From security-research
Self-improvement skill. When a high-quality vulnerability is found, this skill analyzes what worked well and stores the technique in the appropriate detection skill's references/cool_techniques.md file for future audits. User-invoked only.
npx claudepluginhub pucagit/claude-plugin --plugin security-researchThis skill uses the workspace's default tool permissions.
When you find a vulnerability through a novel or effective technique, capture what worked so future audits benefit from that knowledge. Techniques are stored in the **specific detection skill's** `references/cool_techniques.md` file so each skill only sees techniques relevant to its domain.
Generates design tokens/docs from CSS/Tailwind/styled-components codebases, audits visual consistency across 10 dimensions, detects AI slop in UI.
Records polished WebM UI demo videos of web apps using Playwright with cursor overlay, natural pacing, and three-phase scripting. Activates for demo, walkthrough, screen recording, or tutorial requests.
Delivers idiomatic Kotlin patterns for null safety, immutability, sealed classes, coroutines, Flows, extensions, DSL builders, and Gradle DSL. Use when writing, reviewing, refactoring, or designing Kotlin code.
When you find a vulnerability through a novel or effective technique, capture what worked so future audits benefit from that knowledge. Techniques are stored in the specific detection skill's references/cool_techniques.md file so each skill only sees techniques relevant to its domain.
This skill is user-invoked only. The user will call it when:
If the automated patterns would have caught it, skip — only capture genuinely novel insights.
What specific technique led to the discovery?
| Technique Type | Example |
|---|---|
| Deep-dive reasoning chain | Found UAF by tracing object lifecycle through 5 functions |
| Variant analysis hit | Found unfixed sibling of a patched CVE |
| Algorithm understanding | Found overflow by understanding compression boundary conditions |
| Cross-module data flow | Traced input through 4 modules to find unvalidated sink |
| State machine analysis | Found auth bypass by identifying unexpected state transition |
| Edge case reasoning | Found injection via Unicode null byte that bypassed filter |
| Git history insight | Identified that a "fix" was incomplete by reading the original patch |
Formulate a concise, reusable technique:
Which skill should this technique be stored in?
| Discovery Method | Target Skill | File |
|---|---|---|
| Novel injection pattern | detect-injection | detect-injection/references/cool_techniques.md |
| Auth/access control insight | detect-auth | detect-auth/references/cool_techniques.md |
| Business logic/timing flaw | detect-logic | detect-logic/references/cool_techniques.md |
| Config/crypto weakness | detect-config | detect-config/references/cool_techniques.md |
| Deep code reasoning insight | deep-dive | deep-dive/references/cool_techniques.md |
| Git history/variant technique | variant-analysis | variant-analysis/references/cool_techniques.md |
references/cool_techniques.md### [Technique Name] (learned [YYYY-MM-DD])
**When to apply**: [conditions — language, framework, vuln class, code pattern]
**Technique**: [what to do — the specific approach that worked]
**Example**: [concrete example from the audit where this was discovered, anonymized]
If an AUDIT_DIR is available (check CLAUDE.md), append to {AUDIT_DIR}/logs/learned-techniques.log:
[YYYY-MM-DD HH:MM] Technique: [name] | Target skill: [skill name] | Finding: [VULN-NNN or description]
references/cool_techniques.md.