Compétences wiki-researcher
🔍

wiki-researcher

Sûr

Conduct Deep Codebase Research with Evidence-Based Analysis

Shallow code reviews lead to misunderstandings and bugs. This skill enforces rigorous, evidence-based investigation of codebases through structured multi-turn analysis.

Prend en charge: Claude Codex Code(CC)
🥉 73 Bronze
1

Télécharger le ZIP du skill

2

Importer dans Claude

Allez dans Paramètres → Capacités → Skills → Importer un skill

3

Activez et commencez Ă  utiliser

Tester

Utilisation de "wiki-researcher". How does the caching layer work?

Résultat attendu:

HIGH Confidence: CacheManager (src/cache/manager.ts:15) implements LRU eviction. Cache entries flow through RedisCacheAdapter (src/cache/redis.ts:42) which calls Redis SETEX with TTL. Default TTL is 300s (config.ts:78). Cache miss fallback to DataLoader (src/dataloader/index.ts:12) for batch fetching.

Utilisation de "wiki-researcher". What handles payment failures?

Résultat attendu:

MEDIUM Confidence: PaymentService.processPayment (src/services/payments.ts:89) wraps Stripe calls in try-catch. Failures log to Sentry (line 112) and emit PAYMENT_FAILED event (line 115). Event consumers: EmailService sends notification (src/email/handlers.ts:78), webhook dispatcher triggers external callbacks (src/webhook/dispatcher.ts:45). Have not verified retry logic.

Audit de sécurité

Sûr
v1 • 2/25/2026

Static analysis flagged 5 high-risk patterns and 1 medium-risk pattern. All findings are false positives caused by markdown syntax misinterpretation (table pipes, list dashes). The skill is a legitimate codebase research tool with no network requests, file writes, or credential access. It provides structured methodology for deep code analysis using standard read-only tools (Glob, Grep, Read).

1
Fichiers analysés
71
Lignes analysées
3
résultats
1
Total des audits
Problèmes à risque moyen (1)
False Positive: Markdown Syntax Misinterpreted
Static scanner flagged 'Ruby/shell backtick execution' at line 63. This is a false positive - the line contains '- NEVER repeat findings from prior iterations' with no backtick execution. The scanner incorrectly identified markdown syntax.
Problèmes à risque faible (2)
False Positive: Cryptographic Algorithm Detection
Static scanner flagged 'Weak cryptographic algorithm' at lines 3, 37, 49, 70. These are false positives - the lines contain markdown table formatting characters (|) and list markers (-), not cryptographic algorithms.
False Positive: System Reconnaissance
Static scanner flagged 'System reconnaissance' at line 65. This is a false positive - the line contains '- Include Mermaid diagrams...' with no reconnaissance activity.
Audité par: claude

Score de qualité

38
Architecture
100
Maintenabilité
87
Contenu
50
Communauté
96
Sécurité
91
Conformité aux spécifications

Ce que vous pouvez construire

Understand Legacy Codebases

New team members rapidly learn complex systems by tracing actual code paths rather than relying on outdated documentation.

Architectural Decision Analysis

Evaluate design patterns, coupling, and technical debt before refactoring or adding new features.

Bug Investigation

Trace data flow and function calls to identify root causes of complex bugs spanning multiple modules.

Essayez ces prompts

Basic Code Exploration
How does authentication work in this codebase?
Architecture Mapping
Map the data flow from API entry point to database storage for user creation.
Pattern Investigation
What design patterns are used in the payment processing module? Identify trade-offs and risks.
Deep System Analysis
Trace the complete request lifecycle from ingress through middleware, services, and data layers. Include all transformations, error handling, and external integrations.

Bonnes pratiques

  • Provide specific topics or questions rather than generic 'analyze everything' requests
  • Use when you need depth rather than quick answers - this skill prioritizes thoroughness over speed
  • Combine with file navigation tools to jump to specific code locations mentioned in findings
  • Request Mermaid diagrams when visualizing complex architectures or data flows

Éviter

  • Avoid using for simple grep searches - use basic file search instead
  • Do not expect runtime behavior analysis - this skill traces static code paths only
  • Avoid asking about files outside the accessible workspace directory
  • Do not use for time-sensitive tasks - the 5-iteration process requires multiple tool calls

Foire aux questions

How is this different from normal code analysis?
This skill enforces rigorous evidence standards. Every claim must cite file paths and line numbers. It uses 5 research iterations and explicitly distinguishes facts from inferences with confidence ratings.
Can it execute code or test functionality?
No. This skill only reads and analyzes source code. It cannot execute code, run tests, or observe runtime behavior.
How long does analysis take?
The skill performs 5 iterative passes over the codebase. Complex topics may require multiple tool calls across dozens of files. Expect thorough analysis to take longer than casual exploration.
What tools does it use?
Only read-only tools: Glob for file discovery, Grep for content search, and Read for file reading. It never writes files or executes commands.
Will it work on any programming language?
Yes. The skill traces code paths and structure, not specific language syntax. It works with any codebase where files can be read as text.
Can it find bugs or security issues?
It can identify suspicious patterns and logic flaws by tracing code paths. However, it is not a replacement for dedicated security scanners or dynamic analysis tools.

Détails du développeur

Structure de fichiers

đź“„ SKILL.md