From agent-capability-standard
Watch and report current state of a target system, process, or entity. Use when monitoring status, inspecting live systems, checking current conditions, or observing runtime behavior.
npx claudepluginhub synaptiai/synapti-marketplace --plugin agent-capability-standardThis skill is limited to using the following tools:
Observe and report the current state of a specified target without modifying it. This is the foundation for situational awareness and state modeling.
Guides Next.js Cache Components and Partial Prerendering (PPR) with cacheComponents enabled. Implements 'use cache', cacheLife(), cacheTag(), revalidateTag(), static/dynamic optimization, and cache debugging.
Guides building MCP servers enabling LLMs to interact with external services via tools. Covers best practices, TypeScript/Node (MCP SDK), Python (FastMCP).
Generates original PNG/PDF visual art via design philosophy manifestos for posters, graphics, and static designs on user request.
Observe and report the current state of a specified target without modifying it. This is the foundation for situational awareness and state modeling.
Success criteria:
Compatible schemas:
schemas/output_schema.yaml| Parameter | Required | Type | Description |
|---|---|---|---|
target | Yes | string | What to observe (file path, URL, process, system) |
aspects | No | array[string] | Specific aspects to focus on (e.g., ["status", "errors", "metrics"]) |
depth | No | string | Observation depth: surface, detailed, exhaustive |
Identify observation target: Clarify exactly what system, process, or entity to observe
Select observation aspects: Determine what properties/attributes to capture
Capture current state: Execute observation without modifying target
Document observations: Structure findings with evidence
Ground claims: Attach evidence anchors to all observations
file:line for file contentcommand:output for system observationsReturn a structured object:
observation:
target: string # What was observed
timestamp: string # ISO 8601 timestamp
status: string # Overall status assessment
aspects:
- aspect: string # Name of observed aspect
value: any # Observed value or state
notable: boolean # Whether this is noteworthy
anomalies: array[string] # Unexpected findings
confidence: 0..1 # Based on observation quality
evidence_anchors: ["file:line", "command:output"]
assumptions: [] # What was assumed about the target
next_actions: array[string] # 0-3 suggested follow-ups
| Field | Type | Description |
|---|---|---|
observation.target | string | Identifier of what was observed |
observation.timestamp | string | When observation was made |
observation.status | string | Summary status (healthy, degraded, error, unknown) |
observation.aspects | array | List of observed aspects with values |
confidence | number | 0.0-1.0 based on observation completeness |
evidence_anchors | array[string] | References to raw observation data |
Input:
target: "web-server process"
aspects: ["running", "memory", "connections"]
Output:
observation:
target: "nginx process (PID 1234)"
timestamp: "2024-01-15T10:30:00Z"
status: "healthy"
aspects:
- aspect: "running"
value: true
notable: false
- aspect: "memory"
value: "125MB RSS"
notable: false
- aspect: "connections"
value: 847
notable: true
anomalies:
- "Connection count higher than typical (avg: 200)"
confidence: 0.95
evidence_anchors:
- "command:ps aux | grep nginx"
- "command:netstat -an | grep :80"
assumptions:
- "Process identified by name 'nginx'"
next_actions:
- "Monitor connection trend over time"
- "Check for connection leak if count continues rising"
Input:
target: "config/database.yml"
aspects: ["content", "permissions", "modified"]
Output:
observation:
target: "config/database.yml"
timestamp: "2024-01-15T10:35:00Z"
status: "present"
aspects:
- aspect: "content"
value: "PostgreSQL configuration with production credentials"
notable: true
- aspect: "permissions"
value: "644"
notable: true
- aspect: "modified"
value: "2024-01-14T15:22:00Z"
notable: false
anomalies:
- "File permissions allow group/other read (sensitive credentials)"
confidence: 0.9
evidence_anchors:
- "config/database.yml:1-25"
- "command:ls -la config/database.yml"
assumptions:
- "File contains database credentials based on content inspection"
next_actions:
- "Review file permissions for security"
- "Consider using environment variables for credentials"
Verification tools: Read (to verify file observations)
mutation: falserequires_checkpoint: falserequires_approval: falserisk: lowCapability-specific rules:
Commonly follows:
search - Observe specific targets found through searchretrieve - Observe content retrieved by referenceCommonly precedes:
state - Observations feed into world state modelingdetect - Observations provide data for pattern detectioncompare - Observations enable comparison with expected stateAnti-patterns:
mutate)detect)Workflow references:
reference/workflow_catalog.yaml#debug_code_change for observation in debuggingreference/workflow_catalog.yaml#world_model_build for observation in modeling