Claude Skills

aka. Agent Skills

Discover skills for AI coding agents. Works with Claude Code, OpenAI Codex, Gemini CLI, Cursor, and more.

Claude Code
OpenAI Codex
Gemini CLI
Cursor
GitHub Copilot
+more
8660 verified skills
#409

libafl

verified

LibAFL is a modular fuzzing library for building custom fuzzers. Use for advanced fuzzing needs, custom mutators, or non-standard fuzzing targets.

trailofbits/skills
1.9k
#410

testing-handbook-generator

verified

Meta-skill that analyzes the Trail of Bits Testing Handbook (appsec.guide) and generates Claude Code skills for security testing tools and techniques. Use when creating new skills based on handbook content.

trailofbits/skills
1.9k
#411

harness-writing

verified

Techniques for writing effective fuzzing harnesses across languages. Use when creating new fuzz targets or improving existing harness code.

trailofbits/skills
1.9k
#412

semgrep-rule-creator

verified

Create custom Semgrep rules for detecting bug patterns and security vulnerabilities. This skill should be used when the user explicitly asks to "create a Semgrep rule", "write a Semgrep rule", "make a Semgrep rule", "build a Semgrep rule", or requests detection of a specific bug pattern, vulnerability, or insecure code pattern using Semgrep.

trailofbits/skills
1.9k
#413

address-sanitizer

verified

AddressSanitizer detects memory errors during fuzzing. Use when fuzzing C/C++ code to find buffer overflows and use-after-free bugs.

trailofbits/skills
1.9k
#414

ask-questions-if-underspecified

verified

Clarify requirements before implementing. Use when serious doubts araise.

trailofbits/skills
1.9k
#415

ruzzy

verified

Ruzzy is a coverage-guided Ruby fuzzer by Trail of Bits. Use for fuzzing pure Ruby code and Ruby C extensions.

trailofbits/skills
1.9k
#416

dwarf-expert

verified

Provides expertise for analyzing DWARF debug files and understanding the DWARF debug format/standard (v3-v5). Triggers when understanding DWARF information, interacting with DWARF files, answering DWARF-related questions, or working with code that parses DWARF data.

trailofbits/skills
1.9k
#417

audit-context-building

verified

Enables ultra-granular, line-by-line code analysis to build deep architectural context before vulnerability or bug finding.

trailofbits/skills
1.9k
#418

fuzzing-obstacles

verified

Techniques for patching code to overcome fuzzing obstacles. Use when checksums, global state, or other barriers block fuzzer progress.

trailofbits/skills
1.9k
#419

libfuzzer

verified

Coverage-guided fuzzer built into LLVM for C/C++ projects. Use for fuzzing C/C++ code that can be compiled with Clang.

trailofbits/skills
1.9k
#420

ossfuzz

verified

OSS-Fuzz provides free continuous fuzzing for open source projects. Use when setting up continuous fuzzing infrastructure or enrolling projects.

trailofbits/skills
1.9k
#421

atheris

verified

Atheris is a coverage-guided Python fuzzer based on libFuzzer. Use for fuzzing pure Python code and Python C extensions.

trailofbits/skills
1.9k
#422

cargo-fuzz

verified

cargo-fuzz is the de facto fuzzing tool for Rust projects using Cargo. Use for fuzzing Rust code with libFuzzer backend.

trailofbits/skills
1.9k
#423

aflpp

verified

AFL++ is a fork of AFL with better fuzzing performance and advanced features. Use for multi-core fuzzing of C/C++ projects.

trailofbits/skills
1.9k
#424

coverage-analysis

verified

Coverage analysis measures code exercised during fuzzing. Use when assessing harness effectiveness or identifying fuzzing blockers.

trailofbits/skills
1.9k
#425

codeql

verified

CodeQL is a static analysis framework that queries code as a database. Use when you need interprocedural analysis or complex data flow tracking.

trailofbits/skills
1.9k
#426

fuzzing-dictionary

verified

Fuzzing dictionaries guide fuzzers with domain-specific tokens. Use when fuzzing parsers, protocols, or format-specific code.

trailofbits/skills
1.9k
#427

variant-analysis

verified

Find similar vulnerabilities and bugs across codebases using pattern-based analysis. Use when hunting bug variants, building CodeQL/Semgrep queries, analyzing security vulnerabilities, or performing systematic code audits after finding an initial issue.

trailofbits/skills
1.9k
#428

semgrep-rule-variant-creator

verified

Creates language variants of existing Semgrep rules. Use when porting a Semgrep rule to specified target languages. Takes an existing rule and target languages as input, produces independent rule+test directories for each language.

trailofbits/skills
1.9k
#429

sharp-edges

verified

Identifies error-prone APIs, dangerous configurations, and footgun designs that enable security mistakes. Use when reviewing API designs, configuration schemas, cryptographic library ergonomics, or evaluating whether code follows 'secure by default' and 'pit of success' principles. Triggers: footgun, misuse-resistant, secure defaults, API usability, dangerous configuration.

trailofbits/skills
1.9k
#430

codeql

verified

Run CodeQL static analysis for security vulnerability detection, taint tracking, and data flow analysis. Use when asked to analyze code with CodeQL, create CodeQL databases, write custom QL queries, perform security audits, or set up CodeQL in CI/CD pipelines.

trailofbits/skills
1.9k
#431

sarif-parsing

verified

Parse, analyze, and process SARIF (Static Analysis Results Interchange Format) files. Use when reading security scan results, aggregating findings from multiple tools, deduplicating alerts, extracting specific vulnerabilities, or integrating SARIF data into CI/CD pipelines.

trailofbits/skills
1.9k
#432

reddit-fetch

verified

Fetch content from Reddit using Gemini CLI when WebFetch is blocked. Use when accessing Reddit URLs, researching topics on Reddit, or when Reddit returns 403/blocked errors. (user)

ykdojo/claude-code-tips
1.6k
Previous
Page 18 of 361
Next