[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"extension-plugin-ckorhonen-swe-skills-de":3,"guides-for-ckorhonen-swe-skills":572},{"_creationTime":4,"_id":5,"children":6,"community":397,"display":398,"evaluation":401,"identity":402,"isFallback":405,"parentExtension":401,"providers":406,"relations":411,"repo":412,"tags":570,"workflow":571},1778683790179.7788,"k17d2yq229g61qvea0x8t60w1h86mgr8",[7,45,69,91,112,134,159,182,204,229,251,276,295,313,335,357,378],{"_creationTime":8,"_id":9,"community":10,"display":12,"identity":18,"providers":24,"relations":39,"tags":41,"workflow":42},1778683790179.779,"k179d3pmvdz1pwa0vmmshm136986n06n",{"reviewCount":11},0,{"description":13,"installMethods":14,"name":16,"sourceUrl":17},"Babysits an open pull request end-to-end by polling every minute, triaging new comments and reviews, handling CI failures, iterating on reviewer scores, and stopping only when the PR is ready to merge. Use when a user says `babysit this PR`, `watch this PR until it's merge-ready`, `handle review feedback on my PR`, or `keep iterating on this PR until reviewers are happy`. Do NOT use for a one-shot PR risk review, merged PR production monitoring, or repo-wide CI debugging with no scoped PR.",{"claudeCode":15},"ckorhonen/swe-skills","babysit-pr","https://github.com/ckorhonen/swe-skills",{"basePath":19,"githubOwner":20,"githubRepo":21,"locale":22,"slug":16,"type":23},"skills/babysit-pr","ckorhonen","swe-skills","en","skill",{"evaluate":25,"extract":37},{"promptVersionExtension":26,"promptVersionScoring":27,"score":28,"tags":29,"targetMarket":35,"tier":36},"3.0.0","4.4.0",95,[30,31,32,33,34],"github","pull-request","automation","ci-cd","code-review","global","community",{"commitSha":38},"HEAD",{"parentExtensionId":5,"repoId":40},"kd7b5kvzw3q7dgvym5bdx3m53986mann",[32,33,34,30,31],{"evaluatedAt":43,"extractAt":44,"updatedAt":43},1778683839862,1778683790179,{"_creationTime":46,"_id":47,"community":48,"display":49,"identity":53,"providers":55,"relations":65,"tags":66,"workflow":67},1778683790179.7793,"k17ev60xfqgtzpxcffcecxmfb986mvqp",{"reviewCount":11},{"description":50,"installMethods":51,"name":52,"sourceUrl":17},"Audits a repository's code and docs to find important conventions, workflows, and architectural decisions that are missing from agent-facing guidance, then drafts review-ready updates. Use when a user says `capture repo knowledge`, `document implicit conventions`, `turn repo patterns into agent rules`, or asks what future agents should remember about a codebase. Do NOT use for a generic repo tour, onboarding walkthrough, or architecture summary that does not need reusable guidance updates.",{"claudeCode":15},"capture-knowledge",{"basePath":54,"githubOwner":20,"githubRepo":21,"locale":22,"slug":52,"type":23},"skills/capture-knowledge",{"evaluate":56,"extract":64},{"promptVersionExtension":26,"promptVersionScoring":27,"score":57,"tags":58,"targetMarket":35,"tier":63},96,[59,60,61,62,34],"code-analysis","documentation","knowledge-capture","agent-guidance","verified",{"commitSha":38},{"parentExtensionId":5,"repoId":40},[62,59,34,60,61],{"evaluatedAt":68,"extractAt":44,"updatedAt":68},1778683858983,{"_creationTime":70,"_id":71,"community":72,"display":73,"identity":77,"providers":79,"relations":87,"tags":88,"workflow":89},1778683790179.7795,"k179p550g4rp5bty7e6hmc6vah86mmay",{"reviewCount":11},{"description":74,"installMethods":75,"name":76,"sourceUrl":17},"Plans the narrowest trustworthy validation path for a scoped code change or diff. Use when a user asks what to run before merging, how to validate a specific change, whether the current checks are enough, or wants a bounded command order from narrow to broad. Do