[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"extension-skill-netdata-query-agent-events-zh-CN":3,"guides-for-netdata-query-agent-events":618,"similar-k1774dcsh1s4vr0rddtava1hq186mf3e-zh-CN":619},{"_creationTime":4,"_id":5,"children":6,"community":7,"display":9,"evaluation":15,"identity":242,"isFallback":226,"parentExtension":245,"providers":246,"relations":251,"repo":253,"tags":615,"workflow":616},1778694578248.1055,"k1774dcsh1s4vr0rddtava1hq186mf3e",[],{"reviewCount":8},0,{"description":10,"installMethods":11,"name":13,"sourceUrl":14},"Bug-investigation tool for the Netdata agent-events ingestion namespace -- triage crashes, panics, fatals across the fleet by downloading events of interest and clustering locally. Covers the three transports (Cloud API and direct agent API are primary; ssh is operator-only), the verified AE_* field map and enum meanings, the dedup model (23h client-side per agent and event signature), the after-the-fact event timing (POST only on agent restart), and the Netdata systemd-journal plugin multi-value filter syntax (FIELD in A, B, C) AND ... Use when investigating crashes / panics / fatals; when grepping for events touching a specific function or file or version; when looking for regressions across versions; when an agent is reported crashing in a way you want to triage. Ships scripts get-events.sh and analyze-events.sh that fetch events with index-friendly filters and compute group-by stats. Defaults to last 24 hours and to the latest stable plus latest 2-3 nightlies.",{"claudeCode":12},"netdata/netdata","query-agent-events","https://github.com/netdata/netdata",{"_creationTime":16,"_id":17,"extensionId":5,"locale":18,"result":19,"trustSignals":224,"workflow":240},1778694770809.7493,"kn7b4gt751mdksvn5b9wzj9z9186nghz","en",{"checks":20,"evaluatedAt":192,"extensionSummary":193,"features":194,"nonGoals":200,"promptVersionExtension":204,"promptVersionScoring":205,"purpose":206,"rationale":207,"score":208,"summary":209,"tags":210,"targetMarket":217,"tier":218,"useCases":219},[21,26,29,32,36,39,43,47,50,53,57,61,64,68,71,74,77,80,83,86,90,94,98,102,106,109,112,115,119,122,125,128,131,134,137,141,145,149,153,157,160,163,166,169,173,176,179,182,185,189],{"category":22,"check":23,"severity":24,"summary":25},"Practical Utility","Problem relevance","pass","The description clearly names the problem of investigating Netdata agent crashes, panics, and fatals across a fleet, highlighting the dataset's noise and the need for efficient slicing.",{"category":22,"check":27,"severity":24,"summary":28},"Unique selling proposition","The skill offers significant value over a generic query tool by providing specific knowledge about the Netdata agent-events namespace, including index-friendly query patterns, dedup models, and field meanings.",{"category":22,"check":30,"severity":24,"summary":31},"Production readiness","The skill provides scripts and clear documentation for fetching and analyzing agent events, covering the complete lifecycle for bug investigation within its stated domain.",{"category":33,"check":34,"severity":24,"summary":35},"Scope","Single responsibility principle","The skill is focused on investigating Netdata agent-events, specifically for crashes and related issues, and does not extend into unrelated domains.",{"category":33,"check":37,"severity":24,"summary":38},"Description quality","The description accurately reflects the skill's purpose, capabilities, and intended use cases, including details about transports, field maps, and scripts.",{"category":40,"check":41,"severity":24,"summary":42},"Invocation","Scoped tools","The skill uses narrowly scoped tools (get-events.sh, analyze-events.sh) with specific filtering parameters, rather than a single generalist execution tool.",{"category":44,"check":45,"severity":24,"summary":46},"Documentation","Configuration & parameter reference","The SKILL.md details required environment variables, default behaviors for time windows and versions, and provides clear examples of script usage and payload structures.",{"category":33,"check":48,"severity":24,"summary":49},"Tool naming","The scripts and underlying concepts are clearly named (e.g., get-events.sh, analyze-events.sh, AE_FATAL_SIGNAL_CODE) and descriptive of their purpose.",{"category":33,"check":51,"severity":24,"summary":52},"Minimal I/O surface","Input parameters are well-defined (flags, JSON payload with structured fields), and output is documented JSON, avoiding unnecessary diagnostic dumps.",{"category":54,"check":55,"severity":24,"summary":56},"License","License usability","The extension is licensed under GPL-3.0-or-later, a permissive open-source license, as indicated by the bundled LICENSE file and its SPDX identifier.",{"category":58,"check":59,"severity":24,"summary":60},"Maintenance","Commit recency","The repository shows recent commits, with the latest pushedAt on 2026-05-13, indicating active maintenance.",{"category":58,"check":62,"severity":24,"summary":63},"Dependency Management","The repository has a lockfile (hasLockfile: true) and uses standard bash scripts; no third-party dependencies requiring explicit management are apparent within the skill's direct code.",{"category":65,"check":66,"severity":24,"summary":67},"Security","Secret Management","Required environment variables are documented, and