Claude Code Plugins

Community-maintained marketplace

Feedback

analyzing-crypto-weakness

@waiwai24/BinaryX-Agent
0
0

Identifies weak cryptographic algorithms, hardcoded keys, and insecure key management practices in binary code. Use when analyzing encryption/decryption, authentication mechanisms, or reviewing cryptographic implementations.

Install Skill

1Download skill
2Enable skills in Claude

Open claude.ai/settings/capabilities and find the "Skills" section

3Upload to Claude

Click "Upload skill" and select the downloaded ZIP file

Note: Please verify skill by going through its instructions before using it.

SKILL.md

name analyzing-crypto-weakness
description Identifies weak cryptographic algorithms, hardcoded keys, and insecure key management practices in binary code. Use when analyzing encryption/decryption, authentication mechanisms, or reviewing cryptographic implementations.

Cryptographic Weakness Detection

Detection Workflow

  1. Identify cryptographic functions: Search for crypto-related function names, encryption/decryption operations, hash function usage
  2. Extract crypto parameters: Identify algorithms used, check key sizes and modes, examine IV/nonce handling
  3. Check for hardcoded secrets: Use strings to find potential keys, search for common password/key patterns, analyze data sections for secrets
  4. Assess implementation security: Check for constant-time comparisons, verify proper padding, assess randomness of IVs/nonces

Key Patterns

  • Weak algorithms: DES, 3DES, RC4, MD5, SHA1, ECB mode, small key sizes (<128 bits)
  • Hardcoded secrets: passwords/passphrases, keys, IVs/nonces, magic numbers
  • Insecure key management: keys embedded in code, plaintext storage, weak RNG, reused IVs/nonces
  • Implementation issues: timing attacks, side-channel vulnerabilities, incorrect padding, missing authentication

Output Format

Report with: id, type, subtype, severity, confidence, location, algorithm, mode, key_size, issues, recommendation, cve_references, mitigation.

Severity Guidelines

  • CRITICAL: Hardcoded private keys or passwords
  • HIGH: Broken algorithms (DES, RC4) in security-critical code
  • MEDIUM: Weak algorithms in non-critical code
  • LOW: Minor crypto implementation issues

See Also

  • patterns.md - Detailed detection patterns and exploitation scenarios
  • examples.md - Example analysis cases and code samples
  • references.md - CWE references and mitigation strategies