NOT use for writing tests, fixing the code change itself, broad QA sweeps, or generic debugging that needs root cause analysis.",{"claudeCode":15},"change-validation-planner",{"basePath":78,"githubOwner":20,"githubRepo":21,"locale":22,"slug":76,"type":23},"skills/change-validation-planner",{"evaluate":80,"extract":86},{"promptVersionExtension":26,"promptVersionScoring":27,"score":28,"tags":81,"targetMarket":35,"tier":63},[34,82,83,84,85],"validation","planning","diff-analysis","testing",{"commitSha":38},{"parentExtensionId":5,"repoId":40},[34,84,83,85,82],{"evaluatedAt":90,"extractAt":44,"updatedAt":90},1778683910267,{"_creationTime":92,"_id":93,"community":94,"display":95,"identity":99,"providers":101,"relations":108,"tags":109,"workflow":110},1778683790179.7798,"k17f3x4qcv0qp3hgnrhtrg6ekn86m901",{"reviewCount":11},{"description":96,"installMethods":97,"name":98,"sourceUrl":17},"Creates or revises `swe:` skills for this repository using a repeatable authoring workflow: define concrete use cases, tune trigger boundaries, apply progressive disclosure, add matching eval assets, and validate the package. Use when adding a new skill, tightening an existing skill that over- or under-triggers, or distilling an external workflow into a repo-ready skill. Do NOT use for generic documentation edits or for executing the workflow the skill would describe.",{"claudeCode":15},"create-skill",{"basePath":100,"githubOwner":20,"githubRepo":21,"locale":22,"slug":98,"type":23},"skills/create-skill",{"evaluate":102,"extract":107},{"promptVersionExtension":26,"promptVersionScoring":27,"score":57,"tags":103,"targetMarket":35,"tier":63},[104,60,32,105,106],"code-generation","developer-tools","workflow-automation",{"commitSha":38},{"parentExtensionId":5,"repoId":40},[32,104,105,60,106],{"evaluatedAt":111,"extractAt":44,"updatedAt":111},1778683928216,{"_creationTime":113,"_id":114,"community":115,"display":116,"identity":120,"providers":122,"relations":130,"tags":131,"workflow":132},1778683790179.78,"k17f0j7tnzpwzycxqa4c9mmzgs86nm1q",{"reviewCount":11},{"description":117,"installMethods":118,"name":119,"sourceUrl":17},"Audits a repository for human-facing or operational documentation that drifted from code, config, interfaces, workflows, or repo structure changes. Use when a user says `check docs drift`, `docs are stale`, `update the runbook after this change`, or `what documentation is missing after this change`. Do NOT use for agent-guidance updates, generic documentation rewrites, or writing docs without evidence that they are stale.",{"claudeCode":15},"docs-drift-audit",{"basePath":121,"githubOwner":20,"githubRepo":21,"locale":22,"slug":119,"type":23},"skills/docs-drift-audit",{"evaluate":123,"extract":129},{"promptVersionExtension":26,"promptVersionScoring":27,"score":124,"tags":125,"targetMarket":35,"tier":63},98,[60,126,127,128],"auditing","code-quality","maintenance",{"commitSha":38},{"parentExtensionId":5,"repoId":40},[126,127,60,128],{"evaluatedAt":133,"extractAt":44,"updatedAt":133},1778683950892,{"_creationTime":135,"_id":136,"community":137,"display":138,"identity":142,"providers":144,"relations":155,"tags":156,"workflow":157},1778683790179.7803,"k179xtrxqhv48c992a5zz18bvx86m89q",{"reviewCount":11},{"description":139,"installMethods":140,"name":141,"sourceUrl":17},"Audits post-incident engineering follow-through after a sev or incident to verify whether the durable follow-up happened: regression tests, monitors, docs, runbooks, ownership updates, tickets, rollback learnings, and remaining backlog. Use when a user asks whether incident follow-up is complete, what still needs to be done after a postmortem, or how to close the engineering loop. Do