Help us improve
Share bugs, ideas, or general feedback.
From build-ios-apps
Capture, inspect, compare, and root-cause iOS memory graph leaks using Apple's leaks and memgraph tools. Use when debugging leaked iOS objects, simulator memgraphs, retain-cycle suspicions, memory growth after navigation/logout/account changes, or when asked to prove an iOS leak fix with before/after memgraph evidence.
npx claudepluginhub mtfum/openai-build-ios-skills --plugin build-ios-appsHow this skill is triggered — by the user, by Claude, or both
Slash command
/build-ios-apps:ios-memgraph-leaksThe summary Claude sees in its skill listing — used to decide when to auto-load this skill
Use this skill to prove iOS leaks from a live simulator process or an existing `.memgraph`. Pair it with the `ios-debugger-agent` skill when the task also needs simulator build, install, launch, UI driving, logs, or screenshots.
Mandates invoking relevant skills via tools before any response in coding sessions. Covers access, priorities, and adaptations for Claude Code, Copilot CLI, Gemini CLI.
Share bugs, ideas, or general feedback.
Use this skill to prove iOS leaks from a live simulator process or an existing .memgraph. Pair it with the ios-debugger-agent skill when the task also needs simulator build, install, launch, UI driving, logs, or screenshots.
scripts/capture_sim_memgraph.sh.scripts/summarize_memgraph_leaks.py.leaks --traceTree=<address> <file.memgraph> and grouped leak evidence.Do not claim a leak fix from a smaller memgraph alone. A credible fix explains the ownership path that kept the object alive and shows that the same path or type disappears after the patch.
Resolve the simulator UDID and app bundle identifier, then capture the running app:
SKILL_DIR="<absolute path to this skill folder>"
SIM="<simulator-udid>"
BUNDLE_ID="<app.bundle.identifier>"
MEMGRAPH_DIR="$(mktemp -d "${TMPDIR:-/tmp}/claude-ios-memgraph.XXXXXX")"
"$SKILL_DIR/scripts/capture_sim_memgraph.sh" \
--udid "$SIM" \
--bundle-id "$BUNDLE_ID" \
--out-dir "$MEMGRAPH_DIR"
If the process cannot be found, confirm the bundle identifier and use xcrun simctl spawn "$SIM" launchctl list to inspect running labels.
Summarize an existing memgraph:
python3 "$SKILL_DIR/scripts/summarize_memgraph_leaks.py" \
/path/to/app.memgraph \
--trace-limit 5 \
--out /path/to/leak-summary.md
Use --trace-limit sparingly. Trace trees are useful root-cause evidence, but large memgraphs can produce noisy output.
traceTree ownership path or an isolated reproduction.traceTree may have no root path; use leaks --groupByType plus source verification to find the self-retaining edge.A useful leak report includes:
If the memgraph shows only framework/runtime noise, say that and recommend the next narrower capture rather than inventing an app leak.