Automatically export audit findings, security issues, performance problems, or accessibility violations to Teamwork tasks when other agents complete their analysis. Converts technical findings into actionable project management tasks with appropriate priorities and templates. Invoke when audit agents finish reports, user says "export to Teamwork", or findings need project tracking.
From cms-cultivatornpx claudepluginhub kanopi/claude-toolbox --plugin cms-cultivatorThis skill uses the workspace's default tool permissions.
templates/agent-integration.mdtemplates/audit-handlers/accessibility-export.mdtemplates/audit-handlers/performance-export.mdtemplates/audit-handlers/quality-export.mdtemplates/audit-handlers/security-export.mdtemplates/batch-patterns.mdtemplates/dependency-management.mdtemplates/error-handling.mdtemplates/mcp-tools.mdtemplates/priority-mapping.mdtemplates/template-selection.mdSearches, retrieves, and installs Agent Skills from prompts.chat registry using MCP tools like search_skills and get_skill. Activates for finding skills, browsing catalogs, or extending Claude.
Searches prompts.chat for AI prompt templates by keyword or category, retrieves by ID with variable handling, and improves prompts via AI. Use for discovering or enhancing prompts.
Guides Next.js 16+ Turbopack for faster dev via incremental bundling, FS caching, and HMR; covers webpack comparison, bundle analysis, and production builds.
Bridge the gap between technical findings and project execution. Audit reports identify problems; this skill transforms them into tracked, prioritized work items that teams can action.
This skill activates when:
Do NOT activate for:
Recognize and parse these audit report formats:
Markdown reports:
JSON reports:
Common audit types:
Transformation rules:
Group related findings
Create epic for multiple related issues
Individual tasks for each finding
Set appropriate template
Map audit severity to Teamwork priority (Critical→P0, High→P1, Medium→P2, Low→P3, Info→P4).
For complete mapping tables, see Priority Mapping.
Select appropriate task template based on finding type (security→bug report, performance→little task, etc.).
For complete selection algorithm, see Template Selection.
Complete transformation examples for each audit type are available in the audit-handlers directory:
Security: OWASP/CVE findings → Bug Report tasks with CWE classification Performance: Lighthouse/Core Web Vitals → Little Task for optimizations Accessibility: WCAG violations → Bug Reports (Level A/AA) or Little Tasks Code Quality: Complexity/standards → Little Tasks or Epics for refactors
Three common patterns for organizing multiple findings: Epic with Sub-Tasks (3+ related findings), Priority Buckets (mixed severity), Component-Based (multiple issues in same component).
For complete patterns and structures, see Batch Patterns.
Auto-detect blocking relationships (database changes block features, security fixes block deployment, etc.) and link tasks appropriately.
For dependency detection patterns, see Dependency Management.
The skill receives findings from four audit specialists (security, performance, accessibility, quality) and converts them to appropriate task templates.
For integration details, see Agent Integration.
Uses Teamwork MCP tools loaded via ToolSearch for task creation, project listing, and milestone/epic creation.
For tool reference, see MCP Tools.
1. Receive audit report from specialist agent
└─ Parse format (markdown, JSON, structured data)
2. Analyze findings
└─ Group related issues
└─ Determine priority mapping
└─ Select appropriate templates
3. Decide export strategy
└─ Single task vs. epic with sub-tasks
└─ Identify dependencies
4. Load Teamwork MCP tools via ToolSearch
└─ If epic: create parent first
└─ Create individual tasks
└─ Link dependencies
5. Confirm export
└─ List created tasks with links
└─ Provide summary statistics
└─ Suggest next actions
After export, provide comprehensive summary:
## Export Summary
**Audit Type:** Security Scan
**Findings:** 12 issues
**Tasks Created:** 13 (1 epic + 12 sub-tasks)
### Created Tasks
#### Epic
- [SEC-2024: Security Fixes - XSS Vulnerabilities](https://example.teamwork.com/tasks/100)
- Priority: P1 (High)
- Sub-tasks: 12
#### Critical (P0)
- [SEC-101: SQL Injection in User Search](https://example.teamwork.com/tasks/101)
#### High (P1)
- [SEC-102: XSS in User Profile](https://example.teamwork.com/tasks/102)
- [SEC-103: XSS in Comment Form](https://example.teamwork.com/tasks/103)
- [SEC-104: CSRF Missing on Forms](https://example.teamwork.com/tasks/104)
#### Medium (P2)
- 8 additional tasks (see epic for full list)
### Dependencies Configured
- SEC-102, SEC-103, SEC-104 depend on SEC-101 (fix core sanitization first)
### Recommended Actions
1. Start with SEC-101 (critical SQL injection)
2. Then tackle P1 XSS issues in parallel
3. Schedule P2 fixes for next sprint
### Next Steps
- Assign tasks to team members
- Set sprint milestones
- Update team on security priorities
DO:
DON'T:
Fallback strategies for MCP server unavailability (provide formatted markdown for manual entry) and ambiguous findings (request clarification).
For detailed error handling patterns, see Error Handling.
Complete reference materials available in the templates directory:
Use these references to understand transformation patterns and implementation details.