ecosystem-integrity-scanner

Ecosystem Integrity Scanner

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "ecosystem-integrity-scanner" with this command: npx skills add oimiragieo/agent-studio/oimiragieo-agent-studio-ecosystem-integrity-scanner

Ecosystem Integrity Scanner

Overview

Automated structural integrity scanner for the entire Agent Studio framework. Catches issues that silently break agent workflows: wrong require() paths that crash at runtime, phantom skills referenced in agent frontmatter that don't exist on disk, stale agent registry counts, archived references still active in production code, UTF-16 encoding that breaks parsers, and bloated agent configs.

Core principle: Framework structural issues are pre-production bugs. A phantom skill reference means an agent will fail silently. A broken require() means a hook crashes at the wrong moment. The scanner enforces zero-tolerance for these.

When to Invoke

Skill({ skill: 'ecosystem-integrity-scanner' });

Invoke proactively after:

  • Bulk framework changes (batch skill/agent/hook creation or archiving)

  • Refactoring module paths or directory structure

  • Running a major audit or cleanup pass

  • Suspecting phantom references or broken require() chains

  • Before finalizing any CI sanity gate

Mandatory Skills

Invoke before starting this skill:

Skill Purpose When

task-management-protocol

Track scan progress Always

ripgrep

Fast targeted code search When investigating

code-semantic-search

Concept discovery When pattern hunting

token-saver-context-compression

Compress large audit results When output is large

verification-before-completion

Gate completion on zero errors Before marking done

memory-search

Check prior audit patterns At start

Iron Laws

Always run from project root. validate-ecosystem-integrity.cjs resolves all paths relative to process.cwd() . Running from a subdirectory corrupts all path resolution. Never invoke from a non-root directory.

Never ignore PHANTOM_REQUIRE errors. A [PHANTOM_REQUIRE] error means a hook or script will throw MODULE_NOT_FOUND at runtime. These always represent real breakage — no false positives once the scanner is properly calibrated.

Never mark scan complete while errors > 0. Warnings are advisory; errors are blocking. Report path and severity but do not call the pipeline done until errors reach zero or are explicitly accepted as known exceptions with owner annotation.

Always route HIGH errors to specialist agents. Phantom skills → qa agent. Broken require() → developer agent. Archive refs in production → developer . Never attempt to remediate complex structural failures inline without delegation.

Always save the audit report before completing. Write the categorized findings to .claude/context/reports/qa/ecosystem-integrity-report-{ISO-date}.md before calling TaskUpdate(completed) . Evidence must persist across context resets.

Anti-Patterns

Anti-Pattern Risk Correct Approach

Treating [STALE_CATALOG] as informational noise Registry drifts from reality; agents get wrong counts Always update agent-registry.json when agent files change

Skipping scan after bulk framework batch ops Batch ops most commonly create phantom refs Run scan as the FINAL step of every batch operation

Manually patching require() paths without re-scanning One fix may mask three new breaks Always re-run full scan after patching paths

Running scanner against _archive/ subtrees Archive content has intentionally broken refs; false positives Scanner skip rules handle this; trust the skip list

Adding to DYNAMIC_SCRIPT_GENERATORS without review Accidentally suppressing real phantom detections Only add files that provably generate child scripts

Step 1: Run the Integrity Audit Engine

node scripts/validation/validate-ecosystem-integrity.cjs

The script performs six targeted checks:

  • [PHANTOM_REQUIRE] — Broken require() / import paths that resolve to non-existent files (after trying .js , .cjs , .mjs , .json extensions).

  • [PHANTOM_SKILL] — Skills listed in agent frontmatter skills: arrays that have no corresponding .claude/skills/{name}/ directory.

  • [EMPTY_DIR] — Empty directories in .claude/tools/ or .claude/skills/

that indicate abandoned scaffolding creating registry footprinting issues.

  • [ENCODING] — Files with UTF-16 BOM (0xFEFF /0xFFFE ) that break JSON/MD parsers silently.

  • [ARCHIVED_REF] — Production .claude/ code that still references _archive/ or .claude/archive/ paths — active code pointing at dead modules.

  • [STALE_CATALOG] — agent-registry.json entry count differs from actual agent .md file count on disk (drift between manifest and reality).

Step 2: Categorize and Report

Parse outputs into a structured report at .claude/context/reports/qa/ecosystem-integrity-report-{ISO-date}.md :

Ecosystem Integrity Report

<!-- Agent: qa | Task: #{id} | Session: {date} -->

Date: YYYY-MM-DD Overall Status: PASS / FAIL Errors: N | Warnings: N

HIGH — Runtime Blocking (must fix before deployment)

  • [PHANTOM_REQUIRE] — Module resolution failures that crash hooks/scripts
  • [PHANTOM_SKILL] — Missing skills that break agent workflows silently

MEDIUM — Structural Integrity (fix in current sprint)

  • [ARCHIVED_REF] — Active code pointing at archived/dead modules
  • [STALE_CATALOG] — Registry count mismatch with actual agent files

LOW — Housekeeping (fix in next maintenance window)

  • [EMPTY_DIR] — Ghost directories creating registry noise
  • [ENCODING] — UTF-16 files that may break parsers

Step 3: Trigger Remediations

Delegate fixes to the correct specialist:

Error Type Spawn Agent Task Description

[PHANTOM_REQUIRE]

developer

Fix broken require() path in {file}

[PHANTOM_SKILL]

qa

Remove or create missing skill {name}

[ARCHIVED_REF]

developer

Replace archive reference in {file}

[STALE_CATALOG]

developer

Regenerate agent-registry.json

[EMPTY_DIR]

developer

Remove empty directory {path}

[ENCODING]

developer

Re-encode {file} as UTF-8

After fixes, re-run the scanner and verify errors reach zero before completion.

Memory Protocol (MANDATORY)

Before starting:

cat .claude/context/memory/learnings.md cat .claude/context/memory/issues.md

Review prior audit patterns and known suppressed false positives.

After completing:

  • Audit pattern → .claude/context/memory/learnings.md

  • New false-positive suppression rule → .claude/context/memory/decisions.md

  • Unresolved error requiring owner → .claude/context/memory/issues.md

Assume interruption: If the audit report isn't saved to disk, it didn't happen.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Automation

filesystem

No summary provided by upstream source.

Repository SourceNeeds Review
Automation

slack-notifications

No summary provided by upstream source.

Repository SourceNeeds Review
Automation

chrome-browser

No summary provided by upstream source.

Repository SourceNeeds Review
Automation

diagram-generator

No summary provided by upstream source.

Repository SourceNeeds Review