From patchman
Conduct authorized defensive security audits of codebases and web applications. Use for broad appsec review across OWASP, authz, business logic, SSRF, XSS, CSRF, injection, file upload, secrets, logging, and tenant isolation. Produces structured findings with severity, confidence, evidence, and safe remediation guidance.
npx claudepluginhub muhammedzohaib/patchman --plugin patchmanThis skill uses the workspace's default tool permissions.
Use this skill when the user wants a full security review of a repository, service, or application slice.
Acquire memory dumps from live systems/VMs and analyze with Volatility 3 for processes, networks, DLLs, injections in incident response or malware hunts.
Provides x86-64/ARM disassembly patterns, calling conventions, control flow recognition for static analysis of executables and compiled binaries.
Identifies anti-debugging checks like IsDebuggerPresent, NtQueryInformationProcess in Windows binaries; suggests bypasses via patches/hooks/scripts for malware analysis, CTFs, authorized RE.
Use this skill when the user wants a full security review of a repository, service, or application slice.
Title:Severity:Confidence:CWE / OWASP mapping:Affected area:Why this matters:Evidence:Exploitability notes:Recommended fix:Safer example patch:Follow-up checks:Refuse requests for unauthorized access, persistence, evasion, credential theft, destructive actions, or exploit weaponization.