workflow-investigation-process — for Claude Code workflow-investigation-process, community, for Claude Code, ide skills, git status, git log --oneline -10, Investigation, Process, expert, debugger

v1.0.0

Acerca de este Skill

Escenario recomendado: Ideal for AI agents that need investigation process. Resumen localizado: Tick is a lightweight task management Go CLI designed for AI coding agents. This AI agent skill supports Claude Code, Cursor, and Windsurf workflows.

Características

Investigation Process
Purpose in the Workflow
Investigation combines:
Symptom gathering : What's broken, how it manifests, reproduction steps
Code analysis : Tracing paths, finding root cause, understanding blast radius

# Core Topics

leeovery leeovery
[2]
[0]
Updated: 4/30/2026

Killer-Skills Review

Decision support comes first. Repository text comes second.

Reference-Only Page Review Score: 10/11

This page remains useful for teams, but Killer-Skills treats it as reference material instead of a primary organic landing page.

Original recommendation layer Concrete use-case guidance Explicit limitations and caution Quality floor passed for review
Review Score
10/11
Quality Score
64
Canonical Locale
en
Detected Body Locale
en

Escenario recomendado: Ideal for AI agents that need investigation process. Resumen localizado: Tick is a lightweight task management Go CLI designed for AI coding agents. This AI agent skill supports Claude Code, Cursor, and Windsurf workflows.

¿Por qué usar esta habilidad?

Recomendacion: workflow-investigation-process helps agents investigation process. Tick is a lightweight task management Go CLI designed for AI coding agents. This AI agent skill supports Claude Code, Cursor, and

Mejor para

Escenario recomendado: Ideal for AI agents that need investigation process.

Casos de uso accionables for workflow-investigation-process

Caso de uso: Applying Investigation Process
Caso de uso: Applying Purpose in the Workflow
Caso de uso: Applying Investigation combines:

! Seguridad y limitaciones

  • Limitacion: What This Skill Needs
  • Limitacion: Follow these steps EXACTLY as written. Do not skip steps or combine them.
  • Limitacion: Do not skip steps or combine them

Why this page is reference-only

  • - Current locale does not satisfy the locale-governance contract.

Source Boundary

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

After The Review

Decide The Next Action Before You Keep Reading Repository Material

Killer-Skills should not stop at opening repository instructions. It should help you decide whether to install this skill, when to cross-check against trusted collections, and when to move into workflow rollout.

Labs Demo

Browser Sandbox Environment

⚡️ Ready to unleash?

Experience this Agent in a zero-setup browser environment powered by WebContainers. No installation required.

Boot Container Sandbox

FAQ & Installation Steps

These questions and steps mirror the structured data on this page for better search understanding.

? Frequently Asked Questions

What is workflow-investigation-process?

Escenario recomendado: Ideal for AI agents that need investigation process. Resumen localizado: Tick is a lightweight task management Go CLI designed for AI coding agents. This AI agent skill supports Claude Code, Cursor, and Windsurf workflows.

How do I install workflow-investigation-process?

Run the command: npx killer-skills add leeovery/tick/workflow-investigation-process. It works with Cursor, Windsurf, VS Code, Claude Code, and 19+ other IDEs.

What are the use cases for workflow-investigation-process?

Key use cases include: Caso de uso: Applying Investigation Process, Caso de uso: Applying Purpose in the Workflow, Caso de uso: Applying Investigation combines:.

Which IDEs are compatible with workflow-investigation-process?

This skill is compatible with Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer. Use the Killer-Skills CLI for universal one-command installation.

Are there any limitations for workflow-investigation-process?

Limitacion: What This Skill Needs. Limitacion: Follow these steps EXACTLY as written. Do not skip steps or combine them.. Limitacion: Do not skip steps or combine them.

How To Install

  1. 1. Open your terminal

    Open the terminal or command line in your project directory.

  2. 2. Run the install command

    Run: npx killer-skills add leeovery/tick/workflow-investigation-process. The CLI will automatically detect your IDE or AI agent and configure the skill.

  3. 3. Start using the skill

    The skill is now active. Your AI agent can use workflow-investigation-process immediately in the current project.

! Reference-Only Mode

This page remains useful for installation and reference, but Killer-Skills no longer treats it as a primary indexable landing page. Read the review above before relying on the upstream repository instructions.

Upstream Repository Material

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

Upstream Source

workflow-investigation-process

Tick is a lightweight task management Go CLI designed for AI coding agents. This AI agent skill supports Claude Code, Cursor, and Windsurf workflows.