scripts appear to handle them safely without echoing secrets to stdout. The `redact-events.sh` script further aids in sharing sensitive data.",{"category":65,"check":69,"severity":24,"summary":70},"Injection","The skill's design emphasizes structured filtering and documented data sources, and its scripts do not appear to execute arbitrary instructions from external data.",{"category":65,"check":72,"severity":24,"summary":73},"Transitive Supply-Chain Grenades","The skill relies on bundled scripts and documented API interactions, with no evidence of runtime downloads of uncommitted code or remote-pipe-to-shell patterns.",{"category":65,"check":75,"severity":24,"summary":76},"Sandbox Isolation","The scripts operate within the context of the repository and documented environment variables, with no indication of attempts to access or modify files outside the project folder.",{"category":65,"check":78,"severity":24,"summary":79},"Sandbox escape primitives","The bundled scripts do not contain evidence of detached-process spawns or retry loops around denied tool calls.",{"category":65,"check":81,"severity":24,"summary":82},"Data Exfiltration","The skill's purpose is data analysis within the Netdata ecosystem, and there are no indications of undocumented outbound calls or submission of confidential data to third parties.",{"category":65,"check":84,"severity":24,"summary":85},"Hidden Text Tricks","The bundled markdown files and scripts appear to be free of hidden steering tricks, control characters, or malicious Unicode sequences.",{"category":87,"check":88,"severity":24,"summary":89},"Hooks","Opaque code execution","The bundled scripts are plain bash and jq, with no evidence of obfuscation, base64 payloads, or runtime code fetching.",{"category":91,"check":92,"severity":24,"summary":93},"Portability","Structural Assumption","The skill's scripts assume standard Unix-like environments and Git repository structure, with clear documentation for environment variables and output locations.",{"category":95,"check":96,"severity":24,"summary":97},"Trust","Issues Attention","The repository shows an equal number of open and closed issues (16 opened, 16 closed) in the last 90 days, with a closure rate of 50%, indicating good maintainer engagement.",{"category":99,"check":100,"severity":24,"summary":101},"Versioning","Release Management","While there's no explicit versioning in the SKILL.md frontmatter, the `get-events.sh` script dynamically determines versions and installation instructions reference `main` implicitly through direct script execution within the repo context.",{"category":103,"check":104,"severity":24,"summary":105},"Code Execution","Validation","The bash scripts and jq queries appear to handle inputs and structure data appropriately, with clear documentation on expected fields and formats.",{"category":65,"check":107,"severity":24,"summary":108},"Unguarded Destructive Operations","The skill is primarily analytical and read-only; its scripts focus on fetching and analyzing data, with no destructive operations like deletion or modification.",{"category":103,"check":110,"severity":24,"summary":111},"Error Handling","The bash scripts use `set -euo pipefail` for robust error handling, and the JSON processing with jq is expected to handle errors gracefully. The documentation outlines potential failure modes.",{"category":103,"check":113,"severity":24,"summary":114},"Logging","The scripts provide informative output to stderr regarding their progress and findings, and the output JSON dump serves as an audit record.",{"category":116,"check":117,"severity":24,"summary":118},"Compliance","GDPR","The skill operates on system event data and does not appear to handle personal data directly. Identified fields are primarily system identifiers, and the `redact-events.sh` script aids in anonymization if needed.",{"category":116,"check":120,"severity":24,"summary":121},"Target market","The extension is designed for the Netdata agent-events namespace, which is global in scope, and makes no regional market-specific claims.",{"category":91,"check":123,"severity":24,"summary":124},"Runtime stability","The scripts rely on standard bash, jq, and common Unix utilities, making them portable across POSIX-compliant systems. Specific Netdata environment variables are documented.",{"category":44,"check":126,"severity":24,"summary":127},"README","The README file for the Netdata project is extensive and provides context, but the SKILL.md file for this specific skill serves as the primary documentation source for its purpose and usage.",{"category":33,"check":129,"severity":24,"summary":130},"Tool surface size","The skill exposes two main bash scripts (`get-events.sh`, `analyze-events.sh`), which is a manageable surface area.",{"category":40,"check":132,"severity":24,"summary":133},"Overlapping near-synonym tools","The two provided scripts, `get-events.sh` and `analyze-events.sh`, have distinct and non-overlapping functionalities, avoiding redundancy.",{"category":44,"check":135,"severity":24,"summary":136},"Phantom features","All advertised features, including script functionalities, filtering options, and transport mechanisms, are implemented and documented in the SKILL.md and associated scripts.",{"category":138,"check":139,"severity":24,"summary":140},"Install","Installation