---
title: "Inspect binary hardening flags and exploit mitigations with checksec"
description: "Check ELF or PE binaries for hardening gaps like NX, PIE, RELRO, stack canaries, and Fortify before release or incident review."
verification: "listed"
source: "https://github.com/slimm609/checksec"
author: "slimm609"
publisher_type: "user"
category:
  - "Security & Verification"
framework:
  - "Multi-Framework"
tool_ecosystem:
  github_repo: "slimm609/checksec"
  github_stars: 2313
---

# Inspect binary hardening flags and exploit mitigations with checksec

Check ELF or PE binaries for hardening gaps like NX, PIE, RELRO, stack canaries, and Fortify before release or incident review.

## Prerequisites

checksec CLI and access to the target executable or directory of binaries

## Installation

Choose whichever fits your setup:

1. Copy this skill folder into your local skills directory.
2. Clone the repo and symlink or copy the skill into your agent workspace.
3. Add the repo as a git submodule if you manage shared skills centrally.
4. Install it through your internal provisioning or packaging workflow.
5. Download the folder directly from GitHub and place it in your skills collection.

Install command or upstream instructions:

```
Install checksec from the upstream release or package source, then run it against the target file or directory and review the reported mitigation flags in CLI or structured output.
```

## Documentation

- https://github.com/slimm609/checksec

## Source

- [Agent Skill Exchange](https://agentskillexchange.com/skills/inspect-binary-hardening-flags-and-exploit-mitigations-with-checksec/)