NOT use for live incident response, root-cause analysis, or a generic bug hunt unrelated to an incident.",{"claudeCode":15},"incident-followup-audit",{"basePath":143,"githubOwner":20,"githubRepo":21,"locale":22,"slug":141,"type":23},"skills/incident-followup-audit",{"evaluate":145,"extract":154},{"promptVersionExtension":26,"promptVersionScoring":27,"score":146,"tags":147,"targetMarket":35,"tier":63},97,[148,149,150,151,152,153],"incident-management","audit","postmortem","engineering-follow-up","devops","reliability",{"commitSha":38},{"parentExtensionId":5,"repoId":40},[149,152,151,148,150,153],{"evaluatedAt":158,"extractAt":44,"updatedAt":158},1778683966277,{"_creationTime":160,"_id":161,"community":162,"display":163,"identity":167,"providers":169,"relations":178,"tags":179,"workflow":180},1778683790179.7805,"k175gdavh4ddb920rs1v4jc92586n0ke",{"reviewCount":11},{"description":164,"installMethods":165,"name":166,"sourceUrl":17},"Initializes an optional repo-local agent collaboration preference file at `.ai/swe.json` by running a short interview or a zero-question quick mode. Use when a user says `initialize agent settings for this repo`, `set up my local agent prefs here`, `run quick init for this project`, or `create .ai/swe.json for how I like to work`. Do NOT use for `npm init`, project scaffolding, dependency installation, or environment bootstrap.",{"claudeCode":15},"init",{"basePath":168,"githubOwner":20,"githubRepo":21,"locale":22,"slug":166,"type":23},"skills/init",{"evaluate":170,"extract":177},{"promptVersionExtension":26,"promptVersionScoring":27,"score":171,"tags":172,"targetMarket":35,"tier":63},100,[173,174,175,176,105],"configuration","preferences","agent","local",{"commitSha":38},{"parentExtensionId":5,"repoId":40},[175,173,105,176,174],{"evaluatedAt":181,"extractAt":44,"updatedAt":181},1778683991127,{"_creationTime":183,"_id":184,"community":185,"display":186,"identity":190,"providers":193,"relations":200,"tags":201,"workflow":202},1778683790179.7808,"k17ccj9dxfngpgb3m9f5bc052h86mzyp",{"reviewCount":11},{"description":187,"installMethods":188,"name":189,"sourceUrl":17},"Reviews recently merged pull requests, confirms whether they reached production, compares pre- and post-deploy signals, and summarizes observable impact. Use when a user says `monitor merged PRs`, `did this deploy hurt prod`, `check production impact of yesterday's merges`, or asks for a post-deploy readout tied to merged GitHub PRs. Do NOT use for a pre-merge code review, incident analysis with no PR scope, or generic dashboard triage disconnected from merged changes.",{"claudeCode":15},"SWE Merged PR Monitoring",{"basePath":191,"githubOwner":20,"githubRepo":21,"locale":22,"slug":192,"type":23},"skills/merged-pr-monitoring","merged-pr-monitoring",{"evaluate":194,"extract":198},{"promptVersionExtension":26,"promptVersionScoring":27,"score":124,"tags":195,"targetMarket":35,"tier":63},[33,196,30,152,197],"monitoring","production-readiness",{"commitSha":38,"license":199},"MIT",{"parentExtensionId":5,"repoId":40},[33,152,30,196,197],{"evaluatedAt":203,"extractAt":44,"updatedAt":203},1778684010557,{"_creationTime":205,"_id":206,"community":207,"display":208,"identity":212,"providers":214,"relations":225,"tags":226,"workflow":227},1778683790179.781,"k170jzhm0mbg7vqxfvyrqb836586mk3p",{"reviewCount":11},{"description":209,"installMethods":210,"name":211,"sourceUrl":17},"Inspects services, jobs, and code paths for missing or weak logs, metrics, traces, alerts, dashboards, or deployment-linked telemetry, then returns a tightly scoped backlog of observability gaps. Use when a user says `find observability gaps`, `audit telemetry coverage`, `what logs or