repomatic-audit — github workflow automation repomatic-audit, repomatic, kdeldycke, community, github workflow automation, ai agent skill, mcp server, agent automation, ci cd pipeline management, python automation tools, repository maintenance automation, github actions setup

v1.0.0
GitHub

About this Skill

Perfect for DevOps Agents needing automated repository maintenance and CI/CD workflow analysis against the kdeldycke/repomatic reference. repomatic-audit is an AI agent skill that automates repository maintenance, releases, and CI/CD workflows, utilizing technologies like GitHub Actions and Python automation.

Features

Automates repository maintenance using GitHub Actions
Supports CI/CD workflow automation with reusable workflows
Utilizes Python automation for release management
Integrates with tools like mypy, nuitka, and Sphinx-doc
Performs comprehensive audits against the upstream kdeldycke/repomatic reference
Generates deterministic output using grep and ls commands

# Core Topics

kdeldycke kdeldycke
[36]
[7]
Updated: 3/12/2026

Quality Score

Top 5%
55
Excellent
Based on code quality & docs
Installation
SYS Universal Install (Auto-Detect)
> npx killer-skills add kdeldycke/repomatic/repomatic-audit
Supports 18+ Platforms
Cursor
Windsurf
VS Code
Trae
Claude
OpenClaw
+12 more

Agent Capability Analysis

The repomatic-audit MCP Server by kdeldycke is an open-source community integration for Claude and other AI agents, enabling seamless task automation and capability expansion. Optimized for github workflow automation, ci cd pipeline management, python automation tools.

Ideal Agent Persona

Perfect for DevOps Agents needing automated repository maintenance and CI/CD workflow analysis against the kdeldycke/repomatic reference.

Core Value

Empowers agents to automate comprehensive audits of GitHub repositories, leveraging YAML workflow files and pyproject.toml configurations to ensure compliance with upstream references, utilizing tools like grep and ls for repository introspection.

Capabilities Granted for repomatic-audit MCP Server

Automating repository maintenance tasks
Analyzing CI/CD workflows for compliance
Debugging repository configurations against upstream references

! Prerequisites & Limits

  • Requires access to GitHub repository and workflow files
  • Limited to repositories using the kdeldycke/repomatic reference
  • Dependent on specific file structures, such as .github/workflows/*.yaml and pyproject.toml
SKILL.md
Readonly

Context

!ls .github/workflows/*.yaml 2>/dev/null !grep -h 'uses:.*kdeldycke/repomatic' .github/workflows/*.yaml 2>/dev/null | head -5 !grep -A5 '\[tool.repomatic\]' pyproject.toml 2>/dev/null || echo "No [tool.repomatic] section" ![ -f repomatic/__init__.py ] && echo "CANONICAL_REPO" || echo "DOWNSTREAM"

Instructions

You perform a comprehensive audit of a downstream repository against the upstream kdeldycke/repomatic reference. This goes beyond what repomatic workflow sync handles — it catches stale action versions in custom job content, missing workarounds, outdated configs, and conventions that can be borrowed from upstream.

This skill is for downstream repos only. If the context shows CANONICAL_REPO, tell the user this skill is not applicable.

Scope selection

  • all (default when $ARGUMENTS is empty): Run all audits below.
  • workflows: Audit workflow files only.
  • configs: Audit non-workflow config files only.
  • claude: Audit claude.md alignment only.
  • upstream: Identify downstream innovations that could be contributed back to repomatic.

Fetching reference files

Use gh api repos/kdeldycke/repomatic/contents/{path} --jq '.content' | base64 -d to fetch upstream reference files.

1. Workflow audit (workflows)

Thin-caller workflows

Compare each local thin-caller workflow against its reference. These should be identical (except for files listed in exclude). Flag:

  • Extra triggers (e.g., spurious workflow_dispatch).
  • Missing triggers.
  • Version pin drift (different @vX.Y.Z tag).

Header-only workflows (e.g., tests.yaml)

The header (name, on:, concurrency:) is synced automatically, but custom job content is not. Compare the job content against the reference for:

  • Stale action versions: e.g., actions/checkout, astral-sh/setup-uv, codecov/* — compare pinned versions.
  • Missing workarounds: e.g., the "Force native ARM64 Python on Windows ARM64" step that sets UV_PYTHON.
  • Missing matrix exclusions: e.g., windows-11-arm + Python 3.10 (no native ARM64 build).
  • Outdated integration patterns: e.g., using codecov-action when upstream migrated to codecov-cli via uvx.
  • Missing pytest output flags: e.g., --cov-report=xml, --junitxml=junit.xml needed for codecov-cli.
  • YAML scalar style issues: e.g., run: | where run: > is needed for multi-line single commands.

Excluded workflows

Respect exclude entries from [tool.repomatic] in pyproject.toml. Report excluded files but do not flag them as drift.

