[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"extension-skill-netdata-codacy-audit-en":3,"guides-for-netdata-codacy-audit":619,"similar-k17712r7xw99tfa8w7xzre9a4d86m8re-en":620},{"_creationTime":4,"_id":5,"children":6,"community":7,"display":9,"evaluation":15,"identity":242,"isFallback":234,"parentExtension":246,"providers":247,"relations":252,"repo":254,"tags":616,"workflow":617},1778694578248.103,"k17712r7xw99tfa8w7xzre9a4d86m8re",[],{"reviewCount":8},0,{"description":10,"installMethods":11,"name":13,"sourceUrl":14},"Codacy Cloud workflow for this repository -- run Codacy's analyzers locally before `git push` (mirrors what Codacy CI runs), and fetch/cluster Codacy issues for any PR via the v3 API. Use when the user mentions Codacy, \"codacy analysis\", `codacy-analysis-cli`, \"codacy issues on PR\", \"fix codacy CI\", \"codacy markdownlint findings\", or any Codacy gate failing on a netdata-org PR. Ships scripts analyze-local.sh (docker/binary runner for codacy-analysis-cli) and pr-issues.sh (paginated v3 issue fetch + group-by tool/pattern/severity/file). Token-safe -- CODACY_TOKEN never reaches assistant-visible stdout. Read-only by design in the current SOW; write actions (mark FP, mark fixed) are deferred.",{"claudeCode":12},"netdata/netdata","codacy-audit","https://github.com/netdata/netdata",{"_creationTime":16,"_id":17,"extensionId":5,"locale":18,"result":19,"trustSignals":224,"workflow":240},1778694601008.0637,"kn7fcksgjwz4rbcqqdr0yva02186nxjy","en",{"checks":20,"evaluatedAt":192,"extensionSummary":193,"features":194,"nonGoals":200,"promptVersionExtension":204,"promptVersionScoring":205,"purpose":206,"rationale":207,"score":208,"summary":209,"tags":210,"targetMarket":217,"tier":218,"useCases":219},[21,26,29,32,36,39,43,47,50,53,57,61,64,68,71,74,77,80,83,86,90,94,98,102,106,109,112,115,119,122,125,128,131,134,137,141,145,149,152,156,159,162,165,168,172,176,179,182,185,189],{"category":22,"check":23,"severity":24,"summary":25},"Practical Utility","Problem relevance","pass","The description clearly names the problem of local analysis before push and PR issue fetching, using specific terms like \"Codacy Cloud workflow\", \"run Codacy's analyzers locally\", and \"fetch/cluster Codacy issues for any PR\".",{"category":22,"check":27,"severity":24,"summary":28},"Unique selling proposition","The skill offers a unique value by mirroring Codacy CI locally before push, collapsing the feedback loop, and providing a read-only PR triage with specific scripts for issue fetching and clustering, going beyond basic API interaction.",{"category":22,"check":30,"severity":24,"summary":31},"Production readiness","The skill provides two distinct, well-defined scripts (`analyze-local.sh` and `pr-issues.sh`) that directly address the stated use cases, with clear prerequisites and operational notes, indicating readiness for workflow integration.",{"category":33,"check":34,"severity":24,"summary":35},"Scope","Single responsibility principle","The skill focuses on Codacy analysis and issue fetching, with two well-defined scripts that are cohesive and directly related to managing Codacy findings for a repository.",{"category":33,"check":37,"severity":24,"summary":38},"Description quality","The description accurately reflects the skill's functionality, including its two main scripts, use cases, token safety, and limitations, providing a clear and concise overview.",{"category":40,"check":41,"severity":24,"summary":42},"Invocation","Scoped tools","The skill exposes two specific scripts (`analyze-local.sh` and `pr-issues.sh`) with well-defined arguments, rather than a single generalist command, promoting precise agent selection.",{"category":44,"check":45,"severity":24,"summary":46},"Documentation","Configuration & parameter reference","The SKILL.md explicitly lists required environment keys, their purpose, defaults, and source locations, fulfilling the documentation requirement for configuration.",{"category":33,"check":48,"severity":24,"summary":49},"Tool naming","The scripts `analyze-local.sh` and `pr-issues.sh` are descriptively named and follow kebab-case, clearly indicating their function within the Codacy audit domain.",{"category":33,"check":51,"severity":24,"summary":52},"Minimal I/O surface","The scripts accept specific arguments and produce documented outputs (JSON dumps, TSV summaries), requesting only necessary data and returning promised payloads without extraneous information.",{"category":54,"check":55,"severity":24,"summary":56},"License","License usability","The bundled LICENSE file clearly indicates the software is licensed under the GNU General Public License v3.0 or later (GPL-3.0-or-later), which is a permissive open-source license.",{"category":58,"check":59,"severity":24,"summary":60},"Maintenance","Commit recency","The repository has recent commits as of 2026-05-13, indicating active maintenance.",{"category":58,"check":62,"severity":24,"summary":63},"Dependency Management","The skill's scripts rely on common tools like `git`, `curl`, `docker`, and `jq`, which are standard and typically managed through system package managers, without indicating complex or unmanaged dependencies.",{"category":65,"check":66,"severity":24,"summary":67},"Security","Secret Management","The skill correctly handles the CODACY_TOKEN by using environment variables and includes a self-test (`codacyaudit_selftest_no_token_leak`) to ensure the token is never exposed to stdout.",{"category":65,"check":69,"severity":24,"summary":70},"Injection","The