ops-vault-recap — community ops-vault-recap, neuron, community, ide skills

v1.0.0

Acerca de este Skill

Perfecto para Agentes de Gestión del Conocimiento que necesitan una organización de notas unificada y validación de la integridad de la estructura del vault. Recap session memory into vault and validate vault structure

d0nghyun d0nghyun
[1]
[0]
Updated: 3/16/2026

Killer-Skills Review

Decision support comes first. Repository text comes second.

Reference-Only Page Review Score: 7/11

This page remains useful for operators, but Killer-Skills treats it as reference material instead of a primary organic landing page.

Original recommendation layer Concrete use-case guidance Explicit limitations and caution
Review Score
7/11
Quality Score
33
Canonical Locale
en
Detected Body Locale
en

Perfecto para Agentes de Gestión del Conocimiento que necesitan una organización de notas unificada y validación de la integridad de la estructura del vault. Recap session memory into vault and validate vault structure

¿Por qué usar esta habilidad?

Habilita a los agentes a consolidar notas de sesión dispersas en ubicaciones de vault adecuadas, validar la integridad de la estructura del vault y informar y corregir violaciones estructurales utilizando programación CRON.md y exploración de archivos Glob.

Mejor para

Perfecto para Agentes de Gestión del Conocimiento que necesitan una organización de notas unificada y validación de la integridad de la estructura del vault.

Casos de uso accionables for ops-vault-recap

Consolidar notas de sesión en estructuras de vault unificadas
Validar la integridad del vault después de sesiones de trabajo intensivas
Automatizar la recapitulación nocturna del vault y la validación de la estructura a través de CRON.md

! Seguridad y limitaciones

  • Requiere capacidad de exploración de archivos Glob
  • Limitado al formato de archivo markdown (.md)
  • Necesita acceso al directorio de vault/memoria

Why this page is reference-only

  • - Current locale does not satisfy the locale-governance contract.
  • - The underlying skill quality score is below the review floor.

Source Boundary

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

After The Review

Decide The Next Action Before You Keep Reading Repository Material

Killer-Skills should not stop at opening repository instructions. It should help you decide whether to install this skill, when to cross-check against trusted collections, and when to move into workflow rollout.

Labs Demo

Browser Sandbox Environment

⚡️ Ready to unleash?

Experience this Agent in a zero-setup browser environment powered by WebContainers. No installation required.

Boot Container Sandbox

FAQ & Installation Steps

These questions and steps mirror the structured data on this page for better search understanding.

? Frequently Asked Questions

What is ops-vault-recap?

Perfecto para Agentes de Gestión del Conocimiento que necesitan una organización de notas unificada y validación de la integridad de la estructura del vault. Recap session memory into vault and validate vault structure

How do I install ops-vault-recap?

Run the command: npx killer-skills add d0nghyun/neuron/ops-vault-recap. It works with Cursor, Windsurf, VS Code, Claude Code, and 19+ other IDEs.

What are the use cases for ops-vault-recap?

Key use cases include: Consolidar notas de sesión en estructuras de vault unificadas, Validar la integridad del vault después de sesiones de trabajo intensivas, Automatizar la recapitulación nocturna del vault y la validación de la estructura a través de CRON.md.

Which IDEs are compatible with ops-vault-recap?

This skill is compatible with Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer. Use the Killer-Skills CLI for universal one-command installation.

Are there any limitations for ops-vault-recap?

Requiere capacidad de exploración de archivos Glob. Limitado al formato de archivo markdown (.md). Necesita acceso al directorio de vault/memoria.

How To Install

  1. 1. Open your terminal

    Open the terminal or command line in your project directory.

  2. 2. Run the install command

    Run: npx killer-skills add d0nghyun/neuron/ops-vault-recap. The CLI will automatically detect your IDE or AI agent and configure the skill.

  3. 3. Start using the skill

    The skill is now active. Your AI agent can use ops-vault-recap immediately in the current project.

! Reference-Only Mode

This page remains useful for installation and reference, but Killer-Skills no longer treats it as a primary indexable landing page. Read the review above before relying on the upstream repository instructions.

Upstream Repository Material

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

Upstream Source

ops-vault-recap

Install ops-vault-recap, an AI agent skill for AI agent workflows and automation. Review the use cases, limitations, and setup path before rollout.

SKILL.md
Readonly
Upstream Repository Material
The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.
Supporting Evidence

Vault Recap

When to Activate

  • Scheduled nightly via CRON.md
  • User runs /ops-vault-recap
  • After intensive work sessions

Purpose

  1. Consolidate scattered session notes into proper vault locations
  2. Validate vault structure integrity
  3. Report and fix structural violations

Steps

Step 1: Scan Session Memory

bash
1Glob vault/memory/**/*.md # All session notes

Read each file. Identify entries that should be promoted to vault sections:

Content TypeDestination
Project decisionsvault/02-Projects/{project}/
Lessons learnedvault/02-Projects/{project}/learn-*.yaml
General referencevault/04-Resources/
Completed/stale notesvault/05-Archive/

Step 2: Recap & Consolidate

For each promotable entry:

  1. Extract key information (decisions, insights, references)
  2. Check if destination file already exists (append vs create)
  3. Write to proper vault location following pattern-knowledge.md format
  4. Respect vault naming: ###-name.md with frontmatter (name, type)

Step 3: Validate Structure

Run structural checks on all vault files:

CheckRuleSource
DepthMax 3 levelsRULES.md
L1 prefix##-name/validate-vault.sh
L2 prefix###-name/validate-vault.sh
File naming###-name.mdvalidate-vault.sh
Frontmatter--- with name:, type:validate-vault.sh

Step 4: Fix Structural Issues

Auto-fixable (safe):

  • Missing frontmatter → add with inferred name and type
  • Wrong file prefix → rename to match ###- pattern

Report only (needs user):

  • Depth violations (moving files changes references)
  • Duplicate content across locations
  • Orphaned files with no clear destination

Step 5: Clean Stale Memory

Session notes older than 7 days that have been fully recapped:

  • Move to vault/05-Archive/ (not delete)
  • Log what was archived

Step 6: Generate Report

yaml
1vault_recap: 2 timestamp: "{ISO date}" 3 memory_scanned: {count} 4 promoted: {count} 5 structure_checks: 6 total: {count} 7 passed: {count} 8 auto_fixed: {count} 9 needs_user: {count} 10 archived: {count} 11 issues: 12 - type: "{structural | duplicate | orphan}" 13 path: "{file path}" 14 detail: "{description}" 15 action: "{fixed | needs_user}"

Notes

  • Never deletes vault files (archive instead)
  • Respects validate-vault.sh rules as source of truth
  • Memory files under vault/memory/ skip strict naming checks (per hook)
  • Idempotent: recapping already-promoted content is a no-op

Habilidades relacionadas

Looking for an alternative to ops-vault-recap or another community skill for your workflow? Explore these related open-source skills.

Ver todo

openclaw-release-maintainer

Logo of openclaw
openclaw

Your own personal AI assistant. Any OS. Any Platform. The lobster way. 🦞

333.8k
0
Inteligencia Artificial

widget-generator

Logo of f
f

Generar complementos de widgets personalizables para el sistema de feeds de prompts.chat

149.6k
0
Inteligencia Artificial

flags

Logo of vercel
vercel

El Marco de React

138.4k
0
Navegador

pr-review

Logo of pytorch
pytorch

Tensores y redes neuronales dinámicas en Python con fuerte aceleración de GPU

98.6k
0
Desarrollador