curl -fsSL https://raw.githubusercontent.com/forefy/.context/main/install.sh | bashThe installer will prompt you to select your platform and automatically configure everything.
Security audit instructions for AI agents. Turn GitHub Copilot, Claude Code, or any coding agent into a specialized security auditor.
Skills are auto-installed to .claude/skills/ and referenced by name:
@smart-contract-security-audit Review this Solidity projectSkills use the Agent Skills open standard.
Skills are auto-installed to .claude/skills/ and referenced by name:
@smart-contract-security-audit
Custom slash commands are auto-installed to .github/prompts/:
/generate_audit_report_generic
Skills are auto-installed to .claude/skills/ and referenced by name:
@smart-contract-security-auditSkills follow the Agent Skills open standard - compatible with both GitHub Copilot and Claude Code.
Comprehensive Audits:
smart-contract-security-audit- Full smart contract audit framework with multi-expert analysis for Solidity, Anchor, and Vyper. Includes language-specific checks and vulnerability pattern references.infrastructure-security-audit- Infrastructure security audit framework for IaC, Docker, Kubernetes, and cloud configurations.
Each skill is a directory with:
SKILL.md- Main framework and instructions- Language-specific reference files (loaded as needed for token efficiency)
reference/- Vulnerability patterns organized by language
Custom slash commands for Copilot (auto-installed to .github/prompts/):
/generate_audit_report_generic- Create comprehensive audit docs/consolidate_audit_reports- Merge multiple audit runs/triage_audit_findings_generic- Validate and filter findings
Vulnerability patterns are organized within each skill's reference/ directory:
smart-contract-security-audit/reference/solidity/- Solidity vulnerability patterns (fv-sol-X)smart-contract-security-audit/reference/anchor/- Anchor/Solana patterns (fv-anc-X)smart-contract-security-audit/reference/vyper/- Vyper patterns (fv-vyp-X)
Skills automatically reference these patterns during audits using progressive disclosure for token efficiency.
Audits generate numbered folders in .context/outputs/:
audit-report.md- Security findingsaudit-context.md- Scope and assumptionsaudit-debug.md- Technical analysis log


