ctf-forensicsProvides digital forensics and signal analysis techniques for CTF challenges. Use when analyzing disk images, memory dumps, event logs, network captures, cry...
Install via ClawdBot CLI:
clawdbot install gandli/ctf-forensicsGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Accesses sensitive credential files or environment variables
/etc/shadowContains telemetry, tracking, or analytics calls not mentioned in documentation
pixel(Accesses system directories or attempts privilege escalation
/etc/hostsCalls external URL not in known-safe list
https://mempool.space/api/tx/<TXIDUsage Guide
Loading usage data… refresh in a few seconds.
Scored Apr 19, 2026
AI Analysis
The skill provides legitimate forensics tool installation commands and references external resources for CTF challenges. The flagged signals appear to be false positives from example commands (like accessing /etc/shadow for password analysis) and documented blockchain API calls (mempool.space) consistent with the skill's purpose. No evidence of hidden malicious instructions, credential harvesting, or data exfiltration exists.
Audited Apr 16, 2026 · audit v1.0
Perform network reconnaissance and port scanning with Nmap to find open ports, detect services, identify vulnerabilities, and enumerate targets accurately.
Scan networks to discover devices, gather MAC addresses, vendors, and hostnames. Includes safety checks to prevent accidental scanning of public networks.
Security engineering toolkit for threat modeling, vulnerability analysis, secure architecture, and penetration testing. Includes STRIDE analysis, OWASP guida...
Use when conducting security audits, reviewing code for vulnerabilities, or analyzing infrastructure security. Invoke for SAST scans, penetration testing, DevSecOps practices, cloud security reviews.
Test APIs against OWASP API Security Top 10 including discovery, auth abuse, and protocol-specific checks.
Test your AI agent for security vulnerabilities using PwnClaw. Runs 50+ attacks (prompt injection, jailbreaks, social engineering, MCP poisoning, and more) and provides fix instructions. Use when your agent needs a security check or hardening.