AUTHORIZED USE ONLY: This skill contains dual-use security techniques. Before proceeding with any bypass or analysis: Verify authorization: Confirm you have explicit written permission from the software owner, or are operating within a legitimate security context (CTF, authorized pentest, malware analysis, security research)
Document scope: Ensure your activities fall within the defined scope of your authorization Legal compliance: Understand that unauthorized bypassing of software protection may violate laws (CFAA, DMCA anti-circumvention, etc.)
Legitimate use cases: Malware analysis, authorized penetration testing, CTF competitions, academic security research, analyzing software you own/have rights to
Понимать методы защиты от реверсирования, обфускации и защиты, встречающиеся во время анализа программного обеспечения. Используйте при анализе защищенных двоичных файлов, обходе антиотладки для авторизованного анализа или при понимании механизмов защиты программного обеспечения. Источник: sickn33/antigravity-awesome-skills.