session-discovery — Compétence d'Agent IA session-discovery, community, Compétence d'Agent IA, ide skills, Découverte de Sessions, Claude Code, Manifeste JSON, Recherche de Sessions, Filtrage de Sessions, session-discovery AI agent skill

v1.0.0

À propos de ce Skill

Ideal for AI Coding Assistants needing efficient conversation session management and analysis. La compétence de découverte de sessions est une utilité qui trouve les conversations de Claude Code stockées localement.

Fonctionnalités

Exécute un script de découverte de sessions
Retourne un manifeste JSON avec des métadonnées et des sessions
Permet de filtrer les sessions par date et projet
Prend en charge des drapeaux pour personnaliser la recherche

# Core Topics

hartphoenix hartphoenix
[12]
[2]
Updated: 3/16/2026

Killer-Skills Review

Decision support comes first. Repository text comes second.

Reference-Only Page Review Score: 10/11

This page remains useful for operators, but Killer-Skills treats it as reference material instead of a primary organic landing page.

Original recommendation layer Concrete use-case guidance Explicit limitations and caution Quality floor passed for review
Review Score
10/11
Quality Score
57
Canonical Locale
en
Detected Body Locale
en

Ideal for AI Coding Assistants needing efficient conversation session management and analysis. La compétence de découverte de sessions est une utilité qui trouve les conversations de Claude Code stockées localement.

Pourquoi utiliser cette compétence

Empowers agents to discover and manage local Claude Code conversation sessions, enhancing productivity in AI coding workflows through JSON manifests and filtering by project path substrings, leveraging flags like --since and --until for date window control.

Meilleur pour

Ideal for AI Coding Assistants needing efficient conversation session management and analysis.

Cas d'utilisation exploitables for session-discovery

Automating session discovery for efficient coding workflows
Filtering conversation sessions by project or date for targeted analysis
Generating JSON manifests for further processing or integration with other AI tools

! Sécurité et Limitations

  • Requires local Claude Code conversation sessions
  • Needs access to the harness root and scripts directory
  • Limited to sessions stored on the local machine

Why this page is reference-only

  • - Current locale does not satisfy the locale-governance contract.

Source Boundary

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

After The Review

Decide The Next Action Before You Keep Reading Repository Material

Killer-Skills should not stop at opening repository instructions. It should help you decide whether to install this skill, when to cross-check against trusted collections, and when to move into workflow rollout.

Labs Demo

Browser Sandbox Environment

⚡️ Ready to unleash?

Experience this Agent in a zero-setup browser environment powered by WebContainers. No installation required.

Boot Container Sandbox

FAQ & Installation Steps

These questions and steps mirror the structured data on this page for better search understanding.

? Frequently Asked Questions

What is session-discovery?

Ideal for AI Coding Assistants needing efficient conversation session management and analysis. La compétence de découverte de sessions est une utilité qui trouve les conversations de Claude Code stockées localement.

How do I install session-discovery?

Run the command: npx killer-skills add hartphoenix/weft/session-discovery. It works with Cursor, Windsurf, VS Code, Claude Code, and 19+ other IDEs.

What are the use cases for session-discovery?

Key use cases include: Automating session discovery for efficient coding workflows, Filtering conversation sessions by project or date for targeted analysis, Generating JSON manifests for further processing or integration with other AI tools.

Which IDEs are compatible with session-discovery?

This skill is compatible with Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer. Use the Killer-Skills CLI for universal one-command installation.

Are there any limitations for session-discovery?

Requires local Claude Code conversation sessions. Needs access to the harness root and scripts directory. Limited to sessions stored on the local machine.

How To Install

  1. 1. Open your terminal

    Open the terminal or command line in your project directory.

  2. 2. Run the install command

    Run: npx killer-skills add hartphoenix/weft/session-discovery. The CLI will automatically detect your IDE or AI agent and configure the skill.

  3. 3. Start using the skill

    The skill is now active. Your AI agent can use session-discovery immediately in the current project.

! Reference-Only Mode

This page remains useful for installation and reference, but Killer-Skills no longer treats it as a primary indexable landing page. Read the review above before relying on the upstream repository instructions.

Upstream Repository Material

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

Upstream Source

session-discovery

Install session-discovery, an AI agent skill for AI agent workflows and automation. Review the use cases, limitations, and setup path before rollout.

SKILL.md
Readonly
Upstream Repository Material
The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.
Supporting Evidence

Session Discovery

Utility skill that finds Claude Code conversation sessions stored on the local machine. Runs a bun script and returns a JSON manifest.

