{"skill":{"slug":"mobile-master","displayName":"mobile-master","summary":"移动安全SKILL 协助逆向","tags":{"latest":"1.0.0"},"stats":{"comments":0,"downloads":97,"installsAllTime":0,"installsCurrent":0,"stars":0,"versions":1},"createdAt":1774424744652,"updatedAt":1774424766945},"latestVersion":{"version":"1.0.0","createdAt":1774424744652,"changelog":"Initial release of mobile-master skill for Android reverse engineering and mobile security tasks.\n\n- Added tools and descriptions for dexdump, spawn/attach modes, Frida detection bypass, unpacking, jadx-gui, apktool, APK resigning, manifest extraction, protection detection, and install restriction bypass.\n- Provided support commands including starting Frida server, extracting APK, spawning/attaching apps, dumping Dex files, using jadx-gui, and extracting AndroidManifest.xml for permission review.\n- Documentation updated with command table and usage descriptions.","license":"MIT-0"},"metadata":null,"owner":{"handle":"nop3z","userId":"s17a0074mm21pzspagfr05hyts83kec6","displayName":"Nop","image":"https://avatars.githubusercontent.com/u/147847358?v=4"},"moderation":{"isSuspicious":true,"isMalwareBlocked":false,"verdict":"suspicious","reasonCodes":["suspicious.llm_suspicious"],"summary":"Detected: suspicious.llm_suspicious","engineVersion":"v2.2.0","updatedAt":1774424766945}}