instruction","SKILL.md clearly outlines required environment variables, how to obtain them, and provides clear examples of script invocation.",{"category":142,"check":143,"severity":24,"summary":144},"Errors","Actionable error messages","The scripts provide clear usage instructions and error messages for incorrect arguments, and the documentation details failure modes and recovery steps.",{"category":146,"check":147,"severity":24,"summary":148},"Execution","Pinned dependencies","The skill's scripts rely on standard system utilities (bash, jq, git) and documented environment variables, without external package dependencies requiring pinning.",{"category":33,"check":150,"severity":151,"summary":152},"Dry-run preview","not_applicable","The skill is analytical and read-only; it does not perform state-changing operations or send data outward, making a dry-run mode not applicable.",{"category":154,"check":155,"severity":24,"summary":156},"Protocol","Idempotent retry & timeouts","The skill relies on the underlying Netdata API query mechanisms, which are expected to handle timeouts and idempotency. The scripts themselves do not perform state-changing operations.",{"category":116,"check":158,"severity":24,"summary":159},"Telemetry opt-in","The skill's scripts do not appear to emit telemetry. The broader Netdata project documentation mentions telemetry is opt-in.",{"category":40,"check":161,"severity":24,"summary":162},"Precise Purpose","The skill precisely defines its purpose as a bug-investigation tool for Netdata agent-events crashes and specifies its use cases (investigating crashes, grepping for events, looking for regressions).",{"category":40,"check":164,"severity":24,"summary":165},"Concise Frontmatter","The SKILL.md frontmatter is concise, directly stating the skill's purpose and key functionalities without excessive preamble or keyword stuffing.",{"category":44,"check":167,"severity":24,"summary":168},"Concise Body","The SKILL.md body is well-structured and under 500 lines, with detailed explanations, recipes, and references delegated to separate files like AE_FIELDS.md and query-discipline.md.",{"category":170,"check":171,"severity":24,"summary":172},"Context","Progressive Disclosure","Detailed information such as field maps, query discipline, and transport mechanisms are documented in separate markdown files, linked from the main SKILL.md, demonstrating progressive disclosure.",{"category":170,"check":174,"severity":151,"summary":175},"Forked exploration","The skill is designed for focused data retrieval and analysis rather than deep, exploratory code review or multi-file inspection, so `context: fork` is not applicable.",{"category":22,"check":177,"severity":24,"summary":178},"Usage examples","The skill includes comprehensive examples in its scripts and documentation, demonstrating how to fetch and analyze events for various scenarios, including common queries and regression spotting.",{"category":22,"check":180,"severity":24,"summary":181},"Edge cases","The documentation addresses potential edge cases such as empty stack traces, shutdown races, and the implications of the update cadence and dedup model, providing guidance on interpretation.",{"category":103,"check":183,"severity":151,"summary":184},"Tool Fallback","The skill uses bundled scripts and standard communication protocols; it does not explicitly rely on external or custom MCP servers with no fallback.",{"category":186,"check":187,"severity":24,"summary":188},"Safety","Halt on unexpected state","The bash scripts use `set -euo pipefail` to halt on errors, and the documentation implicitly guides users to filter data and investigate specific conditions, preventing the workflow from proceeding on ambiguous states.",{"category":91,"check":190,"severity":24,"summary":191},"Cross-skill coupling","The skill is self-contained and clearly declares its dependencies on other Netdata skills via `source` statements and documentation, ensuring it works standalone.",1778694770697,"This skill provides a set of bash scripts and detailed documentation for investigating Netdata agent events, specifically focusing on crashes, panics, and fatals. It allows users to download and analyze event data locally using various transports and provides tools for filtering, grouping, and identifying root causes.",[195,196,197,198,199],"Triage crashes, panics, and fatals across Netdata fleet","Download events of interest and cluster locally","Support for Cloud API, direct agent API, and ssh transports","Index-friendly query patterns for efficient data slicing","Analysis scripts for grouping and identifying event patterns",[201,202,203],"Generic log querying across all namespaces","Real-time monitoring of active system performance","Modifying agent configurations or behavior","3.0.0","4.4.0","To enable efficient, in-depth investigation of Netdata agent crashes and critical events by providing specialized tools and documentation for slicing and analyzing event data.","The skill is exceptionally well-documented and robust, with clear scripts, comprehensive examples, and thorough handling of edge cases and security considerations. No critical or warning findings.",99,"Highly polished and robust skill for deep-diving Netdata agent event logs, particularly for crash and fatal