From appsec
This skill should be used when the user asks to "check for detectability", "analyze timing side channels", "find privacy issues related to traffic analysis", "check for metadata leakage", or mentions "detectability" in a privacy context. Maps to LINDDUN category D1.
npx claudepluginhub florianbuetow/claude-code --plugin appsecThis skill uses the workspace's default tool permissions.
Analyze source code for detectability threats where an observer can determine
Acquire memory dumps from live systems/VMs and analyze with Volatility 3 for processes, networks, DLLs, injections in incident response or malware hunts.
Provides x86-64/ARM disassembly patterns, calling conventions, control flow recognition for static analysis of executables and compiled binaries.
Identifies anti-debugging checks like IsDebuggerPresent, NtQueryInformationProcess in Windows binaries; suggests bypasses via patches/hooks/scripts for malware analysis, CTFs, authorized RE.
Analyze source code for detectability threats where an observer can determine that a user is interacting with a system, that a record exists, or that a specific action was performed -- even without accessing the content itself. Privacy is compromised when the mere existence of an interaction or record reveals sensitive information.
Read ../../shared/schemas/flags.md for full flag
documentation. This skill supports all cross-cutting flags.
| Flag | Detectability-Specific Behavior |
|---|---|
--scope | Default changed. Focuses on files containing API handlers, error responses, presence indicators, and encrypted message handling. |
--depth quick | Grep patterns only: scan for enumeration endpoints, timing differences, and presence indicators. |
--depth standard | Full code read, analyze response patterns for information leakage through existence proofs. |
--depth deep | Trace API response behaviors across endpoints. Map enumeration surfaces and timing oracle opportunities. |
--depth expert | Deep + adversarial detectability simulation: model what an observer can infer from response patterns and metadata. |
--severity | Filter output. Severity depends on sensitivity of what can be detected. |
--fix | Generate constant-time responses, uniform error handling, and padding implementations. |
LINDDUN D1 -- Detectability
Detectability occurs when an adversary can determine that an item of interest
exists, even without accessing its content. Read
../../shared/frameworks/linddun.md for the
full LINDDUN framework reference including detectability patterns, timing
side channels, and traffic analysis threats.
Privacy Property Violated: Undetectability / Unobservability
STRIDE Mapping: Information Disclosure (detectability focuses on existence proofs and metadata patterns rather than direct content access)
--scope flag (default: changed).Read each scoped file and assess what an observer can detect about system usage or data existence:
At --depth deep or --depth expert, model the full observable surface and
determine what an adversary can infer from response patterns and metadata.
Output findings per ../../shared/schemas/findings.md.
Each finding needs: DTCT-NNN id, title, severity (based on sensitivity of
detectable information and ease of observation), location with snippet, description
of what can be detected and through which channel, impact (what an observer infers),
fix (uniform responses, constant-time ops, or padding), and CWE/LINDDUN references.
user not found|invalid username|no such user|email not registered|account does not existif.*!user.*return|if.*notFound.*return|findOne.*then.*404|catch.*404isOnline|online_status|lastSeen|last_active|typing.*indicator|read.*receipt|seen.*atalready registered|email.*taken|username.*exists|account.*already|duplicate.*emailencrypt\(|cipher\.update|AES.*encrypt|padding|PKCS|NoPaddingautoIncrement|SERIAL|sequence|nextval|uuid.*v1|ObjectIdsendNotification|pushNotif|FCM|APNs|webpush|notify\(.*user| Regulation | Provision | Relevance |
|---|---|---|
| GDPR Art. 25 | Data protection by design | Systems must prevent unauthorized detection of data existence |
| GDPR Art. 32 | Security of processing | Includes protection against unauthorized disclosure via side channels |
| CCPA 1798.150 | Private right of action | Unauthorized access including inference from observable patterns |
| HIPAA 164.312(e) | Transmission security | Health record existence must not be detectable |
| ePrivacy Directive Art. 5 | Confidentiality of communications | Communication metadata must be protected |
Use finding ID prefix DTCT (e.g., DTCT-001, DTCT-002).
All findings follow the schema in
../../shared/schemas/findings.md with:
references.cwe: CWE-203 (Observable Discrepancy) or CWE-208 (Observable Timing Discrepancy)references.owasp: A05:2021 (Security Misconfiguration -- information leakage in responses)metadata.tool: "detecting"metadata.framework: "linddun"metadata.category: "D1"Summary table after all findings:
| Detectability Pattern | Critical | High | Medium | Low |
|-----------------------------|----------|------|--------|-----|
| User enumeration | | | | |
| Timing side channels | | | | |
| Presence indicators | | | | |
| Account enumeration | | | | |
| Message size leakage | | | | |
| Notification patterns | | | | |
Followed by: top 3 priorities, enumeration surface map, and overall assessment.