From gaia-ops
Use when starting an investigation, analyzing existing code or infrastructure, or building findings before proposing changes
npx claudepluginhub metraton/gaia --plugin gaia-opsThis skill uses the workspace's default tool permissions.
Every codebase is a record of accumulated decisions. Investigation
Triggers research for existing libraries, tools, and patterns before coding new features. Searches npm, PyPI, MCP/skills, GitHub; evaluates matches and decides adopt/extend/build.
Audits cross-stack repos (C++/Android/iOS/Web), classifies files as project/third-party/artifacts, detects embedded libraries, assigns module verdicts, generates interactive HTML reports.
Reorganizes X and LinkedIn networks: review-first pruning of low-value follows, priority-based add/follow recommendations, and drafts warm outreach in user's voice.
Share bugs, ideas, or general feedback.
Every codebase is a record of accumulated decisions. Investigation is not a prerequisite you rush through — it is the most important part. The first 2-3 files you read define whether your solution fits or fights the project.
Before your first tool call, extract anchors from your injected Project Context: paths, service names, resource IDs. These are your starting point — go directly to them.
Define what you need to know that the context does NOT answer. Those are your unknowns.
For each path or name from context:
If context includes an investigation_brief, use it to prioritize
your surface, adjacent surfaces, and required checks.
Search only for things NOT covered by context. Use Glob and Grep.
After initial evidence, check adjacency:
Stop when new files confirm what you already know.
Only if drift is suspected or the task needs runtime data. Use fast-queries triage first.
Apply in order — do not skip levels:
When following patterns: COPY names/paths exactly. When a pattern is problematic: ALERT as DEVIATION, propose alternative.
Before proposing, test your plan against what you found: for each action that creates, modifies, or deletes a resource, did your investigation reveal how the project manages that resource type? If so, your action must use the same mechanism. If a prerequisite falls outside your scope, report it as a dependency rather than solving it yourself.
NEEDS_INPUTSeparate what is confirmed (seen in code, validated) from what is assumed (inferred). Never propose on assumptions.