repo-doc-audit — community repo-doc-audit, CityCatalyst, community, ide skills

v1.0.0

About this Skill

Ideal for Code Review Agents requiring comprehensive documentation analysis for open-source carbon accounting repositories. One-off full repository audit for documentation health (docstrings, README, architecture, scripts conventions). Use explicitly when requested.

Open-Earth-Foundation Open-Earth-Foundation
[0]
[0]
Updated: 3/3/2026

Killer-Skills Review

Decision support comes first. Repository text comes second.

Reference-Only Page Review Score: 7/11

This page remains useful for operators, but Killer-Skills treats it as reference material instead of a primary organic landing page.

Original recommendation layer Concrete use-case guidance Explicit limitations and caution Locale and body language aligned
Review Score
7/11
Quality Score
45
Canonical Locale
en
Detected Body Locale
en

Ideal for Code Review Agents requiring comprehensive documentation analysis for open-source carbon accounting repositories. One-off full repository audit for documentation health (docstrings, README, architecture, scripts conventions). Use explicitly when requested.

Core Value

Empowers agents to perform thorough audits of README.md and architecture.md files, ensuring accuracy and consistency across setup, run, config, and troubleshooting sections, utilizing markdown parsing and content validation protocols.

Ideal Agent Persona

Ideal for Code Review Agents requiring comprehensive documentation analysis for open-source carbon accounting repositories.

Capabilities Granted for repo-doc-audit

Auditing documentation after large refactors or restructurings
Validating README.md accuracy for setup and troubleshooting
Generating actionable reports for architecture.md consistency

! Prerequisites & Limits

  • Intentionally not automatic due to potential expense and noise
  • Requires manual initiation for full repo documentation audit
  • Limited to repository-wide documentation analysis

Why this page is reference-only

  • - The underlying skill quality score is below the review floor.

Source Boundary

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

After The Review

Decide The Next Action Before You Keep Reading Repository Material

Killer-Skills should not stop at opening repository instructions. It should help you decide whether to install this skill, when to cross-check against trusted collections, and when to move into workflow rollout.

Labs Demo

Browser Sandbox Environment

⚡️ Ready to unleash?

Experience this Agent in a zero-setup browser environment powered by WebContainers. No installation required.

Boot Container Sandbox

FAQ & Installation Steps

These questions and steps mirror the structured data on this page for better search understanding.

? Frequently Asked Questions

What is repo-doc-audit?

Ideal for Code Review Agents requiring comprehensive documentation analysis for open-source carbon accounting repositories. One-off full repository audit for documentation health (docstrings, README, architecture, scripts conventions). Use explicitly when requested.

How do I install repo-doc-audit?

Run the command: npx killer-skills add Open-Earth-Foundation/CityCatalyst. It works with Cursor, Windsurf, VS Code, Claude Code, and 19+ other IDEs.

What are the use cases for repo-doc-audit?

Key use cases include: Auditing documentation after large refactors or restructurings, Validating README.md accuracy for setup and troubleshooting, Generating actionable reports for architecture.md consistency.

Which IDEs are compatible with repo-doc-audit?

This skill is compatible with Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer. Use the Killer-Skills CLI for universal one-command installation.

Are there any limitations for repo-doc-audit?

Intentionally not automatic due to potential expense and noise. Requires manual initiation for full repo documentation audit. Limited to repository-wide documentation analysis.

How To Install

  1. 1. Open your terminal

    Open the terminal or command line in your project directory.

  2. 2. Run the install command

    Run: npx killer-skills add Open-Earth-Foundation/CityCatalyst. The CLI will automatically detect your IDE or AI agent and configure the skill.

  3. 3. Start using the skill

    The skill is now active. Your AI agent can use repo-doc-audit immediately in the current project.

! Reference-Only Mode

This page remains useful for installation and reference, but Killer-Skills no longer treats it as a primary indexable landing page. Read the review above before relying on the upstream repository instructions.

Upstream Repository Material

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

Upstream Source

repo-doc-audit

Install repo-doc-audit, an AI agent skill for AI agent workflows and automation. Review the use cases, limitations, and setup path before rollout.

SKILL.md
Readonly
Upstream Repository Material
The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.
Supporting Evidence

repo-doc-audit

This is a one-off, repo-wide documentation audit. It is intentionally not automatic because it can be expensive and noisy.

When to use

  • Use this skill when the user asks for a full repo documentation audit or “is everything up to date?”
  • Use after large refactors, restructurings, or major feature additions.

Goal

Produce an actionable report (and optionally fixes) across:

  • README.md accuracy (setup/run/config/troubleshooting)
  • architecture.md accuracy (diagrams and component naming)
  • Script docstrings and runnable-script conventions
  • Consistency between dependency docs (pyproject.toml, requirements.txt, and lockfiles such as uv.lock / poetry.lock)
  • Presence of .env.example entries for documented env vars

1) Establish repo “truth” from code and configs

  • Identify real entrypoints (commands in README.md, modules with __main__, top-level scripts).
  • Identify configuration files that control runtime (e.g., model/provider selection, pipeline toggles).
  • Identify output folders and naming conventions from code paths.

2) Read and validate key docs against truth

  • README.md
    • Commands exist and match actual flags/paths.
    • Setup instructions match dependency source of truth policy.
    • Output structure matches code behavior.
  • architecture.md
    • Components referenced exist in the repo.
    • Diagrams reflect current flow and naming.
  • Module-level READMEs (if present in modules)
    • Do they describe actual behavior and entrypoints?

3) Script/docstring audit (repo-wide)

For any file that looks runnable (heuristics):

  • Located under a scripts/ folder, OR
  • Mentioned in docs as an entrypoint, OR
  • Contains if __name__ == "__main__":, OR
  • Imports argparse and defines main()

Check:

  • Top-level module docstring exists and covers:
    • Brief
    • Inputs (each CLI flag should have a short purpose + expected format; env vars should explain what they control)
    • Outputs
    • Usage from project root (python -m ...)
  • Uses argparse for CLI (when runnable).
  • Has __main__ guard.
  • Avoids side effects at import time.
  • Logging: uses logging (not print) except intentional CLI UX.
  • Imports: prefer absolute imports.
  • Paths: prefer pathlib.Path.

Additionally (repo-wide): check that every function and method has a docstring.

  • Trivial functions/methods: one-liner docstring is acceptable.
  • Non-trivial or side-effecting functions/methods: docstring should explain inputs/outputs, side effects, and raised exceptions when non-obvious.

4) Produce an output report

Deliver a report with:

  • Summary: 3–6 bullets of highest-impact issues
  • Findings grouped by document/file
  • Fix suggestions: concrete edits (small, scoped)
  • Optional automated fixes:
    • Only apply if user asked you to fix; otherwise just report.

Non-goals

  • Do not try to enforce style consistency beyond correctness.
  • Do not rewrite large sections unless necessary for accuracy.

Related Skills

Looking for an alternative to repo-doc-audit or another community skill for your workflow? Explore these related open-source skills.

View All

openclaw-release-maintainer

Logo of openclaw
openclaw

Your own personal AI assistant. Any OS. Any Platform. The lobster way. 🦞

333.8k
0
AI

widget-generator

Logo of f
f

Generate customizable widget plugins for the prompts.chat feed system

149.6k
0
AI

flags

Logo of vercel
vercel

The React Framework

138.4k
0
Browser

pr-review

Logo of pytorch
pytorch

Tensors and Dynamic neural networks in Python with strong GPU acceleration

98.6k
0
Developer