[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"extension-skill-ckorhonen-observability-gap-hunt-zh-CN":3,"guides-for-ckorhonen-observability-gap-hunt":479,"similar-k170jzhm0mbg7vqxfvyrqb836586mk3p-zh-CN":480},{"_creationTime":4,"_id":5,"children":6,"community":7,"display":9,"evaluation":15,"identity":241,"isFallback":227,"parentExtension":246,"providers":268,"relations":272,"repo":273,"tags":477,"workflow":478},1778683790179.781,"k170jzhm0mbg7vqxfvyrqb836586mk3p",[],{"reviewCount":8},0,{"description":10,"installMethods":11,"name":13,"sourceUrl":14},"Inspects services, jobs, and code paths for missing or weak logs, metrics, traces, alerts, dashboards, or deployment-linked telemetry, then returns a tightly scoped backlog of observability gaps. Use when a user says `find observability gaps`, `audit telemetry coverage`, `what logs or metrics are missing`, `check alerting coverage`, or asks for a recurring telemetry review. Do NOT use for live incident response, root-cause analysis, generic performance tuning, or a broad code review.",{"claudeCode":12},"ckorhonen/swe-skills","observability-gap-hunt","https://github.com/ckorhonen/swe-skills",{"_creationTime":16,"_id":17,"extensionId":5,"locale":18,"result":19,"trustSignals":225,"workflow":239},1778684031791.1116,"kn7ecazd4rt147mmskjfvkpmm186nc31","en",{"checks":20,"evaluatedAt":192,"extensionSummary":193,"features":194,"nonGoals":199,"promptVersionExtension":204,"promptVersionScoring":205,"purpose":206,"rationale":207,"score":208,"summary":209,"tags":210,"targetMarket":218,"tier":219,"useCases":220},[21,26,29,32,36,39,44,48,51,54,58,62,65,69,72,75,78,81,84,87,91,95,99,103,107,110,113,116,120,123,126,129,132,135,138,142,146,150,153,157,160,163,166,169,173,176,179,182,185,189],{"category":22,"check":23,"severity":24,"summary":25},"Practical Utility","Problem relevance","pass","The description clearly names the problem of finding observability gaps and specifies when to use the skill with concrete triggers like 'find observability gaps' and explicit non-goals.",{"category":22,"check":27,"severity":24,"summary":28},"Unique selling proposition","The skill offers a concrete value proposition by systematically auditing telemetry coverage and identifying specific gaps, which goes beyond generic LLM capabilities.",{"category":22,"check":30,"severity":24,"summary":31},"Production readiness","The skill covers the complete lifecycle of identifying, ranking, and proposing observability gaps, grounding its approach in repository evidence and stating limitations clearly.",{"category":33,"check":34,"severity":24,"summary":35},"Scope","Single responsibility principle","The skill focuses exclusively on auditing observability telemetry coverage within a given repository scope, without extending into unrelated domains.",{"category":33,"check":37,"severity":24,"summary":38},"Description quality","The description accurately reflects the skill's purpose, scope, and usage, including clear positive and negative triggers.",{"category":40,"check":41,"severity":42,"summary":43},"Invocation","Scoped tools","not_applicable","This skill does not expose discrete tools but operates as a single cohesive unit executing a defined workflow.",{"category":45,"check":46,"severity":42,"summary":47},"Documentation","Configuration & parameter reference","The skill does not appear to use explicit configuration parameters or environment variables beyond what is inherent to the agent's execution environment.",{"category":33,"check":49,"severity":42,"summary":50},"Tool naming","The skill does not expose individual tools with names; it functions as a single unit.",{"category":33,"check":52,"severity":42,"summary":53},"Minimal I/O surface","As a skill operating via a single invocation, discrete tool I/O surface is not applicable.",{"category":55,"check":56,"severity":24,"summary":57},"License","License usability","The extension is licensed under the MIT license, which is a permissive open-source license.",{"category":59,"check":60,"severity":24,"summary":61},"Maintenance","Commit recency","The last commit was on May 9, 2026, which is within the last 3 months.",{"category":59,"check":63,"severity":42,"summary":64},"Dependency Management","The skill does not appear to have external dependencies beyond the core agent runtime.",{"category":66,"check":67,"severity":24,"summary":68},"Security","Secret Management","The skill operates on code and configuration files and does not appear to handle or expose secrets.",{"category":66,"check":70,"severity":24,"summary":71},"Injection","The skill's instructions focus on analyzing existing code and configurations, with no indication of loading or executing untrusted external content as instructions.",{"category":66,"check":73,"severity":24,"summary":74},"Transitive Supply-Chain Grenades","The skill operates on local files and does not fetch remote content or execute arbitrary code at