analysis.",[211,212,213,214,215,216],"debugging","logs","troubleshooting","netdata","events","crashes","global","verified",[220,221,222,223],"Investigating agent crashes, panics, or fatals","Searching for events touching specific functions, files, or versions","Identifying regressions across agent versions","Analyzing agent stability issues reported by users",{"codeQuality":225,"collectedAt":227,"documentation":228,"maintenance":231,"security":237,"testCoverage":239},{"hasLockfile":226},true,1778694751922,{"descriptionLength":229,"readmeSize":230},978,26316,{"closedIssues90d":232,"forks":233,"hasChangelog":234,"openIssues90d":232,"pushedAt":235,"stars":236},16,6433,false,1778692486000,78799,{"hasNpmPackage":234,"license":238,"smitheryVerified":234},"GPL-3.0",{"hasCi":226,"hasTests":226},{"updatedAt":241},1778694770809,{"basePath":243,"githubOwner":214,"githubRepo":214,"locale":18,"slug":13,"type":244},".agents/skills/query-agent-events","skill",null,{"evaluate":247,"extract":249},{"promptVersionExtension":204,"promptVersionScoring":205,"score":208,"tags":248,"targetMarket":217,"tier":218},[211,212,213,214,215,216],{"commitSha":250},"HEAD",{"repoId":252},"kd70yp91ybn40a638h3hzz6nbd86m2cw",{"_creationTime":254,"_id":252,"identity":255,"providers":256,"workflow":611},1778694565561.0132,{"githubOwner":214,"githubRepo":214,"sourceUrl":14},{"classify":257,"discover":586,"github":589},{"commitSha":250,"extensions":258},[259,277,300,313,340,348,369,379,406,414,422,446,459,486,508,521,531,540,548,557,573],{"basePath":260,"description":261,"displayName":262,"installMethods":263,"rationale":264,"selectedPaths":265,"source":276,"sourceLanguage":18,"type":244},".agents/skills/codacy-audit","Codacy Cloud workflow for this repository -- run Codacy's analyzers locally before `git push` (mirrors what Codacy CI runs), and fetch/cluster Codacy issues for any PR via the v3 API. Use when the user mentions Codacy, \"codacy analysis\", `codacy-analysis-cli`, \"codacy issues on PR\", \"fix codacy CI\", \"codacy markdownlint findings\", or any Codacy gate failing on a netdata-org PR. Ships scripts analyze-local.sh (docker/binary runner for codacy-analysis-cli) and pr-issues.sh (paginated v3 issue fetch + group-by tool/pattern/severity/file). Token-safe -- CODACY_TOKEN never reaches assistant-visible stdout. Read-only by design in the current SOW; write actions (mark FP, mark fixed) are deferred.","codacy-audit",{"claudeCode":12},"SKILL.md frontmatter at .agents/skills/codacy-audit/SKILL.md",[266,269,272,274],{"path":267,"priority":268},"SKILL.md","mandatory",{"path":270,"priority":271},"scripts/_lib.sh","low",{"path":273,"priority":271},"scripts/analyze-local.sh",{"path":275,"priority":271},"scripts/pr-issues.sh","rule",{"basePath":278,"description":279,"displayName":280,"installMethods":281,"rationale":282,"selectedPaths":283,"source":276,"sourceLanguage":18,"type":244},".agents/skills/coverity-audit","Triage Coverity Scan defects (https://scan.coverity.com) for this project — fetch defect lists, fetch per-defect details, and apply triage decisions (Bug / FalsePositive / Intentional with severity, action, and a comment). Use when the user asks to \"review Coverity defects\", \"triage Coverity findings\", \"fetch Coverity outstanding\", or anything mentioning Coverity Scan, CIDs, or scan.coverity.com.","coverity-audit",{"claudeCode":12},"SKILL.md frontmatter at .agents/skills/coverity-audit/SKILL.md",[284,285,286,288,290,292,294,296,298],{"path":267,"priority":268},{"path":270,"priority":271},{"path":287,"priority":271},"scripts/fetch-details.sh",{"path":289,"priority":271},"scripts/fetch-table.sh",{"path":291,"priority":271},"scripts/finalize-defect.sh",{"path":293,"priority":271},"scripts/keepalive.sh",{"path":295,"priority":271},"scripts/prepare-defect.sh",{"path":297,"priority":271},"scripts/resolve-cid-to-diid.sh",{"path":299,"priority":271},"scripts/update-triage.sh",{"basePath":301,"description":302,"displayName":303,"installMethods":304,"rationale":305,"selectedPaths":306,"source":276,"sourceLanguage":18,"type":244},".agents/skills/graphql-audit","Triage GitHub Code Scanning alerts (CodeQL with security-extended suite) for this repository — list open alerts, dismiss as false positive / won't fix / used in tests, query via GitHub REST + GraphQL. Use when the user asks to \"review GitHub security alerts\", \"check CodeQL findings\", \"triage code scanning\", or anything mentioning Code Scanning, CodeQL, security-extended, or github.com/$repo/security/code-scanning.","graphql-audit",{"claudeCode":12},"SKILL.md frontmatter at .agents/skills/graphql-audit/SKILL.md",[307,308,309,311],{"path":267,"priority":268},{"path":270,"priority":271},{"path":310,"priority":271},"scripts/codeql-dismiss.sh",{"path":312,"priority":271},"scripts/codeql-list.sh",{"basePath":314,"description":315,"displayName":316,"installMethods":317,"rationale":318,"selectedPaths":319,"source":276,"sourceLanguage":18,"type":244},".agents/skills/integrations-lifecycle","Authoritative reference for Netdata's integrations pipeline -- how `metadata.yaml` drives per-integration pages, the `COLLECTORS.md`/`SECRETS.md`/`SERVICE-DISCOVERY.md` umbrellas, the `integrations.js` artifact consumed by the cloud-frontend, and per-integration `.md` files committed to the repo. Use when adding/modifying any integration (collector, exporter, agent or cloud