How to invoke

Run the discovery script from the harness root:

bash
1bun "$(cat ~/.config/weft/root)/scripts/session-discovery.ts" [flags]

Flags

FlagDefaultDescription
--since YYYY-MM-DDtodayStart of date window
--until YYYY-MM-DDtodayEnd of date window
--project <substring>(all)Filter by project path substring

Examples

bash
1SCRIPT="$(cat ~/.config/weft/root)/scripts/session-discovery.ts" 2 3# Today's sessions 4bun "$SCRIPT" 5 6# Sessions since last review 7bun "$SCRIPT" --since 2026-02-25 8 9# Only sessions in the roger project 10bun "$SCRIPT" --project roger 11 12# Two-day window, specific project 13bun "$SCRIPT" --since 2026-02-27 --until 2026-02-28 --project weft-dev

Output format

JSON to stdout. Diagnostics to stderr.

json
1{ 2 "meta": { 3 "claudeDir": "/Users/name/.claude", 4 "since": "2026-02-28", 5 "until": "2026-02-28", 6 "filesScanned": 258, 7 "sessionsMatched": 6, 8 "errors": [] 9 }, 10 "sessions": [ 11 { 12 "sessionId": "uuid", 13 "project": "/Users/name/code/project", 14 "projectEncoded": "-Users-name-code-project", 15 "filePath": "/Users/name/.claude/projects/.../uuid.jsonl", 16 "start": "2026-02-28T00:21:36.816Z", 17 "end": "2026-02-28T01:56:48.087Z", 18 "messageCount": 178, 19 "userMessageCount": 59, 20 "firstPrompt": "first 120 chars of first real user message...", 21 "gitBranch": "feature-branch", 22 "schemaVersion": "2.1.59" 23 } 24 ] 25}

How consuming skills should use the manifest

1. Run the script, parse the output

bash
1bun "$(cat ~/.config/weft/root)/scripts/session-discovery.ts" --since <last-review-date> 2>/dev/null

Parse the JSON from stdout. The meta object tells you how many sessions were found and whether errors occurred.

2. Decide what to read

The manifest gives you file paths and message counts. Use this to decide whether to analyze inline or delegate to sub-agents (per the context management gate in session-review).

  • Small window (1-2 sessions, < 200 total messages): read the JSONL files directly
  • Large window (3+ sessions, or > 500 messages): dispatch sub-agents with specific file paths from the manifest

3. Read session content

Each filePath is a JSONL file. Each line is a JSON object. The relevant message types:

typeContains
userUser messages. message.content is a string or array of {type, text} blocks.
assistantAgent responses. message.content is an array of text and tool_use blocks.
queue-operationSession lifecycle (enqueue/dequeue). Has timestamp but no content.
progressStreaming progress. Skip for analysis.
file-history-snapshotFile state snapshots. Skip for analysis.

Filter to user and assistant types for conversation analysis.

4. Filter noise from user messages

User message content often starts with IDE-injected metadata. Skip blocks matching these patterns:

  • <ide_opened_file>...
  • <system-reminder>...
  • <command-message>...
  • <command-name>...
  • <local-command...

Resilience notes

CLAUDE_CONFIG_DIR: The script checks this environment variable first. If set, it uses that path instead of ~/.claude/. Most users won't have this set.

Path encoding: The /- encoding for project directories is undocumented and could change. The script doesn't depend on decoding being perfect — it just needs to find JSONL files under projects/. The decoded project field is best-effort for display.

Schema changes: The JSONL format is internal to Claude Code and undocumented. The script reads timestamp and type fields. If these change, the script will return empty results (not crash). The schemaVersion field in each session lets consumers detect version mismatches.

30-day retention: Claude Code may delete sessions older than 30 days. The script can only find what's on disk.

Cross-midnight sessions: The script uses interval overlap logic, not simple date matching. A session starting at 23:00 on day N and ending at 01:00 on day N+1 will match queries for either day.

Compétences associées

Looking for an alternative to session-discovery or another community skill for your workflow? Explore these related open-source skills.

Voir tout

openclaw-release-maintainer

Logo of openclaw
openclaw

Your own personal AI assistant. Any OS. Any Platform. The lobster way. 🦞

widget-generator

Logo of f
f

Générez des plugins de widgets personnalisables pour le système de flux prompts.chat

flags

Logo of vercel
vercel

Le Cadre de Réaction

138.4k
0
Navigateur

pr-review

Logo of pytorch
pytorch

Tenseurs et réseaux neuronaux dynamiques en Python avec une forte accélération GPU

98.6k
0
Développeur