scripts use explicit commands and arguments, and the `codacy-analysis-cli` is expected to handle its own input sanitization. The `pr-issues.sh` script sanitizes PR numbers and uses `jq` for safe JSON processing.",{"category":65,"check":72,"severity":24,"summary":73},"Transitive Supply-Chain Grenades","The skill relies on the `codacy-analysis-cli` tool and `docker` for execution. The analysis script's arguments are explicitly defined and do not involve runtime script fetching or remote code execution.",{"category":65,"check":75,"severity":24,"summary":76},"Sandbox Isolation","The scripts operate within the repository context or use Docker, maintaining isolation. Paths are relative or clearly managed (e.g., Docker volumes), and no operations modify files outside the intended scope.",{"category":65,"check":78,"severity":24,"summary":79},"Sandbox escape primitives","The scripts use standard shell commands and call external CLIs/Docker without detached processes or loops around denied tool calls, adhering to sandbox isolation principles.",{"category":65,"check":81,"severity":24,"summary":82},"Data Exfiltration","The skill handles API tokens via environment variables and the self-test confirms no sensitive data is leaked to stdout. No undocumented outbound calls are apparent.",{"category":65,"check":84,"severity":24,"summary":85},"Hidden Text Tricks","The bundled scripts and SKILL.md are free of hidden text tricks, ANSI escape sequences, or invisible Unicode characters that could manipulate the model.",{"category":87,"check":88,"severity":24,"summary":89},"Hooks","Opaque code execution","The bundled scripts are plain Bash, `codacy-analysis-cli` is invoked as a distinct tool, and there is no evidence of base64 obfuscation, `eval`, or runtime script fetching.",{"category":91,"check":92,"severity":24,"summary":93},"Portability","Structural Assumption","The skill assumes standard Git repository structure and relies on environment variables for configuration, with clear instructions on how to set them up, avoiding hardcoded or non-standard paths.",{"category":95,"check":96,"severity":24,"summary":97},"Trust","Issues Attention","The repository shows 16 issues opened and 16 issues closed in the last 90 days, indicating a healthy maintenance rate with a closure rate of 50%.",{"category":99,"check":100,"severity":24,"summary":101},"Versioning","Release Management","The project has meaningful commit activity and a clear license, and the `SKILL.md` itself is part of the codebase that is updated with commits, implying versioning through commit history.",{"category":103,"check":104,"severity":24,"summary":105},"Code Execution","Validation","The script `pr-issues.sh` validates the PR number input and uses `jq` for safe JSON processing. The `codacy-analysis-cli` is assumed to handle its own argument validation.",{"category":65,"check":107,"severity":24,"summary":108},"Unguarded Destructive Operations","The skill is read-only by design and does not perform any destructive operations like file deletion, code modification, or infrastructure changes.",{"category":103,"check":110,"severity":24,"summary":111},"Error Handling","Scripts use `set -euo pipefail` for robust error handling. The `_codacyaudit_run` helper provides clear error messages and exits non-zero on failure, and `jq` operations are guarded.",{"category":103,"check":113,"severity":24,"summary":114},"Logging","The skill provides informative `echo` statements to stderr for operational feedback and logs audit dumps to `.local/audits/codacy/`, which is a form of local audit logging.",{"category":116,"check":117,"severity":24,"summary":118},"Compliance","GDPR","The skill does not operate on personal data; it analyzes code and fetches Codacy analysis issues, which do not inherently contain personal data.",{"category":116,"check":120,"severity":24,"summary":121},"Target market","The skill is a general code analysis tool and does not contain any regional or jurisdiction-specific logic, making it globally applicable.",{"category":91,"check":123,"severity":24,"summary":124},"Runtime stability","The scripts are written in Bash and rely on common utilities (`git`, `curl`, `docker`, `jq`) available on most Linux/macOS systems, with clear instructions for setting up dependencies.",{"category":44,"check":126,"severity":24,"summary":127},"README","The repository has a comprehensive README.md that clearly states the project's purpose, features, and getting started information.",{"category":33,"check":129,"severity":24,"summary":130},"Tool surface size","The skill exposes two primary scripts (`analyze-local.sh` and `pr-issues.sh`), which is a well-contained surface size.",{"category":40,"check":132,"severity":24,"summary":133},"Overlapping near-synonym tools","The skill exposes two distinct scripts with clear, non-overlapping functionalities for local analysis and PR issue fetching.",{"category":44,"check":135,"severity":24,"summary":136},"Phantom features","All advertised features, such as local analysis and PR issue fetching via specific scripts, are directly implemented and verifiable in the source code.",{"category":138,"check":139,"severity":24,"summary":140},"Install","Installation instruction","The SKILL.md details required environment variables and how to obtain them, and the scripts provide clear usage instructions and options, enabling end-to-end setup and execution.",{"category":142,"check":143,"severity":24,"summary":144},"Errors","Actionable error messages","The scripts