notification, authentication, secretstore, service-discovery, log type, deploy method); editing `metadata.yaml`; checking whether `integrations/*.md` should be hand-edited; reading the four generator scripts under `integrations/`, schemas under `integrations/schemas/`, templates under `integrations/templates/`, the workflows `generate-integrations.yml` or `check-markdown.yml`; ibm.d modules where `metadata.yaml` is generated from `contexts.yaml`; the 5-file consistency rule (metadata.yaml + config_schema.json + stock conf + alerts + README move together).","integrations-lifecycle",{"claudeCode":12},"SKILL.md frontmatter at .agents/skills/integrations-lifecycle/SKILL.md",[320,321,324,326,328,330,332,334,336,338],{"path":267,"priority":268},{"path":322,"priority":323},"artifacts-and-banners.md","medium",{"path":325,"priority":323},"consistency.md",{"path":327,"priority":323},"description-authoring.md",{"path":329,"priority":323},"gotchas.md",{"path":331,"priority":323},"ibm-d.md",{"path":333,"priority":323},"in-app-contract.md",{"path":335,"priority":323},"per-type-matrix.md",{"path":337,"priority":323},"pipeline.md",{"path":339,"priority":323},"schema-reference.md",{"basePath":341,"description":342,"displayName":343,"installMethods":344,"rationale":345,"selectedPaths":346,"source":276,"sourceLanguage":18,"type":244},".agents/skills/learn-pr-preview","Use only when the user explicitly asks to build, run, preview, inspect, or validate learn.netdata.cloud locally using the contents of a PR or documentation branch before merge. Do not trigger for ordinary docs edits unless the user asks for a local Learn preview.","learn-pr-preview",{"claudeCode":12},"SKILL.md frontmatter at .agents/skills/learn-pr-preview/SKILL.md",[347],{"path":267,"priority":268},{"basePath":349,"description":350,"displayName":351,"installMethods":352,"rationale":353,"selectedPaths":354,"source":276,"sourceLanguage":18,"type":244},".agents/skills/learn-site-structure","Authoritative reference for how docs in this repo (and 5 other Netdata-org repos) become published pages on `learn.netdata.cloud`. Covers the `\u003Crepo>/docs/.map/map.yaml` source-of-truth (the actual lever -- filesystem path is irrelevant for routing), the live `ingest/ingest.py` orchestrator in the learn repo (NOT the legacy `ingest.js`), frontmatter injection, slug rules, sidebar autogeneration, MDX escape rules, versioning, the 4-mechanism redirect stack, the 6 source repositories, the every-3-hours CI ingest, Netlify deploy, and the `part_of_learn=True` opt-in for files hand-authored in the learn repo. Use when adding/moving/renaming/deleting a docs page; when a page on Learn looks wrong; when wondering whether to edit a doc here or in the learn repo; when reading `ingest.py`, `sidebars.js`, `docusaurus.config.js`, `static.toml`, `LegacyLearnCorrelateLinksWithGHURLs.json`, `netlify.toml`, the `\u003C!--startmeta` blocks in `.mdx` files, or the workflows `ingest.yml` and `daily-learn-link-check.yml`.","learn-site-structure",{"claudeCode":12},"SKILL.md frontmatter at .agents/skills/learn-site-structure/SKILL.md",[355,356,358,360,362,363,365,367],{"path":267,"priority":268},{"path":357,"priority":323},"authoring-boundary.md",{"path":359,"priority":323},"mapping.md",{"path":361,"priority":323},"mdx-rules.md",{"path":337,"priority":323},{"path":364,"priority":323},"pitfalls-and-gotchas.md",{"path":366,"priority":323},"redirects.md",{"path":368,"priority":323},"sidebars.md",{"basePath":370,"description":371,"displayName":372,"installMethods":373,"rationale":374,"selectedPaths":375,"source":276,"sourceLanguage":18,"type":244},".agents/skills/mirror-netdata-repos","Maintains a local mirror of Netdata-org source repositories at `${NETDATA_REPOS_DIR}` so AI assistants and developers can do cross-repo grep / code review locally without GitHub API round-trips and rate limits. Ships a vendored sync script (`scripts/sync-netdata-repos.sh`) that updates ~150 repos in two phases (resync existing on default branch, discover and clone new). Safety -- skips repos that have staged or modified changes; otherwise switches to the default branch and recursively updates submodules. Reset-to-default is intentional -- it prevents stale-feature-branch \"black hole\" repos that confuse cross-repo reasoning. Supports `--repo NAME` (repeatable) to scope to specific repos. Independent from any other repo mirrors this workstation may have. Use when the local mirror is out of date, before a cross-repo grep / review session, when adding a new netdata-org repo (auto-discovered), when an assistant needs cross-repo cognition without `gh` API turnaround.","mirror-netdata-repos",{"claudeCode":12},"SKILL.md frontmatter at .agents/skills/mirror-netdata-repos/SKILL.md",[376,377],{"path":267,"priority":268},{"path":378,"priority":271},"scripts/sync-netdata-repos.sh",{"basePath":380,"description":381,"displayName":382,"installMethods":383,"rationale":384,"selectedPaths":385,"source":276,"sourceLanguage":18,"type":244},".agents/skills/pr-reviews","Address pull-request comments and reviews iteratively until the PR is clean — fetch all comments with paranoid pagination, classify by author (AI bot vs human), verify each finding, address it, find similar patterns, reply per-thread, resolve threads, check CI before pushing, retrigger AI reviewers (cubic-dev-ai, copilot), and