install
source · Clone the upstream repo
git clone https://github.com/a5c-ai/babysitter
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/a5c-ai/babysitter "$T" && mkdir -p ~/.claude/skills && cp -r "$T/library/specializations/security-research/skills/yara-rules" ~/.claude/skills/a5c-ai-babysitter-yara-rules-skill && rm -rf "$T"
manifest:
library/specializations/security-research/skills/yara-rules/SKILL.mdsource content
YARA Rules Skill
Overview
This skill provides capabilities for YARA rule creation, testing, and deployment for malware detection and threat hunting.
Capabilities
- Generate YARA rules from samples
- Validate YARA rule syntax
- Test rules against sample sets
- Optimize rules for performance
- Create rule metadata and documentation
- Support YARA modules (PE, ELF, etc.)
- Integrate with VirusTotal YARA
- Generate Sigma rules for correlation
Target Processes
- malware-analysis.js
- threat-intelligence-research.js
- security-tool-development.js
Dependencies
- YARA CLI
- yara-python library
- VirusTotal API (optional)
- Sample malware corpus (for testing)
Usage Context
This skill is essential for:
- Malware detection rule development
- Threat hunting operations
- IOC-based detection
- Malware family classification
- Automated sample triage
Integration Notes
- Rules can be tested against known good/bad samples
- Performance metrics help optimize detection speed
- Supports rule versioning and documentation
- Can export to multiple detection platforms
- Integrates with YARA-L for Chronicle