From appsec
This skill should be used when the user asks to "learn about security", "teach me OWASP", "security tutorial", "learn threat modeling", or invokes /appsec:learn. Interactive guided walkthrough using your codebase as teaching material.
npx claudepluginhub florianbuetow/claude-code --plugin appsecThis skill uses the workspace's default tool permissions.
Guided, interactive learning experience that teaches security concepts
Acquire memory dumps from live systems/VMs and analyze with Volatility 3 for processes, networks, DLLs, injections in incident response or malware hunts.
Provides x86-64/ARM disassembly patterns, calling conventions, control flow recognition for static analysis of executables and compiled binaries.
Identifies anti-debugging checks like IsDebuggerPresent, NtQueryInformationProcess in Windows binaries; suggests bypasses via patches/hooks/scripts for malware analysis, CTFs, authorized RE.
Guided, interactive learning experience that teaches security concepts using the user's own codebase as teaching material. Combines explanation with hands-on discovery -- the user finds real vulnerabilities in their own code as they learn about each category.
This skill runs entirely in the main agent context. It does NOT dispatch subagents. It is interactive and conversational -- ask questions, wait for answers, then reveal findings.
Detect the topic from the user's message:
| User Says | Mode | Curriculum |
|---|---|---|
| "learn owasp", "teach me owasp" | OWASP Walkthrough | All 10 categories |
| "learn stride", "teach me stride" | STRIDE Walkthrough | All 6 categories |
| "learn red-team", "learn red teaming" | Red Team Walkthrough | All 6 personas |
| "learn injection", "learn A03" | Single Category Deep Dive | One category |
| "learn security", "security tutorial" | Guided Selection | Ask what to learn |
Load the relevant framework reference before starting:
| Mode | Reference File |
|---|---|
| OWASP | ../../shared/frameworks/owasp-top10-2021.md |
| STRIDE | ../../shared/frameworks/stride.md |
| Red Team | ../../shared/frameworks/dread.md + all persona files in agents/ |
| Single Category | The relevant framework file for that category |
Each learning mode follows the same 4-step pattern per category. The key principle: NEVER just lecture. Always ground the concept in the user's own code, and always make them think before revealing answers.
Present the category in plain language:
Keep this brief. 5-8 sentences maximum. The user's code is the real teacher.
Search the user's codebase for patterns relevant to this category. Use Glob and Grep to find concrete examples. Show 2-3 code snippets with file paths and line numbers.
Present the code WITHOUT revealing whether it is vulnerable or secure. Frame it as: "Here is how your codebase handles [concept]. Look at these patterns..."
Search strategy by category:
| Category | What to Search For |
|---|---|
| Injection (A03) | Database queries, template rendering, shell commands, user input handling |
| Access Control (A01) | Route middleware, authorization checks, role guards, IDOR-prone endpoints |
| Crypto (A02) | Hashing functions, encryption calls, TLS config, key storage |
| Auth (A07) | Login handlers, session management, password storage, token generation |
| Spoofing (S) | Authentication flows, token validation, session handling |
| Tampering (T) | Input validation, request parsing, file operations |
| Info Disclosure (I) | Error handlers, logging statements, API responses |
| DoS (D) | Regex patterns, file uploads, resource allocation, unbounded loops |
| Red Team | Attack surface entry points, auth boundaries, data flows |
If no relevant code is found for a category, use a generic example and note that the category may not be applicable to this codebase.
Ask the user 2-3 questions about the code you showed. These should guide them to discover potential issues themselves:
Wait for the user to respond before proceeding. Do NOT reveal the answers in the same message as the questions.
After the user responds (or asks to see the answer):
Then offer to continue to the next category or dive deeper.
Walk through all 10 categories in priority order (most commonly exploited first, not numerical order):
Walk through all 6 categories mapping each to the security property it protects:
Teach offensive security thinking by walking through each attacker persona:
For each persona, load the persona file from agents/ and use its
checklist to search the user's codebase for exploitable patterns.
After each category, provide a brief progress indicator:
[3/10] OWASP Walkthrough
Completed: A03 Injection, A07 Auth, A01 Access Control
Next: A02 Cryptographic Failures
Continue? (or type 'skip' to move on, 'stop' to finish)
/appsec:explain <topic> for a full explanation.