metrics are missing`, `check alerting coverage`, or asks for a recurring telemetry review. Do NOT use for live incident response, root-cause analysis, generic performance tuning, or a broad code review.",{"claudeCode":15},"observability-gap-hunt",{"basePath":213,"githubOwner":20,"githubRepo":21,"locale":22,"slug":211,"type":23},"skills/observability-gap-hunt",{"evaluate":215,"extract":224},{"promptVersionExtension":26,"promptVersionScoring":27,"score":124,"tags":216,"targetMarket":35,"tier":63},[217,218,219,220,221,222,223],"observability","telemetry","code-audit","logs","metrics","traces","alerts",{"commitSha":38},{"parentExtensionId":5,"repoId":40},[223,219,220,221,217,218,222],{"evaluatedAt":228,"extractAt":44,"updatedAt":228},1778684031791,{"_creationTime":230,"_id":231,"community":232,"display":233,"identity":237,"providers":239,"relations":247,"tags":248,"workflow":249},1778683790179.7812,"k175m0j9vtx26072ktcmdrd18586m8m4",{"reviewCount":11},{"description":234,"installMethods":235,"name":236,"sourceUrl":17},"Maps engineering ownership risk in a repository using repo evidence such as git history, churn, bus factor, CODEOWNERS coverage, test density, and orphaned or unclear-owner surfaces. Use when a user says `map ownership risk`, `find bus factor hotspots`, `which files look orphaned`, `high-change low-test areas`, or asks for a recurring maintenance pass that identifies risky surfaces before they become incidents. Do NOT use for org charts, HR ownership assignments, or generic maintainer lists without repo evidence.",{"claudeCode":15},"ownership-risk-map",{"basePath":238,"githubOwner":20,"githubRepo":21,"locale":22,"slug":236,"type":23},"skills/ownership-risk-map",{"evaluate":240,"extract":246},{"promptVersionExtension":26,"promptVersionScoring":27,"score":28,"tags":241,"targetMarket":35,"tier":63},[242,243,244,128,245],"repository","risk-assessment","ownership","git",{"commitSha":38},{"parentExtensionId":5,"repoId":40},[245,128,244,242,243],{"evaluatedAt":250,"extractAt":44,"updatedAt":250},1778684055187,{"_creationTime":252,"_id":253,"community":254,"display":255,"identity":259,"providers":262,"relations":272,"tags":273,"workflow":274},1778683790179.7815,"k17d99vkqqg0g7hcr1a43detvn86mfny",{"reviewCount":11},{"description":256,"installMethods":257,"name":258,"sourceUrl":17},"Hunts for concrete performance bottlenecks in a scoped repository surface using profiler output, benchmarks, query plans, traces, bundle analysis, or repo evidence, then returns the smallest high-value follow-up experiments or fixes. Use when a user says `find performance bottlenecks`, `why is this slow`, `profile this flow`, `hunt hot paths`, or asks for a recurring performance review. Do NOT use for live incident response, generic observability audits, speculative micro-optimization, or broad architecture rewrites with no bottleneck evidence.",{"claudeCode":15},"SWE Performance Hunt",{"basePath":260,"githubOwner":20,"githubRepo":21,"locale":22,"slug":261,"type":23},"skills/performance-hunt","performance-hunt",{"evaluate":263,"extract":271},{"promptVersionExtension":26,"promptVersionScoring":27,"score":264,"tags":265,"targetMarket":35,"tier":63},99,[266,267,268,269,270],"performance","optimization","profiling","benchmarking","debugging",{"commitSha":38,"license":199},{"parentExtensionId":5,"repoId":40},[269,270,267,266,268],{"evaluatedAt":275,"extractAt":44,"updatedAt":275},1778684076907,{"_creationTime":277,"_id":278,"community":279,"display":280,"identity":284,"providers":286,"relations":291,"tags":292,"workflow":293},1778683790179.7817,"k171yjxfdtbbxak49apmnpetp986mbt1",{"reviewCount":11},{"description":281,"installMethods":282,"name":283,"sourceUrl":17},"Reviews