runtime.",{"category":66,"check":76,"severity":24,"summary":77},"Sandbox Isolation","The skill's operations are confined to analyzing files within the provided repository context and do not involve modifying external paths or performing destructive operations outside its scope.",{"category":66,"check":79,"severity":24,"summary":80},"Sandbox escape primitives","No detached-process spawns or deny-retry loops were detected in the skill's logic.",{"category":66,"check":82,"severity":24,"summary":83},"Data Exfiltration","The skill analyzes code and configuration and does not submit any confidential data or undocumented outbound calls.",{"category":66,"check":85,"severity":24,"summary":86},"Hidden Text Tricks","The bundled content appears free of hidden steering tricks or malformed Unicode characters in its descriptions or instructions.",{"category":88,"check":89,"severity":24,"summary":90},"Hooks","Opaque code execution","The skill's instructions are provided in plain, readable markdown and do not involve obfuscated code execution like base64 payloads or runtime script fetching.",{"category":92,"check":93,"severity":24,"summary":94},"Portability","Structural Assumption","The skill assumes access to a local repository and works with common project structures, but it does not make rigid assumptions about specific file layouts that would break without clear error handling.",{"category":96,"check":97,"severity":24,"summary":98},"Trust","Issues Attention","There are 0 open and 0 closed issues in the last 90 days, indicating low activity or that issues are not currently being tracked.",{"category":100,"check":101,"severity":24,"summary":102},"Versioning","Release Management","The skill's installation instructions in the README reference 'npx skills install ckorhonen/swe-skills', implying installation from a repository source rather than a versioned package. However, the last commit date provides a recency signal.",{"category":104,"check":105,"severity":42,"summary":106},"Code Execution","Validation","The skill does not expose executable code with structured inputs or outputs that would require schema validation.",{"category":66,"check":108,"severity":24,"summary":109},"Unguarded Destructive Operations","The skill is purely analytical and does not perform any destructive operations.",{"category":104,"check":111,"severity":24,"summary":112},"Error Handling","The skill is designed to report on findings and limitations, and any internal errors would likely be surfaced as part of the report, adhering to good error reporting practices.",{"category":104,"check":114,"severity":42,"summary":115},"Logging","The skill is analytical and does not perform destructive actions or outbound calls that would necessitate local audit logging.",{"category":117,"check":118,"severity":24,"summary":119},"Compliance","GDPR","The skill analyzes code and configuration and does not operate on personal data.",{"category":117,"check":121,"severity":24,"summary":122},"Target market","The skill's function of auditing code for observability gaps is universally applicable and not tied to any specific geographic or legal jurisdiction.",{"category":92,"check":124,"severity":24,"summary":125},"Runtime stability","The skill operates on repository code and configuration, which is portable across standard development environments. No specific OS or shell dependencies are mentioned.",{"category":45,"check":127,"severity":24,"summary":128},"README","The README file exists and provides a good overview of the repository's structure, conventions, and development workflow, including installation instructions.",{"category":33,"check":130,"severity":42,"summary":131},"Tool surface size","This is a single skill, not an extension with multiple tools or commands.",{"category":40,"check":133,"severity":42,"summary":134},"Overlapping near-synonym tools","The skill operates as a single unit and does not expose multiple tools with overlapping functionalities.",{"category":45,"check":136,"severity":24,"summary":137},"Phantom features","All advertised features in the README and SKILL.md (observability gap hunting) are implemented and align with the skill's described functionality.",{"category":139,"check":140,"severity":24,"summary":141},"Install","Installation instruction","The README provides clear installation instructions using `npx skills install ckorhonen/swe-skills` and the skill's purpose is well-defined.",{"category":143,"check":144,"severity":24,"summary":145},"Errors","Actionable error messages","While no explicit error paths are detailed, the skill is designed to report findings and limitations, suggesting that any errors encountered during analysis would be surfaced clearly.",{"category":147,"check":148,"severity":42,"summary":149},"Execution","Pinned dependencies","The skill does not appear to use third-party dependencies or scripts that would require pinning.",{"category":33,"check":151,"severity":42,"summary":152},"Dry-run