Claude-skill-registry detecting-signed-unsigned-conversion
Detects unsafe signed/unsigned integer conversions that can lead to integer overflow and security check bypasses. Use when analyzing integer operations, comparisons, or investigating conversion-related vulnerabilities.
install
source · Clone the upstream repo
git clone https://github.com/majiayu000/claude-skill-registry
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/detecting-signed-unsigned-conversion" ~/.claude/skills/majiayu000-claude-skill-registry-detecting-signed-unsigned-conversion && rm -rf "$T"
manifest:
skills/data/detecting-signed-unsigned-conversion/SKILL.mdsource content
Signed/Unsigned Conversion Detection
Detection Workflow
- Identify conversions: Find all signed/unsigned conversions, locate implicit conversions, identify comparison operations, map arithmetic operations
- Analyze conversion safety: Check for negative values, assess overflow potential, verify conversion correctness, review comparison logic
- Trace value flow: Follow values through conversions, identify impact on operations, assess security implications, verify value constraints
- Assess exploitability: Can attacker trigger negative value? Can conversion bypass security checks? What's the potential impact? Is it exploitable?
Key Patterns
- Comparison errors: comparing signed with unsigned values, negative values treated as large positive, bypassed bounds checks, incorrect loop conditions
- Arithmetic errors: signed to unsigned conversion in arithmetic, integer overflow after conversion, underflow after conversion, unexpected results
- Function parameter issues: passing signed to unsigned parameters, implicit conversions in function calls, missing explicit casting, type mismatch in APIs
- Size calculation issues: signed values used for sizes, negative sizes after conversion, overflow in size calculations, incorrect buffer allocations
Output Format
Report with: id, type, subtype, severity, confidence, location, vulnerability, comparison_operation, signed_variable, unsigned_variable, issue, exploitable, attack_scenario, impact, mitigation.
Severity Guidelines
- HIGH: Conversion bypassing security checks
- MEDIUM: Conversion causing logic errors
- LOW: Minor conversion issues
See Also
- Detailed detection patterns and exploitation scenariospatterns.md
- Example analysis cases and code samplesexamples.md
- CWE references and mitigation strategiesreferences.md