2. Config file audit (configs)

Compare these files against the upstream reference:

FileWhat to check
renovate.json5Missing assignees, missing package rules, stale binary versions in postUpgradeTasks
pyproject.toml [tool.typos]Missing default.extend-identifiers for common capitalizations (GitHub, macOS, PyPI, iOS, etc.)
pyproject.toml [tool.bumpversion]Missing ignore_missing_files
pyproject.toml [tool.ruff]Missing or divergent lint rules, preview settings
pyproject.toml [tool.mypy]Missing settings compared to reference
.github/ISSUE_TEMPLATE/Filename conventions (hyphens, not underscores), missing labels
.github/code-of-conduct.mdStale or non-canonical attribution URLs
.github/funding.ymlCompare with reference
.gitignoreCompare with reference
lychee.tomlNote differences (usually project-specific, just flag for review)

Skip files that are intentionally excluded via exclude in [tool.repomatic].

3. claude.md audit (claude)

Fetch the upstream claude.md and identify universally applicable sections that the local claude.md is missing. Focus on:

  • Terminology and spelling rules.
  • Version formatting conventions.
  • Modern typing practices.
  • Python version compatibility caveats.
  • Testing guidelines (e.g., "no test classes" rule).
  • Common maintenance pitfalls.
  • Command-line option conventions.

Do not flag upstream sections that are project-specific (e.g., CLI abstractions, workflow design, release checklists, agent conventions).

4. Upstream contribution opportunities (upstream)

Scan the downstream repo for patterns, workarounds, or configurations that are better than or missing from the upstream reference. These are candidates for contributing back to kdeldycke/repomatic. Look for:

  • Broader test matrices: e.g., more OS variants, extra Python versions, additional architecture coverage that upstream could adopt as defaults.
  • Workarounds for known issues: Steps or configs that fix CI failures or edge cases that upstream hasn't addressed yet.
  • Better tool configurations: e.g., ruff extend-include patterns, pytest addopts, coverage settings that are more complete than upstream.
  • Useful pyproject.toml patterns: e.g., dependency group definitions, build config, or tool settings that could be generalized.
  • Custom workflow steps: Reusable patterns in header-only workflows (e.g., package install verification, environment variable passing) that could become part of the reference workflow.
  • Documentation improvements: claude.md sections, issue templates, or repo metadata patterns that would benefit all downstream repos.

For each candidate, assess:

  1. Generalizability: Would this benefit most downstream repos, or is it project-specific?
  2. Complexity: Is it a simple config change or a significant workflow redesign?
  3. Action: Suggest filing as a GitHub issue or PR at kdeldycke/repomatic, with a draft title and description.

Output format

For each audit area, produce:

  1. A summary table: item, status (MATCH / DRIFT / MISSING / N/A), brief description.
  2. For each issue: what the current state is, what the reference has, and the recommended fix.
  3. Prioritize: group by severity (breaking/functional issues first, then consistency, then cosmetic).

After running

Suggest the user run:

  • /repomatic-sync to fix thin-caller workflow drift automatically.
  • Manual edits for header-only workflow drift and config changes.
  • /repomatic-lint to validate after fixes are applied.

FAQ & Installation Steps

These questions and steps mirror the structured data on this page for better search understanding.

? Frequently Asked Questions

What is repomatic-audit?

Perfect for DevOps Agents needing automated repository maintenance and CI/CD workflow analysis against the kdeldycke/repomatic reference. repomatic-audit is an AI agent skill that automates repository maintenance, releases, and CI/CD workflows, utilizing technologies like GitHub Actions and Python automation.

How do I install repomatic-audit?

Run the command: npx killer-skills add kdeldycke/repomatic/repomatic-audit. It works with Cursor, Windsurf, VS Code, Claude Code, and 15+ other IDEs.

What are the use cases for repomatic-audit?

Key use cases include: Automating repository maintenance tasks, Analyzing CI/CD workflows for compliance, Debugging repository configurations against upstream references.

Which IDEs are compatible with repomatic-audit?

This skill is compatible with Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer. Use the Killer-Skills CLI for universal one-command installation.

Are there any limitations for repomatic-audit?

Requires access to GitHub repository and workflow files. Limited to repositories using the kdeldycke/repomatic reference. Dependent on specific file structures, such as .github/workflows/*.yaml and pyproject.toml.

How To Install

  1. 1. Open your terminal

    Open the terminal or command line in your project directory.

  2. 2. Run the install command

    Run: npx killer-skills add kdeldycke/repomatic/repomatic-audit. The CLI will automatically detect your IDE or AI agent and configure the skill.

  3. 3. Start using the skill

    The skill is now active. Your AI agent can use repomatic-audit immediately in the current project.

Related Skills

Looking for an alternative to repomatic-audit or building a community AI Agent? Explore these related open-source MCP Servers.

View All

widget-generator

Logo of f
f

widget-generator is an open-source AI agent skill for creating widget plugins that are injected into prompt feeds on prompts.chat. It supports two rendering modes: standard prompt widgets using default PromptCard styling and custom render widgets built as full React components.

149.6k
0
Design

linear

Logo of lobehub
lobehub

Linear is a workflow management system that enables multi-agent collaboration, effortless agent team design, and introduces agents as the unit of work interaction.

73.4k
0
Communication

testing

Logo of lobehub
lobehub

Testing is a process for verifying AI agent functionality using commands like bunx vitest run and optimizing workflows with targeted test runs.

73.3k
0
Communication

chat-sdk

Logo of lobehub
lobehub

chat-sdk is a unified TypeScript SDK for building chat bots across multiple platforms, providing a single interface for deploying bot logic.

73.0k
0
Communication