Trigger with "run self-audit", "test the analyzer", "regression test the plugin analyzer", "audit the agent-plugin-analyzer", or "verify the analyzer works correctly". Runs the analyze-plugin skill against the agent-plugin-analyzer itself and its test fixtures as a regression smoke test. Use this after making changes to the analyzer to verify nothing broke.
From agent-plugin-analyzernpx claudepluginhub richfrem/agent-plugins-skills --plugin agent-plugin-analyzerThis skill is limited to using the following tools:
README.mdevals/evals.jsonevals/results.tsvrequirements.txtscripts/assert_audit.pyscripts/inventory_plugin.pyCreates consistent pitch decks, one-pagers, investor memos, financial models, accelerator apps, and fundraising materials from a single source of truth.
Provides demand forecasting, safety stock optimization, replenishment planning, and promotional lift estimation for multi-location retailers managing 300-800 SKUs.
Provides expertise on electricity/gas procurement, tariff optimization, demand charge management, renewable PPA evaluation, hedging, load profiling, and multi-facility energy strategies.
This skill requires Python 3.8+ and standard library only. No external packages needed.
To install this skill's dependencies:
pip-compile ./requirements.in
pip install -r ./requirements.txt
See ./requirements.txt for the dependency lockfile (currently empty — standard library only).
Run the analyze-plugin skill against the agent-plugin-analyzer itself and the test fixtures. This is a regression smoke test that verifies the analyzer produces consistent, expected results.
Run inventory on self (security scanning is on by default):
python3 ./scripts/inventory_plugin.py --path . --format json
Run scanner against test fixtures:
python3 ./scripts/inventory_plugin.py --path ./tests/gold-standard-plugin --format json
python3 ./scripts/inventory_plugin.py --path ./tests/flawed-plugin --format json
Validate deterministic scanner results:
Self-analysis scanner must confirm:
security_flags = [] (zero security findings in the analyzer itself)issues = [] (zero structural violations)Gold-standard fixture scanner must confirm:
security_flags = [] (zero security findings)issues = [] (zero structural violations)warnings = [] (zero missing components)Flawed fixture scanner must confirm:
security_flags count ≥ 4 (network calls + env access; obfuscated credential is LLM-only)issues count ≥ 1 (bash script violation)warnings count ≥ 2 (missing acceptance criteria + references)./README.md for the full expected findings manifestTo run assertions programmatically:
python3 ./scripts/assert_audit.py --fixture flawed --json-output <path-to-scan-output.json>
Run the full 6-phase analysis on each fixture:
tests/gold-standard-plugin/ — should score maturity ≥ L2, zero Critical, at least 2 patterns identifiedtests/flawed-plugin/ — LLM must additionally detect: missing README file tree, missing plugin manifestValidate self-analysis (full 6-phase on the analyzer itself):
Report deviations:
⚠️ SELF-AUDIT REGRESSION: [dimension] expected [X] got [Y]
✅ SELF-AUDIT PASSED: [N] scanner checks passed, [M] fixtures validated, [K] 6-phase checks passed