Static analysis of UEFI/BIOS firmware dumps using Intel's chipsec framework. Decode firmware structure, detect known malware and rootkits (LoJax, ThinkPwn, HackingTeam, MosaicRegressor), generate EFI executable inventories with hashes, extract NVRAM variables, and parse SPI flash descriptors. Use when analyzing firmware .bin/.rom/.fd/.cap files offline without requiring hardware access.
7.3
Rating
0
Installs
Security
Category
Excellent skill for UEFI firmware security analysis. The description is comprehensive and perfectly guides CLI invocation with clear use cases. Task knowledge is outstanding with detailed commands, workflows, threat detection details, and troubleshooting guidance. Structure is very clear with well-organized sections, though at ~500 lines it could benefit from splitting advanced workflows into a separate file. Novelty is strong - firmware analysis requires specialized tooling knowledge that would consume significant tokens for a CLI agent to discover independently, and the skill provides valuable detection of specific threats (LoJax, ThinkPwn, etc.) with actionable workflows. Minor deduction on structure for length and on novelty as the underlying tool (chipsec) does much of the heavy lifting, though the skill adds substantial value through curated workflows and integration guidance.
Loading SKILL.md…