{ "$schema": "internal://schemas/plugin.lock.v1.json", "pluginId": "gh:743175724/agents-project:plugins/reverse-engineering", "normalized": { "repo": null, "ref": "refs/tags/v20251128.0", "commit": "2d9fd5adc7fa5af526c7ba09fb6b3ac077c3fddd", "treeHash": "2ed9bdf0fbdce68def13e2f70796a100258999a3e8a76fed322f42ba5a1cbc3d", "generatedAt": "2025-11-28T10:24:43.496774Z", "toolVersion": "publish_plugins.py@0.2.0" }, "origin": { "remote": "git@github.com:zhongweili/42plugin-data.git", "branch": "master", "commit": "aa1497ed0949fd50e99e70d6324a29c5b34f9390", "repoRoot": "/Users/zhongweili/projects/openmind/42plugin-data" }, "manifest": { "name": "reverse-engineering", "description": "逆向工程与二进制分析 - IDA Pro/Ghidra专家", "version": "1.0.0" }, "content": { "files": [ { "path": "README.md", "sha256": "42f5382ed930d7cc75338b944d98e5805515351c97324ec0a8809f0c43381d20" }, { "path": "plugins/reverse-engineering/agents/reverse-engineer.md", "sha256": "73e695c82408ea77f3ccef66e2006d5d2d3ccd98939b53a6ca1a714c710e199f" }, { "path": "plugins/reverse-engineering/commands/analyze-binary.md", "sha256": "026d32d8288d45cad9f7eac2e4eff494214c9c6ec79dd96fc701fc1959d28edb" }, { "path": "plugins/reverse-engineering/skills/ida-pro-techniques.md", "sha256": "31b453ed7708bb3c0ac33612c72b9162f7ec0a6a5221484135e18ea0ad042b7f" }, { "path": ".claude-plugin/plugin.json", "sha256": "a68e15aeecde10a8353fda2995b2714ec2fc72eb3055fb1a7b619016601b48e3" } ], "dirSha256": "2ed9bdf0fbdce68def13e2f70796a100258999a3e8a76fed322f42ba5a1cbc3d" }, "security": { "scannedAt": null, "scannerVersion": null, "flags": [] } }