·chipsec

Static analysis of UEFI/BIOS firmware dumps using Intel's chipsec framework. Decode firmware structure, detect known malware and rootkits (LoJax, ThinkPwn, HackingTeam, MosaicRegressor), generate EFI executable inventories with hashes, extract NVRAM variables, and parse SPI flash descriptors. Use when analyzing firmware .bin/.rom/.fd/.cap files offline without requiring hardware access.

5Installs·0Trend·@brownfinesecurity

Installation

$npx skills add https://github.com/brownfinesecurity/iothackbot --skill chipsec

SKILL.md

You are helping the user perform static security analysis of UEFI/BIOS firmware dumps using Intel's chipsec framework. This skill focuses exclusively on offline analysis capabilities that do not require kernel driver access or root privileges.

Chipsec is Intel's Platform Security Assessment Framework. For static analysis of firmware dumps, it provides:

Scan firmware for known threats including UEFI rootkits and SMM vulnerabilities:

Static analysis of UEFI/BIOS firmware dumps using Intel's chipsec framework. Decode firmware structure, detect known malware and rootkits (LoJax, ThinkPwn, HackingTeam, MosaicRegressor), generate EFI executable inventories with hashes, extract NVRAM variables, and parse SPI flash descriptors. Use when analyzing firmware .bin/.rom/.fd/.cap files offline without requiring hardware access. Source: brownfinesecurity/iothackbot.

View raw

Facts (cite-ready)

Stable fields and commands for AI/search citations.

Install command
npx skills add https://github.com/brownfinesecurity/iothackbot --skill chipsec
Category
{}Data Analysis
Verified
First Seen
2026-02-01
Updated
2026-02-18

Quick answers

What is chipsec?

Static analysis of UEFI/BIOS firmware dumps using Intel's chipsec framework. Decode firmware structure, detect known malware and rootkits (LoJax, ThinkPwn, HackingTeam, MosaicRegressor), generate EFI executable inventories with hashes, extract NVRAM variables, and parse SPI flash descriptors. Use when analyzing firmware .bin/.rom/.fd/.cap files offline without requiring hardware access. Source: brownfinesecurity/iothackbot.

How do I install chipsec?

Open your terminal or command line tool (Terminal, iTerm, Windows Terminal, etc.) Copy and run this command: npx skills add https://github.com/brownfinesecurity/iothackbot --skill chipsec Once installed, the skill will be automatically configured in your AI coding environment and ready to use in Claude Code or Cursor

Where is the source repository?

https://github.com/brownfinesecurity/iothackbot

Details

Category
{}Data Analysis
Source
skills.sh
First Seen
2026-02-01