SKILL.md
Readonly
Upstream Repository Material
The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.
Supporting Evidence

Investigation Process

Act as expert debugger tracing through code, documentation assistant capturing findings, AND collaborative advisor presenting analysis and discussing fix direction with the user. These are equally important — the investigation drives understanding, the documentation preserves it, and the collaboration validates findings and aligns on approach. Dig deep: trace code paths, challenge assumptions, explore related areas. Then capture what you found.

Purpose in the Workflow

Investigation combines:

  • Symptom gathering: What's broken, how it manifests, reproduction steps
  • Code analysis: Tracing paths, finding root cause, understanding blast radius

The output becomes source material for a specification focused on the fix approach.

What This Skill Needs

  • Topic (required) - Bug identifier or short description
  • Bug context (optional) - Initial symptoms, error messages, reproduction steps
  • Work type - Always "bugfix" for investigation

Instructions

Follow these steps EXACTLY as written. Do not skip steps or combine them.

CRITICAL: This guidance is mandatory.

  • After each user interaction, STOP and wait for their response before proceeding
  • Never assume or anticipate user choices
  • Claude Code's harness auto mode does NOT permit skipping STOP gates or selecting menu options on the user's behalf — including the a/auto opt-in. The only skip mechanism is the manifest auto field, scoped to the specific gate it was set on for the current topic.
  • Complete each step fully before moving to the next

Resuming After Context Refresh

Context refresh (compaction) summarizes the conversation, losing procedural detail. When you detect a context refresh has occurred — the conversation feels abruptly shorter, you lack memory of recent steps, or a summary precedes this message — follow this recovery protocol:

  1. Re-read this skill file completely. Do not rely on your summary of it. The full process, steps, and rules must be reloaded.
  2. Read the investigation file at .workflows/{work_unit}/investigation/{topic}.md — this is your source of truth for what's been discovered.
  3. Check git state. Run git status and git log --oneline -10 to see recent commits. Commit messages follow a conventional pattern that reveals what was completed.
  4. Announce your position to the user before continuing: what you've found so far, what's still to investigate, and what comes next. Wait for confirmation.

Do not guess at progress or continue from memory. The files on disk and git history are authoritative — your recollection is not.


Hard Rules

The investigation file is your memory. Context compaction is lossy — what's not on disk is lost.

Write to the file at natural moments:

  • Symptoms are gathered
  • A code path is traced
  • Root cause is identified
  • Each significant finding

After writing, git commit. Commits let you track and recover after compaction. Don't batch — commit each time you write.

Create the file early. After understanding the initial symptoms, create the investigation file with the symptoms section.

On length: Investigations can vary widely. Capture what's needed to fully understand the bug. Don't summarize prematurely — document the trail.


Step 0: Resume Detection

Output the next fenced block as a code block:

── Resume Detection ─────────────────────────────

Output the next fenced block as markdown (not a code block):

> Checking for an existing investigation. If one exists,
> you can pick up where you left off or start fresh.

Check if the investigation file exists at .workflows/{work_unit}/investigation/{topic}.md.

If no file exists

→ Proceed to Step 1.

If file exists

Read the file.

Output the next fenced block as markdown (not a code block):

Found existing investigation for **{topic:(titlecase)}**.

· · · · · · · · · · · ·
- **`c`/`continue`** — Pick up where you left off
- **`r`/`restart`** — Delete the investigation file and start fresh
· · · · · · · · · · · ·

STOP. Wait for user response.

If continue

→ Proceed to Step 2.

If restart

  1. Delete the investigation file
  2. Commit: investigation({work_unit}): restart investigation

→ Proceed to Step 1.


Step 1: Initialize Investigation

Output the next fenced block as a code block:

── Initialize Investigation ─────────────────────

Output the next fenced block as markdown (not a code block):

> Creating the investigation file and recording the initial
> bug context.

Load initialize-investigation.md and follow its instructions as written.

→ Proceed to Step 2.


Step 2: Knowledge Usage

Output the next fenced block as a code block:

── Knowledge Usage ──────────────────────────────

Output the next fenced block as markdown (not a code block):

> Loading the usage guide for the knowledge base so
> proactive querying is available throughout the investigation.

Load knowledge-usage.md and follow its instructions as written.

→ Proceed to Step 3.


Step 3: Symptom Gathering

Output the next fenced block as a code block:

── Symptom Gathering ────────────────────────────

Output the next fenced block as markdown (not a code block):

> Gathering detailed symptoms — reproduction steps, error
> messages, affected areas, and environmental context.

