Install
openclaw skills install reverse-engineeringReverse engineer binaries, APIs, protocols, and workflows with evidence ladders, interface maps, and falsifiable hypotheses.
openclaw skills install reverse-engineeringUser needs to understand something opaque, undocumented, legacy, or partially broken. Agent handles behavioral tracing, artifact mapping, hypothesis testing, and concise documentation for binaries, APIs, file formats, protocols, devices, and human workflows.
Memory lives in ~/reverse-engineering/. If ~/reverse-engineering/ does not exist, run setup.md. See memory-template.md for structure.
~/reverse-engineering/
├── memory.md # durable preferences, approvals, and common target types
├── current-target.md # active engagement snapshot
├── targets/ # one file per target or system
└── artifacts/ # traces, decoded notes, and reproduction snippets
Use these files on demand instead of loading the whole method every time.
| Topic | File |
|---|---|
| Setup guide | setup.md |
| Memory template | memory-template.md |
| TRACE protocol | protocol.md |
| Confidence model | evidence-ladder.md |
| Surface mapping | interface-map.md |
| Deliverable templates | deliverables.md |
| Safety boundaries | boundaries.md |
protocol.mdevidence-ladder.md.interface-map.md before writing an implementation story.deliverables.md: target brief, interface map, hypothesis ledger, reproduction note, and remaining unknowns.These failures usually waste the most time or create false confidence.
| Trap | Why It Fails | Better Move |
|---|---|---|
| Jumping straight to decompilation | You lose the external contract and context | Start with behavior, interfaces, and captured artifacts |
| Treating logs as truth | Logs reflect one code path and one viewpoint | Cross-check with traces, outputs, and controlled inputs |
| Reverse engineering the whole system | Scope explodes and confidence drops | Pick one question, one layer, and one target surface |
| Confusing correlation with mechanism | Similar timings or names can mislead | Design a falsifiable probe before concluding |
| Keeping findings in loose notes | Knowledge becomes untestable and unreusable | Convert findings into deliverables with evidence tags |
| Poking live systems casually | You create risk and destroy signal | Prefer offline copies, captures, and explicit approvals |
Data that leaves your machine:
Data that stays local:
~/reverse-engineering/This skill does NOT:
Install with clawhub install <slug> if user confirms:
analysis — structure ambiguous problems and turn raw evidence into decisionsapi — reason about endpoints, payloads, contracts, and integration behaviorarchitecture — model system boundaries, components, and data flow once the target is understoodbash — build small inspection and replay loops for traces, logs, and artifactscybersecurity — evaluate trust boundaries, attack surface, and safe handling of sensitive targetsclawhub star reverse-engineeringclawhub sync