vulnerable-secret

13 stars 1 forks
21

This skill provides guidance for extracting secrets from vulnerable executables. It should be used when tasks involve binary analysis, reverse engineering executables to find hidden flags/secrets, or exploiting buffer overflows and other vulnerabilities to extract protected data. Applicable to CTF challenges, security research, and authorized penetration testing scenarios.

Also in: data analysis

Third-Party Agent Skill: Review the code before installing. Agent skills execute in your AI assistant's environment and can access your files. Learn more about security

Installation for Agentic Skill

View all platforms →
skilz install letta-ai/skills/vulnerable-secret
skilz install letta-ai/skills/vulnerable-secret --agent opencode
skilz install letta-ai/skills/vulnerable-secret --agent codex
skilz install letta-ai/skills/vulnerable-secret --agent gemini

First time? Install Skilz: pip install skilz

Works with 22+ AI coding assistants

Cursor, Aider, Copilot, Windsurf, Qwen, Kimi, and more...

View All Agents
Download Agent Skill ZIP

Extract and copy to ~/.claude/skills/ then restart Claude Desktop

1. Clone the repository:
git clone https://github.com/letta-ai/skills
2. Copy the agent skill directory:
cp -r skills/ai/benchmarks/letta/terminal-bench-2/trajectory-only/vulnerable-secret ~/.claude/skills/

Need detailed installation help? Check our platform-specific guides:

Related Agentic Skills

Agentic Skill Details

Repository
skills
Stars
13
Forks
1
Type
Technical
Meta-Domain
web api
Primary Domain
security
Market Score
21

Report Security Issue

Found a security vulnerability in this agent skill?