From appsec
This skill should be used when the user asks to "explain security concept", "what is OWASP", "explain this finding", "what does this vulnerability mean", "explain stride", "explain injection", "what is CSRF", "explain spoofing", "what does INJ-003 mean", "compare stride vs pasta", or asks any question about security terminology, frameworks, vulnerability categories, or specific findings. Works at framework, category, finding, and comparison levels.
npx claudepluginhub florianbuetow/claude-code --plugin appsecThis skill uses the workspace's default tool permissions.
Interactive explainer for security frameworks, threat categories, vulnerability
Acquire memory dumps from live systems/VMs and analyze with Volatility 3 for processes, networks, DLLs, injections in incident response or malware hunts.
Provides x86-64/ARM disassembly patterns, calling conventions, control flow recognition for static analysis of executables and compiled binaries.
Identifies anti-debugging checks like IsDebuggerPresent, NtQueryInformationProcess in Windows binaries; suggests bypasses via patches/hooks/scripts for malware analysis, CTFs, authorized RE.
Interactive explainer for security frameworks, threat categories, vulnerability findings, and security concepts. Works at multiple levels of depth -- from a broad framework overview down to a single finding ID. Always uses the user's own codebase for concrete examples when possible.
Detect what the user is asking about and respond at the appropriate level:
Triggered by framework names: STRIDE, OWASP, PASTA, LINDDUN, MITRE ATT&CK, SANS/CWE Top 25, DREAD.
What to cover:
Framework references to read:
../../shared/frameworks/stride.md../../shared/frameworks/owasp-top10-2021.md../../shared/frameworks/pasta.md../../shared/frameworks/linddun.md../../shared/frameworks/mitre-attck.md../../shared/frameworks/sans-cwe-top25.md../../shared/frameworks/dread.md../../shared/frameworks/owasp-api-top10.mdTriggered by category names: "spoofing", "tampering", "injection", "broken access control", "A01", "A03", "STRIDE-S", "CWE-89", etc.
What to cover:
Triggered by finding IDs: "INJ-003", "SPOOF-001", "AC-005", "SEC-002", etc. Also triggered by phrases like "explain this finding" or "what does this vulnerability mean" when a finding was recently reported.
What to cover:
Triggered by "vs", "versus", "compared to", "difference between", or listing multiple frameworks/categories.
What to cover:
Common comparisons:
Determine:
Read the relevant framework reference file(s) from shared/frameworks/.
For finding explanations, also read the relevant skill's SKILL.md and
detection patterns.
Use Glob and Grep to find real examples from the user's codebase that illustrate the concept. This grounds the explanation in the user's actual code rather than generic examples.
Search strategy by level:
Present the explanation at the appropriate level. Use clear headings, concrete code examples, and practical language. Avoid jargon without definition. When referencing CWEs or other identifiers, briefly explain what they mean.
Always end with a contextual follow-up offer:
| Situation | Offer |
|---|---|
| Explained a framework | "Want me to run a full {framework} analysis on your codebase?" |
| Explained a category | "Want me to scan your code specifically for {category} issues?" |
| Explained a finding | "Want me to generate the fix?" or "Want me to check for similar issues?" |
| Compared frameworks | "Want me to run {recommended framework} on your codebase?" |
| Generic concept | "Want me to check your code for related vulnerabilities?" |