Trail of Bits Security Skills
by Trail of Bits
Turn Claude Code into a security research partner that catches vulnerabilities professional auditors miss. Trail of Bits — the firm behind Slither, Echidna, and hundreds of high-profile security audits — distilled decades of offensive security expertise into 40+ specialized agent skills that transform how you approach code security. These skills don't just run linters; they teach Claude Code to think like an attacker, systematically hunting for vulnerability variants, analyzing supply chain risks, verifying constant-time implementations, and authoring detection rules with the rigor of a professional red team. The collection spans nine categories covering the full security lifecycle. Smart contract auditors scan six blockchain platforms for known vulnerability patterns. Static analysis skills orchestrate CodeQL and Semgrep with expert-crafted queries, then validate findings to cut through false positives. The variant analysis workflow takes a known CVE and hunts for similar patterns across your codebase — the same technique that uncovered a real timing side-channel vulnerability in the RustCrypto/signatures library, proving these skills find bugs that matter in production cryptographic code. Beyond offense, verification skills bring defensive depth: property-based testing generates edge-case inputs, spec-to-code compliance checks implementations against formal specifications, and constant-time analysis flags cryptographic timing leaks. Supply chain auditing inspects dependency trees for typosquatting, abandoned maintainers, and known-vulnerable transitive dependencies. Development skills round out the collection with Git workflow automation, devcontainer setup, and Python modernization — because secure code starts with solid engineering practices.
Installation
Key Features
- ✓40+ specialized security skills organized across 9 categories
- ✓Variant analysis that hunts for vulnerability patterns similar to known CVEs
- ✓Smart contract security scanning across 6 blockchain platforms
- ✓Semgrep and CodeQL rule creation with expert-guided query authoring
- ✓Supply chain risk auditing for dependency typosquatting and abandoned packages
- ✓Constant-time analysis to detect cryptographic timing side-channels
- ✓YARA rule authoring with linting, atom analysis, and best practices enforcement
- ✓Property-based testing and spec-to-code compliance verification
- ✓Firebase APK scanner for Android security misconfiguration detection
- ✓Proven track record — discovered real timing side-channel in RustCrypto/signatures
Use Cases
- →Audit a codebase for vulnerability variants after a CVE disclosure
- →Create and refine Semgrep rules tailored to your project's security policies
- →Scan smart contracts for known vulnerability patterns before deployment
- →Assess supply chain risk in your dependency tree for compromised or abandoned packages
- →Verify that cryptographic implementations are constant-time and free of timing leaks
- →Author YARA rules for malware detection with automated linting and quality checks
- →Run differential security reviews on pull requests before merge
- →Check Android APKs for Firebase security misconfigurations
- →Generate property-based tests to find edge-case bugs in critical code paths