secure-workflow-guide by trailofbits/skills
npx skills add https://github.com/trailofbits/skills --skill secure-workflow-guide引导您了解 Trail of Bits 的安全开发流程——一个包含 5 个步骤的过程,旨在整个开发周期中增强智能合约的安全性。
使用场景:每次代码提交时、部署前,或当您需要进行安全审查时
涵盖一个包含以下步骤的安全工作流程:
运行 Slither 及其 70 多个内置检测器,以发现常见漏洞:
目标:干净的 Slither 报告或已记录的误报甄别结果
检测并验证适用的功能:
注意:仅运行适用于您代码库的检查
生成 3 种安全图表:
审查每个图表以发现安全问题
帮助记录关键安全属性:
广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
然后设置测试:
注意:这是安全方面最重要的活动
分析自动化工具可能遗漏的领域:
在代码库中搜索这些模式并标记风险
有关每个步骤的详细说明、命令和解释,请参阅 WORKFLOW_STEPS.md。
当我被调用时,我将:
根据以下情况调整:
| 借口 | 为何错误 | 必需的行动 |
|---|---|---|
| "Slither 不可用,我将手动检查" | 手动检查会遗漏 70 多个检测器模式 | 安装并运行 Slither,或记录为何被阻止 |
| "无法生成图表,我将描述架构" | 描述不是可视化的——图表能揭示文本遗漏的模式 | 执行 slither --print 命令,生成实际的视觉输出 |
| "未检测到升级,跳过可升级性检查" | 代理和升级通常是隐式的或计划中的 | 在跳过步骤 2 检查前,通过代码库搜索进行验证 |
| "不是代币,跳过 ERC 检查" | 代币可以在没有明显 ERC 继承的情况下集成 | 在跳过前检查代币交互、转账、余额 |
| "现在无法设置 Echidna,建议稍后设置" | 基于属性的测试是步骤 4,不是可选的 | 现在记录属性,设置模糊测试基础设施 |
| "没有 DeFi 交互,跳过预言机/闪电贷检查" | DeFi 模式会出现在意想不到的地方(价格反馈、外部调用) | 完成步骤 5 手动审查,在代码库中搜索模式 |
| "此步骤不适用于我的项目" | 未经验证的"不适用" = 错过的漏洞 | 在声明不适用前,通过显式的代码库搜索进行验证 |
| "我将提供通用的安全建议,而不是运行工作流程" | 通用建议不可操作,工作流程能找到具体问题 | 执行所有 5 个步骤,生成带有文件:行号引用的项目特定发现 |
当我完成工作流程后,您将获得一份全面的安全报告,涵盖:
有关完整的工作流程报告示例,请参阅 EXAMPLE_REPORT.md。
安全报告:
行动计划:
工作流程检查清单:
Trail of Bits 资源:
其他安全事项:
请告诉我您已准备就绪,我将与您的代码库一起运行此工作流程!
每周安装量
1.2K
代码仓库
GitHub 星标数
3.9K
首次出现
Jan 19, 2026
安全审计
安装于
claude-code1.1K
codex1.0K
opencode976
gemini-cli962
cursor931
github-copilot892
Guides through Trail of Bits' secure development workflow - a 5-step process to enhance smart contract security throughout development.
Use this : On every check-in, before deployment, or when you want a security review
Covers a security workflow including:
Run Slither with 70+ built-in detectors to find common vulnerabilities:
Goal : Clean Slither report or documented triages
Detect and validate applicable features:
Note : Only runs checks that apply to your codebase
Generate 3 security diagrams:
Review each diagram for security concerns
Help document critical security properties:
Then set up testing:
Note : Most important activity for security
Analyze areas automated tools miss:
Search codebase for these patterns and flag risks
For detailed instructions, commands, and explanations for each step, see WORKFLOW_STEPS.md.
When invoked, I will:
Adapts based on:
| Rationalization | Why It's Wrong | Required Action |
|---|---|---|
| "Slither not available, I'll check manually" | Manual checking misses 70+ detector patterns | Install and run Slither, or document why it's blocked |
| "Can't generate diagrams, I'll describe the architecture" | Descriptions aren't visual - diagrams reveal patterns text misses | Execute slither --print commands, generate actual visual outputs |
| "No upgrades detected, skip upgradeability checks" | Proxies and upgrades are often implicit or planned | Verify with codebase search before skipping Step 2 checks |
| "Not a token, skip ERC checks" | Tokens can be integrated without obvious ERC inheritance | Check for token interactions, transfers, balances before skipping |
| "Can't set up Echidna now, suggesting it for later" | Property-based testing is Step 4, not optional | Document properties now, set up fuzzing infrastructure |
| "No DeFi interactions, skip oracle/flash loan checks" | DeFi patterns appear in unexpected places (price feeds, external calls) | Complete Step 5 manual review, search codebase for patterns |
| "This step doesn't apply to my project" | "Not applicable" without verification = missed vulnerabilities |
When I complete the workflow, you'll get a comprehensive security report covering:
For a complete example workflow report, see EXAMPLE_REPORT.md.
Security Report :
Action Plan :
Workflow Checklist :
Trail of Bits Resources :
Other Security :
Let me know when you're ready and I'll run through the workflow with your codebase!
Weekly Installs
1.2K
Repository
GitHub Stars
3.9K
First Seen
Jan 19, 2026
Security Audits
Gen Agent Trust HubPassSocketPassSnykPass
Installed on
claude-code1.1K
codex1.0K
opencode976
gemini-cli962
cursor931
github-copilot892
| Verify with explicit codebase search before declaring N/A |
| "I'll provide generic security advice instead of running workflow" | Generic advice isn't actionable, workflow finds specific issues | Execute all 5 steps, generate project-specific findings with file:line references |