Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Automatically generate professional CTF writeups from solving sessions with flag detection, challenge categorization, and proper markdown formatting
Automatically generate professional CTF writeups from solving sessions with flag detection, challenge categorization, and proper markdown formatting
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
This skill helps CTF players, security researchers, and cybersecurity educators automatically generate professional writeups from their solving sessions. It intelligently detects flag formats, categorizes challenges, structures the writeup with proper headings, and includes code blocks with syntax highlighting. Perfect for: Creating platform-specific writeups (HackTheBox, TryHackMe, OffSec, etc.) Documenting Jeopardy-style CTF solutions Generating educational content for training materials Building a portfolio of security research
Use this skill when the user: Says "generate a CTF writeup" Mentions "document my CTF solution" Asks to "create a writeup for [challenge name]" References completing a CTF challenge and needs documentation Wants to format their solving process professionally Needs to extract and format flags from their notes
Automatically detects and validates common CTF flag formats: CTF{...}, FLAG{...}, flag{...} Platform-specific: HTB{...}, THM{...}, SHAASTRA{...}, picoCTF{...} Custom regex patterns for competition-specific formats Case-sensitive validation support
Automatically categorizes based on keywords and tools used: Web Exploitation: SQL injection, XSS, CSRF, authentication bypass Binary Exploitation: Buffer overflow, ROP, format strings, heap exploitation Reverse Engineering: Binary analysis, decompilation, obfuscation Cryptography: Classical ciphers, modern crypto, hash cracking Forensics: Steganography, memory forensics, network analysis, disk imaging OSINT: Information gathering, social media analysis PWN: Exploitation, shellcode, privilege escalation Miscellaneous: Mixed or unique challenge types
Generates properly formatted markdown writeups with: Challenge metadata (name, category, difficulty, points) Executive summary Reconnaissance findings Step-by-step solution with code blocks Tools used section Flag submission Key learnings and takeaways Optional: Additional resources and references
Proper syntax highlighting for: Python, Bash, JavaScript, C/C++ Assembly (x86, ARM) SQL queries Command-line tools output Network packet analysis
When a user requests a CTF writeup, follow this workflow: Gather Information Ask the user for: Challenge name Platform/CTF name (e.g., "HackTheBox", "Shaastra CTF") Category (or detect from description) Difficulty level (Easy/Medium/Hard or points value) Flag format if non-standard Their solving process/notes Process the Content Extract technical steps from their description Identify tools and commands used Detect flag format and validate Categorize the challenge Structure the flow logically Generate the Writeup Create a markdown document with this structure: # [Challenge Name] - [Platform] CTF Writeup **Author**: [Author name or handle] **Date**: [Current date] **Category**: [Category] **Difficulty**: [Difficulty] **Points**: [Points if applicable] ## Summary [2-3 sentence overview of the challenge and solution approach] ## Challenge Description [Original challenge description if provided] ## Reconnaissance [Initial enumeration and information gathering] ## Solution ### Step 1: [Phase name] [Detailed explanation with commands/code] ```bash # Commands used Step 2: [Next phase] [Continue with logical progression] Tools Used Tool 1: Purpose Tool 2: Purpose Flag FLAG{...} Key Takeaways Learning point 1 Learning point 2 References [Relevant links] Validate and Enhance Check flag format matches the platform Ensure code blocks have proper syntax highlighting Add explanatory comments to complex commands Include alternative approaches if mentioned Save the Writeup Save the generated writeup to a markdown file named: [platform]_[challenge-name]_writeup.md
[Continue with logical progression]
Tool 1: Purpose Tool 2: Purpose
FLAG{...}
Learning point 1 Learning point 2
[Relevant links]
User: "I just solved the 'Binary Bash' challenge from Shaastra CTF. It was a buffer overflow where I had to overwrite the return address. The flag was Shaastra{buff3r_0v3rfl0w_m4st3r}. Can you generate a writeup?" Agent Response: Asks for additional details (tools used, exact exploit steps) Generates a professional writeup with: Proper challenge metadata Binary exploitation category Step-by-step buffer overflow explanation Code blocks with assembly/C code GDB commands used Flag in correct format Learning points about memory safety
Include machine IP, OS, and difficulty rating Add user/root flag sections Include attack path diagram if complex
Focus on enumeration methodology Document privilege escalation chains Include proof screenshots references
List point values and solve times Include team strategy if relevant Categorize by challenge type
Reference other skills for specific tasks: ghidra-skill for reverse engineering analysis burpsuite-skill for web exploitation volatility-skill for memory forensics
Support for different writeup styles: Academic: Detailed with theoretical background Speedrun: Concise with just essential steps Tutorial: Beginner-friendly with extra explanations Portfolio: Professional format for job applications
Standard Markdown (.md) PDF via pandoc HTML with custom CSS Platform-specific formats (HTB Academy, Medium, dev.to)
Never include actual credentials or sensitive API keys Sanitize paths that might reveal system information Respect competition rules (don't publish during active CTF) Add spoiler warnings for recent challenges Verify flag sharing is allowed by platform
Users can customize via environment variables: # Set default author name export CTF_AUTHOR="akm626" # Set default CTF platform export CTF_PLATFORM="HackTheBox" # Set preferred writeup style export CTF_WRITEUP_STYLE="tutorial" # Enable automatic screenshot embedding export CTF_AUTO_SCREENSHOTS=true
Basic markdown processor (built-in) Optional: pandoc (for PDF export) Optional: pygments (for enhanced syntax highlighting)
Provide detailed solving notes - the more context, the better Include command outputs when relevant Mention dead-ends and why they failed (valuable learning) Reference CVEs and tool documentation Add your unique insights and methodology Keep flag formats consistent with the platform
For a web exploitation challenge: # SQL Injection Master - Shaastra CTF 2026 **Author**: akm626 **Date**: February 08, 2026 **Category**: Web Exploitation **Difficulty**: Medium **Points**: 300 ## Summary This challenge involved exploiting a SQL injection vulnerability in a login form to extract database contents and retrieve the flag. The application used client-side filtering which was easily bypassed. ## Challenge Description [Original description...] ## Reconnaissance Initial enumeration revealed a PHP-based login portal running on Apache. Basic directory fuzzing found: ```bash ffuf -w common.txt -u http://target.com/FUZZ admin/ backup/ config/
Testing the login form with basic SQL injection payloads: ' OR '1'='1' -- admin' -- ' UNION SELECT NULL--
Used SQLMap to automate extraction: sqlmap -u "http://target.com/login.php" --data="username=admin&password=test" \ --technique=U --dump --batch [Continue with detailed steps...]
SHAASTRA{sql_inj3ct10n_pr0}
Always test for SQL injection on input fields Client-side validation is not security Parameterized queries prevent SQL injection
Burp Suite: Request interception SQLMap: Automated SQL injection ffuf: Directory fuzzing
Writing, remixing, publishing, visual generation, and marketing content production.
Largest current source with strong distribution and engagement signals.