Skills wiki-researcher
🔍

wiki-researcher

Safe

Conduct Deep Codebase Research with Evidence-Based Analysis

Shallow code reviews lead to misunderstandings and bugs. This skill enforces rigorous, evidence-based investigation of codebases through structured multi-turn analysis.

Supports: Claude Codex Code(CC)
📊 71 Adequate
1

Download the skill ZIP

2

Upload in Claude

Go to Settings → Capabilities → Skills → Upload skill

3

Toggle on and start using

Test it

Using "wiki-researcher". How does the caching layer work?

Expected outcome:

HIGH Confidence: CacheManager (src/cache/manager.ts:15) implements LRU eviction. Cache entries flow through RedisCacheAdapter (src/cache/redis.ts:42) which calls Redis SETEX with TTL. Default TTL is 300s (config.ts:78). Cache miss fallback to DataLoader (src/dataloader/index.ts:12) for batch fetching.

Using "wiki-researcher". What handles payment failures?

Expected outcome:

MEDIUM Confidence: PaymentService.processPayment (src/services/payments.ts:89) wraps Stripe calls in try-catch. Failures log to Sentry (line 112) and emit PAYMENT_FAILED event (line 115). Event consumers: EmailService sends notification (src/email/handlers.ts:78), webhook dispatcher triggers external callbacks (src/webhook/dispatcher.ts:45). Have not verified retry logic.

Security Audit

Safe
v1 • 2/25/2026

Static analysis flagged 5 high-risk patterns and 1 medium-risk pattern. All findings are false positives caused by markdown syntax misinterpretation (table pipes, list dashes). The skill is a legitimate codebase research tool with no network requests, file writes, or credential access. It provides structured methodology for deep code analysis using standard read-only tools (Glob, Grep, Read).

1
Files scanned
71
Lines analyzed
3
findings
1
Total audits
Medium Risk Issues (1)
False Positive: Markdown Syntax Misinterpreted
Static scanner flagged 'Ruby/shell backtick execution' at line 63. This is a false positive - the line contains '- NEVER repeat findings from prior iterations' with no backtick execution. The scanner incorrectly identified markdown syntax.
Low Risk Issues (2)
False Positive: Cryptographic Algorithm Detection
Static scanner flagged 'Weak cryptographic algorithm' at lines 3, 37, 49, 70. These are false positives - the lines contain markdown table formatting characters (|) and list markers (-), not cryptographic algorithms.
False Positive: System Reconnaissance
Static scanner flagged 'System reconnaissance' at line 65. This is a false positive - the line contains '- Include Mermaid diagrams...' with no reconnaissance activity.
Audited by: claude

Quality Score

38
Architecture
100
Maintainability
87
Content
33
Community
96
Security
91
Spec Compliance

What You Can Build

Understand Legacy Codebases

New team members rapidly learn complex systems by tracing actual code paths rather than relying on outdated documentation.

Architectural Decision Analysis

Evaluate design patterns, coupling, and technical debt before refactoring or adding new features.

Bug Investigation

Trace data flow and function calls to identify root causes of complex bugs spanning multiple modules.

Try These Prompts

Basic Code Exploration
How does authentication work in this codebase?
Architecture Mapping
Map the data flow from API entry point to database storage for user creation.
Pattern Investigation
What design patterns are used in the payment processing module? Identify trade-offs and risks.
Deep System Analysis
Trace the complete request lifecycle from ingress through middleware, services, and data layers. Include all transformations, error handling, and external integrations.

Best Practices

  • Provide specific topics or questions rather than generic 'analyze everything' requests
  • Use when you need depth rather than quick answers - this skill prioritizes thoroughness over speed
  • Combine with file navigation tools to jump to specific code locations mentioned in findings
  • Request Mermaid diagrams when visualizing complex architectures or data flows

Avoid

  • Avoid using for simple grep searches - use basic file search instead
  • Do not expect runtime behavior analysis - this skill traces static code paths only
  • Avoid asking about files outside the accessible workspace directory
  • Do not use for time-sensitive tasks - the 5-iteration process requires multiple tool calls

Frequently Asked Questions

How is this different from normal code analysis?
This skill enforces rigorous evidence standards. Every claim must cite file paths and line numbers. It uses 5 research iterations and explicitly distinguishes facts from inferences with confidence ratings.
Can it execute code or test functionality?
No. This skill only reads and analyzes source code. It cannot execute code, run tests, or observe runtime behavior.
How long does analysis take?
The skill performs 5 iterative passes over the codebase. Complex topics may require multiple tool calls across dozens of files. Expect thorough analysis to take longer than casual exploration.
What tools does it use?
Only read-only tools: Glob for file discovery, Grep for content search, and Read for file reading. It never writes files or executes commands.
Will it work on any programming language?
Yes. The skill traces code paths and structure, not specific language syntax. It works with any codebase where files can be read as text.
Can it find bugs or security issues?
It can identify suspicious patterns and logic flaws by tracing code paths. However, it is not a replacement for dedicated security scanners or dynamic analysis tools.

Developer Details

File structure

📄 SKILL.md