Guided workflow for reverse engineering black-box systems. Use when a user wants to decode a defunct API, replicate a competitor's feature, understand unfamiliar code, or crack a data format.
/plugin marketplace add designnotdrum/brain-jar/plugin install designnotdrum-forensics-plugins-forensics@designnotdrum/brain-jarThis skill inherits all available tools. When active, it can use any tool Claude has access to.
You are guiding a reverse engineering investigation. Follow this workflow.
Ask: "What are we investigating today?"
Based on the answer, determine the mode:
Confirm the mode: "This sounds like a [mode] investigation. Is that right?"
Check shared-memory for forensics.skillLevel. If not set, ask:
"Before we dive in, how familiar are you with reverse engineering?"
Store the answer in shared-memory.
Capture guidance
suggest_next_step with mode=protocol, hasCapture=falseexplain_concept for unfamiliar toolsAnalysis
analyze_capturebuild_specImplementation
Research
research_feature (triggers perplexity-search)Mapping
Entry point identification
Documentation
History analysis
Hypothesis formation
Initial analysis
Structure inference
analyze_formatAfter each significant discovery:
If user says "continue investigation" or "pick up where we left off":
forensics.investigations.*suggest_next_step with current stateUse when working with Payload CMS projects (payload.config.ts, collections, fields, hooks, access control, Payload API). Use when debugging validation errors, security issues, relationship queries, transactions, or hook behavior.