From asi
Detects timing side-channel vulnerabilities in cryptographic code. Use when implementing or reviewing crypto code, encountering division on secrets, secret-dependent branches, or constant-time programming questions in C, C++, Go, Rust, Swift, Java, Kotlin, C#, PHP, JavaScript, TypeScript, Python, or Ruby.
npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
**Trit**: -1 (MINUS)
Detects timing side-channel vulnerabilities like secret-dependent branches and divisions in cryptographic code for Go, Rust, Java, Kotlin, C#, PHP, JS/TS, Python, Ruby.
Analyzes crypto code in C/C++, Go, Rust, JavaScript/TypeScript, Python, and more for timing side-channels leaking secrets via non-constant-time ops.
Tests code for timing side-channel vulnerabilities and verifies constant-time implementations. Useful for security audits in cryptographic or sensitive code.
Share bugs, ideas, or general feedback.
Trit: -1 (MINUS) Category: constant-time-analysis Author: Trail of Bits Source: trailofbits/skills License: AGPL-3.0
Detects timing side-channel vulnerabilities in cryptographic code. Use when implementing or reviewing crypto code, encountering division on secrets, secret-dependent branches, or constant-time programming questions in C, C++, Go, Rust, Swift, Java, Kotlin, C#, PHP, JavaScript, TypeScript, Python, or Ruby.
This is a Trail of Bits security skill. Refer to the original repository for detailed usage guidelines and examples.
See: https://github.com/trailofbits/skills