oris-maintainer — evolution oris-maintainer, community, evolution, ide skills

v1.0.0

이 스킬 정보

문제 관리와 Rust 작업 공간 검증을 간소화해야 하는 GitHub 자동화 에이전트에 적합합니다. Maintain the Oris Rust agent runtime with an issue-driven GitHub workflow. Use when Codex is working in the Oris repository and needs to pick up a GitHub issue, turn the issue into scoped code changes, run Rust validation such as cargo fmt and cargo test, publish the oris-runtime crate to crates.io, close the completed issue, and continue to the next iteration.

# Core Topics

Colin4k1024 Colin4k1024
[0]
[1]
Updated: 3/18/2026

Killer-Skills Review

Decision support comes first. Repository text comes second.

Reference-Only Page Review Score: 7/11

This page remains useful for operators, but Killer-Skills treats it as reference material instead of a primary organic landing page.

Original recommendation layer Concrete use-case guidance Explicit limitations and caution
Review Score
7/11
Quality Score
21
Canonical Locale
en
Detected Body Locale
en

문제 관리와 Rust 작업 공간 검증을 간소화해야 하는 GitHub 자동화 에이전트에 적합합니다. Maintain the Oris Rust agent runtime with an issue-driven GitHub workflow. Use when Codex is working in the Oris repository and needs to pick up a GitHub issue, turn the issue into scoped code changes, run Rust validation such as cargo fmt and cargo test, publish the oris-runtime crate to crates.io, close the completed issue, and continue to the next iteration.

이 스킬을 사용하는 이유

에이전트가 GitHub 문제의 유지 관리 루프를 자동화할 수 있도록 하여 문제 크기의 변경을 구현하고 Rust 작업 공간을 검증하며 준비가 되면 oris-runtime을 출시하고 GitHub 문제와 Rust 검증 프로토콜을 사용하여 리포지토리 상태와 문제 범위를 일치시킵니다.

최적의 용도

문제 관리와 Rust 작업 공간 검증을 간소화해야 하는 GitHub 자동화 에이전트에 적합합니다.

실행 가능한 사용 사례 for oris-maintainer

문제 크기의 변경 구현을 자동화하는 것
Rust 작업 공간의 일관성을 검증하는 것
변경이 준비되면 oris-runtime을 출시하는 것

! 보안 및 제한 사항

  • GitHub 문제에 대한 액세스가 필요함
  • Rust 작업 공간 검증만 해당함
  • oris-runtime 출시 프로토콜에 의존

Why this page is reference-only

  • - Current locale does not satisfy the locale-governance contract.
  • - The underlying skill quality score is below the review floor.

Source Boundary

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

After The Review

Decide The Next Action Before You Keep Reading Repository Material

Killer-Skills should not stop at opening repository instructions. It should help you decide whether to install this skill, when to cross-check against trusted collections, and when to move into workflow rollout.

Labs Demo

Browser Sandbox Environment

⚡️ Ready to unleash?

Experience this Agent in a zero-setup browser environment powered by WebContainers. No installation required.

Boot Container Sandbox

FAQ & Installation Steps

These questions and steps mirror the structured data on this page for better search understanding.

? Frequently Asked Questions

What is oris-maintainer?

문제 관리와 Rust 작업 공간 검증을 간소화해야 하는 GitHub 자동화 에이전트에 적합합니다. Maintain the Oris Rust agent runtime with an issue-driven GitHub workflow. Use when Codex is working in the Oris repository and needs to pick up a GitHub issue, turn the issue into scoped code changes, run Rust validation such as cargo fmt and cargo test, publish the oris-runtime crate to crates.io, close the completed issue, and continue to the next iteration.

How do I install oris-maintainer?

Run the command: npx killer-skills add Colin4k1024/Oris/oris-maintainer. It works with Cursor, Windsurf, VS Code, Claude Code, and 19+ other IDEs.

What are the use cases for oris-maintainer?