provide informative error messages using `echo` to stderr with clear indicators and explanations, often suggesting next steps or referring to documentation/setup guides.",{"category":146,"check":147,"severity":24,"summary":148},"Execution","Pinned dependencies","The scripts declare interpreter usage via shebangs and rely on system-installed tools like `docker`, `git`, and `jq`, which are typically managed by system package managers that handle pinning.",{"category":33,"check":150,"severity":24,"summary":151},"Dry-run preview","The `analyze-local.sh` script acts as a preview by running Codacy's analyzers locally and reporting findings without modifying the codebase. The `pr-issues.sh` script is read-only.",{"category":153,"check":154,"severity":24,"summary":155},"Protocol","Idempotent retry & timeouts","The scripts use `curl` with a timeout and do not perform mutating operations that would require idempotency. Error handling is robust for network calls.",{"category":116,"check":157,"severity":24,"summary":158},"Telemetry opt-in","The skill does not emit any telemetry; it focuses on local analysis and API calls for issue fetching.",{"category":40,"check":160,"severity":24,"summary":161},"Precise Purpose","The skill clearly states its purpose (Codacy analysis and PR issue fetching) and when to use it (mentions of Codacy, failing gates), with explicit non-goals (write actions deferred).",{"category":40,"check":163,"severity":24,"summary":164},"Concise Frontmatter","The SKILL.md frontmatter is concise, clearly stating the core capability and trigger phrases without excessive keywords.",{"category":44,"check":166,"severity":24,"summary":167},"Concise Body","The SKILL.md is well-structured and concise, delegating detailed information to the referenced scripts and external documentation where appropriate.",{"category":169,"check":170,"severity":24,"summary":171},"Context","Progressive Disclosure","The SKILL.md outlines the workflows and links to specific scripts for execution, demonstrating progressive disclosure of information.",{"category":169,"check":173,"severity":174,"summary":175},"Forked exploration","not_applicable","The skill is focused on executing specific analysis tasks and does not involve deep exploration or code review that would require forked context.",{"category":22,"check":177,"severity":24,"summary":178},"Usage examples","The SKILL.md provides clear, copy-pasteable examples for both pre-push analysis and PR triage workflows, including specific command invocations and expected outputs.",{"category":22,"check":180,"severity":24,"summary":181},"Edge cases","The SKILL.md documents potential issues like missing CODACY_TOKEN and clarifies the behavior of `codacy-analysis-cli` (non-zero exit on findings) and API pagination, providing recovery context.",{"category":103,"check":183,"severity":24,"summary":184},"Tool Fallback","The `analyze-local.sh` script intelligently falls back from a local binary to Docker if needed, and clearly states the required dependencies, which is a form of fallback and clear declaration.",{"category":186,"check":187,"severity":24,"summary":188},"Safety","Halt on unexpected state","The scripts use `set -euo pipefail` and the `_codacyaudit_run` helper exits non-zero on errors, ensuring the workflow halts on unexpected states or API failures.",{"category":91,"check":190,"severity":24,"summary":191},"Cross-skill coupling","The skill is self-contained and does not rely on other specific skills being loaded. It mentions related skills for context but does not implicitly depend on them.",1778694600897,"This skill provides scripts to run Codacy code analyzers locally before a git push, mirroring Codacy CI, and to fetch and cluster Codacy issues for any given PR via the v3 API. It includes wrappers for safe token handling and detailed documentation.",[195,196,197,198,199],"Local Codacy analysis mirroring CI","Pre-push code quality checks","Fetch and cluster Codacy issues for any PR","Token-safe API wrappers","JSON and TSV output formats",[201,202,203],"Marking issues as false-positive or fixed","Master-backlog triage","Cross-repo aggregation","3.0.0","4.4.0","Streamline code quality checks by running Codacy analysis locally before pushing code and efficiently triage PR issues.","The skill is thoroughly implemented with clear documentation, robust error handling, and excellent security practices, including a comprehensive token-safety self-test. All checks passed.",100,"A high-quality skill for integrating Codacy Cloud analysis locally and for reviewing PR issues.",[211,212,213,214,215,216],"codacy","code-analysis","ci","pr-review","linting","security-analysis","global","verified",[220,221,222,223],"Run Codacy analysis locally before 'git push'","Fix Codacy CI findings proactively","Fetch and cluster Codacy issues on a PR","Triage PRs by analyzing Codacy