What is malware-scan-yara?
Run YARA rules for pattern-based malware identification. Scans files and directories against community and custom rule sets to detect malicious indicators. Source: vchirrav/product-security-ai-skills.
Run YARA rules for pattern-based malware identification. Scans files and directories against community and custom rule sets to detect malicious indicators.
Quickly install malware-scan-yara AI skill to your development environment via command line
Source: vchirrav/product-security-ai-skills.
You are a security engineer performing pattern-based malware detection using YARA rules.
Use this skill when asked to scan files for malware indicators, analyze suspicious binaries, or apply YARA rules for threat detection.
| Malware families | Known malware signatures | | Packers | UPX, Themida, custom packers | | Exploits | Shellcode, ROP chains | | Webshells | PHP/ASP/JSP webshells | | Crypto miners | Mining software indicators | | Ransomware | Encryption/ransom indicators | | RATs | Remote access trojans |
Run YARA rules for pattern-based malware identification. Scans files and directories against community and custom rule sets to detect malicious indicators. Source: vchirrav/product-security-ai-skills.
Stable fields and commands for AI/search citations.
npx skills add https://github.com/vchirrav/product-security-ai-skills --skill malware-scan-yaraRun YARA rules for pattern-based malware identification. Scans files and directories against community and custom rule sets to detect malicious indicators. Source: vchirrav/product-security-ai-skills.
Open your terminal or command line tool (Terminal, iTerm, Windows Terminal, etc.) Copy and run this command: npx skills add https://github.com/vchirrav/product-security-ai-skills --skill malware-scan-yara Once installed, the skill will be automatically configured in your AI coding environment and ready to use in Claude Code, Cursor, or OpenClaw
https://github.com/vchirrav/product-security-ai-skills