From patchy-bot
This skill should be used when the user asks to "check my assumptions", "what am I assuming", "assumptions audit", "verify assumptions", "assumption check", "what are the risks", or needs implicit assumptions surfaced. Also trigger proactively during planning phases, before executing approved plans, and when making architectural or design decisions.
npx claudepluginhub kman182401/patchy-operationalThis skill uses the workspace's default tool permissions.
Searches, retrieves, and installs Agent Skills from prompts.chat registry using MCP tools like search_skills and get_skill. Activates for finding skills, browsing catalogs, or extending Claude.
Searches prompts.chat for AI prompt templates by keyword or category, retrieves by ID with variable handling, and improves prompts via AI. Use for discovering or enhancing prompts.
Compares coding agents like Claude Code and Aider on custom YAML-defined codebase tasks using git worktrees, measuring pass rate, cost, time, and consistency.
Systematically extract, categorize, and risk-rate every assumption embedded in a plan, proposal, or discussion before it becomes a silent failure mode.
Make implicit assumptions explicit so they can be verified before they cause problems. Most failures trace back to something taken for granted that turned out to be false. This skill catches those before execution begins.
Complements the-fool (which challenges the approach itself) by tracking what is being taken for granted underneath the approach. The-fool asks "is this the right idea?" -- assumptions-audit asks "what must be true for this idea to work?"
Mine the current plan, discussion, or proposal for every assumption -- stated or implied. Scan for:
Technical assumptions:
Environmental assumptions:
Behavioral assumptions:
Scope assumptions:
Ordering and timing assumptions:
Assign every extracted assumption one of four confidence levels:
| Level | Meaning | Evidence Required |
|---|---|---|
| Verified | Read the file, ran the command, checked the docs this session | Cite the specific evidence (file path, command output, doc URL) |
| High confidence | Stable, well-known behavior unlikely to have changed | Note why it is stable (e.g., "POSIX standard", "unchanged since v2.0") |
| Unverified | Have not checked yet but low blast radius if wrong | Flag for verification; proceed with caution |
| Risky | Unverified AND high impact if wrong | Must verify before proceeding; block execution on this |
Classification rules:
For every Unverified and Risky assumption, produce a concrete verification action:
Read the file at [path] or ls [path]pip show [pkg], node -e "require('[pkg]/package.json').version", etc.curl -s [endpoint], systemctl status [service]ls -la [path], id, sudo -lss -tlnp | grep [port]grep [key] [config-file]Do not produce vague actions like "check the docs" -- specify which doc, which section, or which command to run.
Score the overall risk profile:
Present findings in this structure:
## Assumptions Audit
### Summary
[One-line risk assessment: Green/Yellow/Red + reason]
### Assumption Table
| # | Category | Assumption | Status | Impact if Wrong | Evidence/Action |
|---|----------|-----------|--------|-----------------|-----------------|
| 1 | Technical | pandas >= 2.0 is installed | Verified | High | `pip show pandas` returned 2.1.4 |
| 2 | Environmental | /opt/data/ is writable | Unverified | Medium | Run: `test -w /opt/data/ && echo ok` |
| 3 | Behavioral | API returns JSON, not XML | Risky | High -- redesign parser | Read: current API docs at [url] |
| 4 | Scope | Migration is backwards-compatible | Unverified | High | Check: consumer contracts |
### Verification Queue (ordered by risk)
1. [Risky] #3 — Check API response format: `curl -s [endpoint] | head -c 200`
2. [Unverified] #4 — Review consumer contracts in [file]
3. [Unverified] #2 — Test write permissions: `test -w /opt/data/`
### Risk Assessment
[Which unverified assumptions could derail the work and why]
### Recommendation
[Proceed / Verify first / Reconsider approach]