Search, create, and manage GitHub issues for the Ark project. Use when you need to find existing issues, create new ones, or update issue status.
/plugin marketplace add dwmkerr/ark-claude-code-marketplace/plugin install ark@ark-claude-code-marketplaceThis skill inherits all available tools. When active, it can use any tool Claude has access to.
Manage GitHub issues for the Ark project (mckinsey/agents-at-scale-ark).
Use this skill when:
Note: This skill is commonly used by the ark-security-patcher agent to:
Use the gh CLI tool for all issue operations:
# Search issues by keyword
gh search issues --repo mckinsey/agents-at-scale-ark "CVE"
# Search for specific CVE numbers
gh search issues --repo mckinsey/agents-at-scale-ark "CVE-2025-55183"
# Search with filters
gh search issues --repo mckinsey/agents-at-scale-ark "security" --state open
gh search issues --repo mckinsey/agents-at-scale-ark "vulnerability" --label security
# List all open issues
gh issue list --repo mckinsey/agents-at-scale-ark
# List issues with filters
gh issue list --repo mckinsey/agents-at-scale-ark --state open
gh issue list --repo mckinsey/agents-at-scale-ark --label bug
gh issue list --repo mckinsey/agents-at-scale-ark --assignee @me
# List with custom fields
gh issue list --repo mckinsey/agents-at-scale-ark --json number,title,state,labels
# View specific issue
gh issue view 123 --repo mckinsey/agents-at-scale-ark
# View with comments
gh issue view 123 --repo mckinsey/agents-at-scale-ark --comments
# View as JSON for parsing
gh issue view 123 --repo mckinsey/agents-at-scale-ark --json number,title,body,state,labels
# Create issue interactively
gh issue create --repo mckinsey/agents-at-scale-ark
# Create with title and body
gh issue create --repo mckinsey/agents-at-scale-ark \
--title "Security: Fix CVE-2025-XXXXX" \
--body "Description of the vulnerability..."
# Create with labels
gh issue create --repo mckinsey/agents-at-scale-ark \
--title "Bug: API endpoint fails" \
--body "Steps to reproduce..." \
--label bug,priority:high
# Close an issue
gh issue close 123 --repo mckinsey/agents-at-scale-ark
# Reopen an issue
gh issue reopen 123 --repo mckinsey/agents-at-scale-ark
# Add comment
gh issue comment 123 --repo mckinsey/agents-at-scale-ark \
--body "Fixed in PR #456"
# Edit issue
gh issue edit 123 --repo mckinsey/agents-at-scale-ark \
--title "New title" \
--add-label security
Before creating a new security fix, check if an issue already exists:
# Search for CVE number
gh search issues --repo mckinsey/agents-at-scale-ark "CVE-2025-55183"
# If found, note the issue number
# If not found, you may want to create one
Tip: When creating PRs, reference the issue number using Closes #123 in the PR body to automatically close the issue when the PR merges.
# Search by keyword
gh search issues --repo mckinsey/agents-at-scale-ark "security OR vulnerability OR CVE"
# Filter by label if security labels exist
gh issue list --repo mckinsey/agents-at-scale-ark --label security
gh issue create --repo mckinsey/agents-at-scale-ark \
--title "fix: CVE-2025-XXXXX in [component]" \
--body "$(cat <<'EOF'
## Vulnerability Details
- **CVE**: CVE-2025-XXXXX
- **Severity**: High
- **Component**: [package name]
## Description
[What the vulnerability is]
## Impact on Ark
[How it affects Ark]
## Proposed Fix
[Update package to version X.Y.Z]
## References
- CVE: https://cve.circl.lu/cve/CVE-2025-XXXXX
- Advisory: [URL]
EOF
)" \
--label security
Always search first: Check if a similar issue already exists
gh search issues --repo mckinsey/agents-at-scale-ark "keyword"
Be specific: Use clear, descriptive titles
Include context: Provide all relevant details in the issue body
Closes #123 or Fixes #123 in PR descriptions to auto-close issuesCloses #123, Closes #456For security issues, use this template:
## Vulnerability Details
- **CVE**: CVE-YYYY-NNNNN
- **Severity**: [Critical/High/Medium/Low]
- **Component**: [Package/library name]
## Description
[Clear explanation of the vulnerability]
## Impact on Ark
[Which services are affected and how]
## Proposed Fix
[Recommended mitigation approach]
## References
- CVE: [URL]
- Advisory: [URL]
gh issue view 999 --repo mckinsey/agents-at-scale-ark
# Error: issue not found
Solution: Verify the issue number is correct
gh issue create --repo mckinsey/agents-at-scale-ark
# Error: permission denied
Solution: Ensure you're authenticated with gh auth status and have write access to the repo
If you hit GitHub API rate limits:
gh auth status to check your rate limit statusThe ark-security-patcher agent uses this skill to:
Search for existing CVE issues before starting work:
gh search issues --repo mckinsey/agents-at-scale-ark "CVE-2025-55183"
Link PRs to issues by including in PR body:
Closes #33
Track vulnerability fixes by creating issues when CVEs are discovered
Example workflow:
# Agent searches for CVE issue
ISSUE=$(gh search issues --repo mckinsey/agents-at-scale-ark "CVE-2025-55183" --json number --jq '.[0].number')
if [ -n "$ISSUE" ]; then
echo "Found existing issue #$ISSUE"
# Include "Closes #$ISSUE" in PR
else
echo "No existing issue found"
# Optionally create a new issue
fi
mckinsey/agents-at-scale-arkgh CLI to be authenticated (gh auth login)# Get issue numbers matching a search
gh search issues --repo mckinsey/agents-at-scale-ark "CVE" \
--json number,title --jq '.[] | "\(.number): \(.title)"'
# Check if issue exists
EXISTS=$(gh search issues --repo mckinsey/agents-at-scale-ark "CVE-2025-55183" --json number --jq 'length')
if [ "$EXISTS" -gt 0 ]; then
echo "Issue exists"
fi
# List all open security issues
gh issue list --repo mckinsey/agents-at-scale-ark \
--label security --state open \
--json number,title --jq '.[] | "\(.number): \(.title)"'
# Create multiple issues from a list
for cve in CVE-2025-001 CVE-2025-002; do
gh issue create --repo mckinsey/agents-at-scale-ark \
--title "Security: Fix $cve" \
--body "Track fix for $cve"
done
Build robust backtesting systems for trading strategies with proper handling of look-ahead bias, survivorship bias, and transaction costs. Use when developing trading algorithms, validating strategies, or building backtesting infrastructure.