findings",{"codeQuality":225,"collectedAt":227,"documentation":228,"maintenance":231,"security":237,"testCoverage":239},{"hasLockfile":226},true,1778694579738,{"descriptionLength":229,"readmeSize":230},698,26316,{"closedIssues90d":232,"forks":233,"hasChangelog":234,"openIssues90d":232,"pushedAt":235,"stars":236},16,6433,false,1778692486000,78799,{"hasNpmPackage":234,"license":238,"smitheryVerified":234},"GPL-3.0",{"hasCi":226,"hasTests":226},{"updatedAt":241},1778694601008,{"basePath":243,"githubOwner":244,"githubRepo":244,"locale":18,"slug":13,"type":245},".agents/skills/codacy-audit","netdata","skill",null,{"evaluate":248,"extract":250},{"promptVersionExtension":204,"promptVersionScoring":205,"score":208,"tags":249,"targetMarket":217,"tier":218},[211,212,213,214,215,216],{"commitSha":251},"HEAD",{"repoId":253},"kd70yp91ybn40a638h3hzz6nbd86m2cw",{"_creationTime":255,"_id":253,"identity":256,"providers":257,"workflow":612},1778694565561.0132,{"githubOwner":244,"githubRepo":244,"sourceUrl":14},{"classify":258,"discover":587,"github":590},{"commitSha":251,"extensions":259},[260,275,298,311,338,346,367,377,404,412,420,447,460,487,509,522,532,541,549,558,574],{"basePath":243,"description":10,"displayName":13,"installMethods":261,"rationale":262,"selectedPaths":263,"source":274,"sourceLanguage":18,"type":245},{"claudeCode":12},"SKILL.md frontmatter at .agents/skills/codacy-audit/SKILL.md",[264,267,270,272],{"path":265,"priority":266},"SKILL.md","mandatory",{"path":268,"priority":269},"scripts/_lib.sh","low",{"path":271,"priority":269},"scripts/analyze-local.sh",{"path":273,"priority":269},"scripts/pr-issues.sh","rule",{"basePath":276,"description":277,"displayName":278,"installMethods":279,"rationale":280,"selectedPaths":281,"source":274,"sourceLanguage":18,"type":245},".agents/skills/coverity-audit","Triage Coverity Scan defects (https://scan.coverity.com) for this project — fetch defect lists, fetch per-defect details, and apply triage decisions (Bug / FalsePositive / Intentional with severity, action, and a comment). Use when the user asks to \"review Coverity defects\", \"triage Coverity findings\", \"fetch Coverity outstanding\", or anything mentioning Coverity Scan, CIDs, or scan.coverity.com.","coverity-audit",{"claudeCode":12},"SKILL.md frontmatter at .agents/skills/coverity-audit/SKILL.md",[282,283,284,286,288,290,292,294,296],{"path":265,"priority":266},{"path":268,"priority":269},{"path":285,"priority":269},"scripts/fetch-details.sh",{"path":287,"priority":269},"scripts/fetch-table.sh",{"path":289,"priority":269},"scripts/finalize-defect.sh",{"path":291,"priority":269},"scripts/keepalive.sh",{"path":293,"priority":269},"scripts/prepare-defect.sh",{"path":295,"priority":269},"scripts/resolve-cid-to-diid.sh",{"path":297,"priority":269},"scripts/update-triage.sh",{"basePath":299,"description":300,"displayName":301,"installMethods":302,"rationale":303,"selectedPaths":304,"source":274,"sourceLanguage":18,"type":245},".agents/skills/graphql-audit","Triage GitHub Code Scanning alerts (CodeQL with security-extended suite) for this repository — list open alerts, dismiss as false positive / won't fix / used in tests, query via GitHub REST + GraphQL. Use when the user asks to \"review GitHub security alerts\", \"check CodeQL findings\", \"triage code scanning\", or anything mentioning Code Scanning, CodeQL, security-extended, or github.com/$repo/security/code-scanning.","graphql-audit",{"claudeCode":12},"SKILL.md frontmatter at .agents/skills/graphql-audit/SKILL.md",[305,306,307,309],{"path":265,"priority":266},{"path":268,"priority":269},{"path":308,"priority":269},"scripts/codeql-dismiss.sh",{"path":310,"priority":269},"scripts/codeql-list.sh",{"basePath":312,"description":313,"displayName":314,"installMethods":315,"rationale":316,"selectedPaths":317,"source":274,"sourceLanguage":18,"type":245},".agents/skills/integrations-lifecycle","Authoritative reference for Netdata's integrations pipeline -- how `metadata.yaml` drives per-integration pages, the `COLLECTORS.md`/`SECRETS.md`/`SERVICE-DISCOVERY.md` umbrellas, the `integrations.js` artifact consumed by the cloud-frontend, and per-integration `.md` files committed to the repo. Use when adding/modifying any integration (collector, exporter, agent or cloud notification, authentication, secretstore, service-discovery, log type, deploy method); editing `metadata.yaml`; checking whether `integrations/*.md` should be hand-edited; reading the four generator scripts under `integrations/`, schemas under `integrations/schemas/`, templates under `integrations/templates/`, the workflows `generate-integrations.yml` or `check-markdown.yml`; ibm.d modules where `metadata.yaml` is generated from `contexts.yaml`; the 5-file consistency rule (metadata.yaml + config_schema.json + stock conf + alerts + README move together).","integrations-lifecycle",{"claudeCode":12},"SKILL.md frontmatter at .agents/skills/integrations-lifecycle/SKILL.md",[318,319,322,324,326,328,330,332,334,336],{"path":265,"priority":266},{"path":320,"priority":321},"artifacts-and-banners.md","medium",{"path":323,"priority":321},"consistency.md",{"path":325,"priority":321},"description-authoring.md",{"path":327,"priority":321},"gotchas.md",{"path":329,"priority":321},"ibm-d.md",{"path":331,"priority":321},"in-app-contract.md",{"path":333,"priority":321},"per-type-matrix.md",{"path":335,"priority":321},"pipeline.md",{"path":337,"priority":321},"schema-reference.md",{"basePath":339,"description":340,"displayName":341,"installMethods":342,"rationale":343,"selectedPaths":344,"source":274,"sourceLanguage":18,"type":245},".agents/skills/learn-pr-preview","Use only when the user explicitly asks to build, run, preview, inspect, or validate learn.netdata.cloud locally using the contents of a PR or documentation branch before merge. Do not trigger for ordinary docs edits unless the user asks for a local Learn preview.","learn-pr-preview",{"claudeCode":12},"SKILL.md frontmatter at .agents/skills/learn-pr-preview/SKILL.md",[345],{"path":265,"priority":266},{"basePath":347,"description":348,"displayName":349,"installMethods":350,"rationale":351,"selectedPaths":352,"source":274,"sourceLanguage":18,"type":245},".agents/skills/learn-site-structure","Authoritative