npx claudepluginhub trailofbits/skills --plugin trailmarkThis skill uses the workspace's default tool permissions.
Parses source code into a directed graph of functions, classes, calls, and
Runs full trailmark structural analysis with blast radius, taint propagation, privilege boundaries, and complexity hotspots passes on codebases. Use for detailed structural data in audits or vivisect.
Performs deep code property graph analysis with Joern CPG (AST+CFG+PDG) for control flow, data flow, dependencies, dead code, and CodeQL for taint tracking and security auditing.
Traces execution paths from entry points through code knowledge graph. Shows call chains with criticality scores and generates Mermaid flowcharts for flow analysis.
Share bugs, ideas, or general feedback.
Parses source code into a directed graph of functions, classes, calls, and semantic metadata for security analysis. Supports 16 languages.
diagramming-code skill or draw by hand)| Rationalization | Why It's Wrong | Required Action |
|---|---|---|
| "I'll just read the source files manually" | Manual reading misses call paths, blast radius, and taint data | Install trailmark and use the API |
| "Pre-analysis isn't needed for a quick query" | Blast radius, taint, and privilege data are only available after preanalysis() | Always run engine.preanalysis() before handing off to other skills |
| "The graph is too large, I'll sample" | Sampling misses cross-module attack paths | Build the full graph; use subgraph queries to focus |
| "Uncertain edges don't matter" | Dynamic dispatch is where type confusion bugs hide | Account for uncertain edges in security claims |
| "Single-language analysis is enough" | Polyglot repos have FFI boundaries where bugs cluster | Use the correct --language flag per component |
| "Complexity hotspots are the only thing worth checking" | Low-complexity functions on tainted paths are high-value targets | Combine complexity with taint and blast radius data |
MANDATORY: If uv run trailmark fails (command not found, import error,
ModuleNotFoundError), install trailmark before doing anything else:
uv pip install trailmark
DO NOT fall back to "manual verification", "manual analysis", or reading source files by hand as a substitute for running trailmark. The tool must be installed and used programmatically. If installation fails, report the error to the user instead of silently switching to manual code reading.
# Python (default)
uv run trailmark analyze --summary {targetDir}
# Other languages
uv run trailmark analyze --language rust {targetDir}
uv run trailmark analyze --language javascript {targetDir}
uv run trailmark analyze --language go --summary {targetDir}
# Complexity hotspots
uv run trailmark analyze --complexity 10 {targetDir}
from trailmark.query.api import QueryEngine
# Specify language (defaults to "python")
engine = QueryEngine.from_directory("{targetDir}", language="rust")
engine.callers_of("function_name")
engine.callees_of("function_name")
engine.paths_between("entry_func", "db_query")
engine.complexity_hotspots(threshold=10)
engine.attack_surface()
engine.summary()
engine.to_json()
# Run pre-analysis (blast radius, entrypoints, privilege
# boundaries, taint propagation)
result = engine.preanalysis()
# Query subgraphs created by pre-analysis
engine.subgraph_names()
engine.subgraph("tainted")
engine.subgraph("high_blast_radius")
engine.subgraph("privilege_boundary")
engine.subgraph("entrypoint_reachable")
# Add LLM-inferred annotations
from trailmark.models import AnnotationKind
engine.annotate("function_name", AnnotationKind.ASSUMPTION,
"input is URL-encoded", source="llm")
# Query annotations (including pre-analysis results)
engine.annotations_of("function_name")
engine.annotations_of("function_name",
kind=AnnotationKind.BLAST_RADIUS)
engine.annotations_of("function_name",
kind=AnnotationKind.TAINT_PROPAGATION)
Always run engine.preanalysis() before handing off to genotoxic or
diagramming-code skills. Pre-analysis enriches the graph with four passes:
Results are stored as annotations and named subgraphs on the graph.
For detailed documentation, see references/preanalysis-passes.md.
| Language | --language value | Extensions |
|---|---|---|
| Python | python | .py |
| JavaScript | javascript | .js, .jsx |
| TypeScript | typescript | .ts, .tsx |
| PHP | php | .php |
| Ruby | ruby | .rb |
| C | c | .c, .h |
| C++ | cpp | .cpp, .hpp, .cc, .hh, .cxx, .hxx |
| C# | c_sharp | .cs |
| Java | java | .java |
| Go | go | .go |
| Rust | rust | .rs |
| Solidity | solidity | .sol |
| Cairo | cairo | .cairo |
| Haskell | haskell | .hs |
| Circom | circom | .circom |
| Erlang | erlang | .erl |
Node kinds: function, method, class, module, struct,
interface, trait, enum, namespace, contract, library
Edge kinds: calls, inherits, implements, contains, imports
Edge confidence: certain (direct call, self.method()), inferred
(attribute access on non-self object), uncertain (dynamic dispatch)
assumption, precondition, postcondition, invariant,
blast_radius, privilege_boundary, taint_propagationDeclared contract vs. effective input domain: Trailmark separates what a function declares it accepts from what can actually reach it via call paths. Mismatches are where vulnerabilities hide:
Edge confidence: Dynamic dispatch produces uncertain edges. Account for
confidence when making security claims.
Subgraphs: Named collections of node IDs produced by pre-analysis.
Query with engine.subgraph("name"). Available after engine.preanalysis().
See references/query-patterns.md for common security analysis patterns.
See references/preanalysis-passes.md for pre-analysis pass documentation.