preview","The skill is purely analytical and does not perform any state-changing operations that would require a dry-run preview.",{"category":154,"check":155,"severity":42,"summary":156},"Protocol","Idempotent retry & timeouts","The skill operates locally on files and does not involve remote calls or state-changing operations that would require idempotency or timeouts.",{"category":117,"check":158,"severity":24,"summary":159},"Telemetry opt-in","The skill does not appear to emit any telemetry.",{"category":40,"check":161,"severity":24,"summary":162},"Precise Purpose","The skill's purpose is precisely defined, stating what it does (inspects for observability gaps) and when to use it, with clear positive triggers and explicit non-goals.",{"category":40,"check":164,"severity":24,"summary":165},"Concise Frontmatter","The frontmatter in SKILL.md is concise, clearly stating the core capability and including relevant trigger phrases without excessive keyword stuffing.",{"category":45,"check":167,"severity":24,"summary":168},"Concise Body","The SKILL.md body is well-structured and stays within reasonable length, delegating deeper material to other files if necessary, though none are present in this small skill.",{"category":170,"check":171,"severity":24,"summary":172},"Context","Progressive Disclosure","The skill's documentation is concise and does not embed large amounts of material inline; procedures are outlined directly in SKILL.md.",{"category":170,"check":174,"severity":42,"summary":175},"Forked exploration","The skill is designed to produce a focused report and does not involve deep exploration or code review that would necessitate forking context.",{"category":22,"check":177,"severity":24,"summary":178},"Usage examples","While explicit copy-paste examples for invocation are not provided in SKILL.md, the description clearly outlines usage scenarios and trigger phrases, making its application understandable.",{"category":22,"check":180,"severity":24,"summary":181},"Edge cases","The skill's instructions implicitly handle edge cases by stating limitations (e.g., what to do if telemetry systems are unavailable) and focusing on verifiable evidence.",{"category":104,"check":183,"severity":42,"summary":184},"Tool Fallback","The skill does not depend on external tools like an MCP server and operates standalone.",{"category":186,"check":187,"severity":24,"summary":188},"Safety","Halt on unexpected state","The skill emphasizes grounding claims in evidence and reporting unknowns clearly, implying a halt or clear reporting on unexpected states rather than auto-committing.",{"category":92,"check":190,"severity":24,"summary":191},"Cross-skill coupling","The skill is self-contained and does not appear to implicitly rely on other skills, maintaining standalone functionality.",1778684031261,"This skill systematically inspects a code repository to identify missing or weak logs, metrics, traces, alerts, dashboards, and deployment-linked telemetry. It aims to produce a focused, ranked backlog of observability gaps.",[195,196,197,198],"Identifies missing logs, metrics, traces, and alerts","Audits dashboard and deployment-linked telemetry coverage","Returns a ranked backlog of observability gaps","Focuses on operational visibility rather than performance tuning",[200,201,202,203],"Live incident response or root-cause analysis","Generic performance tuning or optimization","Broad application code review without an observability goal","Redesigning entire monitoring stacks","3.0.0","4.4.0","To help users proactively identify and address blind spots in their system's observability coverage, ensuring services can be operated and diagnosed confidently.","High quality and documentation, with all checks passing or being not applicable. The skill is well-defined, safe, and clearly documented.",98,"Excellent skill for identifying and reporting observability gaps in codebases.",[211,212,213,214,215,216,217],"observability","telemetry","code-audit","logs","metrics","traces","alerts","global","verified",[221,222,223,224],"Audit telemetry coverage for a specific service or package","Find missing logs or metrics for critical workflows","Check alerting coverage before deploying new features","Perform recurring observability reviews over time",{"codeQuality":226,"collectedAt":228,"documentation":229,"maintenance":232,"security":236,"testCoverage":238},{"hasLockfile":227},true,1778684010842,{"descriptionLength":230,"readmeSize":231},488,8683,{"closedIssues90d":8,"forks":8,"hasChangelog":233,"openIssues90d":8,"pushedAt":234,"stars":235},false,1778361321000,1,{"hasNpmPackage":233,"license":237,"smitheryVerified":233},"MIT",{"hasCi":227,"hasTests":233},{"updatedAt":240},1778684031791,{"basePath":242,"githubOwner":243,"githubRepo":244,"locale":18,"slug":13,"type":245},"skills/observability-gap-hunt","ckorhonen","swe-skills","skill",{"_creationTime":247,"_id":248,"community":249,"display":250,"identity":253,"parentExtension":256,"providers":257,"relations":263,"tags":265,"workflow":266},1778683790179.7788,"k17d2yq229g61qvea0x8t60w1h86mgr8",{"reviewCount":8},{"description":251,"installMethods":252,"name":244,"sourceUrl":14},"17 