Loading...
Loading...
Deeply analyzes Agent Studio framework structural health: catching phantom require() references, wrong module depth paths, missing skill/agent dependencies, bloated configurations, archived references in active code, stale catalog counts, and empty tool/skill directories.
npx skill4agent add oimiragieo/agent-studio ecosystem-integrity-scannerrequire()require()Skill({ skill: 'ecosystem-integrity-scanner' });| Skill | Purpose | When |
|---|---|---|
| Track scan progress | Always |
| Fast targeted code search | When investigating |
| Concept discovery | When pattern hunting |
| Compress large audit results | When output is large |
| Gate completion on zero errors | Before marking done |
| Check prior audit patterns | At start |
validate-ecosystem-integrity.cjsprocess.cwd()[PHANTOM_REQUIRE]MODULE_NOT_FOUNDqadeveloperdeveloper.claude/context/reports/qa/ecosystem-integrity-report-{ISO-date}.mdTaskUpdate(completed)| Anti-Pattern | Risk | Correct Approach |
|---|---|---|
Treating | Registry drifts from reality; agents get wrong counts | Always update agent-registry.json when agent files change |
| Skipping scan after bulk framework batch ops | Batch ops most commonly create phantom refs | Run scan as the FINAL step of every batch operation |
| Manually patching require() paths without re-scanning | One fix may mask three new breaks | Always re-run full scan after patching paths |
Running scanner against | Archive content has intentionally broken refs; false positives | Scanner skip rules handle this; trust the skip list |
Adding to | Accidentally suppressing real phantom detections | Only add files that provably generate child scripts |
node scripts/validation/validate-ecosystem-integrity.cjs[PHANTOM_REQUIRE]require()import.js.cjs.mjs.json[PHANTOM_SKILL]skills:.claude/skills/{name}/[EMPTY_DIR].claude/tools/.claude/skills/[ENCODING]0xFEFF0xFFFE[ARCHIVED_REF].claude/_archive/.claude/archive/[STALE_CATALOG]agent-registry.json.md.claude/context/reports/qa/ecosystem-integrity-report-{ISO-date}.md# Ecosystem Integrity Report
<!-- Agent: qa | Task: #{id} | Session: {date} -->
**Date:** YYYY-MM-DD
**Overall Status:** PASS / FAIL
**Errors:** N | **Warnings:** N
## HIGH — Runtime Blocking (must fix before deployment)
- `[PHANTOM_REQUIRE]` — Module resolution failures that crash hooks/scripts
- `[PHANTOM_SKILL]` — Missing skills that break agent workflows silently
## MEDIUM — Structural Integrity (fix in current sprint)
- `[ARCHIVED_REF]` — Active code pointing at archived/dead modules
- `[STALE_CATALOG]` — Registry count mismatch with actual agent files
## LOW — Housekeeping (fix in next maintenance window)
- `[EMPTY_DIR]` — Ghost directories creating registry noise
- `[ENCODING]` — UTF-16 files that may break parsers| Error Type | Spawn Agent | Task Description |
|---|---|---|
| | Fix broken require() path in |
| | Remove or create missing skill |
| | Replace archive reference in |
| | Regenerate agent-registry.json |
| | Remove empty directory |
| | Re-encode |
cat .claude/context/memory/learnings.md
cat .claude/context/memory/issues.md.claude/context/memory/learnings.md.claude/context/memory/decisions.md.claude/context/memory/issues.mdAssume interruption: If the audit report isn't saved to disk, it didn't happen.