analyzing-protocols
Analyzes network protocol implementations to identify parsing vulnerabilities, state machine issues, and protocol-level security problems. Use when analyzing network servers, protocol handlers, or investigating protocol implementation bugs.
$ Installieren
git clone https://github.com/majiayu000/claude-skill-registry /tmp/claude-skill-registry && cp -r /tmp/claude-skill-registry/skills/security/analyzing-protocols ~/.claude/skills/claude-skill-registry// tip: Run this command in your terminal to install the skill
SKILL.md
name: analyzing-protocols description: Analyzes network protocol implementations to identify parsing vulnerabilities, state machine issues, and protocol-level security problems. Use when analyzing network servers, protocol handlers, or investigating protocol implementation bugs.
Protocol Analysis
Detection Workflow
- Identify protocol handlers: Find network socket handlers, locate packet parsing functions, identify protocol state machines, map protocol message types
- Analyze protocol messages: Identify message formats, parse message fields, check field validation, assess length handling
- Trace protocol state: Map state transitions, identify state variables, check state machine completeness, assess state corruption potential
- Assess security: Check authentication and authorization, verify input validation, assess exploitability, identify protocol-level attacks
Key Patterns
- Protocol parsing vulnerabilities: buffer overflows in packet parsing, integer overflow in length fields, format string in protocol handling, command injection in protocol commands
- State machine issues: out-of-order message handling, missing state transitions, state corruption attacks, protocol state confusion
- Authentication flaws: weak authentication mechanisms, missing authentication on critical operations, authentication bypass opportunities, session management issues
- Protocol logic errors: race conditions in protocol handling, TOCTOU in protocol operations, improper input validation, protocol downgrade attacks
Output Format
Report with: id, type, subtype, severity, confidence, location, protocol, vulnerability, packet_field (name, offset, size), overflow_scenario, attack_vector, exploitable, impact, mitigation.
Severity Guidelines
- CRITICAL: Remote code execution via protocol vulnerability
- HIGH: Remote DoS or information disclosure
- MEDIUM: Local protocol issues
- LOW: Minor protocol bugs
See Also
patterns.md- Detailed detection patterns and exploitation scenariosexamples.md- Example analysis cases and code samplesreferences.md- CWE references and mitigation strategies
Repository

majiayu000
Author
majiayu000/claude-skill-registry/skills/security/analyzing-protocols
0
Stars
0
Forks
Updated1d ago
Added1w ago