This skill contains shell command directives that may execute system commands. Review the source carefully before installing.
Comprehensive techniques for acquiring, analyzing, and extracting artifacts from memory dumps for incident response and malware analysis.
AI-powered evaluation of trust, security posture, quality signals, and fit for your use case. Grounded in the skill's actual data.
Detected signals: shell mutation commands, missing license.
• Modifies the shell environment or filesystem. This is unusual for most skills — review before installing.
• No license declared. Usage rights are ambiguous — contact the skill author before using commercially.
Compare this skill side-by-side with an alternative to find the best fit.
Compare with another skill →