open or draft pull requests for engineering risk before merge, focusing on missing validation, hidden coupling, rollout and rollback gaps, migrations, feature flags, and other agent-safe next actions. Use when a user says `review this PR for risk`, `pre-merge review`, `is this PR safe to merge`, or asks for a risk-focused PR review. Do NOT use for post-merge production monitoring, broad code smell review, or commit-scoped bug hunting.",{"claudeCode":15},"pr-risk-review",{"basePath":285,"githubOwner":20,"githubRepo":21,"locale":22,"slug":283,"type":23},"skills/pr-risk-review",{"evaluate":287,"extract":290},{"promptVersionExtension":26,"promptVersionScoring":27,"score":146,"tags":288,"targetMarket":35,"tier":63},[31,34,243,289,32],"engineering-practices",{"commitSha":38},{"parentExtensionId":5,"repoId":40},[32,34,289,31,243],{"evaluatedAt":294,"extractAt":44,"updatedAt":294},1778684098339,{"_creationTime":296,"_id":297,"community":298,"display":299,"identity":303,"providers":305,"relations":309,"tags":310,"workflow":311},1778683790179.782,"k1735hy93q44qsztkc04w6abch86m90j",{"reviewCount":11},{"description":300,"installMethods":301,"name":302,"sourceUrl":17},"Scans recent commits in one or more repositories, identifies likely bugs using concrete repo evidence only, and proposes tightly scoped remediation sessions. Use when a user says `scan recent commits for bugs`, `what did I probably break`, `review yesterday's changes for regressions`, or asks for a commit-scoped bug hunt. Do NOT use for a broad code health review, full security audit, or speculative bug hunting with no repo or time scope.",{"claudeCode":15},"recent-commit-bug-hunt",{"basePath":304,"githubOwner":20,"githubRepo":21,"locale":22,"slug":302,"type":23},"skills/recent-commit-bug-hunt",{"evaluate":306,"extract":308},{"promptVersionExtension":26,"promptVersionScoring":27,"score":264,"tags":307,"targetMarket":35,"tier":63},[245,270,34,32,105],{"commitSha":38},{"parentExtensionId":5,"repoId":40},[32,34,270,105,245],{"evaluatedAt":312,"extractAt":44,"updatedAt":312},1778684118965,{"_creationTime":314,"_id":315,"community":316,"display":317,"identity":321,"providers":324,"relations":331,"tags":332,"workflow":333},1778683790179.7822,"k174j9mpmfxw6fp1mpyb7s9d5x86mpnz",{"reviewCount":11},{"description":318,"installMethods":319,"name":320,"sourceUrl":17},"Reviews a repository and returns a short, best-first backlog of small, low-risk refactor tickets with clear write boundaries and validation paths. Use when a user says `find refactor opportunities`, `what small cleanup tickets should we hand to agents`, `give me parallelizable refactors`, or asks for narrow maintainability wins in an existing repo. Do NOT use for a broad architecture redesign, style-only cleanup sweep, or bug hunt focused on functional regressions.",{"claudeCode":15},"SWE Refactor Opportunities",{"basePath":322,"githubOwner":20,"githubRepo":21,"locale":22,"slug":323,"type":23},"skills/refactor-opportunities","refactor-opportunities",{"evaluate":325,"extract":330},{"promptVersionExtension":26,"promptVersionScoring":27,"score":146,"tags":326,"targetMarket":35,"tier":63},[327,127,328,105,329],"refactoring","maintainability","repository-analysis",{"commitSha":38,"license":199},{"parentExtensionId":5,"repoId":40},[127,105,328,327,329],{"evaluatedAt":334,"extractAt":44,"updatedAt":334},1778684140673,{"_creationTime":336,"_id":337,"community":338,"display":339,"identity":343,"providers":346,"relations":353,"tags":354,"workflow":355},1778683790179.7825,"k17fb5yjsz547kqxvbqy97cw4586nb7f",{"reviewCount":11},{"description":340,"installMethods":341,"name":342,"sourceUrl":17},"Inspects an unfamiliar software