crypto-vulnerability-analyst
SKILL.md
Crypto Vulnerability Analyst
Purpose
Find exploitable cryptographic weakness across primitive choice, implementation details, and protocol flow.
Inputs
code_or_binary_contextprotocol_descriptionkey_management_model
Workflow
Phase 1: Crypto Inventory
- Identify algorithms, modes, and libraries.
- Identify key derivation and randomness sources.
- Identify trust anchors and certificate behavior.
Phase 2: Misuse Detection
- Nonce/IV reuse or predictability.
- Weak or obsolete algorithms/modes.
- Insecure comparisons and padding issues.
- Missing authenticity or misuse of MAC/AEAD.
Phase 3: Key Lifecycle Review
- Key generation entropy quality.
- Key storage and exposure paths.
- Rotation, revocation, and scope boundaries.
Phase 4: Protocol Attack Analysis
- Replay and reflection opportunities.
- Downgrade and negotiation weaknesses.
- Oracle-like behavior from error distinctions.
Phase 5: Risk and Fix Prioritization
- Separate compliance issues from exploitable flaws.
- Prioritize fixes by exploit practicality.
- Provide migration-safe remediation guidance.
Crypto Assessment Matrix
| Area | Failure Pattern |
|---|---|
| encryption | unauthenticated encryption for sensitive state |
| key management | shared static keys across tenants/environments |
| randomness | predictable nonce/session token generation |
| protocol | downgrade and replay not cryptographically bound |
Output Contract
{
"crypto_inventory": [],
"misuse_findings": [],
"protocol_risks": [],
"key_management_gaps": [],
"prioritized_remediation": []
}
Constraints
- Do not equate deprecated with exploitable without context.
- Clearly label confidence when implementation visibility is partial.
Quality Checklist
- Primitive and mode details are explicit.
- Exploit path is technically plausible.
- Remediation is concrete.
Detailed Operator Notes
Validation Discipline
- Confirm static assumptions with targeted runtime checks.
- Keep one controlled input per hypothesis.
- Separate symbol-level hints from observed behavior.
Exploitability Heuristics
- Control quality over corrupted bytes/pointers.
- Trigger repeatability across process restarts.
- Mitigation interaction required for practical exploitation.
Common Blind Spots
- Architecture-specific undefined behavior differences.
- Parser edge cases reachable only through nested formats.
- Configuration-dependent code paths not visible in default runs.
Reporting Rules
- Include prerequisite runtime conditions.
- Include why alternative bug classes were rejected.
- Include a minimal regression-test suggestion for remediation.
Quick Scenarios
Scenario A: Control Validation
- Trigger candidate primitive with minimal input.
- Confirm memory/register side effect.
- Repeat across restarts for stability.
- Record constraints that break control.
Scenario B: Mitigation Interaction
- Confirm active hardening controls.
- Test whether primitive survives mitigations.
- Distinguish crash-only from exploit-capable outcomes.
- Capture bypass requirements if needed.
Scenario C: Reporting Readiness
- Verify prerequisite environment notes.
- Verify reproduction steps are deterministic.
- Verify impact statement is evidence-bound.
- Verify remediation target is specific.
Conditional Decision Matrix
| Condition | Action | Evidence Requirement |
|---|---|---|
| Crash reproduces inconsistently | reduce input and isolate triggering fields | minimal trigger artifact |
| Primitive appears but control unclear | instrument memory/register checkpoints | control-surface trace |
| Mitigation blocks direct exploitation | model required bypass preconditions | mitigation interaction notes |
| Parser path uncertain | force parser branch with crafted corpus | branch-selection evidence |
| Static finding lacks runtime proof | add targeted runtime probe before reporting | runtime validation artifact |
Advanced Coverage Extensions
- Compare behavior across compiler optimization levels when possible.
- Check locale/encoding effects on parser and boundary logic.
- Check integer truncation across 32/64-bit interfaces.
- Check allocator behavior differences under memory pressure.
- Check cryptographic error oracles via differential response paths.
Weekly Installs
2
Repository
1ikeadragon/awe…c-claudeGitHub Stars
4
First Seen
Mar 2, 2026
Security Audits
Installed on
amp2
cline2
opencode2
cursor2
kimi-cli2
codex2