compiler-optimized zeroization of sensitive data with assembly and control-flow analysis",{"claudeCode":792},"zeroize-audit",{"basePath":794,"githubOwner":19,"githubRepo":20,"locale":21,"slug":792,"type":22},"plugins/zeroize-audit",{"evaluate":796,"extract":800},{"promptVersionExtension":25,"promptVersionScoring":26,"score":480,"tags":797,"targetMarket":33,"tier":65},[87,60,798,595,799,90],"zeroization","cpp",{"commitSha":36,"plugin":801},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[595,60,799,90,87,798],{"evaluatedAt":805,"extractAt":45,"updatedAt":805},1778698756591,{"_creationTime":807,"_id":808,"community":809,"display":810,"identity":814,"providers":816,"relations":826,"tags":827,"workflow":828},1778698175626.3176,"k1799sjdabrvrbxmkf4dxed9r986nbmq",{"reviewCount":11},{"description":811,"installMethods":812,"name":813,"sourceUrl":16},"Draws Tarot cards using cryptographic randomness to add entropy to vague or underspecified planning. Interprets the spread to guide next steps. Use when feeling lucky, invoking heart-of-the-cards energy, or when prompts are ambiguous.",{"claudeCode":813},"let-fate-decide",{"basePath":815,"githubOwner":19,"githubRepo":20,"locale":21,"slug":813,"type":22},"plugins/let-fate-decide",{"evaluate":817,"extract":824},{"promptVersionExtension":25,"promptVersionScoring":26,"score":526,"tags":818,"targetMarket":33,"tier":34},[819,820,821,822,823],"tarot","entropy","decision-making","planning","randomness",{"commitSha":36,"license":244,"plugin":825},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[821,820,822,823,819],{"evaluatedAt":829,"extractAt":45,"updatedAt":829},1778698771326,{"_creationTime":831,"_id":832,"community":833,"display":834,"identity":838,"providers":840,"relations":848,"tags":849,"workflow":850},1778698175626.3179,"k17bcxe5y499yzxgf46fh8ztz986mxfa",{"reviewCount":11},{"description":835,"installMethods":836,"name":837,"sourceUrl":16},"Audits GitHub Actions workflows for security vulnerabilities in AI agent integrations (Claude Code Action, Gemini CLI, OpenAI Codex, GitHub AI Inference)",{"claudeCode":837},"agentic-actions-auditor",{"basePath":839,"githubOwner":19,"githubRepo":20,"locale":21,"slug":837,"type":22},"plugins/agentic-actions-auditor",{"evaluate":841,"extract":846},{"promptVersionExtension":25,"promptVersionScoring":26,"score":371,"tags":842,"targetMarket":33,"tier":65},[843,87,505,844,845,263],"github-actions","ci-cd","ai-agents",{"commitSha":36,"plugin":847},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[845,505,844,263,843,87],{"evaluatedAt":851,"extractAt":45,"updatedAt":851},1778698784587,{"_creationTime":853,"_id":854,"community":855,"display":856,"identity":860,"providers":862,"relations":868,"tags":869,"workflow":870},1778698175626.318,"k172f98zkg85jhx9cvbvmcxyds86nnms",{"reviewCount":11},{"description":857,"installMethods":858,"name":859,"sourceUrl":16},"Automatically reviews and fixes Claude Code skills through iterative refinement until they meet quality standards. Requires plugin-dev plugin.",{"claudeCode":859},"skill-improver",{"basePath":861,"githubOwner":19,"githubRepo":20,"locale":21,"slug":859,"type":22},"plugins/skill-improver",{"evaluate":863,"extract":866},{"promptVersionExtension":25,"promptVersionScoring":26,"score":526,"tags":864,"targetMarket":33,"tier":34},[865,419,530,263],"skill-improvement",{"commitSha":36,"plugin":867},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[530,419,263,865],{"evaluatedAt":871,"extractAt":45,"updatedAt":871},1778698798527,{"_creationTime":873,"_id":874,"community":875,"display":876,"identity":880,"providers":882,"relations":890,"tags":891,"workflow":892},1778698175626.3184,"k177a3ajrtvwrv0rccr75bvxk986m31e",{"reviewCount":11},{"description":877,"installMethods":878,"name":879,"sourceUrl":16},"Systematic false positive verification for security bug analysis with mandatory gate reviews",{"claudeCode":879},"fp-check",{"basePath":881,"githubOwner":19,"githubRepo":20,"locale":21,"slug":879,"type":22},"plugins/fp-check",{"evaluate":883,"extract":888},{"promptVersionExtension":25,"promptVersionScoring":26,"score":27,"tags":884,"targetMarket":33,"tier":34},[87,885,120,886,887],"verification","bug-triage","plugins",{"commitSha":36,"plugin":889},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[120,886,887,87,885],{"evaluatedAt":893,"extractAt":45,"updatedAt":893},1778698816348,{"_creationTime":895,"_id":896,"community":897,"display":898,"identity":902,"providers":904,"relations":914,"tags":915,"workflow":916},1778698175626.3186,"k178w69vcq5ktp47kejp29xfss86m4vp",{"reviewCount":11},{"description":899,"installMethods":900,"name":901,"sourceUrl":16},"Annotates codebases with dimensional analysis comments documenting units, dimensions, and decimal scaling. Use when someone asks to annotate units in a codebase, perform a dimensional analysis, or find vulnerabilities in a DeFi protocol. Prevents dimensional mismatches and catches formula bugs early.",{"claudeCode":901},"dimensional-analysis",{"basePath":903,"githubOwner":19,"githubRepo":20,"locale":21,"slug":901,"type":22},"plugins/dimensional-analysis",{"evaluate":905,"extract":912},{"promptVersionExtension":25,"promptVersionScoring":26,"score":526,"tags":906,"targetMarket":33,"tier":34},[60,63,907,908,909,910,87,911],"units","dimensions","annotation","refactoring","defi",{"commitSha":36,"plugin":913},{"mcpCount":11,"provider":38,"skillCount":39},{"parentExtensionId":5,"repoId":41},[909,60,911,63,908,910,87,907],{"evaluatedAt":917,"extractAt":45,"updatedAt":917},1778698831069,{"reviewCount":11},{"description":920,"installMethods":921,"name":19,"sourceUrl":16},"Claude Code plugins from Trail of Bits for enhanced AI-assisted security analysis and development",{"claudeCode":922},"trailofbits/skills",{"_creationTime":924,"_id":925,"extensionId":5,"locale":21,"result":926,"trustSignals":1124,"workflow":1140},1778698203402.7686,"kn7fg61642pcm4zr9wrsdqcek186n5dp",{"checks":927,"evaluatedAt":1102,"extensionSummary":1103,"features":1104,"nonGoals":1109,"promptVersionExtension":1113,"promptVersionScoring":26,"purpose":1114,"rationale":1115,"score":371,"summary":1116,"tags":1117,"targetMarket":33,"tier":65,"useCases":1119},[928,933,936,939,943,946,951,955,958,961,965,969,972,976,979,982,985,988,991,994,998,1002,1007,1011,1015,1018,1022,1026,1029,1033,1037,1040,1043,1045,1047,1049,1051,1053,1055,1057,1059,1061,1063,1065,1067,1069,1071,1073,1075,1077,1079,1081,1083,1084,1086,1088,1089,1090,1092,1094,1096,1097,1098,1100],{"category":929,"check":930,"severity":931,"summary":932},"Practical Utility","Problem relevance","pass","The description explicitly mentions \"enhanced AI-assisted security analysis and development,\" clearly stating the problem domain.",{"category":929,"check":934,"severity":931,"summary":935},"Unique selling proposition","The marketplace offers a curated selection of specialized security and development tools that go beyond standard LLM capabilities, providing focused solutions.",{"category":929,"check":937,"severity":931,"summary":938},"Production readiness","The listed plugins cover a wide range of security and development workflows, suggesting they are designed for practical use in real-world scenarios.",{"category":940,"check":941,"severity":931,"summary":942},"Scope","Single responsibility principle","The marketplace curates a focused set of plugins primarily for security analysis and development, adhering to a single domain.",{"category":940,"check":944,"severity":931,"summary":945},"Description quality","The displayed description accurately reflects the content of the marketplace, which offers specialized security and development plugins.",{"category":947,"check":948,"severity":949,"summary":950},"Invocation","Scoped tools","not_applicable","This check is not applicable to a marketplace which is metadata-only and does not expose tools directly.",{"category":952,"check":953,"severity":949,"summary":954},"Documentation","Configuration & parameter reference","This check is not applicable as a marketplace does not have configurable parameters or explicit tool configurations.",{"category":940,"check":956,"severity":949,"summary":957},"Tool naming","This check is not applicable to a marketplace which does not expose tools directly.",{"category":940,"check":959,"severity":949,"summary":960},"Minimal I/O surface","This check is not applicable as a marketplace does not have tools with input/output surfaces.",{"category":962,"check":963,"severity":931,"summary":964},"License","License usability","The project is licensed under CC-BY-SA-4.0, a permissive open-source license, as indicated by the bundled LICENSE file and the trust signals.",{"category":966,"check":967,"severity":931,"summary":968},"Maintenance","Commit recency","The repository shows recent commits as of May 11, 2026, indicating active maintenance.",{"category":966,"check":970,"severity":949,"summary":971},"Dependency Management","The marketplace itself does not have external dependencies; individual plugins would handle their own dependency management.",{"category":973,"check":974,"severity":949,"summary":975},"Security","Secret Management","As a metadata-only marketplace, it does not handle secrets directly.",{"category":973,"check":977,"severity":949,"summary":978},"Injection","This marketplace does not load or execute external data as instructions.",{"category":973,"check":980,"severity":949,"summary":981},"Transitive Supply-Chain Grenades","The marketplace does not fetch or execute remote code or content at runtime.",{"category":973,"check":983,"severity":949,"summary":984},"Sandbox Isolation","This marketplace does not modify files or interact with the system outside its own scope.",{"category":973,"check":986,"severity":949,"summary":987},"Sandbox escape primitives","There are no scripts or instructions that could lead to sandbox escape.",{"category":973,"check":989,"severity":949,"summary":990},"Data Exfiltration","The marketplace itself does not handle or exfiltrate any data.",{"category":973,"check":992,"severity":931,"summary":993},"Hidden Text Tricks","The README and marketplace metadata do not contain hidden text tricks or obfuscation characters.",{"category":995,"check":996,"severity":949,"summary":997},"Hooks","Opaque code execution","This marketplace does not involve code execution, thus no opaque code is present.",{"category":999,"check":1000,"severity":949,"summary":1001},"Portability","Structural Assumption","The marketplace does not make assumptions about user project structure.",{"category":1003,"check":1004,"severity":1005,"summary":1006},"Trust","Issues Attention","warning","13 issues opened and 4 closed in the last 90 days, indicating a low closure rate (24%) and potentially slow maintainer response.",{"category":1008,"check":1009,"severity":931,"summary":1010},"Versioning","Release Management","The marketplace has a `manifestVersion` of '1.0.0' and individual plugins list specific versions, indicating clear release management.",{"category":1012,"check":1013,"severity":949,"summary":1014},"Code Execution","Validation","This marketplace does not execute code or process structured output.",{"category":973,"check":1016,"severity":949,"summary":1017},"Unguarded Destructive Operations","The marketplace itself performs no destructive operations.",{"category":1019,"check":1020,"severity":949,"summary":1021},"Errors","Actionable error messages","This marketplace does not have user-facing error paths.",{"category":1023,"check":1024,"severity":949,"summary":1025},"Execution","Pinned dependencies","The marketplace itself does not have third-party dependencies; individual plugins would manage this.",{"category":940,"check":1027,"severity":949,"summary":1028},"Dry-run preview","This marketplace does not have state-changing commands or tools.",{"category":1030,"check":1031,"severity":949,"summary":1032},"Protocol","Idempotent retry & timeouts","The marketplace does not involve remote calls or state-changing operations.",{"category":1034,"check":1035,"severity":949,"summary":1036},"Compliance","Telemetry opt-in","The marketplace does not emit telemetry.",{"category":940,"check":1038,"severity":931,"summary":1039},"Theme declaration","The README clearly states the curation theme: \"Claude Code plugin marketplace... for enhanced AI-assisted security analysis, testing, and development workflows.\"",{"category":1008,"check":1041,"severity":931,"summary":1042},"Per-entry version metadata","Each plugin entry in `marketplace.json` includes an explicit `version` field, ensuring clear versioning for each item.",{"category":929,"check":930,"severity":931,"summary":1044},"The README and marketplace metadata clearly articulate that the collection is for \"enhanced AI-assisted security analysis, testing, and development workflows.