agent skills for engineering analysis and judgment — PR risk review, repo introspection, audits, ownership maps, refactor opportunities. See https://cdd.dev/skill/.",{"claudeCode":244},{"basePath":254,"githubOwner":243,"githubRepo":244,"locale":18,"slug":244,"type":255},"","plugin",null,{"extract":258},{"commitSha":259,"plugin":260},"HEAD",{"mcpCount":8,"provider":261,"skillCount":262},"classify",17,{"repoId":264},"kd7b5kvzw3q7dgvym5bdx3m53986mann",[],{"extractAt":267,"updatedAt":267},1778683790179,{"evaluate":269,"extract":271},{"promptVersionExtension":204,"promptVersionScoring":205,"score":208,"tags":270,"targetMarket":218,"tier":219},[211,212,213,214,215,216,217],{"commitSha":259},{"parentExtensionId":248,"repoId":264},{"_creationTime":274,"_id":264,"identity":275,"providers":276,"workflow":473},1778683785537.182,{"githubOwner":243,"githubRepo":244,"sourceUrl":14},{"classify":277,"discover":461,"github":464},{"commitSha":259,"extensions":278},[279,327,336,344,352,360,368,376,384,392,397,405,413,421,429,437,445,453],{"basePath":254,"description":251,"displayName":244,"installMethods":280,"rationale":281,"selectedPaths":282,"source":326,"sourceLanguage":18,"type":255},{"claudeCode":244},"plugin manifest at .claude-plugin/plugin.json",[283,286,288,291,294,296,298,300,302,304,306,308,310,312,314,316,318,320,322,324],{"path":284,"priority":285},".claude-plugin/plugin.json","mandatory",{"path":287,"priority":285},"README.md",{"path":289,"priority":290},"LICENSE","high",{"path":292,"priority":293},"skills/babysit-pr/SKILL.md","medium",{"path":295,"priority":293},"skills/capture-knowledge/SKILL.md",{"path":297,"priority":293},"skills/change-validation-planner/SKILL.md",{"path":299,"priority":293},"skills/create-skill/SKILL.md",{"path":301,"priority":293},"skills/docs-drift-audit/SKILL.md",{"path":303,"priority":293},"skills/incident-followup-audit/SKILL.md",{"path":305,"priority":293},"skills/init/SKILL.md",{"path":307,"priority":293},"skills/merged-pr-monitoring/SKILL.md",{"path":309,"priority":293},"skills/observability-gap-hunt/SKILL.md",{"path":311,"priority":293},"skills/ownership-risk-map/SKILL.md",{"path":313,"priority":293},"skills/performance-hunt/SKILL.md",{"path":315,"priority":293},"skills/pr-risk-review/SKILL.md",{"path":317,"priority":293},"skills/recent-commit-bug-hunt/SKILL.md",{"path":319,"priority":293},"skills/refactor-opportunities/SKILL.md",{"path":321,"priority":293},"skills/repo-introspection/SKILL.md",{"path":323,"priority":293},"skills/security-audit/SKILL.md",{"path":325,"priority":293},"skills/test-gap-hunt/SKILL.md","rule",{"basePath":328,"description":329,"displayName":330,"installMethods":331,"rationale":332,"selectedPaths":333,"source":326,"sourceLanguage":18,"type":245},"skills/babysit-pr","Babysits an open pull request end-to-end by polling every minute, triaging new comments and reviews, handling CI failures, iterating on reviewer scores, and stopping only when the PR is ready to merge. Use when a user says `babysit this PR`, `watch this PR until it's merge-ready`, `handle review feedback on my PR`, or `keep iterating on this PR until reviewers are happy`. Do NOT use for a one-shot PR risk review, merged PR production monitoring, or repo-wide CI debugging with no scoped PR.","babysit-pr",{"claudeCode":12},"SKILL.md frontmatter at skills/babysit-pr/SKILL.md",[334],{"path":335,"priority":285},"SKILL.md",{"basePath":337,"description":338,"displayName":339,"installMethods":340,"rationale":341,"selectedPaths":342,"source":326,"sourceLanguage":18,"type":245},"skills/capture-knowledge","Audits a repository's code and docs to find important conventions, workflows, and architectural decisions that are missing from agent-facing guidance, then drafts review-ready updates. Use when a user says `capture repo knowledge`, `document implicit conventions`, `turn repo patterns into agent rules`, or asks what future agents should remember about a codebase. Do NOT use for a generic repo tour, onboarding walkthrough, or architecture summary that does not need reusable guidance updates.","capture-knowledge",{"claudeCode":12},"SKILL.md frontmatter at skills/capture-knowledge/SKILL.md",[343],{"path":335,"priority":285},{"basePath":345,"description":346,"displayName":347,"installMethods":348,"rationale":349,"selectedPaths":350,"source":326,"sourceLanguage":18,"type":245},"skills/change-validation-planner","Plans the narrowest trustworthy validation path for a scoped code change or diff. Use when a user asks what to run before merging, how to validate a specific change, whether the current checks are enough, or wants a bounded command order from narrow to broad. Do NOT use for writing