reference for how docs in this repo (and 5 other Netdata-org repos) become published pages on `learn.netdata.cloud`. Covers the `\u003Crepo>/docs/.map/map.yaml` source-of-truth (the actual lever -- filesystem path is irrelevant for routing), the live `ingest/ingest.py` orchestrator in the learn repo (NOT the legacy `ingest.js`), frontmatter injection, slug rules, sidebar autogeneration, MDX escape rules, versioning, the 4-mechanism redirect stack, the 6 source repositories, the every-3-hours CI ingest, Netlify deploy, and the `part_of_learn=True` opt-in for files hand-authored in the learn repo. Use when adding/moving/renaming/deleting a docs page; when a page on Learn looks wrong; when wondering whether to edit a doc here or in the learn repo; when reading `ingest.py`, `sidebars.js`, `docusaurus.config.js`, `static.toml`, `LegacyLearnCorrelateLinksWithGHURLs.json`, `netlify.toml`, the `\u003C!--startmeta` blocks in `.mdx` files, or the workflows `ingest.yml` and `daily-learn-link-check.yml`.","learn-site-structure",{"claudeCode":12},"SKILL.md frontmatter at .agents/skills/learn-site-structure/SKILL.md",[353,354,356,358,360,361,363,365],{"path":265,"priority":266},{"path":355,"priority":321},"authoring-boundary.md",{"path":357,"priority":321},"mapping.md",{"path":359,"priority":321},"mdx-rules.md",{"path":335,"priority":321},{"path":362,"priority":321},"pitfalls-and-gotchas.md",{"path":364,"priority":321},"redirects.md",{"path":366,"priority":321},"sidebars.md",{"basePath":368,"description":369,"displayName":370,"installMethods":371,"rationale":372,"selectedPaths":373,"source":274,"sourceLanguage":18,"type":245},".agents/skills/mirror-netdata-repos","Maintains a local mirror of Netdata-org source repositories at `${NETDATA_REPOS_DIR}` so AI assistants and developers can do cross-repo grep / code review locally without GitHub API round-trips and rate limits. Ships a vendored sync script (`scripts/sync-netdata-repos.sh`) that updates ~150 repos in two phases (resync existing on default branch, discover and clone new). Safety -- skips repos that have staged or modified changes; otherwise switches to the default branch and recursively updates submodules. Reset-to-default is intentional -- it prevents stale-feature-branch \"black hole\" repos that confuse cross-repo reasoning. Supports `--repo NAME` (repeatable) to scope to specific repos. Independent from any other repo mirrors this workstation may have. Use when the local mirror is out of date, before a cross-repo grep / review session, when adding a new netdata-org repo (auto-discovered), when an assistant needs cross-repo cognition without `gh` API turnaround.","mirror-netdata-repos",{"claudeCode":12},"SKILL.md frontmatter at .agents/skills/mirror-netdata-repos/SKILL.md",[374,375],{"path":265,"priority":266},{"path":376,"priority":269},"scripts/sync-netdata-repos.sh",{"basePath":378,"description":379,"displayName":380,"installMethods":381,"rationale":382,"selectedPaths":383,"source":274,"sourceLanguage":18,"type":245},".agents/skills/pr-reviews","Address pull-request comments and reviews iteratively until the PR is clean — fetch all comments with paranoid pagination, classify by author (AI bot vs human), verify each finding, address it, find similar patterns, reply per-thread, resolve threads, check CI before pushing, retrigger AI reviewers (cubic-dev-ai, copilot), and wait for new feedback. Use when the user says \"address PR comments\", \"look at the reviews on PR N\", \"deal with the bot comments\", \"iterate on PR N until clean\", or anything mentioning PR comments / reviews / cubic / copilot.","pr-reviews",{"claudeCode":12},"SKILL.md frontmatter at .agents/skills/pr-reviews/SKILL.md",[384,385,386,388,390,392,394,396,398,400,402],{"path":265,"priority":266},{"path":268,"priority":269},{"path":387,"priority":269},"scripts/ci-status.sh",{"path":389,"priority":269},"scripts/fetch-all.sh",{"path":391,"priority":269},"scripts/fetch-sonar-findings.sh",{"path":393,"priority":269},"scripts/list-open-threads.sh",{"path":395,"priority":269},"scripts/reply-thread.sh",{"path":397,"priority":269},"scripts/resolve-thread.sh",{"path":399,"priority":269},"scripts/trigger-copilot.sh",{"path":401,"priority":269},"scripts/trigger-cubic.sh",{"path":403,"priority":269},"scripts/wait-for-activity.sh",{"basePath":405,"description":406,"displayName":407,"installMethods":408,"rationale":409,"selectedPaths":410,"source":274,"sourceLanguage":18,"type":245},".agents/skills/project-snmp-profiles-authoring","Use when editing Netdata SNMP profile YAMLs, topology SNMP profiles, ddsnmp profile parsing, or profile-format documentation. Requires checking source MIB field accessibility, especially MAX-ACCESS not-accessible INDEX objects, before adding or changing profile symbols.","project-snmp-profiles-authoring",{"claudeCode":12},"SKILL.md frontmatter at .agents/skills/project-snmp-profiles-authoring/SKILL.md",[411],{"path":265,"priority":266},{"basePath":413,"description":414,"displayName":415,"installMethods":416,"rationale":417,"selectedPaths":418,"source":274,"sourceLanguage":18,"type":245},".agents/skills/project-writing-collectors","Best practices and orientation for AI assistants authoring or modifying Netdata data-collection plugins or modules in any language. Read before adding a new collector, modifying an existing one, working on logs, topology, NetFlow/sFlow/IPFIX, OTEL ingestion, SNMP profiles, statsd, Prometheus