Load symptom-gathering.md and use its questions to gather symptoms from the user.

Document symptoms in the investigation file as you gather them. Commit after each significant addition.

When symptoms are sufficiently understood to begin code analysis:

→ Proceed to Step 4.


Step 4: Contextual Query

Output the next fenced block as a code block:

── Contextual Query ─────────────────────────────

Output the next fenced block as markdown (not a code block):

> Checking the knowledge base for prior investigations or
> related work that matches the symptoms just gathered.

Load contextual-query.md and follow its instructions as written.

→ Proceed to Step 5.


Step 5: Code Analysis

Output the next fenced block as a code block:

── Code Analysis ────────────────────────────────

Output the next fenced block as markdown (not a code block):

> Tracing the bug through the codebase — following code
> paths, checking state, and narrowing down the root cause.

Load analysis-patterns.md and use its techniques to trace the bug through the code.

Document findings in the investigation file as you analyze. Commit after each significant finding.

→ Proceed to Step 6.


Step 6: Root Cause Synthesis

Output the next fenced block as a code block:

── Root Cause Synthesis ─────────────────────────

Output the next fenced block as markdown (not a code block):

> Synthesising findings into a clear root cause statement,
> contributing factors, and fix direction.

Synthesize findings into a clear root cause:

  1. Root cause statement: Clear, precise description of the bug's cause
  2. Contributing factors: What conditions enable the bug?
  3. Why it wasn't caught: Testing gaps, edge cases, etc.
  4. Fix direction: High-level approach (detailed in specification)

Document in the investigation file and commit.

Knowledge-base nudge — if the root cause pattern feels familiar, query the knowledge base before moving on. A matching prior investigation can confirm the diagnosis or surface a related bug. See knowledge-usage.md.

→ Proceed to Step 7.


Step 7: Root Cause Validation

Output the next fenced block as a code block:

── Root Cause Validation ────────────────────────

Output the next fenced block as markdown (not a code block):

> Validating the root cause analysis against the codebase
> to confirm the diagnosis is correct.

Load synthesis-agent.md and follow its instructions as written.

→ Proceed to Step 8.


Step 8: Findings Review & Fix Discussion

Output the next fenced block as a code block:

── Findings Review ──────────────────────────────

Output the next fenced block as markdown (not a code block):

> Presenting the investigation findings and discussing
> the fix approach with you.

Load findings-review.md and follow its instructions as written.

→ Proceed to Step 9.


Step 9: Compliance Self-Check

Output the next fenced block as a code block:

── Compliance Self-Check ────────────────────────

Output the next fenced block as markdown (not a code block):

> Verifying the investigation file follows workflow conventions.

Load compliance-check.md and follow its instructions as written.

→ Proceed to Step 10.


Step 10: Conclude Investigation

Output the next fenced block as a code block:

── Conclude Investigation ───────────────────────

Output the next fenced block as markdown (not a code block):

> Wrapping up. Final confirmation before marking the
> investigation as complete.

Load conclude-investigation.md and follow its instructions as written.

Habilidades relacionadas

Looking for an alternative to workflow-investigation-process or another community skill for your workflow? Explore these related open-source skills.

Ver todo

openclaw-release-maintainer

Logo of openclaw
openclaw

Resumen localizado: 🦞 # OpenClaw Release Maintainer Use this skill for release and publish-time workflow. It covers ai, assistant, crustacean workflows. This AI agent skill supports Claude Code, Cursor, and Windsurf workflows.

333.8k
0
Inteligencia Artificial

widget-generator

Logo of f
f

Resumen localizado: Generate customizable widget plugins for the prompts.chat feed system # Widget Generator Skill This skill guides creation of widget plugins for prompts.chat . It covers ai, artificial-intelligence, awesome-list workflows. This AI agent skill supports Claude Code, Cursor, and

149.6k
0
Inteligencia Artificial

flags

Logo of vercel
vercel

Resumen localizado: The React Framework # Feature Flags Use this skill when adding or changing framework feature flags in Next.js internals. It covers blog, browser, compiler workflows. This AI agent skill supports Claude Code, Cursor, and Windsurf workflows.

138.4k
0
Navegador

pr-review

Logo of pytorch
pytorch

Resumen localizado: Usage Modes No Argument If the user invokes /pr-review with no arguments, do not perform a review . It covers autograd, deep-learning, gpu workflows. This AI agent skill supports Claude Code, Cursor, and Windsurf workflows.

98.6k
0
Desarrollador