tests, fixing the code change itself, broad QA sweeps, or generic debugging that needs root cause analysis.","change-validation-planner",{"claudeCode":12},"SKILL.md frontmatter at skills/change-validation-planner/SKILL.md",[351],{"path":335,"priority":285},{"basePath":353,"description":354,"displayName":355,"installMethods":356,"rationale":357,"selectedPaths":358,"source":326,"sourceLanguage":18,"type":245},"skills/create-skill","Creates or revises `swe:` skills for this repository using a repeatable authoring workflow: define concrete use cases, tune trigger boundaries, apply progressive disclosure, add matching eval assets, and validate the package. Use when adding a new skill, tightening an existing skill that over- or under-triggers, or distilling an external workflow into a repo-ready skill. Do NOT use for generic documentation edits or for executing the workflow the skill would describe.","create-skill",{"claudeCode":12},"SKILL.md frontmatter at skills/create-skill/SKILL.md",[359],{"path":335,"priority":285},{"basePath":361,"description":362,"displayName":363,"installMethods":364,"rationale":365,"selectedPaths":366,"source":326,"sourceLanguage":18,"type":245},"skills/docs-drift-audit","Audits a repository for human-facing or operational documentation that drifted from code, config, interfaces, workflows, or repo structure changes. Use when a user says `check docs drift`, `docs are stale`, `update the runbook after this change`, or `what documentation is missing after this change`. Do NOT use for agent-guidance updates, generic documentation rewrites, or writing docs without evidence that they are stale.","docs-drift-audit",{"claudeCode":12},"SKILL.md frontmatter at skills/docs-drift-audit/SKILL.md",[367],{"path":335,"priority":285},{"basePath":369,"description":370,"displayName":371,"installMethods":372,"rationale":373,"selectedPaths":374,"source":326,"sourceLanguage":18,"type":245},"skills/incident-followup-audit","Audits post-incident engineering follow-through after a sev or incident to verify whether the durable follow-up happened: regression tests, monitors, docs, runbooks, ownership updates, tickets, rollback learnings, and remaining backlog. Use when a user asks whether incident follow-up is complete, what still needs to be done after a postmortem, or how to close the engineering loop. Do NOT use for live incident response, root-cause analysis, or a generic bug hunt unrelated to an incident.","incident-followup-audit",{"claudeCode":12},"SKILL.md frontmatter at skills/incident-followup-audit/SKILL.md",[375],{"path":335,"priority":285},{"basePath":377,"description":378,"displayName":379,"installMethods":380,"rationale":381,"selectedPaths":382,"source":326,"sourceLanguage":18,"type":245},"skills/init","Initializes an optional repo-local agent collaboration preference file at `.ai/swe.json` by running a short interview or a zero-question quick mode. Use when a user says `initialize agent settings for this repo`, `set up my local agent prefs here`, `run quick init for this project`, or `create .ai/swe.json for how I like to work`. Do NOT use for `npm init`, project scaffolding, dependency installation, or environment bootstrap.","init",{"claudeCode":12},"SKILL.md frontmatter at skills/init/SKILL.md",[383],{"path":335,"priority":285},{"basePath":385,"description":386,"displayName":387,"installMethods":388,"rationale":389,"selectedPaths":390,"source":326,"sourceLanguage":18,"type":245},"skills/merged-pr-monitoring","Reviews recently merged pull requests, confirms whether they reached production, compares pre- and post-deploy signals, and summarizes observable impact. Use when a user says `monitor merged PRs`, `did this deploy hurt prod`, `check production impact of yesterday's merges`, or asks for a post-deploy readout tied to merged GitHub PRs. Do NOT use for a pre-merge code review, incident analysis with no PR scope, or generic dashboard triage disconnected from merged changes.","merged-pr-monitoring",{"claudeCode":12},"SKILL.md frontmatter at skills/merged-pr-monitoring/SKILL.md",[391],{"path":335,"priority":285},{"basePath":242,"description":10,"displayName":13,"installMethods":393,"rationale":394,"selectedPaths":395,"source":326,"sourceLanguage":18,"type":245},{"claudeCode":12},"SKILL.md frontmatter at skills/observability-gap-hunt/SKILL.md",[396],{"path":335,"priority":285},{"basePath":398,"description":399,"displayName":400,"installMethods":401,"rationale":402,"selectedPaths":403,"source":326,"sourceLanguage":18,"type":245},"skills/ownership-risk-map","Maps engineering ownership risk in a repository using repo evidence such as git history, churn, bus factor, CODEOWNERS coverage, test density, and orphaned or unclear-owner surfaces. Use when a user says `map ownership risk`, `find bus factor hotspots`, `which files look orphaned`, `high-change low-test areas`, or asks for a recurring maintenance pass that identifies risky surfaces before