scraping, or interactive Functions. Covers the mental model, framework-agnostic best practices, dashboard-shaping mechanisms (NIDL, SNMP profiles, statsd synthetic_charts, OTEL mappings, Prometheus exposition), production quality criteria, the plugin landscape, per-data-type patterns (metrics, logs, snapshots, topology, enrichment), per-domain common practices, and a pre-PR self-check.","project-writing-collectors",{"claudeCode":12},"SKILL.md frontmatter at .agents/skills/project-writing-collectors/SKILL.md",[419],{"path":265,"priority":266},{"basePath":421,"description":422,"displayName":423,"installMethods":424,"rationale":425,"selectedPaths":426,"source":274,"sourceLanguage":18,"type":245},".agents/skills/query-agent-events","Bug-investigation tool for the Netdata agent-events ingestion namespace -- triage crashes, panics, fatals across the fleet by downloading events of interest and clustering locally. Covers the three transports (Cloud API and direct agent API are primary; ssh is operator-only), the verified AE_* field map and enum meanings, the dedup model (23h client-side per agent and event signature), the after-the-fact event timing (POST only on agent restart), and the Netdata systemd-journal plugin multi-value filter syntax (FIELD in A, B, C) AND ... Use when investigating crashes / panics / fatals; when grepping for events touching a specific function or file or version; when looking for regressions across versions; when an agent is reported crashing in a way you want to triage. Ships scripts get-events.sh and analyze-events.sh that fetch events with index-friendly filters and compute group-by stats. Defaults to last 24 hours and to the latest stable plus latest 2-3 nightlies.","query-agent-events",{"claudeCode":12},"SKILL.md frontmatter at .agents/skills/query-agent-events/SKILL.md",[427,428,430,432,434,436,437,439,441,443,445],{"path":265,"priority":266},{"path":429,"priority":321},"AE_FIELDS.md",{"path":431,"priority":321},"finding-crashes.md",{"path":433,"priority":321},"finding-fatals.md",{"path":435,"priority":321},"query-discipline.md",{"path":268,"priority":269},{"path":438,"priority":269},"scripts/analyze-events.sh",{"path":440,"priority":269},"scripts/get-events.sh",{"path":442,"priority":269},"scripts/redact-events.sh",{"path":444,"priority":321},"transports.md",{"path":446,"priority":321},"update-cadence.md",{"basePath":448,"description":449,"displayName":450,"installMethods":451,"rationale":452,"selectedPaths":453,"source":274,"sourceLanguage":18,"type":245},".agents/skills/sonarqube-audit","Triage SonarCloud findings (issues, hotspots, code smells, vulnerabilities) for this project — search what's open, mark False Positive / Won't Fix / Confirm / Safe / Acknowledged / Fixed, batch-mark whole rule families. Use when the user asks to \"review Sonar findings\", \"triage SonarCloud\", \"mark False Positive on Sonar\", or anything mentioning sonarqube/sonarcloud, S2259, S5008, code smells, security hotspots, or sonarcloud.io.","sonarqube-audit",{"claudeCode":12},"SKILL.md frontmatter at .agents/skills/sonarqube-audit/SKILL.md",[454,455,456,458],{"path":265,"priority":266},{"path":268,"priority":269},{"path":457,"priority":269},"scripts/sonar-mark.sh",{"path":459,"priority":269},"scripts/sonar-search.sh",{"basePath":461,"description":462,"displayName":463,"installMethods":464,"rationale":465,"selectedPaths":466,"source":274,"sourceLanguage":18,"type":245},"docs/netdata-ai/skills/query-netdata-agents","Query Netdata Agents (parents and children) directly via their HTTP API on port 19999. Includes a bearer-token helper that mints, caches, and transparently refreshes a per-agent bearer from a long-lived Netdata Cloud token, and auto-detects bearer-protected agents. Use when the user asks how to call an agent's REST API or Function directly, query an agent's logs/metrics/alerts directly, mint a bearer token from a cloud token, or work around bearer protection.","query-netdata-agents",{"claudeCode":12},"SKILL.md frontmatter at docs/netdata-ai/skills/query-netdata-agents/SKILL.md",[467,468,470,472,474,476,478,480,482,484,486],{"path":265,"priority":266},{"path":469,"priority":321},"query-alerts.md",{"path":471,"priority":321},"query-dyncfg.md",{"path":473,"priority":321},"query-flows.md",{"path":475,"priority":321},"query-functions.md",{"path":477,"priority":321},"query-logs.md",{"path":479,"priority":321},"query-metrics.md",{"path":481,"priority":321},"query-nodes.md",{"path":483,"priority":321},"query-streaming.md",{"path":485,"priority":321},"query-topology.md",{"path":268,"priority":269},{"basePath":488,"description":489,"displayName":490,"installMethods":491,"rationale":492,"selectedPaths":493,"source":274,"sourceLanguage":18,"type":245},"docs/netdata-ai/skills/query-netdata-cloud","Query Netdata Cloud via its REST API -- metrics, logs (systemd-journal / windows-events / otel-logs), topology graphs (topology:snmp), network flows (flows:netflow), alerts, dynamic configuration (DynCfg), and generic Functions on a node. Use when the user asks about querying Netdata Cloud, fetching metrics from the cloud, querying logs / topology / netflow / sflow / ipfix through Cloud, listing or modifying configurations via DynCfg, calling agent Functions through Cloud, listing spaces/rooms/nodes, or building a curl command against `app.netdata.cloud`. Pairs with the `query-netdata-agents` skill when direct-agent access is needed.","query-netdata-cloud",{"claudeCode":12},"SKILL.md frontmatter at