Overview
This page showcases real-world security vulnerabilities and bugs discovered using skills from the Trail of Bits Skills Marketplace.Found a bug using Trail of Bits Skills? Let us know!
Recognition
When reporting bugs you’ve found, feel free to mention:Found using Trail of Bits SkillsThis helps spread awareness of AI-assisted security analysis tools and techniques.
Verified Findings
| Skill | Bug | Description |
|---|---|---|
| constant-time-analysis | Timing side-channel in ML-DSA signing | Variable-time division operation in ML-DSA (FIPS 204) digital signature implementation leaked secret key information through execution timing. |
Why This Matters
Each entry in the trophy case represents:- Real impact: Actual vulnerabilities in production or widely-used code
- AI assistance: Bugs found with help from Claude Code skills
- Validation: Skills that demonstrably improve security analysis
Contributing Your Findings
Found a bug using Trail of Bits Skills? Here’s how to add it to the trophy case:Document the finding
Prepare:
- Link to the bug report, pull request, or CVE
- Which skill helped you find it
- Brief description of the vulnerability
Submit via GitHub issue
Create a new trophy case issue with your finding.
Skill Effectiveness
constant-time-analysis
Focus: Timing side-channel vulnerabilities in cryptographic code Verified findings: 1+ Impact areas:- Post-quantum cryptography implementations (ML-DSA/Dilithium)
- Digital signature schemes
- Secret-dependent timing leaks
Types of Bugs We Track
We’re interested in documenting:Security Vulnerabilities
- Memory safety issues
- Timing side-channels
- Cryptographic weaknesses
- Authentication bypasses
- Input validation failures
- Injection vulnerabilities
Correctness Issues
- Spec compliance violations
- Logic errors
- Edge case handling
- Resource leaks
Code Quality
- Performance issues
- Anti-patterns
- Maintainability problems
- Test coverage gaps
Impact Metrics
This section will grow as more findings are reported. Each skill’s effectiveness will be tracked and documented.
- Total verified bugs: 1
- Skills with findings: 1
- Projects impacted: 1
How Skills Find Bugs
Different skills use different approaches:Static Analysis
Skills likeconstant-time-analysis and static-analysis detect patterns in source code:
Workflow Enforcement
Skills likefp-check and differential-review enforce rigorous review processes:
Pattern Recognition
Skills likevariant-analysis and insecure-defaults find similar issues across codebases:
Research Applications
These findings also demonstrate:- AI-assisted security analysis - How LLMs can augment human security researchers
- Knowledge transfer - Encoding expert knowledge in reusable skills
- Systematic coverage - Skills ensure comprehensive analysis
Future Growth
As the marketplace grows, we expect to see:- More skills finding bugs in their domains
- Cross-skill collaboration (multiple skills on one finding)
- Emerging patterns in what AI finds vs. what humans find
- Better understanding of skill effectiveness
Get Involved
Help grow the trophy case:Report a Finding
Share bugs you’ve found
Create a Skill
Build skills for your domain
Browse Skills
Find skills to use
Contribute
Improve existing skills
Acknowledgments
Thank you to all contributors who:- Create and maintain skills
- Report findings to the trophy case
- Fix bugs discovered by these tools
- Share knowledge and improve security
- Safer software for users
- Validation of AI-assisted analysis
- Knowledge encoded for future use
- Community collaboration at work