wait for new feedback. Use when the user says \"address PR comments\", \"look at the reviews on PR N\", \"deal with the bot comments\", \"iterate on PR N until clean\", or anything mentioning PR comments / reviews / cubic / copilot.","pr-reviews",{"claudeCode":12},"SKILL.md frontmatter at .agents/skills/pr-reviews/SKILL.md",[386,387,388,390,392,394,396,398,400,402,404],{"path":267,"priority":268},{"path":270,"priority":271},{"path":389,"priority":271},"scripts/ci-status.sh",{"path":391,"priority":271},"scripts/fetch-all.sh",{"path":393,"priority":271},"scripts/fetch-sonar-findings.sh",{"path":395,"priority":271},"scripts/list-open-threads.sh",{"path":397,"priority":271},"scripts/reply-thread.sh",{"path":399,"priority":271},"scripts/resolve-thread.sh",{"path":401,"priority":271},"scripts/trigger-copilot.sh",{"path":403,"priority":271},"scripts/trigger-cubic.sh",{"path":405,"priority":271},"scripts/wait-for-activity.sh",{"basePath":407,"description":408,"displayName":409,"installMethods":410,"rationale":411,"selectedPaths":412,"source":276,"sourceLanguage":18,"type":244},".agents/skills/project-snmp-profiles-authoring","Use when editing Netdata SNMP profile YAMLs, topology SNMP profiles, ddsnmp profile parsing, or profile-format documentation. Requires checking source MIB field accessibility, especially MAX-ACCESS not-accessible INDEX objects, before adding or changing profile symbols.","project-snmp-profiles-authoring",{"claudeCode":12},"SKILL.md frontmatter at .agents/skills/project-snmp-profiles-authoring/SKILL.md",[413],{"path":267,"priority":268},{"basePath":415,"description":416,"displayName":417,"installMethods":418,"rationale":419,"selectedPaths":420,"source":276,"sourceLanguage":18,"type":244},".agents/skills/project-writing-collectors","Best practices and orientation for AI assistants authoring or modifying Netdata data-collection plugins or modules in any language. Read before adding a new collector, modifying an existing one, working on logs, topology, NetFlow/sFlow/IPFIX, OTEL ingestion, SNMP profiles, statsd, Prometheus scraping, or interactive Functions. Covers the mental model, framework-agnostic best practices, dashboard-shaping mechanisms (NIDL, SNMP profiles, statsd synthetic_charts, OTEL mappings, Prometheus exposition), production quality criteria, the plugin landscape, per-data-type patterns (metrics, logs, snapshots, topology, enrichment), per-domain common practices, and a pre-PR self-check.","project-writing-collectors",{"claudeCode":12},"SKILL.md frontmatter at .agents/skills/project-writing-collectors/SKILL.md",[421],{"path":267,"priority":268},{"basePath":243,"description":10,"displayName":13,"installMethods":423,"rationale":424,"selectedPaths":425,"source":276,"sourceLanguage":18,"type":244},{"claudeCode":12},"SKILL.md frontmatter at .agents/skills/query-agent-events/SKILL.md",[426,427,429,431,433,435,436,438,440,442,444],{"path":267,"priority":268},{"path":428,"priority":323},"AE_FIELDS.md",{"path":430,"priority":323},"finding-crashes.md",{"path":432,"priority":323},"finding-fatals.md",{"path":434,"priority":323},"query-discipline.md",{"path":270,"priority":271},{"path":437,"priority":271},"scripts/analyze-events.sh",{"path":439,"priority":271},"scripts/get-events.sh",{"path":441,"priority":271},"scripts/redact-events.sh",{"path":443,"priority":323},"transports.md",{"path":445,"priority":323},"update-cadence.md",{"basePath":447,"description":448,"displayName":449,"installMethods":450,"rationale":451,"selectedPaths":452,"source":276,"sourceLanguage":18,"type":244},".agents/skills/sonarqube-audit","Triage SonarCloud findings (issues, hotspots, code smells, vulnerabilities) for this project — search what's open, mark False Positive / Won't Fix / Confirm / Safe / Acknowledged / Fixed, batch-mark whole rule families. Use when the user asks to \"review Sonar findings\", \"triage SonarCloud\", \"mark False Positive on Sonar\", or anything mentioning sonarqube/sonarcloud, S2259, S5008, code smells, security hotspots, or sonarcloud.io.","sonarqube-audit",{"claudeCode":12},"SKILL.md frontmatter at .agents/skills/sonarqube-audit/SKILL.md",[453,454,455,457],{"path":267,"priority":268},{"path":270,"priority":271},{"path":456,"priority":271},"scripts/sonar-mark.sh",{"path":458,"priority":271},"scripts/sonar-search.sh",{"basePath":460,"description":461,"displayName":462,"installMethods":463,"rationale":464,"selectedPaths":465,"source":276,"sourceLanguage":18,"type":244},"docs/netdata-ai/skills/query-netdata-agents","Query Netdata Agents (parents and children) directly via their HTTP API on port 19999. Includes a bearer-token helper that mints, caches, and transparently refreshes a per-agent bearer from a long-lived Netdata Cloud token, and auto-detects bearer-protected agents. Use when the user asks how to call an agent's REST API or Function directly, query an agent's logs/metrics/alerts directly, mint a bearer token from a cloud token, or work around bearer protection.","query-netdata-agents",{"claudeCode":12},"SKILL.md frontmatter at