docs/netdata-ai/skills/query-netdata-cloud/SKILL.md",[494,495,496,497,499,500,501,502,504,505,506,508],{"path":265,"priority":266},{"path":469,"priority":321},{"path":471,"priority":321},{"path":498,"priority":321},"query-feed.md",{"path":473,"priority":321},{"path":475,"priority":321},{"path":477,"priority":321},{"path":503,"priority":321},"query-members.md",{"path":479,"priority":321},{"path":481,"priority":321},{"path":507,"priority":321},"query-rooms.md",{"path":485,"priority":321},{"basePath":510,"installMethods":511,"rationale":513,"selectedPaths":514,"source":274,"sourceLanguage":18,"type":521},"src/crates/netdata-log-viewer/otel-signal-viewer-plugin",{"cargo":512},"otel-signal-viewer-plugin","cli ecosystem detected at src/crates/netdata-log-viewer/otel-signal-viewer-plugin",[515,517,519],{"path":516,"priority":266},"Cargo.toml",{"path":518,"priority":266},"README.md",{"path":520,"priority":321},"src/main.rs","cli",{"basePath":523,"installMethods":524,"rationale":526,"selectedPaths":527,"source":274,"sourceLanguage":18,"type":521},"src/crates/netdata-otel/otel-plugin",{"cargo":525},"otel-plugin","cli ecosystem detected at src/crates/netdata-otel/otel-plugin",[528,529,530],{"path":516,"priority":266},{"path":520,"priority":321},{"path":531,"priority":269},"src/lib.rs",{"basePath":533,"installMethods":534,"rationale":536,"selectedPaths":537,"source":274,"sourceLanguage":18,"type":521},"src/crates/netflow-plugin",{"cargo":535},"netflow-plugin","cli ecosystem detected at src/crates/netflow-plugin",[538,539,540],{"path":516,"priority":266},{"path":518,"priority":266},{"path":520,"priority":321},{"basePath":542,"installMethods":543,"rationale":545,"selectedPaths":546,"source":274,"sourceLanguage":18,"type":521},"src/crates/netipc",{"cargo":544},"netipc","cli ecosystem detected at src/crates/netipc",[547,548],{"path":516,"priority":266},{"path":531,"priority":269},{"basePath":550,"installMethods":551,"rationale":553,"selectedPaths":554,"source":274,"sourceLanguage":18,"type":521},"src/crates/rdp",{"cargo":552},"rdp","cli ecosystem detected at src/crates/rdp",[555,556,557],{"path":516,"priority":266},{"path":520,"priority":321},{"path":531,"priority":269},{"basePath":559,"installMethods":560,"rationale":562,"selectedPaths":563,"source":274,"sourceLanguage":18,"type":521},"src/go",{"go":561},"github.com/netdata/netdata/go/plugins","cli ecosystem detected at src/go",[564,566,568,570,572],{"path":565,"priority":266},"go.mod",{"path":567,"priority":321},"cmd/godplugin/main.go",{"path":569,"priority":321},"cmd/ibmdplugin/main.go",{"path":571,"priority":321},"cmd/scriptsdplugin/main.go",{"path":573,"priority":269},"cmd/ibmdplugin/stub.go",{"basePath":575,"installMethods":576,"rationale":578,"selectedPaths":579,"source":274,"sourceLanguage":18,"type":586},"",{"remote":577},"https://app.netdata.cloud/api/v1/mcp","server.json with namespace/server name at server.json",[580,582,583],{"path":581,"priority":266},"server.json",{"path":518,"priority":266},{"path":584,"priority":585},"LICENSE","high","mcp",{"sources":588},[589],"manual",{"closedIssues90d":232,"description":591,"forks":233,"homepage":592,"license":238,"openIssues90d":232,"pushedAt":235,"readmeSize":230,"stars":236,"topics":593},"The fastest path to AI-powered full stack observability, even for lean teams.","https://www.netdata.cloud",[594,595,596,597,598,244,599,600,601,602,603,604,605,606,607,608,609,610,586,611],"monitoring","docker","kubernetes","cncf","prometheus","devops","observability","alerting","influxdb","grafana","data-visualization","database","linux","machine-learning","mysql","postgresql","mongodb","ai",{"classifiedAt":613,"discoverAt":614,"extractAt":615,"githubAt":615,"updatedAt":613},1778694578050,1778694565561,1778694575885,[213,211,212,215,214,216],{"evaluatedAt":241,"extractAt":618,"updatedAt":241},1778694578248,[],[621,649,670,699,730,757],{"_creationTime":622,"_id":623,"community":624,"display":625,"identity":631,"providers":635,"relations":643,"tags":645,"workflow":646},1778697652123.8845,"k17bexjjjsz81ysk7bd3ggdm8s86mt2t",{"reviewCount":8},{"description":626,"installMethods":627,"name":629,"sourceUrl":630},"Choose, run, rerun, or debug OpenClaw tests, CI checks, Docker E2E lanes, release validation, and the cheapest safe verification path.",{"claudeCode":628},"steipete/clawdis","openclaw-testing","https://github.com/steipete/clawdis",{"basePath":632,"githubOwner":633,"githubRepo":634,"locale":18,"slug":629,"type":245},".agents/skills/openclaw-testing","steipete","clawdis",{"evaluate":636,"extract":642},{"promptVersionExtension":204,"promptVersionScoring":205,"score":208,"tags":637,"targetMarket":217,"tier":218},[638,213,639,640,641],"testing","validation","automation","developer-tools",{"commitSha":251},{"repoId":644},"kd738npxg9yh3xf3vddzy9fyfh86nhng",[640,213,641,638,639],{"evaluatedAt":647,"extractAt":648,"updatedAt":647},1778697962962,1778697652123,{"_creationTime":650,"_id":651,"community":652,"display":653,"identity":657,"providers":659,"relations":666,"tags":667,"workflow":668},1778697652123.8806,"k17e99n8cb55vm23m26vec6r1586mrwe",{"reviewCount":8},{"description":654,"installMethods":655,"name":656,"sourceUrl":630},"Use Crabbox for OpenClaw remote validation across Linux, macOS, Windows, and WSL2. Default to Blacksmith Testbox for broad Linux proof; includes direct Blacksmith and owned AWS/Hetzner fallback notes when Crabbox