From semgrep-rule-creator
Creates Semgrep security rules with test-first methodology, using conversation context for detection patterns, target languages, and taint modes.
npx claudepluginhub trailofbits/skills --plugin semgrep-rule-creator(uses conversation context for detection pattern)# Create Semgrep Rule **Arguments:** $ARGUMENTS This command is context-driven. Use conversation context to understand: 1. The vulnerability or pattern to detect 2. The target language 3. Whether taint mode is appropriate If context is unclear, ask for a description of the pattern to detect. Invoke the `semgrep-rule-creator` skill for the full workflow.
/create-ruleCreates a custom Semgrep YAML detection rule from a vulnerability pattern in a finding ID or file:line location. Supports --output dir and --test flags, saves for future scans.
/semgrep-analyzeRuns Semgrep static analysis on files or directories with optional ruleset, producing structured JSON findings with status, issues by severity/location/rule, and summary.
/securityConducts security reviews of apps, APIs, scripts, and configs using OWASP Top 10 best practices and threat modeling; detects vulnerabilities and suggests fixes.
/kasi-securityRuns security audit on project codebase: detects stack (PHP/Node/Python/etc.), loads checklist, scans files for SQLi/XSS/CSRF/auth bypass/etc., outputs prioritized findings with confidence labels.
/hookifyCreates custom behavioral rules from instructions to block or warn on unwanted actions like dangerous bash commands, debug code in files, or missing tests, saving regex-based rules to .claude/ files. Also analyzes conversation history for rule suggestions.
/security-reviewPerforms CWE Top 25 security review and STRIDE threat modeling on files/directories at maximum effort. Supports git diff scans (--auto/--quick), dependency checks, and markdown/json reports.
Share bugs, ideas, or general feedback.
Arguments: $ARGUMENTS
This command is context-driven. Use conversation context to understand:
If context is unclear, ask for a description of the pattern to detect.
Invoke the semgrep-rule-creator skill for the full workflow.