Babysitter Static Analysis Tools Skill

Integration with security-focused static analysis tools

install
source · Clone the upstream repo
git clone https://github.com/a5c-ai/babysitter
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/a5c-ai/babysitter "$T" && mkdir -p ~/.claude/skills && cp -r "$T/library/specializations/security-research/skills/static-analysis-tools" ~/.claude/skills/a5c-ai-babysitter-static-analysis-tools-skill && rm -rf "$T"
manifest: library/specializations/security-research/skills/static-analysis-tools/SKILL.md
source content

Static Analysis Tools Skill

Overview

This skill provides integration with security-focused static analysis tools for comprehensive code security analysis.

Capabilities

  • Execute Semgrep rules and custom patterns
  • Run CodeQL queries for vulnerability detection
  • Execute Bandit (Python), Brakeman (Ruby), etc.
  • Parse and interpret static analysis results
  • Generate custom detection rules
  • Aggregate findings across tools
  • Map findings to CWE/CVE identifiers
  • Support SAST pipeline integration

Target Processes

  • static-code-analysis.js
  • variant-analysis.js
  • web-app-vuln-research.js
  • api-security-research.js

Dependencies

  • Semgrep CLI
  • CodeQL CLI and databases
  • Language-specific analyzers:
    • Bandit (Python)
    • Brakeman (Ruby)
    • gosec (Go)
    • SpotBugs (Java)
  • Python for result aggregation

Usage Context

This skill is essential for:

  • Security code review automation
  • Vulnerability pattern detection
  • Custom security rule development
  • CI/CD security gate integration
  • Variant analysis across codebases

Integration Notes

  • Supports multiple output formats (SARIF, JSON, custom)
  • Can run incrementally on changed files
  • Integrates with IDE and CI/CD workflows
  • Custom rules can be version controlled
  • Results can be deduplicated and triaged