docs/netdata-ai/skills/query-netdata-agents/SKILL.md",[466,467,469,471,473,475,477,479,481,483,485],{"path":267,"priority":268},{"path":468,"priority":323},"query-alerts.md",{"path":470,"priority":323},"query-dyncfg.md",{"path":472,"priority":323},"query-flows.md",{"path":474,"priority":323},"query-functions.md",{"path":476,"priority":323},"query-logs.md",{"path":478,"priority":323},"query-metrics.md",{"path":480,"priority":323},"query-nodes.md",{"path":482,"priority":323},"query-streaming.md",{"path":484,"priority":323},"query-topology.md",{"path":270,"priority":271},{"basePath":487,"description":488,"displayName":489,"installMethods":490,"rationale":491,"selectedPaths":492,"source":276,"sourceLanguage":18,"type":244},"docs/netdata-ai/skills/query-netdata-cloud","Query Netdata Cloud via its REST API -- metrics, logs (systemd-journal / windows-events / otel-logs), topology graphs (topology:snmp), network flows (flows:netflow), alerts, dynamic configuration (DynCfg), and generic Functions on a node. Use when the user asks about querying Netdata Cloud, fetching metrics from the cloud, querying logs / topology / netflow / sflow / ipfix through Cloud, listing or modifying configurations via DynCfg, calling agent Functions through Cloud, listing spaces/rooms/nodes, or building a curl command against `app.netdata.cloud`. Pairs with the `query-netdata-agents` skill when direct-agent access is needed.","query-netdata-cloud",{"claudeCode":12},"SKILL.md frontmatter at docs/netdata-ai/skills/query-netdata-cloud/SKILL.md",[493,494,495,496,498,499,500,501,503,504,505,507],{"path":267,"priority":268},{"path":468,"priority":323},{"path":470,"priority":323},{"path":497,"priority":323},"query-feed.md",{"path":472,"priority":323},{"path":474,"priority":323},{"path":476,"priority":323},{"path":502,"priority":323},"query-members.md",{"path":478,"priority":323},{"path":480,"priority":323},{"path":506,"priority":323},"query-rooms.md",{"path":484,"priority":323},{"basePath":509,"installMethods":510,"rationale":512,"selectedPaths":513,"source":276,"sourceLanguage":18,"type":520},"src/crates/netdata-log-viewer/otel-signal-viewer-plugin",{"cargo":511},"otel-signal-viewer-plugin","cli ecosystem detected at src/crates/netdata-log-viewer/otel-signal-viewer-plugin",[514,516,518],{"path":515,"priority":268},"Cargo.toml",{"path":517,"priority":268},"README.md",{"path":519,"priority":323},"src/main.rs","cli",{"basePath":522,"installMethods":523,"rationale":525,"selectedPaths":526,"source":276,"sourceLanguage":18,"type":520},"src/crates/netdata-otel/otel-plugin",{"cargo":524},"otel-plugin","cli ecosystem detected at src/crates/netdata-otel/otel-plugin",[527,528,529],{"path":515,"priority":268},{"path":519,"priority":323},{"path":530,"priority":271},"src/lib.rs",{"basePath":532,"installMethods":533,"rationale":535,"selectedPaths":536,"source":276,"sourceLanguage":18,"type":520},"src/crates/netflow-plugin",{"cargo":534},"netflow-plugin","cli ecosystem detected at src/crates/netflow-plugin",[537,538,539],{"path":515,"priority":268},{"path":517,"priority":268},{"path":519,"priority":323},{"basePath":541,"installMethods":542,"rationale":544,"selectedPaths":545,"source":276,"sourceLanguage":18,"type":520},"src/crates/netipc",{"cargo":543},"netipc","cli ecosystem detected at src/crates/netipc",[546,547],{"path":515,"priority":268},{"path":530,"priority":271},{"basePath":549,"installMethods":550,"rationale":552,"selectedPaths":553,"source":276,"sourceLanguage":18,"type":520},"src/crates/rdp",{"cargo":551},"rdp","cli ecosystem detected at src/crates/rdp",[554,555,556],{"path":515,"priority":268},{"path":519,"priority":323},{"path":530,"priority":271},{"basePath":558,"installMethods":559,"rationale":561,"selectedPaths":562,"source":276,"sourceLanguage":18,"type":520},"src/go",{"go":560},"github.com/netdata/netdata/go/plugins","cli ecosystem detected at src/go",[563,565,567,569,571],{"path":564,"priority":268},"go.mod",{"path":566,"priority":323},"cmd/godplugin/main.go",{"path":568,"priority":323},"cmd/ibmdplugin/main.go",{"path":570,"priority":323},"cmd/scriptsdplugin/main.go",{"path":572,"priority":271},"cmd/ibmdplugin/stub.go",{"basePath":574,"installMethods":575,"rationale":577,"selectedPaths":578,"source":276,"sourceLanguage":18,"type":585},"",{"remote":576},"https://app.netdata.cloud/api/v1/mcp","server.json with namespace/server name at server.json",[579,581,582],{"path":580,"priority":268},"server.json",{"path":517,"priority":268},{"path":583,"priority":584},"LICENSE","high","mcp",{"sources":587},[588],"manual",{"closedIssues90d":232,"description":590,"forks":233,"homepage":591,"license":238,"openIssues90d":232,"pushedAt":235,"readmeSize":230,"stars":236,"topics":592},"The fastest path to AI-powered full stack observability, even for lean teams.","https://www.netdata.cloud",[593,594,595,596,597,214,598,599,600,601,602,603,604,605,606,607,608,609,585,610],"monitoring","docker","kubernetes","cncf","prometheus","devops","observability","alerting","influxdb","grafana","data-visualization","database","linux","machine-learning","mysql","postgresql","mongodb","ai",{"classifiedAt":612,"discoverAt":613,"extractAt":614,"githubAt":614,"updatedAt":612},1778694578050,1778694565561,1778694575885,[216,211,215,212,214,213],{"evaluatedAt":241,"extractAt":617,"updatedAt":241},1778694578248,[],[620,639,671,690,719,749],{"_creationTime":621,"_id":622,"community":623,"display":624,"identity":627,"providers":628,"relations":635,"tags":636,"workflow":637},1778694578248.106,"k172cmz9daa3kvvdqf7zmq035586n8c3",{"reviewCount":8},{"description":461,"installMethods":625,"name":626,"sourceUrl":14},{"claudeCode":12},"Query