\"",{"category":929,"check":934,"severity":931,"summary":1046},"The marketplace offers a specialized collection of security and development tools from Trail of Bits, which are not standard LLM capabilities.",{"category":929,"check":937,"severity":931,"summary":1048},"The breadth and depth of the listed security and development plugins suggest they are intended for production use.",{"category":940,"check":941,"severity":931,"summary":1050},"The marketplace focuses on security analysis and development tools, maintaining a coherent scope.",{"category":940,"check":944,"severity":931,"summary":1052},"The description \"Claude Code plugins from Trail of Bits for enhanced AI-assisted security analysis and development\" accurately represents the marketplace's content.",{"category":947,"check":948,"severity":949,"summary":1054},"This marketplace does not expose tools directly; therefore, this check is not applicable.",{"category":952,"check":953,"severity":949,"summary":1056},"This marketplace does not have user-configurable parameters or tool-specific configurations.",{"category":940,"check":956,"severity":949,"summary":1058},"This marketplace does not expose individual tools; therefore, this check is not applicable.",{"category":940,"check":959,"severity":949,"summary":1060},"This marketplace does not have tools with I/O surfaces; therefore, this check is not applicable.",{"category":962,"check":963,"severity":931,"summary":1062},"The project is licensed under CC-BY-SA-4.0, a permissive open-source license, clearly stated in the LICENSE file and README.",{"category":966,"check":967,"severity":931,"summary":1064},"The last commit was on May 11, 2026, which is recent and indicates active maintenance.",{"category":966,"check":970,"severity":949,"summary":1066},"The marketplace itself does not use third-party dependencies.",{"category":973,"check":974,"severity":949,"summary":1068},"The marketplace is metadata-only and does not handle secrets.",{"category":973,"check":977,"severity":949,"summary":1070},"The marketplace does not load or execute external data.",{"category":973,"check":980,"severity":949,"summary":1072},"The marketplace does not fetch remote content or code.",{"category":973,"check":983,"severity":949,"summary":1074},"The marketplace does not modify files or interact with the system.",{"category":973,"check":986,"severity":949,"summary":1076},"No code execution or scripts are present that could lead to sandbox escape.",{"category":973,"check":989,"severity":949,"summary":1078},"The marketplace does not handle or transmit data.",{"category":973,"check":992,"severity":931,"summary":1080},"No hidden text tricks, invisible characters, or obfuscation techniques were found in the README or marketplace metadata.",{"category":995,"check":996,"severity":949,"summary":1082},"The marketplace does not involve code execution.",{"category":999,"check":1000,"severity":949,"summary":1001},{"category":1003,"check":1004,"severity":1005,"summary":1085},"With 13 issues opened and 4 closed in the last 90 days, the closure rate is low (approximately 24%), suggesting potentially slow response times from maintainers.",{"category":1008,"check":1009,"severity":931,"summary":1087},"The marketplace metadata and individual plugin entries in `marketplace.json` clearly indicate version information (e.g., `1.0.0`, `1.0.1`).",{"category":1012,"check":1013,"severity":949,"summary":1014},{"category":973,"check":1016,"severity":949,"summary":1017},{"category":1019,"check":1020,"severity":949,"summary":1091},"The marketplace does not generate user-facing errors.",{"category":1023,"check":1024,"severity":949,"summary":1093},"The marketplace itself does not have third-party dependencies.",{"category":940,"check":1027,"severity":949,"summary":1095},"The marketplace does not have state-changing commands or tools.",{"category":1030,"check":1031,"severity":949,"summary":1032},{"category":1034,"check":1035,"severity":949,"summary":1036},{"category":940,"check":1038,"severity":931,"summary":1099},"The README clearly declares a curation theme focused on security analysis and development workflows.",{"category":1008,"check":1041,"severity":931,"summary":1101},"Each plugin listed in `marketplace.json` has an explicit `version` field, providing clear version metadata.",1778698203222,"This is a marketplace for Claude Code plugins developed by Trail of Bits, offering specialized tools for security analysis, testing, and development workflows.",[1105,1106,1107,1108],"Curated collection of specialized security plugins","Tools for AI-assisted development workflows","Focus on security analysis and testing","Regularly updated with new plugins",[1110,1111,1112],"Providing executable code directly","Offering general-purpose AI tools","Directly installing plugins (users install via provided commands)","3.1.0","To provide a curated catalog of advanced security and development plugins, enabling users to enhance their AI-assisted analysis and development processes.","The marketplace has a warning for 'Issues Attention' due to a low closure rate, and several 'not_applicable' checks which are standard for a marketplace. However, it passes on license, commit recency, release management, and theme declaration.","A curated marketplace of security and development plugins from Trail of Bits.",[87,618,120,1118,887],"marketplace",[1120,1121,1122,1123],"Browsing for security-focused AI tools","Discovering specialized development plugins","Enhancing AI-assisted code auditing","Finding tools for smart contract security analysis",{"codeQuality":1125,"collectedAt":1127,"documentation":1128,"maintenance":1130,"security":1137,"testCoverage":1139},{"hasLockfile":1126},true,1778698187757,{"descriptionLength":27,"readmeSize":1129},7901,{"closedIssues90d":1131,"forks":1132,"hasChangelog":1126,"manifestVersion":1133,"openIssues90d":1134,"pushedAt":1135,"stars":1136},4,455,"1.0.0",13,1778517916000,5161,{"hasNpmPackage":1138,"license":244,"smitheryVerified":1138},false,{"hasCi":1126,"hasTests":1126},{"updatedAt":1141},1778698203402,{"basePath":1143,"githubOwner":19,"githubRepo":20,"locale":21,"slug":20,"type":1118},"",null,{"evaluate":1146,"extract":1148},{"promptVersionExtension":1113,"promptVersionScoring":26,"score":371,"tags":1147,"targetMarket":33,"tier":65},[87,618,120,1118,887],{"commitSha":36,"marketplace":1149,"plugin":1151},{"name":19,"pluginCount":1150},39,{"mcpCount":11,"provider":38,"skillCount":11},{"repoId":41},{"_creationTime":1154,"_id":41,"identity":1155,"providers":1156,"workflow":2738},1778698169543.2075,{"githubOwner":19,"githubRepo":20,"sourceUrl":16},{"classify":1157,"discover":2731,"github":2734},{"commitSha":36,"extensions":1158},[1159,1172,1182,1194,1222,1232,1240,1250,1258,1266,1274,1286,1296,1328,1336,1346,1354,1362,1372,1380,1390,1404,1416,1452,1478,1488,1502,1529,1537,1547,1555,1563,1573,1581,1589,1619,1629,1637,1652,1667,1685,1694,1725,1732,1739,1747,1755,1763,1771,1781,1789,1797,1805,1813,1821,1829,1839,1846,1853,1877,1963,1974,1985,2000,2015,2022,2043,2052,2071,2077,2086,2100,2129,2137,2159,2166,2179,2190,2202,2241,2248,2255,2286,2294,2309,2316,2324,2332,2340,2348,2356,2364,2372,2380,2388,2396,2404,2412,2420,2442,2450,2460,2484,2498,2512,2526,2544,2555,2563,2571,2588,2597,2612,2646,2721],{"basePath":1143,"description":920,"displayName":19,"installMethods":1160,"rationale":1161,"selectedPaths":1162,"source":1171,"sourceLanguage":21,"type":1118},{"claudeCode":922},"marketplace.json at .claude-plugin/marketplace.json",[1163,1166,1168],{"path":1164,"priority":1165},".claude-plugin/marketplace.json","mandatory",{"path":1167,"priority":1165},"README.md",{"path":1169,"priority":1170},"LICENSE","high","rule",{"basePath":18,"description":13,"displayName":15,"installMethods":1173,"rationale":1174,"selectedPaths":1175,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":15},"plugin manifest at plugins/ask-questions-if-underspecified/.claude-plugin/plugin.json",[1176,1178,1179],{"path":1177,"priority":1165},".claude-plugin/plugin.json",{"path":1167,"priority":1165},{"path":1180,"priority":1181},"skills/ask-questions-if-underspecified/SKILL.md","medium",{"basePath":55,"description":51,"displayName":53,"installMethods":1183,"rationale":1184,"selectedPaths":1185,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":53},"plugin manifest at plugins/audit-context-building/.claude-plugin/plugin.json",[1186,1187,1188,1190,1192],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1189,"priority":1181},"skills/audit-context-building/SKILL.md",{"path":1191,"priority":1170},"agents/function-analyzer.md",{"path":1193,"priority":1170},"commands/audit-context.md",{"basePath":81,"description":77,"displayName":79,"installMethods":1195,"rationale":1196,"selectedPaths":1197,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":79},"plugin manifest at plugins/building-secure-contracts/.claude-plugin/plugin.json",[1198,1199,1200,1202,1204,1206,1208,1210,1212,1214,1216,1218,1220],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1201,"priority":1181},"skills/algorand-vulnerability-scanner/SKILL.md",{"path":1203,"priority":1181},"skills/audit-prep-assistant/SKILL.md",{"path":1205,"priority":1181},"skills/cairo-vulnerability-scanner/SKILL.md",{"path":1207,"priority":1181},"skills/code-maturity-assessor/SKILL.md",{"path":1209,"priority":1181},"skills/cosmos-vulnerability-scanner/SKILL.md",{"path":1211,"priority":1181},"skills/guidelines-advisor/SKILL.md",{"path":1213,"priority":1181},"skills/secure-workflow-guide/SKILL.md",{"path":1215,"priority":1181},"skills/solana-vulnerability-scanner/SKILL.md",{"path":1217,"priority":1181},"skills/substrate-vulnerability-scanner/SKILL.md",{"path":1219,"priority":1181},"skills/token-integration-analyzer/SKILL.md",{"path":1221,"priority":1181},"skills/ton-vulnerability-scanner/SKILL.md",{"basePath":113,"description":109,"displayName":111,"installMethods":1223,"rationale":1224,"selectedPaths":1225,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":111},"plugin manifest at plugins/burpsuite-project-parser/.claude-plugin/plugin.json",[1226,1227,1228,1230],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1229,"priority":1181},"skills/burpsuite-project-parser/SKILL.md",{"path":1231,"priority":1170},"commands/burp-search.md",{"basePath":136,"description":132,"displayName":134,"installMethods":1233,"rationale":1234,"selectedPaths":1235,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":134},"plugin manifest at plugins/claude-in-chrome-troubleshooting/.claude-plugin/plugin.json",[1236,1237,1238],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1239,"priority":1181},"skills/claude-in-chrome-troubleshooting/SKILL.md",{"basePath":162,"description":158,"displayName":160,"installMethods":1241,"rationale":1242,"selectedPaths":1243,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":160},"plugin manifest at plugins/constant-time-analysis/.claude-plugin/plugin.json",[1244,1245,1246,1248],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1247,"priority":1181},"skills/constant-time-analysis/SKILL.md",{"path":1249,"priority":1170},"commands/ct-check.md",{"basePath":184,"description":180,"displayName":182,"installMethods":1251,"rationale":1252,"selectedPaths":1253,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":182},"plugin manifest at plugins/culture-index/.claude-plugin/plugin.json",[1254,1255,1256],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1257,"priority":1181},"skills/interpreting-culture-index/SKILL.md",{"basePath":208,"description":204,"displayName":206,"installMethods":1259,"rationale":1260,"selectedPaths":1261,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":206},"plugin manifest at plugins/debug-buttercup/.claude-plugin/plugin.json",[1262,1263,1264],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1265,"priority":1181},"skills/debug-buttercup/SKILL.md",{"basePath":233,"description":228,"displayName":230,"installMethods":1267,"rationale":1268,"selectedPaths":1269,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":230},"plugin manifest at plugins/devcontainer-setup/.claude-plugin/plugin.json",[1270,1271,1272],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1273,"priority":1181},"skills/devcontainer-setup/SKILL.md",{"basePath":259,"description":255,"displayName":257,"installMethods":1275,"rationale":1276,"selectedPaths":1277,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":257},"plugin manifest at plugins/differential-review/.claude-plugin/plugin.json",[1278,1279,1280,1282,1284],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1281,"priority":1181},"skills/differential-review/SKILL.md",{"path":1283,"priority":1170},"agents/adversarial-modeler.md",{"path":1285,"priority":1170},"commands/diff-review.md",{"basePath":281,"description":277,"displayName":279,"installMethods":1287,"rationale":1288,"selectedPaths":1289,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":279},"plugin manifest at plugins/firebase-apk-scanner/.claude-plugin/plugin.json",[1290,1291,1292,1294],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1293,"priority":1181},"skills/firebase-apk-scanner/SKILL.md",{"path":1295,"priority":1170},"commands/scan-apk.md",{"basePath":305,"description":301,"displayName":303,"installMethods":1297,"rationale":1298,"selectedPaths":1299,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":303},"plugin manifest at plugins/gh-cli/.claude-plugin/plugin.json",[1300,1301,1302,1304,1306,1308,1310,1312,1314,1316,1318,1320,1322,1324,1326],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1303,"priority":1170},"hooks/cleanup-clones.sh",{"path":1305,"priority":1170},"hooks/hooks.json",{"path":1307,"priority":1170},"hooks/intercept-github-curl.bats",{"path":1309,"priority":1170},"hooks/intercept-github-curl.sh",{"path":1311,"priority":1170},"hooks/intercept-github-fetch.bats",{"path":1313,"priority":1170},"hooks/intercept-github-fetch.sh",{"path":1315,"priority":1170},"hooks/persist-session-id.sh",{"path":1317,"priority":1170},"hooks/session-hooks.bats",{"path":1319,"priority":1170},"hooks/setup-shims.bats",{"path":1321,"priority":1170},"hooks/setup-shims.sh",{"path":1323,"priority":1170},"hooks/shims/gh",{"path":1325,"priority":1170},"hooks/shims/gh-shim.bats",{"path":1327,"priority":1170},"hooks/test_helper.bash",{"basePath":325,"description":321,"displayName":323,"installMethods":1329,"rationale":1330,"selectedPaths":1331,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":323},"plugin manifest at plugins/dwarf-expert/.claude-plugin/plugin.json",[1332,1333,1334],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1335,"priority":1181},"skills/dwarf-expert/SKILL.md",{"basePath":348,"description":344,"displayName":346,"installMethods":1337,"rationale":1338,"selectedPaths":1339,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":346},"plugin manifest at plugins/entry-point-analyzer/.claude-plugin/plugin.json",[1340,1341,1342,1344],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1343,"priority":1181},"skills/entry-point-analyzer/SKILL.md",{"path":1345,"priority":1170},"commands/entry-points.md",{"basePath":368,"description":364,"displayName":366,"installMethods":1347,"rationale":1348,"selectedPaths":1349,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":366},"plugin manifest at plugins/mutation-testing/.claude-plugin/plugin.json",[1350,1351,1352],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1353,"priority":1181},"skills/mutation-testing/SKILL.md",{"basePath":392,"description":388,"displayName":390,"installMethods":1355,"rationale":1356,"selectedPaths":1357,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":390},"plugin