constant-time-analysis

Installation
Summary

Detects timing side-channel vulnerabilities in cryptographic code across 12 languages.

  • Analyzes assembly or bytecode to flag variable-time operations (division, secret-dependent branches, weak RNG, table lookups by secret index) that leak secret data through execution timing
  • Supports C, C++, Go, Rust, Swift, Java, Kotlin, C#, PHP, JavaScript, TypeScript, Python, and Ruby with language-specific analysis guides
  • Offers cross-architecture and optimization-level testing for compiled languages to catch compiler-dependent timing leaks
  • Requires manual data-flow verification for each flagged operation; static analysis flags all potentially dangerous instructions regardless of secret involvement
SKILL.md

Constant-Time Analysis

Analyze cryptographic code to detect operations that leak secret data through execution timing variations.

When to Use

User writing crypto code? ──yes──> Use this skill
         no
         v
User asking about timing attacks? ──yes──> Use this skill
         no
         v
Code handles secret keys/tokens? ──yes──> Use this skill
Related skills
Installs
2.2K
GitHub Stars
5.1K
First Seen
Jan 19, 2026