From feature-workflow
Loads active runtime audit context from docs/audits/registry.json, including injections and findings, when editing audited code or discussing audit sessions.
npx claudepluginhub schuettc/claude-code-plugins --plugin feature-workflowThis skill is limited to using the following tools:
Automatically load active audit session data when the user is working in the context of a runtime audit.
Audits runtime code behavior by injecting tracked logs, capturing execution data, generating reports, and verifying dynamic flows for debugging and process audits.
Audits Claude Code session logs for PBR workflow compliance (STATE.md updates, hooks, commits, skills) and UX quality (flows, friction, expectations). Supports date ranges and modes.
Displays audit logs for Claude Code components (skills, commands, agents, hooks) from .claude/audit/ to monitor health, identify stale items, and track coverage.
Share bugs, ideas, or general feedback.
Automatically load active audit session data when the user is working in the context of a runtime audit.
Invoke this skill when the user:
Read docs/audits/registry.json to find active audit sessions.
{
"audits": [
{
"id": "auth-flow-001",
"status": "in-progress",
"name": "Login Flow Verification"
}
]
}
Filter for audits with status: "in-progress".
For relevant audits, read:
docs/audits/[audit-id]/
├── session.json # Current phase, target description, questions
├── injections.json # Active injections in code
└── report.md # Findings (if analysis complete)
If there are active injections:
injections.json to understand what's currently injectedReference context when responding:
Note: This file has active audit injections at lines 42, 67.
Consider running cleanup before making significant changes,
or be careful not to modify the AUDIT-INJECTED lines.
The audit "auth-flow-001" verified this behavior:
- Credentials ARE validated before database query (confirmed)
- Session IS created after successful auth (confirmed)
Evidence captured in the audit report.
Reminder: There's an active audit "auth-flow-001" with injections
in src/auth/login.ts. Status: awaiting runtime capture.
Would you like to:
1. Continue the audit capture
2. Run cleanup to remove injections
This skill works with:
/feature-audit command - Provides context during audit workflow/feature-troubleshoot command - Can reference audit findingsruntime-auditor agent - Shares context with audit operationsUser: "Why is there a console.log in the login function?"
Response (after silently loading context):
That's an audit injection from the active "auth-flow-001" audit.
It was added to capture the user object at login entry. The audit
is currently in the "runtime-capture" phase, waiting for you to
trigger the login flow and capture the output.
You can:
1. Run the process to capture the logs
2. Run `/feature-audit` to continue the workflow
3. Jump to cleanup if you want to remove the injections
Alert the user when:
| Session Status | Meaning |
|---|---|
in-progress | Audit active, may have injections |
awaiting-capture | Injections present, waiting for runtime |
analyzing | Captured data being processed |
completed | Audit finished, should be cleaned up |
Always check injections.json for actual injection state regardless of session status.