Use when performing adversarial security testing on SUI Move contracts. Generates attack tests targeting access control, integer abuse, object manipulation, economic exploits, input fuzzing, ordering attacks, type confusion, and DoS vectors. Triggers on red team, penetration test, attack simulation, or exploit discovery tasks.
From sui-dev-agentsnpx claudepluginhub first-mover-tw/sui-dev-agents --plugin sui-dev-agentsThis skill uses the workspace's default tool permissions.
references/examples.mdreferences/reference.mdSearches, retrieves, and installs Agent Skills from prompts.chat registry using MCP tools like search_skills and get_skill. Activates for finding skills, browsing catalogs, or extending Claude.
Searches prompts.chat for AI prompt templates by keyword or category, retrieves by ID with variable handling, and improves prompts via AI. Use for discovering or enhancing prompts.
Compares coding agents like Claude Code and Aider on custom YAML-defined codebase tasks using git worktrees, measuring pass rate, cost, time, and consistency.
Adversarial security testing for SUI Move contracts — think like a hacker, break before they do.
This skill runs automated attack rounds against Move contracts, generating malicious test code that actively tries to exploit vulnerabilities. Unlike static analysis, red-team testing executes real attacks.
/sui-red-team → 10 rounds (default), delete test files after
/sui-red-team 20 → 20 rounds
/sui-red-team --rounds 5 → 5 rounds
/sui-red-team --keep-tests → Keep attack tests in tests/red-team/
For each round N of {total_rounds}:
sui move test --filter "red_team_round_{N}"EXPLOITED — vulnerability foundexpected_failure or abort → DEFENDED — contract correctly blockedSUSPICIOUS--keep-tests)| # | Category | Attack Vectors |
|---|---|---|
| 1 | Access Control | Call admin func without Cap, forge Cap, wrong sender, stolen shared object |
| 2 | Integer Abuse | 0 value, MAX_U64, overflow trigger, underflow trigger, precision loss |
| 3 | Object Manipulation | Wrong object ID, shared object contention, object double-use, orphan objects |
| 4 | Economic Attack | Flash loan sim, price manipulation, fee bypass, dust attack, rounding exploit |
| 5 | Input Fuzzing | Empty vector, max-length string, special bytes (0x00, 0xFF), deeply nested |
| 6 | Ordering Attack | Tx ordering dependency, epoch manipulation, timelock bypass, front-running sim |
| 7 | Type Confusion | Wrong generic param, phantom type abuse, ability constraint bypass |
| 8 | Denial of Service | Gas exhaustion, large loop trigger, storage bloat, recursive call depth |
Red Team Report ({N} rounds)
============================
🔴 EXPLOITED ({count}):
Round X: [sources/module.move:line] function_name() vulnerability description
→ Attack: description of successful exploit
→ Fix: suggested remediation
🟡 SUSPICIOUS ({count}):
Round X: [sources/module.move:line] description of anomaly
→ Concern: why this is suspicious
🟢 DEFENDED ({count}):
Round X: Category — defense description ✓
Summary: {exploited} exploits / {suspicious} suspicious / {defended} defended
Confidence: {confidence}% (based on round coverage)
Generated test files use the naming pattern:
tests/red_team_round_{N}_{category}.move
With --keep-tests, files persist in tests/red-team/ directory for later review or extension.
sui-security-guard for static analysis complementsui-deployer should check red-team report❌ Running too few rounds
❌ Ignoring SUSPICIOUS results
❌ Not re-testing after fixes
sui move test --filter "red_team_round_{N}"See reference.md for attack pattern details and examples.md for attack test code examples.