manifest at plugins/property-based-testing/.claude-plugin/plugin.json",[1358,1359,1360],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1361,"priority":1181},"skills/property-based-testing/SKILL.md",{"basePath":413,"description":409,"displayName":411,"installMethods":1363,"rationale":1364,"selectedPaths":1365,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":411},"plugin manifest at plugins/semgrep-rule-creator/.claude-plugin/plugin.json",[1366,1367,1368,1370],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1369,"priority":1181},"skills/semgrep-rule-creator/SKILL.md",{"path":1371,"priority":1170},"commands/semgrep-rule.md",{"basePath":437,"description":433,"displayName":435,"installMethods":1373,"rationale":1374,"selectedPaths":1375,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":435},"plugin manifest at plugins/semgrep-rule-variant-creator/.claude-plugin/plugin.json",[1376,1377,1378],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1379,"priority":1181},"skills/semgrep-rule-variant-creator/SKILL.md",{"basePath":458,"description":454,"displayName":456,"installMethods":1381,"rationale":1382,"selectedPaths":1383,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":456},"plugin manifest at plugins/sharp-edges/.claude-plugin/plugin.json",[1384,1385,1386,1388],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1387,"priority":1181},"skills/sharp-edges/SKILL.md",{"path":1389,"priority":1170},"agents/sharp-edges-analyzer.md",{"basePath":477,"description":474,"displayName":420,"installMethods":1391,"rationale":1392,"selectedPaths":1393,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":420},"plugin manifest at plugins/static-analysis/.claude-plugin/plugin.json",[1394,1395,1396,1398,1400,1402],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1397,"priority":1181},"skills/codeql/SKILL.md",{"path":1399,"priority":1181},"skills/sarif-parsing/SKILL.md",{"path":1401,"priority":1181},"skills/semgrep/SKILL.md",{"path":1403,"priority":1170},"agents/semgrep-scanner.md",{"basePath":500,"description":496,"displayName":498,"installMethods":1405,"rationale":1406,"selectedPaths":1407,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":498},"plugin manifest at plugins/spec-to-code-compliance/.claude-plugin/plugin.json",[1408,1409,1410,1412,1414],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1411,"priority":1181},"skills/spec-to-code-compliance/SKILL.md",{"path":1413,"priority":1170},"agents/spec-compliance-checker.md",{"path":1415,"priority":1170},"commands/spec-compliance.md",{"basePath":523,"description":519,"displayName":521,"installMethods":1417,"rationale":1418,"selectedPaths":1419,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":521},"plugin manifest at plugins/testing-handbook-skills/.claude-plugin/plugin.json",[1420,1421,1422,1424,1426,1428,1430,1432,1434,1436,1438,1440,1442,1444,1446,1448,1450],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1423,"priority":1181},"skills/address-sanitizer/SKILL.md",{"path":1425,"priority":1181},"skills/aflpp/SKILL.md",{"path":1427,"priority":1181},"skills/atheris/SKILL.md",{"path":1429,"priority":1181},"skills/cargo-fuzz/SKILL.md",{"path":1431,"priority":1181},"skills/constant-time-testing/SKILL.md",{"path":1433,"priority":1181},"skills/coverage-analysis/SKILL.md",{"path":1435,"priority":1181},"skills/fuzzing-dictionary/SKILL.md",{"path":1437,"priority":1181},"skills/fuzzing-obstacles/SKILL.md",{"path":1439,"priority":1181},"skills/harness-writing/SKILL.md",{"path":1441,"priority":1181},"skills/libafl/SKILL.md",{"path":1443,"priority":1181},"skills/libfuzzer/SKILL.md",{"path":1445,"priority":1181},"skills/ossfuzz/SKILL.md",{"path":1447,"priority":1181},"skills/ruzzy/SKILL.md",{"path":1449,"priority":1181},"skills/testing-handbook-generator/SKILL.md",{"path":1451,"priority":1181},"skills/wycheproof/SKILL.md",{"basePath":550,"description":545,"displayName":547,"installMethods":1453,"rationale":1454,"selectedPaths":1455,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":547},"plugin manifest at plugins/trailmark/.claude-plugin/plugin.json",[1456,1457,1458,1460,1462,1464,1466,1468,1470,1472,1474,1476],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1459,"priority":1181},"skills/audit-augmentation/SKILL.md",{"path":1461,"priority":1181},"skills/crypto-protocol-diagram/SKILL.md",{"path":1463,"priority":1181},"skills/diagramming-code/SKILL.md",{"path":1465,"priority":1181},"skills/genotoxic/SKILL.md",{"path":1467,"priority":1181},"skills/graph-evolution/SKILL.md",{"path":1469,"priority":1181},"skills/mermaid-to-proverif/SKILL.md",{"path":1471,"priority":1181},"skills/trailmark/SKILL.md",{"path":1473,"priority":1181},"skills/trailmark-structural/SKILL.md",{"path":1475,"priority":1181},"skills/trailmark-summary/SKILL.md",{"path":1477,"priority":1181},"skills/vector-forge/SKILL.md",{"basePath":572,"description":568,"displayName":570,"installMethods":1479,"rationale":1480,"selectedPaths":1481,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":570},"plugin manifest at plugins/variant-analysis/.claude-plugin/plugin.json",[1482,1483,1484,1486],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1485,"priority":1181},"skills/variant-analysis/SKILL.md",{"path":1487,"priority":1170},"commands/variants.md",{"basePath":591,"description":587,"displayName":589,"installMethods":1489,"rationale":1490,"selectedPaths":1491,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":589},"plugin manifest at plugins/c-review/.claude-plugin/plugin.json",[1492,1493,1494,1496,1498,1500],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1495,"priority":1181},"skills/c-review/SKILL.md",{"path":1497,"priority":1170},"agents/c-review-dedup-judge.md",{"path":1499,"priority":1170},"agents/c-review-fp-judge.md",{"path":1501,"priority":1170},"agents/c-review-worker.md",{"basePath":614,"description":610,"displayName":612,"installMethods":1503,"rationale":1504,"selectedPaths":1505,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":612},"plugin manifest at plugins/modern-python/.claude-plugin/plugin.json",[1506,1507,1508,1510,1511,1512,1513,1515,1517,1519,1521,1523,1525,1527],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1509,"priority":1181},"skills/modern-python/SKILL.md",{"path":1305,"priority":1170},{"path":1319,"priority":1170},{"path":1321,"priority":1170},{"path":1514,"priority":1170},"hooks/shims/pip",{"path":1516,"priority":1170},"hooks/shims/pip-shim.bats",{"path":1518,"priority":1170},"hooks/shims/pipx",{"path":1520,"priority":1170},"hooks/shims/pipx-shim.bats",{"path":1522,"priority":1170},"hooks/shims/python",{"path":1524,"priority":1170},"hooks/shims/python-shim.bats",{"path":1526,"priority":1170},"hooks/shims/uv",{"path":1528,"priority":1170},"hooks/shims/uv-shim.bats",{"basePath":639,"description":635,"displayName":637,"installMethods":1530,"rationale":1531,"selectedPaths":1532,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":637},"plugin manifest at plugins/insecure-defaults/.claude-plugin/plugin.json",[1533,1534,1535],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1536,"priority":1181},"skills/insecure-defaults/SKILL.md",{"basePath":661,"description":657,"displayName":659,"installMethods":1538,"rationale":1539,"selectedPaths":1540,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":659},"plugin manifest at plugins/second-opinion/.claude-plugin/plugin.json",[1541,1542,1543,1545],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1544,"priority":1181},"skills/second-opinion/SKILL.md",{"path":1546,"priority":1165},".mcp.json",{"basePath":683,"description":679,"displayName":681,"installMethods":1548,"rationale":1549,"selectedPaths":1550,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":681},"plugin manifest at plugins/yara-authoring/.claude-plugin/plugin.json",[1551,1552,1553],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1554,"priority":1181},"skills/yara-rule-authoring/SKILL.md",{"basePath":707,"description":703,"displayName":705,"installMethods":1556,"rationale":1557,"selectedPaths":1558,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":705},"plugin manifest at plugins/git-cleanup/.claude-plugin/plugin.json",[1559,1560,1561],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1562,"priority":1181},"skills/git-cleanup/SKILL.md",{"basePath":730,"description":726,"displayName":728,"installMethods":1564,"rationale":1565,"selectedPaths":1566,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":728},"plugin manifest at plugins/workflow-skill-design/.claude-plugin/plugin.json",[1567,1568,1569,1571],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1570,"priority":1181},"skills/designing-workflow-skills/SKILL.md",{"path":1572,"priority":1170},"agents/workflow-skill-reviewer.md",{"basePath":753,"description":749,"displayName":751,"installMethods":1574,"rationale":1575,"selectedPaths":1576,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":751},"plugin manifest at plugins/seatbelt-sandboxer/.claude-plugin/plugin.json",[1577,1578,1579],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1580,"priority":1181},"skills/seatbelt-sandboxer/SKILL.md",{"basePath":773,"description":769,"displayName":771,"installMethods":1582,"rationale":1583,"selectedPaths":1584,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":771},"plugin manifest at plugins/supply-chain-risk-auditor/.claude-plugin/plugin.json",[1585,1586,1587],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1588,"priority":1181},"skills/supply-chain-risk-auditor/SKILL.md",{"basePath":794,"description":790,"displayName":792,"installMethods":1590,"rationale":1591,"selectedPaths":1592,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":792},"plugin manifest at plugins/zeroize-audit/.claude-plugin/plugin.json",[1593,1594,1595,1597,1599,1601,1603,1605,1607,1609,1611,1613,1615,1617],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1596,"priority":1181},"skills/zeroize-audit/SKILL.md",{"path":1598,"priority":1170},"agents/0-preflight.md",{"path":1600,"priority":1170},"agents/1-mcp-resolver.md",{"path":1602,"priority":1170},"agents/2-source-analyzer.md",{"path":1604,"priority":1170},"agents/2b-rust-source-analyzer.md",{"path":1606,"priority":1170},"agents/3-tu-compiler-analyzer.md",{"path":1608,"priority":1170},"agents/3b-rust-compiler-analyzer.md",{"path":1610,"priority":1170},"agents/4-report-assembler.md",{"path":1612,"priority":1170},"agents/5-poc-generator.md",{"path":1614,"priority":1170},"agents/5b-poc-validator.md",{"path":1616,"priority":1170},"agents/5c-poc-verifier.md",{"path":1618,"priority":1170},"agents/6-test-generator.md",{"basePath":815,"description":811,"displayName":813,"installMethods":1620,"rationale":1621,"selectedPaths":1622,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":813},"plugin manifest at plugins/let-fate-decide/.claude-plugin/plugin.json",[1623,1624,1625,1627],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1626,"priority":1181},"skills/let-fate-decide/SKILL.md",{"path":1628,"priority":1170},"agents/draw.md",{"basePath":839,"description":835,"displayName":837,"installMethods":1630,"rationale":1631,"selectedPaths":1632,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":837},"plugin manifest at plugins/agentic-actions-auditor/.claude-plugin/plugin.json",[1633,1634,1635],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1636,"priority":1181},"skills/agentic-actions-auditor/SKILL.md",{"basePath":861,"description":857,"displayName":859,"installMethods":1638,"rationale":1639,"selectedPaths":1640,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":859},"plugin manifest at plugins/skill-improver/.claude-plugin/plugin.json",[1641,1642,1643,1645,1647,1649,1650],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1644,"priority":1181},"skills/skill-improver/SKILL.md",{"path":1646,"priority":1170},"commands/cancel-skill-improver.md",{"path":1648,"priority":1170},"commands/skill-improver.md",{"path":1305,"priority":1170},{"path":1651,"priority":1170},"hooks/stop-hook.sh",{"basePath":881,"description":877,"displayName":879,"installMethods":1653,"rationale":1654,"selectedPaths":1655,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":879},"plugin manifest at plugins/fp-check/.claude-plugin/plugin.json",[1656,1657,1658,1660,1662,1664,1666],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1659,"priority":1181},"skills/fp-check/SKILL.md",{"path":1661,"priority":1170},"agents/data-flow-analyzer.md",{"path":1663,"priority":1170},"agents/exploitability-verifier.md",{"path":1665,"priority":1170},"agents/poc-builder.md",{"path":1305,"priority":1170},{"basePath":903,"description":899,"displayName":901,"installMethods":1668,"rationale":1669,"selectedPaths":1670,"source":1171,"sourceLanguage":21,"type":22},{"claudeCode":901},"plugin manifest at plugins/dimensional-analysis/.claude-plugin/plugin.json",[1671,1672,1673,1675,1677,1679,1681,1683],{"path":1177,"priority":1165},{"path":1167,"priority":1165},{"path":1674,"priority":1181},"skills/dimensional-analysis/SKILL.md",{"path":1676,"priority":1170},"agents/arithmetic-scanner.md",{"path":1678,"priority":1170},"agents/dimension-annotator.md",{"path":1680,"priority":1170},"agents/dimension-discoverer.md",{"path":1682,"priority":1170},"agents/dimension-propagator.md",{"path":1684,"priority":1170},"agents/dimension-validator.md",{"basePath":1686,"description":1687,"displayName":303,"installMethods":1688,"rationale":1689,"selectedPaths":1690,"source":1171,"sourceLanguage":21,"type":1693},".codex/skills/gh-cli","Enforces authenticated gh CLI workflows over unauthenticated curl/WebFetch patterns. Use when working with GitHub URLs, API access, pull requests, or issues.",{"claudeCode":922},"SKILL.md frontmatter at .codex/skills/gh-cli/SKILL.md",[1691],{"path":1692,"priority":1165},"SKILL.md","skill",{"basePath":1695,"description":1696,"displayName":837,"installMethods":1697,"rationale":1698,"selectedPaths":1699,"source":1171,"sourceLanguage":21,"type":1693},"plugins/agentic-actions-auditor/skills/agentic-actions-auditor","Audits GitHub Actions workflows for security vulnerabilities in AI agent integrations including Claude Code Action, Gemini