Trigger with "mine this skill", "analyze this skill", "run targeted skill analysis", "extract patterns from this skill", or when you want focused analysis on a single Agent Skill directory without processing an entire plugin. Use this when the user points to a specific skill folder or says "look at this skill".
From agent-plugin-analyzernpx claudepluginhub richfrem/agent-plugins-skills --plugin agent-plugin-analyzerThis skill is limited to using the following tools:
evals/evals.jsonevals/results.tsvrequirements.txtscripts/inventory_plugin.pyCreates consistent pitch decks, one-pagers, investor memos, financial models, accelerator apps, and fundraising materials from a single source of truth.
Provides demand forecasting, safety stock optimization, replenishment planning, and promotional lift estimation for multi-location retailers managing 300-800 SKUs.
Provides expertise on electricity/gas procurement, tariff optimization, demand charge management, renewable PPA evaluation, hedging, load profiling, and multi-facility energy strategies.
This skill requires Python 3.8+ and standard library only. No external packages needed.
To install this skill's dependencies:
pip-compile ./requirements.in
pip install -r ./requirements.txt
See ./requirements.txt for the dependency lockfile (currently empty — standard library only).
Run the targeted analysis pipeline on a single Agent Skill. This allows for focused extraction and synthesis from isolated directories without processing an entire plugin.
analyze-plugin skill, focused purely on this component.synthesize-learnings./mine-skill <path-to-skill-directory>
# Analyze a specific skill within a knowledge plugin
/mine-skill claude-knowledgework-plugins/sales/skills/call-prep
# Analyze one of our own core skills
/mine-skill plugins\ reference/agent-scaffolders/skills/create-plugin
analyze-plugin operating in Single Skill Mode on the provided $ARGUMENTS.scripts/inventory_plugin.py runs against the skill path.
Security scanning is enabled by default. Credential detection, network call detection, and environment variable checks run on all script files unless
--no-securityis passed.
references/pattern-catalog.md and detects anti-patterns.synthesize-learnings is invoked to map discovered patterns back to our core agent-scaffolders and agent-skill-open-specifications.