fails.",{"claudeCode":628},"crabbox",{"basePath":658,"githubOwner":633,"githubRepo":634,"locale":18,"slug":656,"type":245},".agents/skills/crabbox",{"evaluate":660,"extract":665},{"promptVersionExtension":204,"promptVersionScoring":205,"score":208,"tags":661,"targetMarket":217,"tier":218},[638,213,662,639,606,663,664],"remote-execution","macos","windows",{"commitSha":251},{"repoId":644},[213,606,663,662,638,639,664],{"evaluatedAt":669,"extractAt":648,"updatedAt":669},1778697705804,{"_creationTime":671,"_id":672,"community":673,"display":674,"identity":680,"providers":684,"relations":692,"tags":694,"workflow":695},1778692878074.8352,"k1726g737t0bwq4pnxjkpjqt6s86m789",{"reviewCount":8},{"description":675,"installMethods":676,"name":678,"sourceUrl":679},"Worktrunk-specific guidance for tend CI workflows. Adds codecov polling, Rust test commands, labels, and review criteria on top of the generic tend-* skills. Use when operating in CI.",{"claudeCode":677},"max-sixty/worktrunk","running-tend","https://github.com/max-sixty/worktrunk",{"basePath":681,"githubOwner":682,"githubRepo":683,"locale":18,"slug":678,"type":245},".claude/skills/running-tend","max-sixty","worktrunk",{"evaluate":685,"extract":691},{"promptVersionExtension":204,"promptVersionScoring":205,"score":208,"tags":686,"targetMarket":217,"tier":218},[213,687,688,689,690],"rust","codecov","github-actions","workflows",{"commitSha":251},{"repoId":693},"kd735mff6mvfxbagjk8sv9pg9s86ngdh",[213,688,689,687,690],{"evaluatedAt":696,"extractAt":697,"updatedAt":698},1778692982347,1778692878074,1778693214652,{"_creationTime":700,"_id":701,"community":702,"display":703,"identity":709,"providers":714,"relations":723,"tags":726,"workflow":727},1778695548458.377,"k17esa27yncbsd0bz8hcg2crg986mjqk",{"reviewCount":8},{"description":704,"installMethods":705,"name":707,"sourceUrl":708},"Extract the conceptual essence of a repository as skills, agents, and teams — the project's roles, procedures, and coordination patterns expressed as agentskills.io-standard definitions. Reads an arbitrary codebase and produces generalized definitions that capture WHAT the project does and WHO operates it, without replicating HOW it does it. Use when onboarding to a new codebase and wanting to understand its conceptual architecture, when bootstrapping an agentic system from an existing project, when studying a project's organizational DNA for cross-pollination, or when creating a skill/agent/team library inspired by a reference implementation.\n",{"claudeCode":706},"pjt222/agent-almanac","Metal","https://github.com/pjt222/agent-almanac",{"basePath":710,"githubOwner":711,"githubRepo":712,"locale":18,"slug":713,"type":245},"skills/metal","pjt222","agent-almanac","metal",{"evaluate":715,"extract":721},{"promptVersionExtension":204,"promptVersionScoring":205,"score":208,"tags":716,"targetMarket":217,"tier":218},[212,717,718,719,720],"conceptualization","agent-definition","repository-structure","software-architecture",{"commitSha":251,"license":722},"MIT",{"parentExtensionId":724,"repoId":725},"k170h0janaa9kwn7cfgfz2ykss86mmh9","kd7aryv63z61j39n2td1aeqkvh86mh12",[718,212,717,719,720],{"evaluatedAt":728,"extractAt":729,"updatedAt":728},1778699463464,1778695548458,{"_creationTime":731,"_id":732,"community":733,"display":734,"identity":740,"providers":743,"relations":750,"tags":752,"workflow":753},1778699438912.8826,"k170fxxh22hdspg4vr94whgj1986mpr9",{"reviewCount":8},{"description":735,"installMethods":736,"name":738,"sourceUrl":739},"Context Runtime for AI Agents — 59 MCP tools, 10 read modes, 95+ shell patterns, tree-sitter AST for 18 languages. Compresses LLM context by up to 99%. Use when reading files, running shell commands, searching code, or exploring directories. Auto-installs if not present.",{"claudeCode":737},"yvgude/lean-ctx","lean-ctx","https://github.com/yvgude/lean-ctx",{"basePath":741,"githubOwner":742,"githubRepo":738,"locale":18,"slug":738,"type":245},"skills/lean-ctx","yvgude",{"evaluate":744,"extract":749},{"promptVersionExtension":204,"promptVersionScoring":205,"score":208,"tags":745,"targetMarket":217,"tier":218},[746,747,748,641,687,212],"context-compression","ai-agent","cli-tools",{"commitSha":251},{"repoId":751},"kd7dxtfr9j3z54hs3bz0218e1n86may0",[747,748,212,746,641,687],{"evaluatedAt":754,"extractAt":755,"updatedAt":756},1778699456179,1778699438912,1778699517795,{"_creationTime":758,"_id":759,"community":760,"display":761,"identity":767,"providers":772,"relations":781,"tags":783,"workflow":784},1778698056313.1528,"k176pxdjxvnyex7jv6abt3myd586n5vv",{"reviewCount":8},{"description":762,"installMethods":763,"name":765,"sourceUrl":766},"Map a codebase into feature-grouped flowcharts, identify duplicated concerns across features, and propose a unified architecture. Use when asked to \"find the ideal path,\" unify duplicated systems, or audit architecture before a refactor. Emits a proposed unified flowchart plus per-system /make-plan prompts.",{"claudeCode":764},"thedotmack/claude-mem","Pathfinder","https://github.com/thedotmack/claude-mem",{"basePath":768,"githubOwner":769,"githubRepo":770,"locale":18,"slug":771,"type":245},"plugin/skills/pathfinder","thedotmack","claude-mem","pathfinder",{"evaluate":773,"extract":779},{"promptVersionExtension":204,"promptVersionScoring":205,"score":208,"tags":774,"targetMarket":217,"tier":218},[212,775,776,777,778],"architecture","documentation","refactoring","flowchart",{"commitSha":251,"license":780},"Apache-2.0",{"repoId":782},"kd70jnxgm695az2wtf37zbqdj986mp7k",[775,212,776,778,777],{"evaluatedAt":785,"extractAt":786,"updatedAt":787},1778698228002,1778698056313,1778698443446]