Babysitter Static Analysis Tools Skill
Integration with security-focused static analysis tools
install
source · Clone the upstream repo
git clone https://github.com/a5c-ai/babysitter
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/a5c-ai/babysitter "$T" && mkdir -p ~/.claude/skills && cp -r "$T/library/specializations/security-research/skills/static-analysis-tools" ~/.claude/skills/a5c-ai-babysitter-static-analysis-tools-skill && rm -rf "$T"
manifest:
library/specializations/security-research/skills/static-analysis-tools/SKILL.mdsource content
Static Analysis Tools Skill
Overview
This skill provides integration with security-focused static analysis tools for comprehensive code security analysis.
Capabilities
- Execute Semgrep rules and custom patterns
- Run CodeQL queries for vulnerability detection
- Execute Bandit (Python), Brakeman (Ruby), etc.
- Parse and interpret static analysis results
- Generate custom detection rules
- Aggregate findings across tools
- Map findings to CWE/CVE identifiers
- Support SAST pipeline integration
Target Processes
- static-code-analysis.js
- variant-analysis.js
- web-app-vuln-research.js
- api-security-research.js
Dependencies
- Semgrep CLI
- CodeQL CLI and databases
- Language-specific analyzers:
- Bandit (Python)
- Brakeman (Ruby)
- gosec (Go)
- SpotBugs (Java)
- Python for result aggregation
Usage Context
This skill is essential for:
- Security code review automation
- Vulnerability pattern detection
- Custom security rule development
- CI/CD security gate integration
- Variant analysis across codebases
Integration Notes
- Supports multiple output formats (SARIF, JSON, custom)
- Can run incrementally on changed files
- Integrates with IDE and CI/CD workflows
- Custom rules can be version controlled
- Results can be deduplicated and triaged