CLI, OpenAI Codex, and GitHub AI Inference. Detects attack vectors where attacker-controlled input reaches AI agents running in CI/CD pipelines, including env var intermediary patterns, direct expression injection, dangerous sandbox configurations, and wildcard user allowlists. Use when reviewing workflow files that invoke AI coding agents, auditing CI/CD pipeline security for prompt injection risks, or evaluating agentic action configurations.",{"claudeCode":922},"SKILL.md frontmatter at plugins/agentic-actions-auditor/skills/agentic-actions-auditor/SKILL.md",[1700,1701,1703,1705,1707,1709,1711,1713,1715,1717,1719,1721,1723],{"path":1692,"priority":1165},{"path":1702,"priority":1181},"references/action-profiles.md",{"path":1704,"priority":1181},"references/cross-file-resolution.md",{"path":1706,"priority":1181},"references/foundations.md",{"path":1708,"priority":1181},"references/vector-a-env-var-intermediary.md",{"path":1710,"priority":1181},"references/vector-b-direct-expression-injection.md",{"path":1712,"priority":1181},"references/vector-c-cli-data-fetch.md",{"path":1714,"priority":1181},"references/vector-d-pr-target-checkout.md",{"path":1716,"priority":1181},"references/vector-e-error-log-injection.md",{"path":1718,"priority":1181},"references/vector-f-subshell-expansion.md",{"path":1720,"priority":1181},"references/vector-g-eval-of-ai-output.md",{"path":1722,"priority":1181},"references/vector-h-dangerous-sandbox-configs.md",{"path":1724,"priority":1181},"references/vector-i-wildcard-allowlists.md",{"basePath":1726,"description":1727,"displayName":15,"installMethods":1728,"rationale":1729,"selectedPaths":1730,"source":1171,"sourceLanguage":21,"type":1693},"plugins/ask-questions-if-underspecified/skills/ask-questions-if-underspecified","Clarify requirements before implementing. Use when serious doubts arise.",{"claudeCode":922},"SKILL.md frontmatter at plugins/ask-questions-if-underspecified/skills/ask-questions-if-underspecified/SKILL.md",[1731],{"path":1692,"priority":1165},{"basePath":1733,"description":1734,"displayName":53,"installMethods":1735,"rationale":1736,"selectedPaths":1737,"source":1171,"sourceLanguage":21,"type":1693},"plugins/audit-context-building/skills/audit-context-building","Enables ultra-granular, line-by-line code analysis to build deep architectural context before vulnerability or bug finding.",{"claudeCode":922},"SKILL.md frontmatter at plugins/audit-context-building/skills/audit-context-building/SKILL.md",[1738],{"path":1692,"priority":1165},{"basePath":1740,"description":1741,"displayName":1742,"installMethods":1743,"rationale":1744,"selectedPaths":1745,"source":1171,"sourceLanguage":21,"type":1693},"plugins/building-secure-contracts/skills/algorand-vulnerability-scanner","Scans Algorand smart contracts for 11 common vulnerabilities including rekeying attacks, unchecked transaction fees, missing field validations, and access control issues. Use when auditing Algorand projects (TEAL/PyTeal).","algorand-vulnerability-scanner",{"claudeCode":922},"SKILL.md frontmatter at plugins/building-secure-contracts/skills/algorand-vulnerability-scanner/SKILL.md",[1746],{"path":1692,"priority":1165},{"basePath":1748,"description":1749,"displayName":1750,"installMethods":1751,"rationale":1752,"selectedPaths":1753,"source":1171,"sourceLanguage":21,"type":1693},"plugins/building-secure-contracts/skills/audit-prep-assistant","Prepares codebases for security review using Trail of Bits' checklist. Helps set review goals, runs static analysis tools, increases test coverage, removes dead code, ensures accessibility, and generates documentation (flowcharts, user stories, inline comments).","audit-prep-assistant",{"claudeCode":922},"SKILL.md frontmatter at plugins/building-secure-contracts/skills/audit-prep-assistant/SKILL.md",[1754],{"path":1692,"priority":1165},{"basePath":1756,"description":1757,"displayName":1758,"installMethods":1759,"rationale":1760,"selectedPaths":1761,"source":1171,"sourceLanguage":21,"type":1693},"plugins/building-secure-contracts/skills/cairo-vulnerability-scanner","Scans Cairo/StarkNet smart contracts for 6 critical vulnerabilities including felt252 arithmetic overflow, L1-L2 messaging issues, address conversion problems, and signature replay. Use when auditing StarkNet projects.","cairo-vulnerability-scanner",{"claudeCode":922},"SKILL.md frontmatter at plugins/building-secure-contracts/skills/cairo-vulnerability-scanner/SKILL.md",[1762],{"path":1692,"priority":1165},{"basePath":1764,"description":1765,"displayName":1766,"installMethods":1767,"rationale":1768,"selectedPaths":1769,"source":1171,"sourceLanguage":21,"type":1693},"plugins/building-secure-contracts/skills/code-maturity-assessor","Systematic code maturity assessment using Trail of Bits' 9-category framework. Analyzes codebase for arithmetic safety, auditing practices, access controls, complexity, decentralization, documentation, MEV risks, low-level code, and testing. Produces professional scorecard with evidence-based ratings and actionable recommendations.","code-maturity-assessor",{"claudeCode":922},"SKILL.md frontmatter at plugins/building-secure-contracts/skills/code-maturity-assessor/SKILL.md",[1770],{"path":1692,"priority":1165},{"basePath":1772,"description":1773,"displayName":1774,"installMethods":1775,"rationale":1776,"selectedPaths":1777,"source":1171,"sourceLanguage":21,"type":1693},"plugins/building-secure-contracts/skills/cosmos-vulnerability-scanner","Scans Cosmos SDK blockchain modules and CosmWasm contracts for consensus-critical vulnerabilities — chain halts, fund loss, state divergence. 25 core + 16 IBC + 10 EVM + 3 CosmWasm patterns. Use when auditing custom x/ modules, reviewing IBC integrations, or assessing pre-launch chain security. Updated for SDK v0.53.x.","cosmos-vulnerability-scanner",{"claudeCode":922},"SKILL.md frontmatter at plugins/building-secure-contracts/skills/cosmos-vulnerability-scanner/SKILL.md",[1778,1779],{"path":1692,"priority":1165},{"path":1780,"priority":1181},"CHANGELOG.md",{"basePath":1782,"description":1783,"displayName":1784,"installMethods":1785,"rationale":1786,"selectedPaths":1787,"source":1171,"sourceLanguage":21,"type":1693},"plugins/building-secure-contracts/skills/guidelines-advisor","Smart contract development advisor based on Trail of Bits' best practices. Analyzes codebase to generate documentation/specifications, review architecture, check upgradeability patterns, assess implementation quality, identify pitfalls, review dependencies, and evaluate testing. Provides actionable recommendations.","guidelines-advisor",{"claudeCode":922},"SKILL.md frontmatter at plugins/building-secure-contracts/skills/guidelines-advisor/SKILL.md",[1788],{"path":1692,"priority":1165},{"basePath":1790,"description":1791,"displayName":1792,"installMethods":1793,"rationale":1794,"selectedPaths":1795,"source":1171,"sourceLanguage":21,"type":1693},"plugins/building-secure-contracts/skills/secure-workflow-guide","Guides through Trail of Bits' 5-step secure development workflow. Runs Slither scans, checks special features (upgradeability/ERC conformance/token integration), generates visual security diagrams, helps document security properties for fuzzing/verification, and reviews manual security areas.","secure-workflow-guide",{"claudeCode":922},"SKILL.md frontmatter at plugins/building-secure-contracts/skills/secure-workflow-guide/SKILL.md",[1796],{"path":1692,"priority":1165},{"basePath":1798,"description":1799,"displayName":1800,"installMethods":1801,"rationale":1802,"selectedPaths":1803,"source":1171,"sourceLanguage":21,"type":1693},"plugins/building-secure-contracts/skills/solana-vulnerability-scanner","Scans Solana programs for 6 critical vulnerabilities including arbitrary CPI, improper PDA validation, missing signer/ownership checks, and sysvar spoofing. Use when auditing Solana/Anchor programs.","solana-vulnerability-scanner",{"claudeCode":922},"SKILL.md frontmatter at plugins/building-secure-contracts/skills/solana-vulnerability-scanner/SKILL.md",[1804],{"path":1692,"priority":1165},{"basePath":1806,"description":1807,"displayName":1808,"installMethods":1809,"rationale":1810,"selectedPaths":1811,"source":1171,"sourceLanguage":21,"type":1693},"plugins/building-secure-contracts/skills/substrate-vulnerability-scanner","Scans Substrate/Polkadot pallets for 7 critical vulnerabilities including arithmetic overflow, panic DoS, incorrect weights, and bad origin checks. Use when auditing Substrate runtimes or FRAME pallets.","substrate-vulnerability-scanner",{"claudeCode":922},"SKILL.md frontmatter at plugins/building-secure-contracts/skills/substrate-vulnerability-scanner/SKILL.md",[1812],{"path":1692,"priority":1165},{"basePath":1814,"description":1815,"displayName":1816,"installMethods":1817,"rationale":1818,"selectedPaths":1819,"source":1171,"sourceLanguage":21,"type":1693},"plugins/building-secure-contracts/skills/token-integration-analyzer","Token integration and implementation analyzer based on Trail of Bits' token integration checklist. Analyzes token implementations for ERC20/ERC721 conformity, checks for 20+ weird token patterns, assesses contract composition and owner privileges, performs on-chain scarcity analysis, and evaluates how protocols handle non-standard tokens. Context-aware for both token implementations and token integrations.","token-integration-analyzer",{"claudeCode":922},"SKILL.md frontmatter at plugins/building-secure-contracts/skills/token-integration-analyzer/SKILL.md",[1820],{"path":1692,"priority":1165},{"basePath":1822,"description":1823,"displayName":1824,"installMethods":1825,"rationale":1826,"selectedPaths":1827,"source":1171,"sourceLanguage":21,"type":1693},"plugins/building-secure-contracts/skills/ton-vulnerability-scanner","Scans TON (The Open Network) smart contracts for 3 critical vulnerabilities including integer-as-boolean misuse, fake Jetton contracts, and forward TON without gas checks. Use when auditing FunC contracts.","ton-vulnerability-scanner",{"claudeCode":922},"SKILL.md frontmatter at plugins/building-secure-contracts/skills/ton-vulnerability-scanner/SKILL.md",[1828],{"path":1692,"priority":1165},{"basePath":1830,"description":1831,"displayName":111,"installMethods":1832,"rationale":1833,"selectedPaths":1834,"source":1171,"sourceLanguage":21,"type":1693},"plugins/burpsuite-project-parser/skills/burpsuite-project-parser","Searches and explores Burp Suite project files (.burp) from the command line. Use when searching response headers or bodies with regex patterns, extracting security audit findings, dumping proxy history or site map data, or analyzing HTTP traffic captured in a Burp project.",{"claudeCode":922},"SKILL.md frontmatter at plugins/burpsuite-project-parser/skills/burpsuite-project-parser/SKILL.md",[1835,1836],{"path":1692,"priority":1165},{"path":1837,"priority":1838},"scripts/burp-search.sh","low",{"basePath":1840,"description":1841,"displayName":589,"installMethods":1842,"rationale":1843,"selectedPaths":1844,"source":1171,"sourceLanguage":21,"type":1693},"plugins/c-review/skills/c-review","Performs comprehensive C/C++ security review for memory corruption, integer overflows, race conditions, and platform-specific vulnerabilities. Use when auditing native C/C++ applications, reviewing daemons or services for memory safety, or hunting integer overflow / use-after-free / race conditions in userspace code.",{"claudeCode":922},"SKILL.md frontmatter at plugins/c-review/skills/c-review/SKILL.md",[1845],{"path":1692,"priority":1165},{"basePath":1847,"description":1848,"displayName":134,"installMethods":1849,"rationale":1850,"selectedPaths":1851,"source":1171,"sourceLanguage":21,"type":1693},"plugins/claude-in-chrome-troubleshooting/skills/claude-in-chrome-troubleshooting","Diagnose and fix Claude in Chrome MCP extension connectivity issues. Use when mcp__claude-in-chrome__* tools fail, return \"Browser extension is not connected\", or behave erratically.",{"claudeCode":922},"SKILL.md frontmatter at plugins/claude-in-chrome-troubleshooting/skills/claude-in-chrome-troubleshooting/SKILL.md",[1852],{"path":1692,"priority":1165},{"basePath":1854,"description":1855,"displayName":160,"installMethods":1856,"rationale":1857,"selectedPaths":1858,"source":1171,"sourceLanguage":21,"type":1693},"plugins/constant-time-analysis/skills/constant-time-analysis","Detects timing side-channel vulnerabilities in cryptographic code. Use when implementing or reviewing crypto code, encountering division on secrets, secret-dependent branches, or constant-time programming questions in C, C++, Go, Rust, Swift, Java, Kotlin, C#, PHP, JavaScript, TypeScript, Python, or Ruby.",{"claudeCode":922},"SKILL.md frontmatter at plugins/constant-time-analysis/skills/constant-time-analysis/SKILL.md",[1859,1860,1861,1863,1865,1867,1869,1871,1873,1875],{"path":1692,"priority":1165},{"path":1167,"priority":1170},{"path":1862,"priority":1181},"references/compiled.md",{"path":1864,"priority":1181},"references/javascript.md",{"path":1866,"priority":1181},"references/kotlin.md",{"path":1868,"priority":1181},"references/php.md",{"path":1870,"priority":1181},"references/python.md",{"path":1872,"priority":1181},"references/ruby.md",{"path":1874,"priority":1181},"references/swift.md",{"path":1876,"priority":1181},"references/vm-compiled.md",{"basePath":1878,"description":1879,"displayName":1880,"installMethods":1881,"rationale":1882,"selectedPaths":1883,"source":1171,"sourceLanguage":21,"type":1693},"plugins/culture-index/skills/interpreting-culture-index","Interprets Culture Index (CI) surveys, behavioral profiles, and personality assessment data. Supports individual profile interpretation, team composition analysis (gas/brake/glue), burnout detection, profile comparison, hiring profiles, manager coaching, interview transcript analysis for trait prediction, candidate debrief, onboarding planning, and conflict mediation. Accepts extracted JSON or PDF input via OpenCV extraction script.","interpreting-culture-index",{"claudeCode":922},"SKILL.md frontmatter at