Claude-skill-registry detecting-arbitrary-write
Detects arbitrary write vulnerabilities by identifying unchecked array indexing and out-of-bounds memory writes. Use when analyzing memory write operations, pointer arithmetic, or investigating code execution vulnerabilities.
install
source · Clone the upstream repo
git clone https://github.com/majiayu000/claude-skill-registry
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/detecting-arbitrary-write" ~/.claude/skills/majiayu000-claude-skill-registry-detecting-arbitrary-write && rm -rf "$T"
manifest:
skills/data/detecting-arbitrary-write/SKILL.mdsource content
Arbitrary Write Detection
Detection Workflow
- Identify write operations: Find all array writes, pointer dereference writes, format string usage with %n, struct member writes
- Trace input sources: Use
to trace input, follow user data to write points, identify attacker-controlled valuesxrefs_to - Check bounds validation: Verify array bounds checks, assess pointer arithmetic safety, check format string validation, review type safety
- Assess exploitability: Can attacker control write address? Can attacker control write value? What can be overwritten? Can code execution be achieved?
Key Patterns
- Unchecked array indexing: array writes with user-controlled indices, pointer arithmetic writes with user input
- Format string writes: user-controlled format strings with %n, memory writes via printf
- Pointer dereference writes: writing through user-controlled pointers, use-after-free writes, vtable corruption
- Struct/class member writes: writing to wrong struct members, type confusion, vtable/function pointer overwrites
Output Format
Report with: id, type, subtype, severity, confidence, location, vulnerability, write operation, array base, index source, value source, bounds check, exploitable, attack scenario, potential targets, mitigation.
Severity Guidelines
- CRITICAL: Arbitrary write enabling code execution
- HIGH: Arbitrary write with significant impact
- MEDIUM: Arbitrary write with limited impact
- LOW: Minor arbitrary write issues
See Also
- Detailed detection patterns and exploitation scenariospatterns.md
- Example analysis cases and code samplesexamples.md
- CWE references and mitigation strategiesreferences.md