binary-re-tool-setup
Facilitates the setup and configuration of essential reverse engineering tools for effective binary analysis and debugging.
Install this skill
or
80/100
Security score
The binary-re-tool-setup skill was audited on Feb 28, 2026 and we found 8 security issues across 3 threat categories. Review the findings below before installing.
Categories Tested
Security Issues
medium line 230
Curl to non-GitHub URL
SourceSKILL.md
| 230 | bash -c "$(curl -fsSL https://gef.blah.cat/sh)" |
medium line 194
Access to hidden dotfiles in home directory
SourceSKILL.md
| 194 | **Configuration (~/.radare2rc):** |
low line 217
Access to hidden dotfiles in home directory
SourceSKILL.md
| 217 | echo 'export PATH=$PATH:/opt/ghidra/support' >> ~/.bashrc |
low line 236
Access to hidden dotfiles in home directory
SourceSKILL.md
| 236 | git clone https://github.com/hugsy/gef-extras.git ~/.gef-extras |
low line 237
Access to hidden dotfiles in home directory
SourceSKILL.md
| 237 | echo 'source ~/.gef-extras/scripts/checksec.py' >> ~/.gdbinit |
medium line 473
Access to hidden dotfiles in home directory
SourceSKILL.md
| 473 | Add to `~/.bashrc` or `~/.zshrc`: |
low line 210
External URL reference
SourceSKILL.md
| 210 | # Download from https://ghidra-sre.org/ |
low line 230
External URL reference
SourceSKILL.md
| 230 | bash -c "$(curl -fsSL https://gef.blah.cat/sh)" |
Scanned on Feb 28, 2026
View Security DashboardInstall this skill with one command
/learn @aiskillstore/binary-re-tool-setup