plugins/culture-index/skills/interpreting-culture-index/SKILL.md",[1884,1885,1887,1889,1891,1893,1895,1897,1899,1901,1903,1905,1907,1909,1911,1913,1915,1917,1919,1921,1923,1925,1927,1929,1931,1933,1935,1937,1939,1941,1943,1945,1947,1949,1951,1953,1955,1957,1959,1961],{"path":1692,"priority":1165},{"path":1886,"priority":1181},"references/anti-patterns.md",{"path":1888,"priority":1181},"references/archetype-administrator.md",{"path":1890,"priority":1181},"references/archetype-coordinator.md",{"path":1892,"priority":1181},"references/archetype-craftsman.md",{"path":1894,"priority":1181},"references/archetype-daredevil.md",{"path":1896,"priority":1181},"references/archetype-debater.md",{"path":1898,"priority":1181},"references/archetype-facilitator.md",{"path":1900,"priority":1181},"references/archetype-influencer.md",{"path":1902,"priority":1181},"references/archetype-operator.md",{"path":1904,"priority":1181},"references/archetype-persuader.md",{"path":1906,"priority":1181},"references/archetype-philosopher.md",{"path":1908,"priority":1181},"references/archetype-rainmaker.md",{"path":1910,"priority":1181},"references/archetype-scholar.md",{"path":1912,"priority":1181},"references/archetype-socializer.md",{"path":1914,"priority":1181},"references/archetype-specialist.md",{"path":1916,"priority":1181},"references/archetype-technical-expert.md",{"path":1918,"priority":1181},"references/archetype-traditionalist.md",{"path":1920,"priority":1181},"references/archetype-trailblazer.md",{"path":1922,"priority":1181},"references/conversation-starters.md",{"path":1924,"priority":1181},"references/interview-trait-signals.md",{"path":1926,"priority":1181},"references/motivators.md",{"path":1928,"priority":1181},"references/patterns-archetypes.md",{"path":1930,"priority":1181},"references/primary-traits.md",{"path":1932,"priority":1181},"references/secondary-traits.md",{"path":1934,"priority":1181},"references/team-composition.md",{"path":1936,"priority":1838},"scripts/check_deps.py",{"path":1938,"priority":1838},"scripts/culture_index/__init__.py",{"path":1940,"priority":1838},"scripts/culture_index/constants.py",{"path":1942,"priority":1838},"scripts/culture_index/extract.py",{"path":1944,"priority":1838},"scripts/culture_index/models.py",{"path":1946,"priority":1838},"scripts/culture_index/opencv_extractor.py",{"path":1948,"priority":1838},"scripts/extract_pdf.py",{"path":1950,"priority":1838},"scripts/pyproject.toml",{"path":1952,"priority":1838},"templates/burnout-report.md",{"path":1954,"priority":1838},"templates/comparison-report.md",{"path":1956,"priority":1838},"templates/hiring-profile.md",{"path":1958,"priority":1838},"templates/individual-report.md",{"path":1960,"priority":1838},"templates/predicted-profile.md",{"path":1962,"priority":1838},"templates/team-report.md",{"basePath":1964,"description":1965,"displayName":206,"installMethods":1966,"rationale":1967,"selectedPaths":1968,"source":1171,"sourceLanguage":21,"type":1693},"plugins/debug-buttercup/skills/debug-buttercup","Debugs the Buttercup CRS (Cyber Reasoning System) running on Kubernetes. Use when diagnosing pod crashes, restart loops, Redis failures, resource pressure, disk saturation, DinD issues, or any service misbehavior in the crs namespace. Covers triage, log analysis, queue inspection, and common failure patterns for: redis, fuzzer-bot, coverage-bot, seed-gen, patcher, build-bot, scheduler, task-server, task-downloader, program-model, litellm, dind, tracer-bot, merger-bot, competition-api, pov-reproducer, scratch-cleaner, registry-cache, image-preloader, ui.\n",{"claudeCode":922},"SKILL.md frontmatter at plugins/debug-buttercup/skills/debug-buttercup/SKILL.md",[1969,1970,1972],{"path":1692,"priority":1165},{"path":1971,"priority":1181},"references/failure-patterns.md",{"path":1973,"priority":1838},"scripts/diagnose.sh",{"basePath":1975,"description":1976,"displayName":230,"installMethods":1977,"rationale":1978,"selectedPaths":1979,"source":1171,"sourceLanguage":21,"type":1693},"plugins/devcontainer-setup/skills/devcontainer-setup","Creates devcontainers with Claude Code, language-specific tooling (Python/Node/Rust/Go), and persistent volumes. Use when adding devcontainer support to a project, setting up isolated development environments, or configuring sandboxed Claude Code workspaces.",{"claudeCode":922},"SKILL.md frontmatter at plugins/devcontainer-setup/skills/devcontainer-setup/SKILL.md",[1980,1981,1983],{"path":1692,"priority":1165},{"path":1982,"priority":1181},"references/dockerfile-best-practices.md",{"path":1984,"priority":1181},"references/features-vs-dockerfile.md",{"basePath":1986,"description":1987,"displayName":257,"installMethods":1988,"rationale":1989,"selectedPaths":1990,"source":1171,"sourceLanguage":21,"type":1693},"plugins/differential-review/skills/differential-review","Performs security-focused differential review of code changes (PRs, commits, diffs). Adapts analysis depth to codebase size, uses git history for context, calculates blast radius, checks test coverage, and generates comprehensive markdown reports. Automatically detects and prevents security regressions.\n",{"claudeCode":922},"SKILL.md frontmatter at plugins/differential-review/skills/differential-review/SKILL.md",[1991,1992,1994,1996,1998],{"path":1692,"priority":1165},{"path":1993,"priority":1181},"adversarial.md",{"path":1995,"priority":1181},"methodology.md",{"path":1997,"priority":1181},"patterns.md",{"path":1999,"priority":1181},"reporting.md",{"basePath":2001,"description":2002,"displayName":901,"installMethods":2003,"rationale":2004,"selectedPaths":2005,"source":1171,"sourceLanguage":21,"type":1693},"plugins/dimensional-analysis/skills/dimensional-analysis","Annotates codebases with dimensional analysis comments documenting units, dimensions, and decimal scaling. Use when someone asks to annotate units in a codebase, perform a dimensional analysis, or find vulnerabilities in a DeFi protocol, offchain code, or other blockchain-related codebase with arithmetic. Prevents dimensional mismatches and catches formula bugs early.",{"claudeCode":922},"SKILL.md frontmatter at plugins/dimensional-analysis/skills/dimensional-analysis/SKILL.md",[2006,2007,2009,2011,2013],{"path":1692,"priority":1165},{"path":2008,"priority":1181},"references/annotate.md",{"path":2010,"priority":1181},"references/bug-patterns.md",{"path":2012,"priority":1181},"references/common-dimensions.md",{"path":2014,"priority":1181},"references/dimension-algebra.md",{"basePath":2016,"description":2017,"displayName":323,"installMethods":2018,"rationale":2019,"selectedPaths":2020,"source":1171,"sourceLanguage":21,"type":1693},"plugins/dwarf-expert/skills/dwarf-expert","Provides expertise for analyzing DWARF debug files and understanding the DWARF debug format/standard (v3-v5). Triggers when understanding DWARF information, interacting with DWARF files, answering DWARF-related questions, or working with code that parses DWARF data.",{"claudeCode":922},"SKILL.md frontmatter at plugins/dwarf-expert/skills/dwarf-expert/SKILL.md",[2021],{"path":1692,"priority":1165},{"basePath":2023,"description":2024,"displayName":346,"installMethods":2025,"rationale":2026,"selectedPaths":2027,"source":1171,"sourceLanguage":21,"type":1693},"plugins/entry-point-analyzer/skills/entry-point-analyzer","Analyzes smart contract codebases to identify state-changing entry points for security auditing. Detects externally callable functions that modify state, categorizes them by access level (public, admin, role-restricted, contract-only), and generates structured audit reports. Excludes view/pure/read-only functions. Use when auditing smart contracts (Solidity, Vyper, Solana/Rust, Move, TON, CosmWasm) or when asked to find entry points, audit flows, external functions, access control patterns, or privileged operations.",{"claudeCode":922},"SKILL.md frontmatter at plugins/entry-point-analyzer/skills/entry-point-analyzer/SKILL.md",[2028,2029,2031,2033,2035,2037,2039,2041],{"path":1692,"priority":1165},{"path":2030,"priority":1181},"references/cosmwasm.md",{"path":2032,"priority":1181},"references/move-aptos.md",{"path":2034,"priority":1181},"references/move-sui.md",{"path":2036,"priority":1181},"references/solana.md",{"path":2038,"priority":1181},"references/solidity.md",{"path":2040,"priority":1181},"references/ton.md",{"path":2042,"priority":1181},"references/vyper.md",{"basePath":2044,"description":2045,"displayName":279,"installMethods":2046,"rationale":2047,"selectedPaths":2048,"source":1171,"sourceLanguage":21,"type":1693},"plugins/firebase-apk-scanner/skills/firebase-apk-scanner","Scans Android APKs for Firebase security misconfigurations including open databases, storage buckets, authentication issues, and exposed cloud functions. Use when analyzing APK files for Firebase vulnerabilities, performing mobile app security audits, or testing Firebase endpoint security. For authorized security research only.",{"claudeCode":922},"SKILL.md frontmatter at plugins/firebase-apk-scanner/skills/firebase-apk-scanner/SKILL.md",[2049,2050],{"path":1692,"priority":1165},{"path":2051,"priority":1181},"references/vulnerabilities.md",{"basePath":2053,"description":2054,"displayName":879,"installMethods":2055,"rationale":2056,"selectedPaths":2057,"source":1171,"sourceLanguage":21,"type":1693},"plugins/fp-check/skills/fp-check","Systematically verifies suspected security bugs to eliminate false positives. Produces TRUE POSITIVE or FALSE POSITIVE verdicts with documented evidence for each bug.",{"claudeCode":922},"SKILL.md frontmatter at plugins/fp-check/skills/fp-check/SKILL.md",[2058,2059,2061,2063,2065,2067,2069],{"path":1692,"priority":1165},{"path":2060,"priority":1181},"references/bug-class-verification.md",{"path":2062,"priority":1181},"references/deep-verification.md",{"path":2064,"priority":1181},"references/evidence-templates.md",{"path":2066,"priority":1181},"references/false-positive-patterns.md",{"path":2068,"priority":1181},"references/gate-reviews.md",{"path":2070,"priority":1181},"references/standard-verification.md",{"basePath":2072,"description":703,"displayName":705,"installMethods":2073,"rationale":2074,"selectedPaths":2075,"source":1171,"sourceLanguage":21,"type":1693},"plugins/git-cleanup/skills/git-cleanup",{"claudeCode":922},"SKILL.md frontmatter at plugins/git-cleanup/skills/git-cleanup/SKILL.md",[2076],{"path":1692,"priority":1165},{"basePath":2078,"description":2079,"displayName":637,"installMethods":2080,"rationale":2081,"selectedPaths":2082,"source":1171,"sourceLanguage":21,"type":1693},"plugins/insecure-defaults/skills/insecure-defaults","Detects fail-open insecure defaults (hardcoded secrets, weak auth, permissive security) that allow apps to run insecurely in production. Use when auditing security, reviewing config management, or analyzing environment variable handling.",{"claudeCode":922},"SKILL.md frontmatter at plugins/insecure-defaults/skills/insecure-defaults/SKILL.md",[2083,2084],{"path":1692,"priority":1165},{"path":2085,"priority":1181},"references/examples.md",{"basePath":2087,"description":2088,"displayName":813,"installMethods":2089,"rationale":2090,"selectedPaths":2091,"source":1171,"sourceLanguage":21,"type":1693},"plugins/let-fate-decide/skills/let-fate-decide","Draws 4 Tarot cards to inject entropy into planning when prompts are vague, ambiguous, or casually delegated. Interprets the spread to guide next steps. Use when the user says 'let fate decide', 'YOLO', 'whatever', 'idk', or other nonchalant phrases, makes Yu-Gi-Oh references, or when you are about to arbitrarily pick between multiple reasonable approaches. Prefer over ask-questions-if-underspecified when the user's tone is casual or playful rather than precision-seeking.",{"claudeCode":922},"SKILL.md frontmatter at plugins/let-fate-decide/skills/let-fate-decide/SKILL.md",[2092,2093,2095,2097,2098],{"path":1692,"priority":1165},{"path":2094,"priority":1181},"references/INTERPRETATION_GUIDE.md",{"path":2096,"priority":1838},"scripts/draw_cards.py",{"path":1950,"priority":1838},{"path":2099,"priority":1838},"scripts/test_draw_cards.py",{"basePath":2101,"description":2102,"displayName":612,"installMethods":2103,"rationale":2104,"selectedPaths":2105,"source":1171,"sourceLanguage":21,"type":1693},"plugins/modern-python/skills/modern-python","Configures Python projects with modern tooling (uv, ruff, ty). Use when creating projects, writing standalone scripts, or migrating from pip/Poetry/mypy/black.",{"claudeCode":922},"SKILL.md frontmatter at plugins/modern-python/skills/modern-python/SKILL.md",[2106,2107,2109,2111,2113,2115,2117,2119,2121,2123,2125,2127],{"path":1692,"priority":1165},{"path":2108,"priority":1181},"references/dependabot.md",{"path":2110,"priority":1181},"references/migration-checklist.md",{"path":2112,"priority":1181},"references/pep723-scripts.md",{"path":2114,"priority":1181},"references/prek.md",{"path":2116,"priority":1181},"references/pyproject.md",{"path":2118,"priority":1181},"references/ruff-config.md",{"path":2120,"priority":1181},"references/security-setup.md",{"path":2122,"priority":1181},"references/testing.md",{"path":2124,"priority":1181},"references/uv-commands.md",{"path":2126,"priority":1838},"templates/dependabot.yml",{"path":2128,"priority":1838},"templates/pre-commit-config.yaml",{"basePath":2130,"description":364,"displayName":366,"installMethods":2131,"rationale":2132,"selectedPaths":2133,"source":1171,"sourceLanguage":21,"type":1693},"plugins/mutation-testing/skills/mutation-testing",{"claudeCode":922},"SKILL.md frontmatter at plugins/mutation-testing/skills/mutation-testing/SKILL.md",[2134,2135],{"path":1692,"priority":1165},{"path":2136,"priority":1181},"references/optimization-strategies.md",{"basePath":2138,"description":2139,"displayName":390,"installMethods":2140,"rationale":2141,"selectedPaths":2142,"source":1171,"sourceLanguage":21,"type":1693},"plugins/property-based-testing/skills/property-based-testing","Provides guidance for property-based testing across multiple languages and smart contracts. Use when writing tests, reviewing code with serialization/validation/parsing patterns, designing features, or when property-based testing would provide stronger coverage than example-based tests.",{"claudeCode":922},"SKILL.md frontmatter at