By jygzyc
Execute phased Android vulnerability analysis workflows using DECX: reconnaissance on APKs and frameworks to enumerate attack surfaces, deep tracing of WebView/IPC/Binder flows, exploitability screening with justifications, PoC app construction and deployment, plus bilingual Markdown reports from findings.
npx claudepluginhub jygzyc/decx --plugin decxCoverage verification agent for DECX app vulnerability hunting. Checks that recon inventory and coverage rows stay aligned before deeper tracing or final reporting.
Phase 2 recon agent for DECX vulnerability hunting. Builds the first structured inventory for APK or framework targets and writes recon artifacts only.
Final reporting agent for DECX vulnerability hunting. Builds Markdown reports from `statically-supported` findings only and keeps call-chain semantics aligned with DECX report rules.
Phase 3 or 4 trace agent for DECX vulnerability hunting. Traces one retained target or one method chain at a time and updates evidence artifacts.
Controller skill for DECX analyses that should be split into recon, trace, review, or PoC subagents while keeping one DECX session and one artifact workspace.
Android app vulnerability hunting skill built on DECX CLI + JADX. Use for APK attack-surface enumeration, exported component and deep-link triage, WebView and IPC flow tracing, exploitability screening, bilingual reporting, and handoff to decxcli-poc.
Use when hunting Android framework vulnerabilities in a processed final framework bundle, `system_server`, Binder services, AIDL implementations, vendor services, or OEM framework code.
Android exploit PoC construction skill. Turns one DECX-supported finding into one buildable PoC app, with optional compile and adb deployment when explicitly requested.
General Android analysis skill for DECX CLI. Use for APK/DEX/JAR opening, source lookup, cross-reference tracing, manifest inspection, resource inspection, and session management.
Use when starting any DECX-related conversation. Establishes how to find and use DECX skills before any DECX action, including clarifying questions.
Decompile Android APK/JAR/AAR with jadx, trace call flows through libraries, and document extracted APIs.
Uses power tools
Uses Bash, Write, or Edit tools
Share bugs, ideas, or general feedback.
Scan Android APKs for Firebase security misconfigurations including open databases, storage buckets, authentication issues, and exposed cloud functions. For authorized security research only.
Expert guidance and automation for mobile app observability: crash reporting, performance monitoring, session replay, and instrumentation for iOS, Android, React Native, and Flutter.
Binary reverse engineering, malware analysis, firmware security, and software protection research for authorized security research, CTF competitions, and defensive security
Android development validation with Gradle build hooks.
Agentic binary reverse engineering for ELF binaries on ARM64, ARMv7, x86_64 - hypothesis-driven analysis with radare2, Ghidra, GDB, QEMU