From ork
Audits entire codebases for security vulnerabilities, architecture issues, and dependencies using 1M context window in a single pass. Use for whole-project analysis.
npx claudepluginhub yonatangross/orchestkit --plugin orkThis skill is limited to using the following tools:
Single-pass whole-project analysis leveraging Opus 4.6's extended context window. Loads entire codebases (~50K LOC) into context for cross-file vulnerability detection, architecture review, and dependency analysis.
assets/audit-report-template.mdassets/severity-matrix.mdchecklists/audit-completion.mdreferences/architecture-review-guide.mdreferences/audit-scope-dialog.mdreferences/dependency-audit-guide.mdreferences/report-structure.mdreferences/security-audit-guide.mdreferences/token-budget-planning.mdreferences/token-estimation.mdrules/_sections.mdrules/finding-severity-classification.mdrules/scope-declaration.mdscripts/estimate-tokens.shtest-cases.jsonConducts full codebase health audit across architecture, security, code quality, dependencies, test coverage. Produces scored report with letter grades and prioritized remediation. Use for existing codebases or before releases.
Performs multi-phase deep review of entire codebase covering architecture, security, code quality, UX, and accessibility with severity ratings and prioritized findings for GitHub issues.
Analyzes any codebase's architecture with 6 specialist agents (perf/scale, reliability, security, ops/DX, data/deps + Codex cross-review). Agents debate risks, fragile spots, improvements for audits/refactors.
Share bugs, ideas, or general feedback.
Single-pass whole-project analysis leveraging Opus 4.6's extended context window. Loads entire codebases (~50K LOC) into context for cross-file vulnerability detection, architecture review, and dependency analysis.
/ork:audit-full # Full audit (all modes)
/ork:audit-full security # Security-focused audit
/ork:audit-full architecture # Architecture review
/ork:audit-full dependencies # Dependency audit
Opus 4.6: Uses
complexity: maxfor extended thinking across entire codebases. 1M context (GA) enables cross-file reasoning that chunked approaches miss.
1M Context Required: If
CLAUDE_CODE_DISABLE_1M_CONTEXTis set, audit-full cannot perform full-codebase analysis. Check:echo $CLAUDE_CODE_DISABLE_1M_CONTEXT— if non-empty, either unset it (unset CLAUDE_CODE_DISABLE_1M_CONTEXT) or use/ork:verifyfor chunked analysis instead.
BEFORE creating tasks, clarify audit scope using the interactive dialog.
Load: Read("${CLAUDE_SKILL_DIR}/references/audit-scope-dialog.md") for the full AskUserQuestion dialog with mode options (Full/Security/Architecture/Dependencies) and scope options (Entire codebase/Specific directory/Changed files).
TaskCreate(
subject="Full-codebase audit",
description="Single-pass audit using extended context",
activeForm="Running full-codebase audit"
)
# Phase subtasks
TaskCreate(subject="Estimate token budget and plan loading", activeForm="Estimating token budget")
TaskCreate(subject="Load codebase into context", activeForm="Loading codebase")
TaskCreate(subject="Run audit analysis", activeForm="Analyzing codebase")
TaskCreate(subject="Generate audit report", activeForm="Generating report")
Before loading files, estimate whether the codebase fits in context.
Load: Read("${CLAUDE_SKILL_DIR}/references/token-budget-planning.md") for estimation rules (tokens/line by file type), budget allocation tables, auto-exclusion list, and fallback dialog when codebase exceeds budget.
Run estimation: bash ${CLAUDE_SKILL_DIR}/scripts/estimate-tokens.sh /path/to/project
Load: Read("${CLAUDE_SKILL_DIR}/references/report-structure.md") for loading strategy, inclusion patterns by language (TS/JS, Python, Config), and batch reading patterns.
With codebase loaded, perform the selected audit mode(s).
Load: Read("${CLAUDE_SKILL_DIR}/references/security-audit-guide.md") for the full checklist.
Key cross-file analysis patterns:
Load: Read("${CLAUDE_SKILL_DIR}/references/architecture-review-guide.md") for the full guide.
Key analysis patterns:
Load: Read("${CLAUDE_SKILL_DIR}/references/dependency-audit-guide.md") for the full guide.
Key analysis patterns:
Output findings incrementally as each audit mode completes — don't batch until the report:
For multi-mode audits (Full), each mode's findings appear as they complete. This lets users act on critical security findings while architecture analysis is still running.
Load the report template: Read("${CLAUDE_SKILL_DIR}/assets/audit-report-template.md").
Report structure and severity classification: Read("${CLAUDE_SKILL_DIR}/references/report-structure.md") for finding table format, severity breakdown (CRITICAL/HIGH/MEDIUM/LOW with timelines), and architecture diagram conventions.
Severity matrix: Read("${CLAUDE_SKILL_DIR}/assets/severity-matrix.md") for classification criteria.
Before finalizing the report, verify with Read("${CLAUDE_SKILL_DIR}/checklists/audit-completion.md").
| Situation | Use Instead |
|---|---|
| Small targeted check (1-5 files) | Direct Read + analysis |
| CI/CD automated scanning | security-scanning skill |
| Multi-agent graded verification | /ork:verify |
| Exploring unfamiliar codebase | /ork:explore |
| Codebase > 125K LOC (exceeds 1M) | /ork:verify (chunked approach) |
security-scanning — Automated scanner integration (npm audit, Semgrep, etc.)ork:security-patterns — Security architecture patterns and OWASP vulnerability classificationork:architecture-patterns — Architectural pattern referenceork:quality-gates — Quality assessment criteriaork:verify — Multi-agent verification (fallback for codebases exceeding 1M context)Load on demand with Read("${CLAUDE_SKILL_DIR}/references/<file>"):
| File | Content |
|---|---|
references/security-audit-guide.md | Cross-file vulnerability patterns |
references/architecture-review-guide.md | Pattern and coupling analysis |
references/dependency-audit-guide.md | CVE, license, currency checks |
references/token-estimation.md | File type ratios and budget planning |
assets/audit-report-template.md | Structured output format |
assets/severity-matrix.md | Finding classification criteria |
checklists/audit-completion.md | Pre-report verification |
scripts/estimate-tokens.sh | Automated LOC to token estimation |