they become incidents. Do NOT use for org charts, HR ownership assignments, or generic maintainer lists without repo evidence.","ownership-risk-map",{"claudeCode":12},"SKILL.md frontmatter at skills/ownership-risk-map/SKILL.md",[404],{"path":335,"priority":285},{"basePath":406,"description":407,"displayName":408,"installMethods":409,"rationale":410,"selectedPaths":411,"source":326,"sourceLanguage":18,"type":245},"skills/performance-hunt","Hunts for concrete performance bottlenecks in a scoped repository surface using profiler output, benchmarks, query plans, traces, bundle analysis, or repo evidence, then returns the smallest high-value follow-up experiments or fixes. Use when a user says `find performance bottlenecks`, `why is this slow`, `profile this flow`, `hunt hot paths`, or asks for a recurring performance review. Do NOT use for live incident response, generic observability audits, speculative micro-optimization, or broad architecture rewrites with no bottleneck evidence.","performance-hunt",{"claudeCode":12},"SKILL.md frontmatter at skills/performance-hunt/SKILL.md",[412],{"path":335,"priority":285},{"basePath":414,"description":415,"displayName":416,"installMethods":417,"rationale":418,"selectedPaths":419,"source":326,"sourceLanguage":18,"type":245},"skills/pr-risk-review","Reviews open or draft pull requests for engineering risk before merge, focusing on missing validation, hidden coupling, rollout and rollback gaps, migrations, feature flags, and other agent-safe next actions. Use when a user says `review this PR for risk`, `pre-merge review`, `is this PR safe to merge`, or asks for a risk-focused PR review. Do NOT use for post-merge production monitoring, broad code smell review, or commit-scoped bug hunting.","pr-risk-review",{"claudeCode":12},"SKILL.md frontmatter at skills/pr-risk-review/SKILL.md",[420],{"path":335,"priority":285},{"basePath":422,"description":423,"displayName":424,"installMethods":425,"rationale":426,"selectedPaths":427,"source":326,"sourceLanguage":18,"type":245},"skills/recent-commit-bug-hunt","Scans recent commits in one or more repositories, identifies likely bugs using concrete repo evidence only, and proposes tightly scoped remediation sessions. Use when a user says `scan recent commits for bugs`, `what did I probably break`, `review yesterday's changes for regressions`, or asks for a commit-scoped bug hunt. Do NOT use for a broad code health review, full security audit, or speculative bug hunting with no repo or time scope.","recent-commit-bug-hunt",{"claudeCode":12},"SKILL.md frontmatter at skills/recent-commit-bug-hunt/SKILL.md",[428],{"path":335,"priority":285},{"basePath":430,"description":431,"displayName":432,"installMethods":433,"rationale":434,"selectedPaths":435,"source":326,"sourceLanguage":18,"type":245},"skills/refactor-opportunities","Reviews a repository and returns a short, best-first backlog of small, low-risk refactor tickets with clear write boundaries and validation paths. Use when a user says `find refactor opportunities`, `what small cleanup tickets should we hand to agents`, `give me parallelizable refactors`, or asks for narrow maintainability wins in an existing repo. Do NOT use for a broad architecture redesign, style-only cleanup sweep, or bug hunt focused on functional regressions.","refactor-opportunities",{"claudeCode":12},"SKILL.md frontmatter at skills/refactor-opportunities/SKILL.md",[436],{"path":335,"priority":285},{"basePath":438,"description":439,"displayName":440,"installMethods":441,"rationale":442,"selectedPaths":443,"source":326,"sourceLanguage":18,"type":245},"skills/repo-introspection","Inspects an unfamiliar software repository and produces a concrete orientation report covering structure, tooling, entry points, boundaries, active surfaces, and safe places to start work. Use when a user says `help me understand this repo`, `map this codebase before I edit it`, `where should I start`, or asks for an engineering walkthrough before planning or delegation. Do NOT use when the user already knows the target change and wants implementation, or when they need a specific bug diagnosis rather than repo orientation.","repo-introspection",{"claudeCode":12},"SKILL.md frontmatter at skills/repo-introspection/SKILL.md",[444],{"path":335,"priority":285},{"basePath":446,"description":447,"displayName":448,"installMethods":449,"rationale":450,"selectedPaths":451,"source":326,"sourceLanguage":18,"type":245},"skills/security-audit","Audits a repository, workspace, or monorepo for dependency vulnerabilities, outdated security-sensitive packages, license issues, and dependency hygiene gaps, then compiles one evidence-backed report. Use when a user says `run a security audit`, `check dependencies and licenses`, `audit this monorepo for vulnerable packages`, or asks for a package-level security review. Do NOT use for a general secure-code review, threat model, or speculative