Netdata Agents",{"basePath":460,"githubOwner":214,"githubRepo":214,"locale":18,"slug":462,"type":244},{"evaluate":629,"extract":633},{"promptVersionExtension":204,"promptVersionScoring":205,"score":208,"tags":630,"targetMarket":217,"tier":218},[214,593,631,213,212,632],"api","metrics",{"commitSha":250,"license":634},"GPL-3.0-or-later",{"repoId":252},[631,212,632,593,214,213],{"evaluatedAt":638,"extractAt":617,"updatedAt":638},1778694811524,{"_creationTime":640,"_id":641,"community":642,"display":643,"identity":649,"providers":654,"relations":665,"tags":667,"workflow":668},1778697652123.895,"k179x649dvyg7xswjx2h5a199n86m32x",{"reviewCount":8},{"description":644,"installMethods":645,"name":647,"sourceUrl":648},"Diagnose OpenClaw Android, iOS, or macOS node pairing, QR/setup code, route, auth, and connection failures.",{"claudeCode":646},"steipete/clawdis","Node Connect","https://github.com/steipete/clawdis",{"basePath":650,"githubOwner":651,"githubRepo":652,"locale":18,"slug":653,"type":244},"skills/node-connect","steipete","clawdis","node-connect",{"evaluate":655,"extract":663},{"promptVersionExtension":204,"promptVersionScoring":205,"score":656,"tags":657,"targetMarket":217,"tier":218},100,[211,658,659,660,661,213,662],"networking","android","ios","macos","openclaws",{"commitSha":250,"license":664},"MIT",{"repoId":666},"kd738npxg9yh3xf3vddzy9fyfh86nhng",[659,211,660,661,658,662,213],{"evaluatedAt":669,"extractAt":670,"updatedAt":669},1778698735523,1778697652123,{"_creationTime":672,"_id":673,"community":674,"display":675,"identity":679,"providers":681,"relations":686,"tags":687,"workflow":688},1778697652123.8813,"k175pymk0vm7xrcjj2p0jf904186nae7",{"reviewCount":8},{"description":676,"installMethods":677,"name":678,"sourceUrl":648},"Debug OpenClaw model, provider, tool-surface, code-mode, streaming, and live/Crabbox behavior by choosing the right logs, probes, and proof path before changing code.",{"claudeCode":646},"openclaw-debugging",{"basePath":680,"githubOwner":651,"githubRepo":652,"locale":18,"slug":678,"type":244},".agents/skills/openclaw-debugging",{"evaluate":682,"extract":685},{"promptVersionExtension":204,"promptVersionScoring":205,"score":656,"tags":683,"targetMarket":217,"tier":218},[211,662,520,213,684],"development",{"commitSha":250},{"repoId":666},[520,211,684,662,213],{"evaluatedAt":689,"extractAt":670,"updatedAt":689},1778697754713,{"_creationTime":691,"_id":692,"community":693,"display":694,"identity":700,"providers":705,"relations":713,"tags":715,"workflow":716},1778683190010.284,"k1757t8mrzzrf8yabxrtp82mg586m6nf",{"reviewCount":8},{"description":695,"installMethods":696,"name":698,"sourceUrl":699},"Systematic debugging methodology emphasizing root cause analysis over quick fixes",{"claudeCode":697},"bobmatnyc/claude-mpm-skills","Systematic Debugging","https://github.com/bobmatnyc/claude-mpm-skills",{"basePath":701,"githubOwner":702,"githubRepo":703,"locale":18,"slug":704,"type":244},"universal/debugging/systematic-debugging","bobmatnyc","claude-mpm-skills","systematic-debugging",{"evaluate":706,"extract":711},{"promptVersionExtension":204,"promptVersionScoring":205,"score":656,"tags":707,"targetMarket":217,"tier":218},[211,213,708,709,710],"root-cause-analysis","methodology","problem-solving",{"commitSha":250,"license":712},"Apache-2.0",{"repoId":714},"kd72g55e5qeqs90bk1bvkt8wbx86nkn3",[211,709,710,708,213],{"evaluatedAt":717,"extractAt":718,"updatedAt":717},1778686304588,1778683190010,{"_creationTime":720,"_id":721,"community":722,"display":723,"identity":728,"providers":733,"relations":740,"tags":744,"workflow":745},1778684074950.4968,"k17a2p5tj2n738wj5cs7gerp2s86mvsp",{"reviewCount":8},{"description":724,"installMethods":725,"name":213,"sourceUrl":727},"使用 Chrome DevTools MCP 和文档来排查连接和目标问题。当 list_pages、new_page 或 navigate_page 失败，或服务器初始化失败时，触发此技能。",{"claudeCode":726},"ChromeDevTools/chrome-devtools-mcp","https://github.com/ChromeDevTools/chrome-devtools-mcp",{"basePath":729,"githubOwner":730,"githubRepo":731,"locale":732,"slug":213,"type":244},"skills/troubleshooting","ChromeDevTools","chrome-devtools-mcp","zh-CN",{"evaluate":734,"extract":739},{"promptVersionExtension":204,"promptVersionScoring":205,"score":656,"tags":735,"targetMarket":217,"tier":218},[736,737,213,211,738,585],"devtools","chrome","automation",{"commitSha":250},{"parentExtensionId":741,"repoId":742,"translatedFrom":743},"k17evynnzmmag96rw4rpybyydx86m0py","kd7an8ppnz1q2np9tc5yw4qenn86mg6h","k1709q7z5grftph7kb93c569qh86n56a",[738,737,211,736,585,213],{"evaluatedAt":746,"extractAt":747,"updatedAt":748},1778683958622,1778683762612,1778684074950,{"_creationTime":750,"_id":751,"community":752,"display":753,"identity":755,"providers":756,"relations":762,"tags":763,"workflow":764},1778694578248.1062,"k17e56dzsqh7qked458bjbs0e586n21y",{"reviewCount":8},{"description":488,"installMethods":754,"name":489,"sourceUrl":14},{"claudeCode":12},{"basePath":487,"githubOwner":214,"githubRepo":214,"locale":18,"slug":489,"type":244},{"evaluate":757,"extract":761},{"promptVersionExtension":204,"promptVersionScoring":205,"score":656,"tags":758,"targetMarket":217,"tier":218},[214,631,593,632,212,759,760],"topology","rest",{"commitSha":250},{"repoId":252},[631,212,632,593,214,760,759],{"evaluatedAt":765,"extractAt":617,"updatedAt":765},1778694825298]