Tracks untrusted input propagation from sources to sinks in binary code to identify injection vulnerabilities. Use when analyzing data flow, tracing user input to dangerous functions, or detecting command/SQL injection.
1.3
Rating
0
Installs
Security
Category
No summary available.
Loading SKILL.md…