vulnerability hunt without manifests, lockfiles, or package surfaces to inspect.","security-audit",{"claudeCode":12},"SKILL.md frontmatter at skills/security-audit/SKILL.md",[452],{"path":335,"priority":285},{"basePath":454,"description":455,"displayName":456,"installMethods":457,"rationale":458,"selectedPaths":459,"source":326,"sourceLanguage":18,"type":245},"skills/test-gap-hunt","Identifies and prioritizes the highest-value test coverage gaps in a repository or workspace, then incrementally adds or strengthens tests using the local test stack and cleanly scoped subagent work when available. Use when a user says `improve test coverage`, `find weak tests`, `add missing test cases`, `run a recurring test-improvement pass`, or asks for a language-agnostic workflow to strengthen mocks, fixtures, and test structure without chasing raw coverage numbers. Do NOT use for first-time framework selection, broad test-stack migrations, or large production refactors.","test-gap-hunt",{"claudeCode":12},"SKILL.md frontmatter at skills/test-gap-hunt/SKILL.md",[460],{"path":335,"priority":285},{"sources":462},[463],"manual",{"closedIssues90d":8,"description":465,"forks":8,"homepage":466,"license":237,"openIssues90d":8,"pushedAt":234,"readmeSize":231,"stars":235,"topics":467},"Claude Code skills for on-demand engineering work — PR risk review, repo introspection, audits, ownership maps. Published at cdd.dev/skills/swe.","https://cdd.dev/skills/swe/",[468,469,470,471,472],"agent-skills","claude-code","claude-plugins","code-review","codex",{"classifiedAt":474,"discoverAt":475,"extractAt":476,"githubAt":476,"updatedAt":474},1778683789715,1778683785537,1778683787839,[217,213,214,215,211,212,216],{"evaluatedAt":240,"extractAt":267,"updatedAt":240},[],[481,510,536,558,589,618],{"_creationTime":482,"_id":483,"community":484,"display":485,"identity":491,"providers":494,"relations":503,"tags":506,"workflow":507},1778693180473.1174,"k17fm8t65dw1y28823kj8ce3bn86mgqg",{"reviewCount":8},{"description":486,"installMethods":487,"name":489,"sourceUrl":490},"Azure Monitor Query SDK for Python. Use for querying Log Analytics workspaces and Azure Monitor metrics.\nTriggers: \"azure-monitor-query\", \"LogsQueryClient\", \"MetricsQueryClient\", \"Log Analytics\", \"Kusto queries\", \"Azure metrics\".\n",{"claudeCode":488},"microsoft/agent-skills","azure-monitor-query-py","https://github.com/microsoft/agent-skills",{"basePath":492,"githubOwner":493,"githubRepo":468,"locale":18,"slug":489,"type":245},".github/plugins/azure-sdk-python/skills/azure-monitor-query-py","microsoft",{"evaluate":495,"extract":502},{"promptVersionExtension":204,"promptVersionScoring":205,"score":496,"tags":497,"targetMarket":218,"tier":219},100,[498,499,214,215,500,501],"azure","monitoring","sdk","python",{"commitSha":259},{"parentExtensionId":504,"repoId":505},"k171mfx6atvhq1bkhpky84v4b186n9qd","kd77czgnv00rfjm815pcc5xx5986n5t8",[498,214,215,499,501,500],{"evaluatedAt":508,"extractAt":509,"updatedAt":508},1778695102758,1778693180473,{"_creationTime":511,"_id":512,"community":513,"display":514,"identity":520,"providers":523,"relations":530,"tags":532,"workflow":533},1778694578248.1062,"k17e56dzsqh7qked458bjbs0e586n21y",{"reviewCount":8},{"description":515,"installMethods":516,"name":518,"sourceUrl":519},"Query Netdata Cloud via its REST API -- metrics, logs (systemd-journal / windows-events / otel-logs), topology graphs (topology:snmp), network flows (flows:netflow), alerts, dynamic configuration (DynCfg), and generic Functions on a node. Use when the user asks about querying Netdata Cloud, fetching metrics from the cloud, querying logs / topology / netflow / sflow / ipfix through Cloud, listing or modifying configurations via DynCfg, calling agent Functions through Cloud, listing spaces/rooms/nodes, or building a curl command against `app.netdata.cloud`. Pairs with the `query-netdata-agents` skill when direct-agent access is needed.",{"claudeCode":517},"netdata/netdata","query-netdata-cloud","https://github.com/netdata/netdata",{"basePath":521,"githubOwner":522,"githubRepo":522,"locale":18,"slug":518,"type":245},"docs/netdata-ai/skills/query-netdata-cloud","netdata",{"evaluate":524,"extract":529},{"promptVersionExtension":204,"promptVersionScoring":205,"score":496,"tags":525,"targetMarket":218,"tier":219},[522,526,499,215,214,527,528],"api","topology","rest",{"commitSha":259},{"repoId":531},"kd70yp91ybn40a638h3hzz6nbd86m2cw",[526,214,215,499,522,528,527],{"evaluatedAt":534,"extractAt":535,"updatedAt":534},1778694825298,1778694578248,{"_creationTime":537,"_id":538,"community":539,"display":540,"identity":544,"providers":547,"relations":554,"tags":555,"workflow":556},1778694578248.106,"k172cmz9daa3kvvdqf7zmq035586n8c3",{"reviewCount":8},{"description":541,"installMethods":542,"name":543,"sourceUrl":519},"Query Netdata Agents (parents and children) directly via their HTTP API on port 19999. Includes a bearer-token