plugins/property-based-testing/skills/property-based-testing/SKILL.md",[2143,2144,2145,2147,2149,2151,2153,2155,2157],{"path":1692,"priority":1165},{"path":1167,"priority":1170},{"path":2146,"priority":1181},"references/design.md",{"path":2148,"priority":1181},"references/generating.md",{"path":2150,"priority":1181},"references/interpreting-failures.md",{"path":2152,"priority":1181},"references/libraries.md",{"path":2154,"priority":1181},"references/refactoring.md",{"path":2156,"priority":1181},"references/reviewing.md",{"path":2158,"priority":1181},"references/strategies.md",{"basePath":2160,"description":2161,"displayName":751,"installMethods":2162,"rationale":2163,"selectedPaths":2164,"source":1171,"sourceLanguage":21,"type":1693},"plugins/seatbelt-sandboxer/skills/seatbelt-sandboxer","Generates minimal macOS Seatbelt sandbox configurations. Use when sandboxing, isolating, or restricting macOS applications with allowlist-based profiles.",{"claudeCode":922},"SKILL.md frontmatter at plugins/seatbelt-sandboxer/skills/seatbelt-sandboxer/SKILL.md",[2165],{"path":1692,"priority":1165},{"basePath":2167,"description":2168,"displayName":659,"installMethods":2169,"rationale":2170,"selectedPaths":2171,"source":1171,"sourceLanguage":21,"type":1693},"plugins/second-opinion/skills/second-opinion","Runs external LLM code reviews (OpenAI Codex or Google Gemini CLI) on uncommitted changes, branch diffs, or specific commits. Use when the user asks for a second opinion, external review, codex review, gemini review, or mentions /second-opinion.",{"claudeCode":922},"SKILL.md frontmatter at plugins/second-opinion/skills/second-opinion/SKILL.md",[2172,2173,2175,2177],{"path":1692,"priority":1165},{"path":2174,"priority":1181},"references/codex-invocation.md",{"path":2176,"priority":1181},"references/codex-review-schema.json",{"path":2178,"priority":1181},"references/gemini-invocation.md",{"basePath":2180,"description":2181,"displayName":411,"installMethods":2182,"rationale":2183,"selectedPaths":2184,"source":1171,"sourceLanguage":21,"type":1693},"plugins/semgrep-rule-creator/skills/semgrep-rule-creator","Creates custom Semgrep rules for detecting security vulnerabilities, bug patterns, and code patterns. Use when writing Semgrep rules or building custom static analysis detections.",{"claudeCode":922},"SKILL.md frontmatter at plugins/semgrep-rule-creator/skills/semgrep-rule-creator/SKILL.md",[2185,2186,2188],{"path":1692,"priority":1165},{"path":2187,"priority":1181},"references/quick-reference.md",{"path":2189,"priority":1181},"references/workflow.md",{"basePath":2191,"description":2192,"displayName":435,"installMethods":2193,"rationale":2194,"selectedPaths":2195,"source":1171,"sourceLanguage":21,"type":1693},"plugins/semgrep-rule-variant-creator/skills/semgrep-rule-variant-creator","Creates language variants of existing Semgrep rules. Use when porting a Semgrep rule to specified target languages. Takes an existing rule and target languages as input, produces independent rule+test directories for each language.",{"claudeCode":922},"SKILL.md frontmatter at plugins/semgrep-rule-variant-creator/skills/semgrep-rule-variant-creator/SKILL.md",[2196,2197,2199,2201],{"path":1692,"priority":1165},{"path":2198,"priority":1181},"references/applicability-analysis.md",{"path":2200,"priority":1181},"references/language-syntax-guide.md",{"path":2189,"priority":1181},{"basePath":2203,"description":2204,"displayName":456,"installMethods":2205,"rationale":2206,"selectedPaths":2207,"source":1171,"sourceLanguage":21,"type":1693},"plugins/sharp-edges/skills/sharp-edges","Identifies error-prone APIs, dangerous configurations, and footgun designs that enable security mistakes. Use when reviewing API designs, configuration schemas, cryptographic library ergonomics, or evaluating whether code follows 'secure by default' and 'pit of success' principles. Triggers: footgun, misuse-resistant, secure defaults, API usability, dangerous configuration.",{"claudeCode":922},"SKILL.md frontmatter at plugins/sharp-edges/skills/sharp-edges/SKILL.md",[2208,2209,2211,2213,2215,2217,2219,2221,2223,2225,2227,2229,2231,2233,2235,2237,2239],{"path":1692,"priority":1165},{"path":2210,"priority":1181},"references/auth-patterns.md",{"path":2212,"priority":1181},"references/case-studies.md",{"path":2214,"priority":1181},"references/config-patterns.md",{"path":2216,"priority":1181},"references/crypto-apis.md",{"path":2218,"priority":1181},"references/lang-c.md",{"path":2220,"priority":1181},"references/lang-csharp.md",{"path":2222,"priority":1181},"references/lang-go.md",{"path":2224,"priority":1181},"references/lang-java.md",{"path":2226,"priority":1181},"references/lang-javascript.md",{"path":2228,"priority":1181},"references/lang-kotlin.md",{"path":2230,"priority":1181},"references/lang-php.md",{"path":2232,"priority":1181},"references/lang-python.md",{"path":2234,"priority":1181},"references/lang-ruby.md",{"path":2236,"priority":1181},"references/lang-rust.md",{"path":2238,"priority":1181},"references/lang-swift.md",{"path":2240,"priority":1181},"references/language-specific.md",{"basePath":2242,"description":2243,"displayName":859,"installMethods":2244,"rationale":2245,"selectedPaths":2246,"source":1171,"sourceLanguage":21,"type":1693},"plugins/skill-improver/skills/skill-improver","Iteratively reviews and fixes Claude Code skill quality issues until they meet standards. Runs automated fix-review cycles using the skill-reviewer agent. Use to fix skill quality issues, improve skill descriptions, run automated skill review loops, or iteratively refine a skill. Triggers on 'fix my skill', 'improve skill quality', 'skill improvement loop'. NOT for one-time reviews—use /skill-reviewer directly.",{"claudeCode":922},"SKILL.md frontmatter at plugins/skill-improver/skills/skill-improver/SKILL.md",[2247],{"path":1692,"priority":1165},{"basePath":2249,"description":2250,"displayName":498,"installMethods":2251,"rationale":2252,"selectedPaths":2253,"source":1171,"sourceLanguage":21,"type":1693},"plugins/spec-to-code-compliance/skills/spec-to-code-compliance","Verifies code implements exactly what documentation specifies for blockchain audits. Use when comparing code against whitepapers, finding gaps between specs and implementation, or performing compliance checks for protocol implementations.",{"claudeCode":922},"SKILL.md frontmatter at plugins/spec-to-code-compliance/skills/spec-to-code-compliance/SKILL.md",[2254],{"path":1692,"priority":1165},{"basePath":2256,"description":2257,"displayName":482,"installMethods":2258,"rationale":2259,"selectedPaths":2260,"source":1171,"sourceLanguage":21,"type":1693},"plugins/static-analysis/skills/codeql","Scans a codebase for security vulnerabilities using CodeQL's interprocedural data flow and taint tracking analysis. Triggers on \"run codeql\", \"codeql scan\", \"codeql analysis\", \"build codeql database\", or \"find vulnerabilities with codeql\". Supports \"run all\" (security-and-quality + security-experimental suites) and \"important only\" (high-precision security findings) scan modes. Also handles creating data extension models and processing CodeQL SARIF output.",{"claudeCode":922},"SKILL.md frontmatter at plugins/static-analysis/skills/codeql/SKILL.md",[2261,2262,2264,2266,2268,2270,2272,2274,2276,2278,2280,2282,2284],{"path":1692,"priority":1165},{"path":2263,"priority":1181},"references/build-fixes.md",{"path":2265,"priority":1181},"references/diagnostic-query-templates.md",{"path":2267,"priority":1181},"references/extension-yaml-format.md",{"path":2269,"priority":1181},"references/important-only-suite.md",{"path":2271,"priority":1181},"references/language-details.md",{"path":2273,"priority":1181},"references/macos-arm64e-workaround.md",{"path":2275,"priority":1181},"references/performance-tuning.md",{"path":2277,"priority":1181},"references/quality-assessment.md",{"path":2279,"priority":1181},"references/ruleset-catalog.md",{"path":2281,"priority":1181},"references/run-all-suite.md",{"path":2283,"priority":1181},"references/sarif-processing.md",{"path":2285,"priority":1181},"references/threat-models.md",{"basePath":2287,"description":2288,"displayName":2289,"installMethods":2290,"rationale":2291,"selectedPaths":2292,"source":1171,"sourceLanguage":21,"type":1693},"plugins/static-analysis/skills/sarif-parsing","Parses and processes SARIF files from static analysis tools like CodeQL, Semgrep, or other scanners. Triggers on \"parse sarif\", \"read scan results\", \"aggregate findings\", \"deduplicate alerts\", or \"process sarif output\". Handles filtering, deduplication, format conversion, and CI/CD integration of SARIF data. Does NOT run scans — use the Semgrep or CodeQL skills for that.","sarif-parsing",{"claudeCode":922},"SKILL.md frontmatter at plugins/static-analysis/skills/sarif-parsing/SKILL.md",[2293],{"path":1692,"priority":1165},{"basePath":2295,"description":2296,"displayName":418,"installMethods":2297,"rationale":2298,"selectedPaths":2299,"source":1171,"sourceLanguage":21,"type":1693},"plugins/static-analysis/skills/semgrep","Run Semgrep static analysis scan on a codebase using parallel subagents. Supports two scan modes — \"run all\" (full ruleset coverage) and \"important only\" (high-confidence security vulnerabilities). Automatically detects and uses Semgrep Pro for cross-file taint analysis when available. Use when asked to scan code for vulnerabilities, run a security audit with Semgrep, find bugs, or perform static analysis. Spawns parallel workers for multi-language codebases.",{"claudeCode":922},"SKILL.md frontmatter at plugins/static-analysis/skills/semgrep/SKILL.md",[2300,2301,2303,2305,2307],{"path":1692,"priority":1165},{"path":2302,"priority":1181},"references/rulesets.md",{"path":2304,"priority":1181},"references/scan-modes.md",{"path":2306,"priority":1181},"references/scanner-task-prompt.md",{"path":2308,"priority":1838},"scripts/merge_sarif.py",{"basePath":2310,"description":2311,"displayName":771,"installMethods":2312,"rationale":2313,"selectedPaths":2314,"source":1171,"sourceLanguage":21,"type":1693},"plugins/supply-chain-risk-auditor/skills/supply-chain-risk-auditor","Identifies dependencies at heightened risk of exploitation or takeover. Use when assessing supply chain attack surface, evaluating dependency health, or scoping security engagements.",{"claudeCode":922},"SKILL.md frontmatter at plugins/supply-chain-risk-auditor/skills/supply-chain-risk-auditor/SKILL.md",[2315],{"path":1692,"priority":1165},{"basePath":2317,"description":2318,"displayName":2319,"installMethods":2320,"rationale":2321,"selectedPaths":2322,"source":1171,"sourceLanguage":21,"type":1693},"plugins/testing-handbook-skills/skills/address-sanitizer","AddressSanitizer detects memory errors during fuzzing. Use when fuzzing C/C++ code to find buffer overflows and use-after-free bugs.\n","address-sanitizer",{"claudeCode":922},"SKILL.md frontmatter at plugins/testing-handbook-skills/skills/address-sanitizer/SKILL.md",[2323],{"path":1692,"priority":1165},{"basePath":2325,"description":2326,"displayName":2327,"installMethods":2328,"rationale":2329,"selectedPaths":2330,"source":1171,"sourceLanguage":21,"type":1693},"plugins/testing-handbook-skills/skills/aflpp","AFL++ is a fork of AFL with better fuzzing performance and advanced features. Use for multi-core fuzzing of C/C++ projects.\n","aflpp",{"claudeCode":922},"SKILL.md frontmatter at plugins/testing-handbook-skills/skills/aflpp/SKILL.md",[2331],{"path":1692,"priority":1165},{"basePath":2333,"description":2334,"displayName":2335,"installMethods":2336,"rationale":2337,"selectedPaths":2338,"source":1171,"sourceLanguage":21,"type":1693},"plugins/testing-handbook-skills/skills/atheris","Atheris is a coverage-guided Python fuzzer based on libFuzzer. Use for fuzzing pure Python code and Python C extensions.\n","atheris",{"claudeCode":922},"SKILL.md frontmatter at plugins/testing-handbook-skills/skills/atheris/SKILL.md",[2339],{"path":1692,"priority":1165},{"basePath":2341,"description":2342,"displayName":2343,"installMethods":2344,"rationale":2345,"selectedPaths":2346,"source":1171,"sourceLanguage":21,"type":1693},"plugins/testing-handbook-skills/skills/cargo-fuzz","cargo-fuzz is the de facto fuzzing tool for Rust projects using Cargo. Use for fuzzing Rust code with libFuzzer backend.\n","cargo-fuzz",{"claudeCode":922},"SKILL.md frontmatter at plugins/testing-handbook-skills/skills/cargo-fuzz/SKILL.md",[2347],{"path":1692,"priority":1165},{"basePath":2349,"description":2350,"displayName":2351,"installMethods":2352,"rationale":2353,"selectedPaths":2354,"source":1171,"sourceLanguage":21,"type":1693},"plugins/testing-handbook-skills/skills/constant-time-testing","Constant-time testing detects timing side channels in cryptographic code. Use when auditing crypto implementations for timing vulnerabilities.\n","constant-time-testing",{"claudeCode":922},"SKILL.md frontmatter at plugins/testing-handbook-skills/skills/constant-time-testing/SKILL.md",[2355],{"path":1692,"priority":1165},{"basePath":2357,"description":2358,"displayName":2359,"installMethods":2360,"rationale":2361,"selectedPaths":2362,"source":1171,"sourceLanguage":21,"type":1693},"plugins/testing-handbook-skills/skills/coverage-analysis","Coverage analysis measures code exercised during fuzzing. Use when assessing harness effectiveness or identifying fuzzing blockers.\n","coverage-analysis",{"claudeCode":922},"SKILL.md frontmatter at plugins/testing-handbook-skills/skills/coverage-analysis/SKILL.md",[2363],{"path":1692,"priority":1165},{"basePath":2365,"description":2366,"displayName":2367,"installMethods":2368,"rationale":2369,"selectedPaths":2370,"source":1171,"sourceLanguage":21,"type":1693},"plugins/testing-handbook-skills/skills/fuzzing-dictionary","Fuzzing dictionaries guide fuzzers with domain-specific tokens. Use when fuzzing parsers, protocols, or format-specific code.\n","fuzzing-dictionary",{"claudeCode":922},"SKILL.md frontmatter at plugins/testing-handbook-skills/skills/fuzzing-dictionary/SKILL.md",[2371],{"path":1692,"priority":1165},{"basePath":2373,"description":2374,"displayName":2375,"installMethods":2376,"rationale":2377,"selectedPaths":2378,"source":1171,"sourceLanguage":21,"type":1693},"plugins/testing-handbook-skills/skills/fuzzing-obstacles","Techniques for patching code to overcome fuzzing obstacles. Use when checksums, global state, or other barriers block fuzzer progress.