repository and produces a concrete orientation report covering structure, tooling, entry points, boundaries, active surfaces, and safe places to start work. Use when a user says `help me understand this repo`, `map this codebase before I edit it`, `where should I start`, or asks for an engineering walkthrough before planning or delegation. Do NOT use when the user already knows the target change and wants implementation, or when they need a specific bug diagnosis rather than repo orientation.",{"claudeCode":15},"SWE Repo Introspection",{"basePath":344,"githubOwner":20,"githubRepo":21,"locale":22,"slug":345,"type":23},"skills/repo-introspection","repo-introspection",{"evaluate":347,"extract":352},{"promptVersionExtension":26,"promptVersionScoring":27,"score":264,"tags":348,"targetMarket":35,"tier":63},[349,242,350,60,351],"codebase","structure","analysis",{"commitSha":38,"license":199},{"parentExtensionId":5,"repoId":40},[351,349,60,242,350],{"evaluatedAt":356,"extractAt":44,"updatedAt":356},1778684157056,{"_creationTime":358,"_id":359,"community":360,"display":361,"identity":365,"providers":367,"relations":374,"tags":375,"workflow":376},1778683790179.7827,"k17cbddq3srr2f7k210q5d940586nb94",{"reviewCount":11},{"description":362,"installMethods":363,"name":364,"sourceUrl":17},"Audits a repository, workspace, or monorepo for dependency vulnerabilities, outdated security-sensitive packages, license issues, and dependency hygiene gaps, then compiles one evidence-backed report. Use when a user says `run a security audit`, `check dependencies and licenses`, `audit this monorepo for vulnerable packages`, or asks for a package-level security review. Do NOT use for a general secure-code review, threat model, or speculative vulnerability hunt without manifests, lockfiles, or package surfaces to inspect.",{"claudeCode":15},"security-audit",{"basePath":366,"githubOwner":20,"githubRepo":21,"locale":22,"slug":364,"type":23},"skills/security-audit",{"evaluate":368,"extract":373},{"promptVersionExtension":26,"promptVersionScoring":27,"score":124,"tags":369,"targetMarket":35,"tier":63},[370,149,371,372,329],"security","dependency-management","licensing",{"commitSha":38},{"parentExtensionId":5,"repoId":40},[149,371,372,329,370],{"evaluatedAt":377,"extractAt":44,"updatedAt":377},1778684175108,{"_creationTime":379,"_id":380,"community":381,"display":382,"identity":386,"providers":388,"relations":393,"tags":394,"workflow":395},1778683790179.783,"k173ww0j1kj1ayvt41341qz2nd86mv7d",{"reviewCount":11},{"description":383,"installMethods":384,"name":385,"sourceUrl":17},"Identifies and prioritizes the highest-value test coverage gaps in a repository or workspace, then incrementally adds or strengthens tests using the local test stack and cleanly scoped subagent work when available. Use when a user says `improve test coverage`, `find weak tests`, `add missing test cases`, `run a recurring test-improvement pass`, or asks for a language-agnostic workflow to strengthen mocks, fixtures, and test structure without chasing raw coverage numbers. Do NOT use for first-time framework selection, broad test-stack migrations, or large production refactors.",{"claudeCode":15},"test-gap-hunt",{"basePath":387,"githubOwner":20,"githubRepo":21,"locale":22,"slug":385,"type":23},"skills/test-gap-hunt",{"evaluate":389,"extract":392},{"promptVersionExtension":26,"promptVersionScoring":27,"score":124,"tags":390,"targetMarket":35,"tier":63},[85,127,391,32,327],"coverage",{"commitSha":38},{"parentExtensionId":5,"repoId":40},[32,127,391,327,85],{"evaluatedAt":396,"extractAt":44,"updatedAt":396},1778684191640,{"reviewCount":11},{"description":399,"installMethods":400,"name":21,"sourceUrl":17},"17 