fp-check
セキュリティ脆弱性の発見を検証し、誤検知の有無を確認し、その悪用可能性を評価します。作業効率と自動化能力を向上させるAIエージェントスキル。
npx skills add trailofbits/skills --skill fp-checkBefore / After 効果比較
1 组セキュリティスキャンレポートには多数の誤検知(False Positives)が含まれており、セキュリティチームは各「脆弱性」を手動で検証するために多大な時間を費やしています。これは時間がかかり、不正確であり、真の脅威を見逃す可能性があります。
fp-checkを使用することで、誤検知を迅速に特定して排除し、真の脆弱性に集中できます。これにより、脆弱性検証の効率と精度が大幅に向上します。チームは重要なセキュリティ問題により迅速に対応し、修正することができます。
description SKILL.md
fp-check
False Positive Check
When to Use
-
"Is this bug real?" or "is this a true positive?"
-
"Is this a false positive?" or "verify this finding"
-
"Check if this vulnerability is exploitable"
-
Any request to verify or validate a specific suspected bug
When NOT to Use
-
Finding or hunting for bugs ("find bugs", "security analysis", "audit code")
-
General code review for style, performance, or maintainability
-
Feature development, refactoring, or non-security tasks
-
When the user explicitly asks for a quick scan without verification
Rationalizations to Reject
If you catch yourself thinking any of these, STOP.
Rationalization Why It's Wrong Required Action
"Rapid analysis of remaining bugs" Every bug gets full verification Return to task list, verify next bug through all phases
"This pattern looks dangerous, so it's a vulnerability" Pattern recognition is not analysis Complete data flow tracing before any conclusion
"Skipping full verification for efficiency" No partial analysis allowed Execute all steps per the chosen verification path
"The code looks unsafe, reporting without tracing data flow" Unsafe-looking code may have upstream validation Trace the complete path from source to sink
"Similar code was vulnerable elsewhere" Each context has different validation, callers, and protections Verify this specific instance independently
"This is clearly critical" LLMs are biased toward seeing bugs and overrating severity Complete devil's advocate review; prove it with evidence
Step 0: Understand the Claim and Context
Before any analysis, restate the bug in your own words. If you cannot do this clearly, ask the user for clarification using AskUserQuestion. Half of false positives collapse at this step — the claim doesn't make coherent sense when restated precisely.
Document:
-
What is the exact vulnerability claim? (e.g., "heap buffer overflow in
parse_header()whencontent_lengthexceeds 4096") -
What is the alleged root cause? (e.g., "missing bounds check before
memcpyat line 142") -
What is the supposed trigger? (e.g., "attacker sends HTTP request with oversized Content-Length header")
-
What is the claimed impact? (e.g., "remote code execution via controlled heap corruption")
-
What is the threat model? What privilege level does this code run at? Is it sandboxed? What can the attacker already do before triggering this bug? (e.g., "unauthenticated remote attacker vs privileged local user"; "runs inside Chrome renderer sandbox" vs "runs as root with no sandbox")
-
What is the bug class? Classify the bug and consult bug-class-verification.md for class-specific verification requirements that supplement the generic phases below.
-
Execution context: When and how is this code path reached during normal execution?
-
Caller analysis: What functions call this code and what input constraints do they impose?
-
Architectural context: Is this part of a larger security system with multiple protection layers?
-
Historical context: Any recent changes, known issues, or previous security reviews of this code area?
Route: Standard vs Deep Verification
After Step 0, choose a verification path.
Standard Verification
Use when ALL of these hold:
-
Clear, specific vulnerability claim (not vague or ambiguous)
-
Single component — no cross-component interaction in the bug path
-
Well-understood bug class (buffer overflow, SQL injection, XSS, integer overflow, etc.)
-
No concurrency or async involved in the trigger
-
Straightforward data flow from source to sink
Follow standard-verification.md. No task creation — work through the linear checklist, documenting findings inline.
Deep Verification
Use when ANY of these hold:
-
Ambiguous claim that could be interpreted multiple ways
-
Cross-component bug path (data flows through 3+ modules or services)
-
Race conditions, TOCTOU, or concurrency in the trigger mechanism
-
Logic bugs without a clear spec to verify against
-
Standard verification was inconclusive or escalated
-
User explicitly requests full verification
Follow deep-verification.md. Create the full task dependency graph and execute phases with the plugin's agents.
Default
Start with standard. Standard verification has two built-in escalation checkpoints that route to deep when complexity exceeds the linear checklist.
Batch Triage
When verifying multiple bugs at once:
-
Run Step 0 for all bugs first — restating each claim often collapses obvious false positives immediately
-
Route each bug independently (some may be standard, others deep)
-
Process all standard-routed bugs first, then deep-routed bugs
-
After all bugs are verified, check for exploit chains — findings that individually failed gate review may combine to form a viable attack
Final Summary
After processing ALL suspected bugs, provide:
-
Counts: X TRUE POSITIVES, Y FALSE POSITIVES
-
TRUE POSITIVE list: Each with brief vulnerability description
-
FALSE POSITIVE list: Each with brief reason for rejection
References
-
Standard Verification — Linear single-pass checklist for straightforward bugs
-
Deep Verification — Full task-based orchestration for complex bugs
-
Gate Reviews — Six mandatory gates and verdict format
-
Bug-Class Verification — Class-specific verification requirements for memory corruption, logic bugs, race conditions, integer issues, crypto, injection, info disclosure, DoS, and deserialization
-
False Positive Patterns — 13-item checklist and red flags for common false positive patterns
-
Evidence Templates — Documentation templates for data flow, mathematical proofs, attacker control, and devil's advocate reviews
Weekly Installs317Repositorytrailofbits/skillsGitHub Stars3.7KFirst SeenMar 3, 2026Security AuditsGen Agent Trust HubPassSocketPassSnykPassInstalled oncodex280claude-code279cursor279opencode253gemini-cli252github-copilot251
forumユーザーレビュー (0)
レビューを書く
レビューなし
統計データ
ユーザー評価
この Skill を評価