detecting
Installation
SKILL.md
Detectability Analysis (LINDDUN D1)
Analyze source code for detectability threats where an observer can determine that a user is interacting with a system, that a record exists, or that a specific action was performed -- even without accessing the content itself. Privacy is compromised when the mere existence of an interaction or record reveals sensitive information.
Supported Flags
Read ../../shared/schemas/flags.md for full flag
documentation. This skill supports all cross-cutting flags.
| Flag | Detectability-Specific Behavior |
|---|---|
--scope |
Default changed. Focuses on files containing API handlers, error responses, presence indicators, and encrypted message handling. |
--depth quick |
Grep patterns only: scan for enumeration endpoints, timing differences, and presence indicators. |
--depth standard |
Full code read, analyze response patterns for information leakage through existence proofs. |
--depth deep |
Trace API response behaviors across endpoints. Map enumeration surfaces and timing oracle opportunities. |
Related skills