\n","fuzzing-obstacles",{"claudeCode":922},"SKILL.md frontmatter at plugins/testing-handbook-skills/skills/fuzzing-obstacles/SKILL.md",[2379],{"path":1692,"priority":1165},{"basePath":2381,"description":2382,"displayName":2383,"installMethods":2384,"rationale":2385,"selectedPaths":2386,"source":1171,"sourceLanguage":21,"type":1693},"plugins/testing-handbook-skills/skills/harness-writing","Techniques for writing effective fuzzing harnesses across languages. Use when creating new fuzz targets or improving existing harness code.\n","harness-writing",{"claudeCode":922},"SKILL.md frontmatter at plugins/testing-handbook-skills/skills/harness-writing/SKILL.md",[2387],{"path":1692,"priority":1165},{"basePath":2389,"description":2390,"displayName":2391,"installMethods":2392,"rationale":2393,"selectedPaths":2394,"source":1171,"sourceLanguage":21,"type":1693},"plugins/testing-handbook-skills/skills/libafl","LibAFL is a modular fuzzing library for building custom fuzzers. Use for advanced fuzzing needs, custom mutators, or non-standard fuzzing targets.\n","libafl",{"claudeCode":922},"SKILL.md frontmatter at plugins/testing-handbook-skills/skills/libafl/SKILL.md",[2395],{"path":1692,"priority":1165},{"basePath":2397,"description":2398,"displayName":2399,"installMethods":2400,"rationale":2401,"selectedPaths":2402,"source":1171,"sourceLanguage":21,"type":1693},"plugins/testing-handbook-skills/skills/libfuzzer","Coverage-guided fuzzer built into LLVM for C/C++ projects. Use for fuzzing C/C++ code that can be compiled with Clang.\n","libfuzzer",{"claudeCode":922},"SKILL.md frontmatter at plugins/testing-handbook-skills/skills/libfuzzer/SKILL.md",[2403],{"path":1692,"priority":1165},{"basePath":2405,"description":2406,"displayName":2407,"installMethods":2408,"rationale":2409,"selectedPaths":2410,"source":1171,"sourceLanguage":21,"type":1693},"plugins/testing-handbook-skills/skills/ossfuzz","OSS-Fuzz provides free continuous fuzzing for open source projects. Use when setting up continuous fuzzing infrastructure or enrolling projects.\n","ossfuzz",{"claudeCode":922},"SKILL.md frontmatter at plugins/testing-handbook-skills/skills/ossfuzz/SKILL.md",[2411],{"path":1692,"priority":1165},{"basePath":2413,"description":2414,"displayName":2415,"installMethods":2416,"rationale":2417,"selectedPaths":2418,"source":1171,"sourceLanguage":21,"type":1693},"plugins/testing-handbook-skills/skills/ruzzy","Ruzzy is a coverage-guided Ruby fuzzer by Trail of Bits. Use for fuzzing pure Ruby code and Ruby C extensions.\n","ruzzy",{"claudeCode":922},"SKILL.md frontmatter at plugins/testing-handbook-skills/skills/ruzzy/SKILL.md",[2419],{"path":1692,"priority":1165},{"basePath":2421,"description":2422,"displayName":2423,"installMethods":2424,"rationale":2425,"selectedPaths":2426,"source":1171,"sourceLanguage":21,"type":1693},"plugins/testing-handbook-skills/skills/testing-handbook-generator","Meta-skill that analyzes the Trail of Bits Testing Handbook (appsec.guide) and generates Claude Code skills for security testing tools and techniques. Use when creating new skills based on handbook content.\n","testing-handbook-generator",{"claudeCode":922},"SKILL.md frontmatter at plugins/testing-handbook-skills/skills/testing-handbook-generator/SKILL.md",[2427,2428,2430,2432,2434,2436,2438,2440],{"path":1692,"priority":1165},{"path":2429,"priority":1181},"agent-prompt.md",{"path":2431,"priority":1181},"discovery.md",{"path":2433,"priority":1838},"templates/domain-skill.md",{"path":2435,"priority":1838},"templates/fuzzer-skill.md",{"path":2437,"priority":1838},"templates/technique-skill.md",{"path":2439,"priority":1838},"templates/tool-skill.md",{"path":2441,"priority":1181},"testing.md",{"basePath":2443,"description":2444,"displayName":2445,"installMethods":2446,"rationale":2447,"selectedPaths":2448,"source":1171,"sourceLanguage":21,"type":1693},"plugins/testing-handbook-skills/skills/wycheproof","Wycheproof provides test vectors for validating cryptographic implementations. Use when testing crypto code for known attacks and edge cases.\n","wycheproof",{"claudeCode":922},"SKILL.md frontmatter at plugins/testing-handbook-skills/skills/wycheproof/SKILL.md",[2449],{"path":1692,"priority":1165},{"basePath":2451,"description":2452,"displayName":2453,"installMethods":2454,"rationale":2455,"selectedPaths":2456,"source":1171,"sourceLanguage":21,"type":1693},"plugins/trailmark/skills/audit-augmentation","Augments Trailmark code graphs with external audit findings from SARIF static analysis results and weAudit annotation files. Maps findings to graph nodes by file and line overlap, creates severity-based subgraphs, and enables cross-referencing findings with pre-analysis data (blast radius, taint, etc.). Use when projecting SARIF results onto a code graph, overlaying weAudit annotations, cross-referencing Semgrep or CodeQL findings with call graph data, or visualizing audit findings in the context of code structure.\n","audit-augmentation",{"claudeCode":922},"SKILL.md frontmatter at plugins/trailmark/skills/audit-augmentation/SKILL.md",[2457,2458],{"path":1692,"priority":1165},{"path":2459,"priority":1181},"references/formats.md",{"basePath":2461,"description":2462,"displayName":2463,"installMethods":2464,"rationale":2465,"selectedPaths":2466,"source":1171,"sourceLanguage":21,"type":1693},"plugins/trailmark/skills/crypto-protocol-diagram","Extracts protocol message flow from source code, RFCs, academic papers, pseudocode, informal prose, ProVerif (.pv), or Tamarin (.spthy) models and generates Mermaid sequenceDiagrams with cryptographic annotations. Use when diagramming a crypto protocol, visualizing a handshake or key exchange flow, extracting message flow from a spec or RFC, diagramming a ProVerif or Tamarin model, or drawing sequence diagrams for TLS, Noise, Signal, X3DH, Double Ratchet, FROST, DH, or ECDH protocols.","crypto-protocol-diagram",{"claudeCode":922},"SKILL.md frontmatter at plugins/trailmark/skills/crypto-protocol-diagram/SKILL.md",[2467,2468,2470,2472,2474,2476,2478,2480,2482],{"path":1692,"priority":1165},{"path":2469,"priority":1838},"examples/simple-handshake/expected-output.md",{"path":2471,"priority":1838},"examples/simple-handshake/protocol.py",{"path":2473,"priority":1838},"examples/simple-proverif/expected-output.md",{"path":2475,"priority":1838},"examples/simple-proverif/model.pv",{"path":2477,"priority":1181},"references/ascii-sequence-diagram.md",{"path":2479,"priority":1181},"references/mermaid-sequence-syntax.md",{"path":2481,"priority":1181},"references/protocol-patterns.md",{"path":2483,"priority":1181},"references/spec-parsing-patterns.md",{"basePath":2485,"description":2486,"displayName":2487,"installMethods":2488,"rationale":2489,"selectedPaths":2490,"source":1171,"sourceLanguage":21,"type":1693},"plugins/trailmark/skills/diagramming-code","Generates Mermaid diagrams from Trailmark code graphs. Produces call graphs, class hierarchies, module dependency maps, containment diagrams, complexity heatmaps, and attack surface data flow visualizations. Use when visualizing code architecture, drawing call graphs, generating class diagrams, creating dependency maps, producing complexity heatmaps, or visualizing data flow and attack surface paths as Mermaid diagrams.\n","diagramming-code",{"claudeCode":922},"SKILL.md frontmatter at plugins/trailmark/skills/diagramming-code/SKILL.md",[2491,2492,2494,2496],{"path":1692,"priority":1165},{"path":2493,"priority":1181},"references/diagram-types.md",{"path":2495,"priority":1181},"references/mermaid-syntax.md",{"path":2497,"priority":1838},"scripts/diagram.py",{"basePath":2499,"description":2500,"displayName":2501,"installMethods":2502,"rationale":2503,"selectedPaths":2504,"source":1171,"sourceLanguage":21,"type":1693},"plugins/trailmark/skills/genotoxic","Graph-informed mutation testing triage. Parses codebases with Trailmark, runs mutation testing and necessist, then uses survived mutants, unnecessary test statements, and call graph data to identify false positives, missing test coverage, and fuzzing targets. Use when triaging survived mutants, analyzing mutation testing results, identifying test gaps, finding fuzzing targets from weak tests, running mutation frameworks (including circomvent and cairo-mutants), or using necessist.","genotoxic",{"claudeCode":922},"SKILL.md frontmatter at plugins/trailmark/skills/genotoxic/SKILL.md",[2505,2506,2508,2510],{"path":1692,"priority":1165},{"path":2507,"priority":1181},"references/graph-analysis.md",{"path":2509,"priority":1181},"references/mutation-frameworks.md",{"path":2511,"priority":1181},"references/triage-methodology.md",{"basePath":2513,"description":2514,"displayName":2515,"installMethods":2516,"rationale":2517,"selectedPaths":2518,"source":1171,"sourceLanguage":21,"type":1693},"plugins/trailmark/skills/graph-evolution","Compares Trailmark code graphs at two source code snapshots (git commits, tags, or directories) to surface security-relevant structural changes. Detects new attack paths, complexity shifts, blast radius growth, taint propagation changes, and privilege boundary modifications that text diffs miss. Use when comparing code between commits or tags, analyzing structural evolution, detecting attack surface growth, reviewing what changed between audit snapshots, or finding security-relevant changes that text diffs miss.\n","graph-evolution",{"claudeCode":922},"SKILL.md frontmatter at plugins/trailmark/skills/graph-evolution/SKILL.md",[2519,2520,2522,2524],{"path":1692,"priority":1165},{"path":2521,"priority":1181},"references/evolution-metrics.md",{"path":2523,"priority":1181},"references/report-format.md",{"path":2525,"priority":1838},"scripts/graph_diff.py",{"basePath":2527,"description":2528,"displayName":2529,"installMethods":2530,"rationale":2531,"selectedPaths":2532,"source":1171,"sourceLanguage":21,"type":1693},"plugins/trailmark/skills/mermaid-to-proverif","Translates Mermaid sequenceDiagrams describing cryptographic protocols into ProVerif formal verification models (.pv files). Use when generating a ProVerif model, formally verifying a protocol, converting a Mermaid diagram to ProVerif, verifying protocol security properties (secrecy, authentication, forward secrecy), checking for replay attacks, or producing a .pv file from a sequence diagram.","mermaid-to-proverif",{"claudeCode":922},"SKILL.md frontmatter at plugins/trailmark/skills/mermaid-to-proverif/SKILL.md",[2533,2534,2536,2538,2540,2542],{"path":1692,"priority":1165},{"path":2535,"priority":1838},"examples/simple-handshake/diagram.md",{"path":2537,"priority":1838},"examples/simple-handshake/sample-output.pv",{"path":2539,"priority":1181},"references/crypto-to-proverif-mapping.md",{"path":2541,"priority":1181},"references/proverif-syntax.md",{"path":2543,"priority":1181},"references/security-properties.md",{"basePath":2545,"description":2546,"displayName":547,"installMethods":2547,"rationale":2548,"selectedPaths":2549,"source":1171,"sourceLanguage":21,"type":1693},"plugins/trailmark/skills/trailmark","Builds and queries multi-language source code graphs for security analysis. Includes pre-analysis passes for blast radius, taint propagation, privilege boundaries, and entry point enumeration. Use when analyzing call paths, mapping attack surface, finding complexity hotspots, enumerating entry points, tracing taint propagation, measuring blast radius, or building a code graph for audit prioritization. Prefer `trailmark.parse.detect_languages()` or `--language auto` when the target language is unknown or polyglot.",{"claudeCode":922},"SKILL.md frontmatter at plugins/trailmark/skills/trailmark/SKILL.md",[2550,2551,2553],{"path":1692,"priority":1165},{"path":2552,"priority":1181},"references/preanalysis-passes.md",{"path":2554,"priority":1181},"references/query-patterns.md",{"basePath":2556,"description":2557,"displayName":2558,"installMethods":2559,"rationale":2560,"selectedPaths":2561,"source":1171,"sourceLanguage":21,"type":1693},"plugins/trailmark/skills/trailmark-structural","Runs full Trailmark structural analysis on Trailmark 0.2.x by building a graph, running `preanalysis()`, and reporting hotspots, taint, blast radius, privilege boundaries, and attack surface. Use when vivisect needs detailed structural data for a target. Triggers: structural analysis, blast radius, taint analysis, complexity hotspots.","trailmark-structural",{"claudeCode":922},"SKILL.md frontmatter at plugins/trailmark/skills/trailmark-structural/SKILL.md",[2562],{"path":1692,"priority":1165},{"basePath":2564,"description":2565,"displayName":2566,"installMethods":2567,"rationale":2568,"selectedPaths":2569,"source":1171,"sourceLanguage":21,"type":1693},"plugins/trailmark/skills/trailmark-summary","Runs a Trailmark summary analysis on a codebase. Returns auto-detected languages, entry point count, and dependency list. Use when vivisect or galvanize needs a quick structural overview. Triggers: trailmark summary, code summary, structural overview.","trailmark-summary",{"claudeCode":922},"SKILL.md frontmatter at plugins/trailmark/skills/trailmark-summary/SKILL.md",[2570],{"path":1692,"priority":1165},{"basePath":2572,"description":2573,"displayName":2574,"installMethods":2575,"rationale":2576,"selectedPaths":2577,"source":1171,"sourceLanguage":21,"type":1693},"plugins/trailmark/skills/vector-forge","Mutation-driven test vector generation. Finds implementations of a cryptographic algorithm or protocol, runs mutation testing to identify escaped mutants, then generates new test vectors that deliberately exercise the uncovered code paths. Compares before/after mutation kill rates to prove vector effectiveness. Use when generating cryptographic test vectors, measuring Wycheproof coverage gaps, finding escaped mutants via mutation testing, creating cross-implementation test suites, or improving test vector coverage for crypto primitives.","vector-forge",{"claudeCode":922},"SKILL.md frontmatter at