agent skills for engineering analysis and judgment — PR risk review, repo introspection, audits, ownership maps, refactor opportunities. See https://cdd.dev/skill/.",{"claudeCode":21},null,{"basePath":403,"githubOwner":20,"githubRepo":21,"locale":22,"slug":21,"type":404},"","plugin",true,{"extract":407},{"commitSha":38,"plugin":408},{"mcpCount":11,"provider":409,"skillCount":410},"classify",17,{"repoId":40},{"_creationTime":413,"_id":40,"identity":414,"providers":415,"workflow":566},1778683785537.182,{"githubOwner":20,"githubRepo":21,"sourceUrl":17},{"classify":416,"discover":552,"github":555},{"commitSha":38,"extensions":417},[418,466,472,477,482,487,492,497,502,507,512,517,522,527,532,537,542,547],{"basePath":403,"description":399,"displayName":21,"installMethods":419,"rationale":420,"selectedPaths":421,"source":465,"sourceLanguage":22,"type":404},{"claudeCode":21},"plugin manifest at .claude-plugin/plugin.json",[422,425,427,430,433,435,437,439,441,443,445,447,449,451,453,455,457,459,461,463],{"path":423,"priority":424},".claude-plugin/plugin.json","mandatory",{"path":426,"priority":424},"README.md",{"path":428,"priority":429},"LICENSE","high",{"path":431,"priority":432},"skills/babysit-pr/SKILL.md","medium",{"path":434,"priority":432},"skills/capture-knowledge/SKILL.md",{"path":436,"priority":432},"skills/change-validation-planner/SKILL.md",{"path":438,"priority":432},"skills/create-skill/SKILL.md",{"path":440,"priority":432},"skills/docs-drift-audit/SKILL.md",{"path":442,"priority":432},"skills/incident-followup-audit/SKILL.md",{"path":444,"priority":432},"skills/init/SKILL.md",{"path":446,"priority":432},"skills/merged-pr-monitoring/SKILL.md",{"path":448,"priority":432},"skills/observability-gap-hunt/SKILL.md",{"path":450,"priority":432},"skills/ownership-risk-map/SKILL.md",{"path":452,"priority":432},"skills/performance-hunt/SKILL.md",{"path":454,"priority":432},"skills/pr-risk-review/SKILL.md",{"path":456,"priority":432},"skills/recent-commit-bug-hunt/SKILL.md",{"path":458,"priority":432},"skills/refactor-opportunities/SKILL.md",{"path":460,"priority":432},"skills/repo-introspection/SKILL.md",{"path":462,"priority":432},"skills/security-audit/SKILL.md",{"path":464,"priority":432},"skills/test-gap-hunt/SKILL.md","rule",{"basePath":19,"description":13,"displayName":16,"installMethods":467,"rationale":468,"selectedPaths":469,"source":465,"sourceLanguage":22,"type":23},{"claudeCode":15},"SKILL.md frontmatter at skills/babysit-pr/SKILL.md",[470],{"path":471,"priority":424},"SKILL.md",{"basePath":54,"description":50,"displayName":52,"installMethods":473,"rationale":474,"selectedPaths":475,"source":465,"sourceLanguage":22,"type":23},{"claudeCode":15},"SKILL.md frontmatter at skills/capture-knowledge/SKILL.md",[476],{"path":471,"priority":424},{"basePath":78,"description":74,"displayName":76,"installMethods":478,"rationale":479,"selectedPaths":480,"source":465,"sourceLanguage":22,"type":23},{"claudeCode":15},"SKILL.md frontmatter at skills/change-validation-planner/SKILL.md",[481],{"path":471,"priority":424},{"basePath":100,"description":96,"displayName":98,"installMethods":483,"rationale":484,"selectedPaths":485,"source":465,"sourceLanguage":22,"type":23},{"claudeCode":15},"SKILL.md frontmatter at skills/create-skill/SKILL.md",[486],{"path":471,"priority":424},{"basePath":121,"description":117,"displayName":119,"installMethods":488,"rationale":489,"selectedPaths":490,"source":465,"sourceLanguage":22,"type":23},{"claudeCode":15},"SKILL.md frontmatter at skills/docs-drift-audit/SKILL.md",[491],{"path":471,"priority":424},{"basePath":143,"description":139,"displayName":141,"installMethods":493,"rationale":494,"selectedPaths":495,"source":465,"sourceLanguage":22,"type":23},{"claudeCode":15},"SKILL.md