From ec0f6700f8b041246b36337329e9907d94372a2c Mon Sep 17 00:00:00 2001 From: Simone Avogadro Date: Mon, 2 Mar 2026 11:30:57 +0100 Subject: [PATCH] Improve plugin discoverability and metadata completeness - Add keywords, skills and commands paths to plugin.json - Add argument-hint to decompile command for better UX - Add description to SKILL.md frontmatter for skill auto-matching Co-Authored-By: Claude Opus 4.6 --- .../android-reverse-engineering/.claude-plugin/plugin.json | 5 ++++- plugins/android-reverse-engineering/commands/decompile.md | 1 + .../skills/android-reverse-engineering/SKILL.md | 1 + 3 files changed, 6 insertions(+), 1 deletion(-) diff --git a/plugins/android-reverse-engineering/.claude-plugin/plugin.json b/plugins/android-reverse-engineering/.claude-plugin/plugin.json index ac96b35..be386ee 100644 --- a/plugins/android-reverse-engineering/.claude-plugin/plugin.json +++ b/plugins/android-reverse-engineering/.claude-plugin/plugin.json @@ -6,5 +6,8 @@ "name": "Simone Avogadro" }, "repository": "https://github.com/SimoneAvogadro/android-reverse-engineering-skill", - "license": "Apache-2.0" + "license": "Apache-2.0", + "keywords": ["android", "reverse-engineering", "apk", "jadx", "decompile", "api-extraction"], + "skills": "./skills/", + "commands": "./commands/" } diff --git a/plugins/android-reverse-engineering/commands/decompile.md b/plugins/android-reverse-engineering/commands/decompile.md index a51cf40..2489b82 100644 --- a/plugins/android-reverse-engineering/commands/decompile.md +++ b/plugins/android-reverse-engineering/commands/decompile.md @@ -2,6 +2,7 @@ allowed-tools: Bash, Read, Glob, Grep, Write, Edit description: Decompile an Android APK/XAPK/JAR/AAR and analyze its structure user-invocable: true +argument-hint: argument: path to APK, XAPK, JAR, or AAR file (optional) --- diff --git a/plugins/android-reverse-engineering/skills/android-reverse-engineering/SKILL.md b/plugins/android-reverse-engineering/skills/android-reverse-engineering/SKILL.md index 1c4ce95..0979ffb 100644 --- a/plugins/android-reverse-engineering/skills/android-reverse-engineering/SKILL.md +++ b/plugins/android-reverse-engineering/skills/android-reverse-engineering/SKILL.md @@ -1,4 +1,5 @@ --- +description: Decompile Android APK, XAPK, JAR, and AAR files using jadx or Fernflower/Vineflower. Reverse engineer Android apps, extract HTTP API endpoints (Retrofit, OkHttp, Volley), and trace call flows from UI to network layer. Use when the user wants to decompile, analyze, or reverse engineer Android packages, find API endpoints, or follow call flows. trigger: decompile APK|decompile XAPK|reverse engineer Android|extract API|analyze Android|jadx|fernflower|vineflower|follow call flow|decompile JAR|decompile AAR|Android reverse engineering|find API endpoints ---