helper that mints, caches, and transparently refreshes a per-agent bearer from a long-lived Netdata Cloud token, and auto-detects bearer-protected agents. Use when the user asks how to call an agent's REST API or Function directly, query an agent's logs/metrics/alerts directly, mint a bearer token from a cloud token, or work around bearer protection.",{"claudeCode":517},"Query Netdata Agents",{"basePath":545,"githubOwner":522,"githubRepo":522,"locale":18,"slug":546,"type":245},"docs/netdata-ai/skills/query-netdata-agents","query-netdata-agents",{"evaluate":548,"extract":552},{"promptVersionExtension":204,"promptVersionScoring":205,"score":549,"tags":550,"targetMarket":218,"tier":219},99,[522,499,526,551,214,215],"troubleshooting",{"commitSha":259,"license":553},"GPL-3.0-or-later",{"repoId":531},[526,214,215,499,522,551],{"evaluatedAt":557,"extractAt":535,"updatedAt":557},1778694811524,{"_creationTime":559,"_id":560,"community":561,"display":562,"identity":568,"providers":573,"relations":582,"tags":585,"workflow":586},1778695548458.3406,"k17777mdb6925e1e4rj4a89vj986nbp2",{"reviewCount":8},{"description":563,"installMethods":564,"name":566,"sourceUrl":567},"Capture outbound HTTP and telemetry from a CLI harness at runtime. Covers capture-channel selection (transcript file vs verbose-fetch stderr vs outbound proxy vs on-disk state), hook-driven per-event capture vs long-running session capture, JSONL output format for diff-friendly artifacts, and the observability table that maps each target to the cheapest channel that captures it. Use when a static finding needs runtime confirmation, when a payload shape is needed for a client re-implementation, or when dark-vs-live disambiguation requires watching what the binary actually sends.\n",{"claudeCode":565},"pjt222/agent-almanac","Conduct Empirical Wire Capture","https://github.com/pjt222/agent-almanac",{"basePath":569,"githubOwner":570,"githubRepo":571,"locale":18,"slug":572,"type":245},"skills/conduct-empirical-wire-capture","pjt222","agent-almanac","conduct-empirical-wire-capture",{"evaluate":574,"extract":581},{"promptVersionExtension":204,"promptVersionScoring":205,"score":549,"tags":575,"targetMarket":218,"tier":219},[576,577,578,212,579,211,580],"reverse-engineering","wire-capture","http","jsonl","cli",{"commitSha":259,"license":237},{"parentExtensionId":583,"repoId":584},"k170h0janaa9kwn7cfgfz2ykss86mmh9","kd7aryv63z61j39n2td1aeqkvh86mh12",[580,578,579,211,576,212,577],{"evaluatedAt":587,"extractAt":588,"updatedAt":587},1778696709112,1778695548458,{"_creationTime":590,"_id":591,"community":592,"display":593,"identity":599,"providers":604,"relations":612,"tags":614,"workflow":615},1778687399826.025,"k1731q8sd6h0jjmc57jp56bqkx86nkz6",{"reviewCount":8},{"description":594,"installMethods":595,"name":597,"sourceUrl":598},"Downloads, exports, and inspects existing Arize traces and spans to understand what an LLM app is doing or debug runtime issues. Covers exporting traces by ID, spans by ID, sessions by ID, and root-cause investigation using the ax CLI. Use when the user wants to look at existing trace data, see what their LLM app is doing, export traces, download spans, investigate errors, or analyze behavior regressions.",{"claudeCode":596},"github/awesome-copilot","Arize Trace Skill","https://github.com/github/awesome-copilot",{"basePath":600,"githubOwner":601,"githubRepo":602,"locale":18,"slug":603,"type":245},"skills/arize-trace","github","awesome-copilot","arize-trace",{"evaluate":605,"extract":611},{"promptVersionExtension":204,"promptVersionScoring":205,"score":549,"tags":606,"targetMarket":218,"tier":219},[607,211,608,609,216,610],"arize","debugging","llm-ops","spans",{"commitSha":259,"license":237},{"repoId":613},"kd7dsmv976w8rtkqnjjfdtfgks86nnmw",[607,608,609,211,610,216],{"evaluatedAt":616,"extractAt":617,"updatedAt":616},1778689289120,1778687399826,{"_creationTime":619,"_id":620,"community":621,"display":622,"identity":628,"providers":633,"relations":639,"tags":642,"workflow":643},1778696691708.3284,"k1705np2853cnad3d5tpdbad0986m5t0",{"reviewCount":8},{"description":623,"installMethods":624,"name":626,"sourceUrl":627},"Aggregate and display system metrics with anomaly detection for a time period",{"claudeCode":625},"ruvnet/ruflo","Observe Metrics","https://github.com/ruvnet/ruflo",{"basePath":629,"githubOwner":630,"githubRepo":631,"locale":18,"slug":632,"type":245},"plugins/ruflo-observability/skills/observe-metrics","ruvnet","ruflo","observe-metrics",{"evaluate":634,"extract":638},{"promptVersionExtension":204,"promptVersionScoring":205,"score":208,"tags":635,"targetMarket":218,"tier":219},[215,211,636,499,637],"anomaly-detection","system-health",{"commitSha":259,"license":237},{"parentExtensionId":640,"repoId":641},"k17dgqjrf0b7x1y976rp0ksx7986n6n7","kd7ed28gj8n0y3msk5dzrp05zs86nqtc",[636,215,499,211,637],{"evaluatedAt":644,"extractAt":645,"updatedAt":644},1778701185599,1778696691708]