frontmatter at skills/incident-followup-audit/SKILL.md",[496],{"path":471,"priority":424},{"basePath":168,"description":164,"displayName":166,"installMethods":498,"rationale":499,"selectedPaths":500,"source":465,"sourceLanguage":22,"type":23},{"claudeCode":15},"SKILL.md frontmatter at skills/init/SKILL.md",[501],{"path":471,"priority":424},{"basePath":191,"description":187,"displayName":192,"installMethods":503,"rationale":504,"selectedPaths":505,"source":465,"sourceLanguage":22,"type":23},{"claudeCode":15},"SKILL.md frontmatter at skills/merged-pr-monitoring/SKILL.md",[506],{"path":471,"priority":424},{"basePath":213,"description":209,"displayName":211,"installMethods":508,"rationale":509,"selectedPaths":510,"source":465,"sourceLanguage":22,"type":23},{"claudeCode":15},"SKILL.md frontmatter at skills/observability-gap-hunt/SKILL.md",[511],{"path":471,"priority":424},{"basePath":238,"description":234,"displayName":236,"installMethods":513,"rationale":514,"selectedPaths":515,"source":465,"sourceLanguage":22,"type":23},{"claudeCode":15},"SKILL.md frontmatter at skills/ownership-risk-map/SKILL.md",[516],{"path":471,"priority":424},{"basePath":260,"description":256,"displayName":261,"installMethods":518,"rationale":519,"selectedPaths":520,"source":465,"sourceLanguage":22,"type":23},{"claudeCode":15},"SKILL.md frontmatter at skills/performance-hunt/SKILL.md",[521],{"path":471,"priority":424},{"basePath":285,"description":281,"displayName":283,"installMethods":523,"rationale":524,"selectedPaths":525,"source":465,"sourceLanguage":22,"type":23},{"claudeCode":15},"SKILL.md frontmatter at skills/pr-risk-review/SKILL.md",[526],{"path":471,"priority":424},{"basePath":304,"description":300,"displayName":302,"installMethods":528,"rationale":529,"selectedPaths":530,"source":465,"sourceLanguage":22,"type":23},{"claudeCode":15},"SKILL.md frontmatter at skills/recent-commit-bug-hunt/SKILL.md",[531],{"path":471,"priority":424},{"basePath":322,"description":318,"displayName":323,"installMethods":533,"rationale":534,"selectedPaths":535,"source":465,"sourceLanguage":22,"type":23},{"claudeCode":15},"SKILL.md frontmatter at skills/refactor-opportunities/SKILL.md",[536],{"path":471,"priority":424},{"basePath":344,"description":340,"displayName":345,"installMethods":538,"rationale":539,"selectedPaths":540,"source":465,"sourceLanguage":22,"type":23},{"claudeCode":15},"SKILL.md frontmatter at skills/repo-introspection/SKILL.md",[541],{"path":471,"priority":424},{"basePath":366,"description":362,"displayName":364,"installMethods":543,"rationale":544,"selectedPaths":545,"source":465,"sourceLanguage":22,"type":23},{"claudeCode":15},"SKILL.md frontmatter at skills/security-audit/SKILL.md",[546],{"path":471,"priority":424},{"basePath":387,"description":383,"displayName":385,"installMethods":548,"rationale":549,"selectedPaths":550,"source":465,"sourceLanguage":22,"type":23},{"claudeCode":15},"SKILL.md frontmatter at skills/test-gap-hunt/SKILL.md",[551],{"path":471,"priority":424},{"sources":553},[554],"manual",{"closedIssues90d":11,"description":556,"forks":11,"homepage":557,"license":199,"openIssues90d":11,"pushedAt":558,"readmeSize":559,"stars":560,"topics":561},"Claude Code skills for on-demand engineering work — PR risk review, repo introspection, audits, ownership maps. Published at cdd.dev/skills/swe.","https://cdd.dev/skills/swe/",1778361321000,8683,1,[562,563,564,34,565],"agent-skills","claude-code","claude-plugins","codex",{"classifiedAt":567,"discoverAt":568,"extractAt":569,"githubAt":569,"updatedAt":567},1778683789715,1778683785537,1778683787839,[],{"extractAt":44,"updatedAt":44},[]]