plugins/trailmark/skills/vector-forge/SKILL.md",[2578,2579,2581,2583,2584,2586],{"path":1692,"priority":1165},{"path":2580,"priority":1181},"references/fault-simulation.md",{"path":2582,"priority":1181},"references/lessons-learned.md",{"path":2509,"priority":1181},{"path":2585,"priority":1181},"references/report-template.md",{"path":2587,"priority":1181},"references/vector-patterns.md",{"basePath":2589,"description":2590,"displayName":570,"installMethods":2591,"rationale":2592,"selectedPaths":2593,"source":1171,"sourceLanguage":21,"type":1693},"plugins/variant-analysis/skills/variant-analysis","Find similar vulnerabilities and bugs across codebases using pattern-based analysis. Use when hunting bug variants, building CodeQL/Semgrep queries, analyzing security vulnerabilities, or performing systematic code audits after finding an initial issue.",{"claudeCode":922},"SKILL.md frontmatter at plugins/variant-analysis/skills/variant-analysis/SKILL.md",[2594,2595],{"path":1692,"priority":1165},{"path":2596,"priority":1181},"METHODOLOGY.md",{"basePath":2598,"description":2599,"displayName":2600,"installMethods":2601,"rationale":2602,"selectedPaths":2603,"source":1171,"sourceLanguage":21,"type":1693},"plugins/workflow-skill-design/skills/designing-workflow-skills","Guides the design and structuring of workflow-based Claude Code skills with multi-step phases, decision trees, subagent delegation, and progressive disclosure. Use when creating skills that involve sequential pipelines, routing patterns, safety gates, task tracking, phased execution, or any multi-step workflow. Also applies when reviewing or refactoring existing workflow skills for quality.","designing-workflow-skills",{"claudeCode":922},"SKILL.md frontmatter at plugins/workflow-skill-design/skills/designing-workflow-skills/SKILL.md",[2604,2605,2606,2608,2610],{"path":1692,"priority":1165},{"path":1886,"priority":1181},{"path":2607,"priority":1181},"references/progressive-disclosure-guide.md",{"path":2609,"priority":1181},"references/tool-assignment-guide.md",{"path":2611,"priority":1181},"references/workflow-patterns.md",{"basePath":2613,"description":2614,"displayName":2615,"installMethods":2616,"rationale":2617,"selectedPaths":2618,"source":1171,"sourceLanguage":21,"type":1693},"plugins/yara-authoring/skills/yara-rule-authoring","Guides authoring of high-quality YARA-X detection rules for malware identification. Use when writing, reviewing, or optimizing YARA rules. Covers naming conventions, string selection, performance optimization, migration from legacy YARA, and false positive reduction. Triggers on: YARA, YARA-X, malware detection, threat hunting, IOC, signature, crx module, dex module.\n","yara-rule-authoring",{"claudeCode":922},"SKILL.md frontmatter at plugins/yara-authoring/skills/yara-rule-authoring/SKILL.md",[2619,2620,2622,2624,2626,2628,2630,2632,2634,2636,2638,2640,2641,2643,2644],{"path":1692,"priority":1165},{"path":2621,"priority":1838},"examples/MAL_Mac_ProtonRAT_Jan25.yar",{"path":2623,"priority":1838},"examples/MAL_NPM_SupplyChain_Jan25.yar",{"path":2625,"priority":1838},"examples/MAL_Win_Remcos_Jan25.yar",{"path":2627,"priority":1838},"examples/SUSP_CRX_SuspiciousPermissions.yar",{"path":2629,"priority":1838},"examples/SUSP_JS_Obfuscation_Jan25.yar",{"path":2631,"priority":1181},"references/crx-module.md",{"path":2633,"priority":1181},"references/dex-module.md",{"path":2635,"priority":1181},"references/performance.md",{"path":2637,"priority":1181},"references/strings.md",{"path":2639,"priority":1181},"references/style-guide.md",{"path":2122,"priority":1181},{"path":2642,"priority":1838},"scripts/atom_analyzer.py",{"path":1950,"priority":1838},{"path":2645,"priority":1838},"scripts/yara_lint.py",{"basePath":2647,"description":2648,"displayName":792,"installMethods":2649,"rationale":2650,"selectedPaths":2651,"source":1171,"sourceLanguage":21,"type":1693},"plugins/zeroize-audit/skills/zeroize-audit","Detects missing zeroization of sensitive data in source code and identifies zeroization removed by compiler optimizations, with assembly-level analysis, and control-flow verification. Use for auditing C/C++/Rust code handling secrets, keys, passwords, or other sensitive data.",{"claudeCode":922},"SKILL.md frontmatter at plugins/zeroize-audit/skills/zeroize-audit/SKILL.md",[2652,2653,2655,2657,2659,2661,2663,2665,2667,2669,2671,2673,2675,2677,2679,2681,2683,2685,2687,2689,2691,2693,2695,2697,2699,2701,2703,2705,2707,2709,2711,2713,2715,2717,2719],{"path":1692,"priority":1165},{"path":2654,"priority":1838},"prompts/report_template.md",{"path":2656,"priority":1838},"prompts/system.md",{"path":2658,"priority":1838},"prompts/task.md",{"path":2660,"priority":1181},"references/compile-commands.md",{"path":2662,"priority":1181},"references/detection-strategy.md",{"path":2664,"priority":1181},"references/ir-analysis.md",{"path":2666,"priority":1181},"references/mcp-analysis.md",{"path":2668,"priority":1181},"references/poc-generation.md",{"path":2670,"priority":1181},"references/rust-zeroization-patterns.md",{"path":2672,"priority":1838},"tools/analyze_asm.sh",{"path":2674,"priority":1838},"tools/analyze_cfg.py",{"path":2676,"priority":1838},"tools/analyze_heap.sh",{"path":2678,"priority":1838},"tools/analyze_ir_semantic.py",{"path":2680,"priority":1838},"tools/diff_ir.sh",{"path":2682,"priority":1838},"tools/diff_rust_mir.sh",{"path":2684,"priority":1838},"tools/emit_asm.sh",{"path":2686,"priority":1838},"tools/emit_ir.sh",{"path":2688,"priority":1838},"tools/emit_rust_asm.sh",{"path":2690,"priority":1838},"tools/emit_rust_ir.sh",{"path":2692,"priority":1838},"tools/emit_rust_mir.sh",{"path":2694,"priority":1838},"tools/extract_compile_flags.py",{"path":2696,"priority":1838},"tools/generate_poc.py",{"path":2698,"priority":1838},"tools/mcp/apply_confidence_gates.py",{"path":2700,"priority":1838},"tools/mcp/check_mcp.sh",{"path":2702,"priority":1838},"tools/mcp/normalize_mcp_evidence.py",{"path":2704,"priority":1838},"tools/scripts/check_llvm_patterns.py",{"path":2706,"priority":1838},"tools/scripts/check_mir_patterns.py",{"path":2708,"priority":1838},"tools/scripts/check_rust_asm.py",{"path":2710,"priority":1838},"tools/scripts/check_rust_asm_aarch64.py",{"path":2712,"priority":1838},"tools/scripts/check_rust_asm_x86.py",{"path":2714,"priority":1838},"tools/scripts/find_dangerous_apis.py",{"path":2716,"priority":1838},"tools/scripts/semantic_audit.py",{"path":2718,"priority":1838},"tools/track_dataflow.sh",{"path":2720,"priority":1838},"tools/validate_rust_toolchain.sh",{"basePath":162,"installMethods":2722,"rationale":2724,"selectedPaths":2725,"source":1171,"sourceLanguage":21,"type":215},{"pypi":2723},"ct-analyzer","cli ecosystem detected at plugins/constant-time-analysis",[2726,2728,2729],{"path":2727,"priority":1165},"pyproject.toml",{"path":1167,"priority":1165},{"path":2730,"priority":1181},"ct_analyzer/analyzer.py",{"sources":2732},[2733],"manual",{"closedIssues90d":1131,"description":2735,"forks":1132,"license":244,"openIssues90d":1134,"pushedAt":1135,"readmeSize":1129,"stars":1136,"topics":2736},"Trail of Bits Claude Code skills for security research, vulnerability detection, and audit workflows",[2737],"agent-skills",{"classifiedAt":2739,"discoverAt":2740,"extractAt":2741,"githubAt":2741,"updatedAt":2739},1778698175241,1778698169543,1778698173272,[120,618,1118,887,87],{"evaluatedAt":1141,"extractAt":45,"updatedAt":1141},[],[2746,2774,2805,2835,2864,2891],{"_creationTime":2747,"_id":2748,"community":2749,"display":2750,"identity":2756,"providers":2759,"relations":2767,"tags":2769,"workflow":2770},1778691163132.3403,"k1719cjzyej30vadk57qk39mes86nqmg",{"reviewCount":11},{"description":2751,"installMethods":2752,"name":2754,"sourceUrl":2755},"A curated collection of Claude Code plugins for our team",{"claudeCode":2753},"ivan-magda/claude-code-plugin-template","my-team-plugin-marketplace","https://github.com/ivan-magda/claude-code-plugin-template",{"basePath":1143,"githubOwner":2757,"githubRepo":2758,"locale":21,"slug":2758,"type":1118},"ivan-magda","claude-code-plugin-template",{"evaluate":2760,"extract":2763},{"promptVersionExtension":1113,"promptVersionScoring":26,"score":284,"tags":2761,"targetMarket":33,"tier":34},[1118,887,2762,63,737],"template",{"commitSha":36,"marketplace":2764,"plugin":2766},{"name":2754,"pluginCount":2765},2,{"mcpCount":11,"provider":38,"skillCount":11},{"repoId":2768},"kd726xp7056j73gecjdmdy5by186nt53",[737,63,1118,887,2762],{"evaluatedAt":2771,"extractAt":2772,"updatedAt":2773},1778691192585,1778691163132,1778691313273,{"_creationTime":2775,"_id":2776,"community":2777,"display":2778,"identity":2784,"providers":2787,"relations":2799,"tags":2801,"workflow":2802},1778685949178.7734,"k17dg0d5d8g0a5nhm59gm0tkwx86nbt4",{"reviewCount":11},{"description":2779,"installMethods":2780,"name":2782,"sourceUrl":2783},"A comprehensive community-driven collection of 117 AI agents, 174 slash commands, 28 hooks, and 199 MCP servers for Claude Code",{"claudeCode":2781},"davepoon/buildwithclaude","Build with Claude","https://github.com/davepoon/buildwithclaude",{"basePath":1143,"githubOwner":2785,"githubRepo":2786,"locale":21,"slug":2786,"type":1118},"davepoon","buildwithclaude",{"evaluate":2788,"extract":2794},{"promptVersionExtension":1113,"promptVersionScoring":26,"score":27,"tags":2789,"targetMarket":33,"tier":34},[1118,737,887,2790,2791,2792,2793],"agents","commands","hooks","mcp-servers",{"commitSha":36,"license":2795,"marketplace":2796,"plugin":2798},"MIT",{"name":2786,"pluginCount":2797,"version":1133},57,{"mcpCount":11,"provider":38,"skillCount":11},{"repoId":2800},"kd719kw54vhmcscq7ckdp59fg586mnt6",[2790,737,2791,2792,1118,2793,887],{"evaluatedAt":2803,"extractAt":2804,"updatedAt":2803},1778685984127,1778685949178,{"_creationTime":2806,"_id":2807,"community":2808,"display":2809,"identity":2815,"providers":2817,"relations":2829,"tags":2831,"workflow":2832},1778698867338.2915,"k17b5xtbnc3ma310pdjq42f8w186m4n1",{"reviewCount":11},{"description":2810,"installMethods":2811,"name":2813,"sourceUrl":2814},"42 agent skills for product strategy, UX design, marketing, sales, motivation, conversion optimization, code quality, and systems architecture — based on bestselling books",{"claudeCode":2812},"wondelai/skills","wondelai-skills","https://github.com/wondelai/skills",{"basePath":1143,"githubOwner":2816,"githubRepo":20,"locale":21,"slug":20,"type":1118},"wondelai",{"evaluate":2818,"extract":2826},{"promptVersionExtension":1113,"promptVersionScoring":26,"score":526,"tags":2819,"targetMarket":33,"tier":34},[1118,2820,2821,2822,2823,2824,2825,419],"curation","business-strategy","product-development","ux-design","marketing","sales",{"commitSha":36,"marketplace":2827,"plugin":2828},{"name":2813,"pluginCount":39},{"mcpCount":11,"provider":38,"skillCount":11},{"repoId":2830},"kd7aexggvp8qjwjtgjbetg0jch86mg5a",[2821,419,2820,2824,1118,2822,2825,2823],{"evaluatedAt":2833,"extractAt":2834,"updatedAt":2833},1778698884072,1778698867338,{"_creationTime":2836,"_id":2837,"community":2838,"display":2839,"identity":2845,"providers":2849,"relations":2857,"tags":2859,"workflow":2860},1778693661691.4353,"k17csgr8nkwt3ck7jbe8wwnrwh86n80s",{"reviewCount":11},{"description":2840,"installMethods":2841,"name":2843,"sourceUrl":2844},"Local agents marketplace for the unslop plugin (anti-AI-slop tooling).",{"claudeCode":2842},"MohamedAbdallah-14/unslop","unslop-agents-marketplace","https://github.com/MohamedAbdallah-14/unslop",{"basePath":2846,"githubOwner":2847,"githubRepo":2848,"locale":21,"slug":887,"type":1118},".agents/plugins","MohamedAbdallah-14","unslop",{"evaluate":2850,"extract":2855},{"promptVersionExtension":1113,"promptVersionScoring":26,"score":526,"tags":2851,"targetMarket":33,"tier":34},[2852,2853,2854,215,22,1118],"ai","text","humanization",{"commitSha":36,"marketplace":2856},{"name":2843,"pluginCount":11},{"repoId":2858},"kd727xcarpnqcat3wd68ms466s86mwkb",[2852,215,2854,1118,22,2853],{"evaluatedAt":2861,"extractAt":2862,"updatedAt":2863},1778693686255,1778693661691,1778693923133,{"_creationTime":2865,"_id":2866,"community":2867,"display":2868,"identity":2874,"providers":2876,"relations":2885,"tags":2887,"workflow":2888},1778699018122.7656,"k17cywe30jfsfw3cdpncjfn8y186nvyw",{"reviewCount":11},{"description":2869,"installMethods":2870,"name":2872,"sourceUrl":2873},"Production-ready workflow orchestration with 80 focused plugins, 185 specialized agents, and 153 skills - optimized for granular installation and minimal token usage",{"claudeCode":2871},"wshobson/agents","Claude Code Plugins","https://github.com/wshobson/agents",{"basePath":1143,"githubOwner":2875,"githubRepo":2790,"locale":21,"slug":2790,"type":1118},"wshobson",{"evaluate":2877,"extract":2880},{"promptVersionExtension":1113,"promptVersionScoring":26,"score":526,"tags":2878,"targetMarket":33,"tier":34},[2879,63,845,887,530,528],"workflow-orchestration",{"commitSha":36,"license":2795,"marketplace":2881,"plugin":2884},{"name":2882,"pluginCount":2883},"claude-code-workflows",81,{"mcpCount":11,"provider":38,"skillCount":11},{"repoId":2886},"kd74de64zj0axtg5b8t7eqqe2x86nske",[845,530,528,63,887,2879],{"evaluatedAt":2889,"extractAt":2890,"updatedAt":2889},1778699049186,1778699018122,{"_creationTime":2892,"_id":2893,"community":2894,"display":2895,"identity":2901,"providers":2903,"relations":2909,"tags":2911,"workflow":2912},1778682677410.03,"k173b5kkdwhw4s5qwxzfw8wp9d86nd66",{"reviewCount":11},{"description":2896,"installMethods":2897,"name":2899,"sourceUrl":2900},"Agent skills for integrating Auth0 authentication into any application, framework, or platform.",{"claudeCode":2898},"auth0/agent-skills","auth0-agent-skills","https://github.com/auth0/agent-skills",{"basePath":1143,"githubOwner":2902,"githubRepo":2737,"locale":21,"slug":2737,"type":1118},"auth0",{"evaluate":2904,"extract":2907},{"promptVersionExtension":1113,"promptVersionScoring":26,"score":284,"tags":2905,"targetMarket":33,"tier":34},[2902,310,2906,63,1118],"sdk",{"commitSha":36,"marketplace":2908},{"name":2899,"pluginCount":11},{"repoId":2910},"kd7d2wx4927yddhxgfpzw6t10x86m349",[2902,310,63,1118,2906],{"evaluatedAt":2913,"extractAt":2914,"updatedAt":2913},1778682703171,1778682677410]