Key use cases include: 문제 크기의 변경 구현을 자동화하는 것, Rust 작업 공간의 일관성을 검증하는 것, 변경이 준비되면 oris-runtime을 출시하는 것.

Which IDEs are compatible with oris-maintainer?

This skill is compatible with Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer. Use the Killer-Skills CLI for universal one-command installation.

Are there any limitations for oris-maintainer?

GitHub 문제에 대한 액세스가 필요함. Rust 작업 공간 검증만 해당함. oris-runtime 출시 프로토콜에 의존.

How To Install

  1. 1. Open your terminal

    Open the terminal or command line in your project directory.

  2. 2. Run the install command

    Run: npx killer-skills add Colin4k1024/Oris/oris-maintainer. The CLI will automatically detect your IDE or AI agent and configure the skill.

  3. 3. Start using the skill

    The skill is now active. Your AI agent can use oris-maintainer immediately in the current project.

! Reference-Only Mode

This page remains useful for installation and reference, but Killer-Skills no longer treats it as a primary indexable landing page. Read the review above before relying on the upstream repository instructions.

Upstream Repository Material

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

Upstream Source

oris-maintainer

Install oris-maintainer, an AI agent skill for AI agent workflows and automation. Review the use cases, limitations, and setup path before rollout.

SKILL.md
Readonly
Upstream Repository Material
The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.
Supporting Evidence

Oris Maintainer

Overview

Run Oris as a tight maintenance loop: select the active GitHub issue, implement only the issue-sized change, validate the Rust workspace, release oris-runtime when the change is ready, and then close the issue. Keep the repository state, the issue scope, and the released crate version aligned. Treat each issue as one releasable milestone unless the user says otherwise.

Workflow

1. Sync Issue Context

  • Start each issue with the preflight and issue selection command groups in command-checklist.md.
  • Check branch and worktree state with git status --short --branch before changing anything.
  • Verify GitHub access with gh auth status before relying on gh issue or gh pr.
  • Use gh issue list --state open --limit 20 to find the next candidate issue.
  • Apply the selection order in issue-selection.md before choosing which issue to work on.
  • Use gh issue view <number> to read the active issue. Treat the issue body, labels, and comments as the source of truth for scope.
  • As soon as the issue is selected as the active work item, record the in progress state using issue-state-machine.md.
  • If the roadmap needs to be seeded from CSV, inspect docs/issues-roadmap.csv and optionally use scripts/import_issues_from_csv.sh.

2. Plan the Smallest Releasable Change

  • Run the planning command group in command-checklist.md before editing files.
  • Restate the issue in concrete engineering terms before editing code.
  • Classify the issue with issue-test-matrix.md before choosing the validation scope and version default.
  • Read only the modules touched by the issue first. Use rg to find symbols and call sites quickly.
  • Create or use an issue-specific branch such as codex/issue-<number>-<slug> when a new branch is needed.
  • Inspect project-map.md if you need the high-value files and workspace layout.
  • If the issue changes public API, behavior, or release notes, inspect crates/oris-runtime/Cargo.toml, README.md, and the latest RELEASE_*.md.

3. Implement Narrowly

  • Use the development loop command group in command-checklist.md as the default edit/verify cycle.
  • Change only what the issue requires. Avoid opportunistic refactors unless they unblock the issue directly.
  • Keep oris-runtime publishability in mind. Public API changes, feature flags, and docs updates must remain coherent.
  • Update the smallest relevant example if the issue changes developer-facing behavior.
  • Preserve unrelated user changes already present in the worktree.

4. Validate Before Release

  • Run the pre-release validation command group in command-checklist.md in order.
  • Apply the required test set from issue-test-matrix.md. Treat the mapped commands as the minimum validation floor for the chosen issue type.
  • Start with cargo fmt --all.
  • Run the most targeted tests that prove the change first.
  • Before publishing, run the broader validation sequence in validation-and-release.md.
  • If the change touches persistence, backend startup, or API security, run the matching CI-aligned regression commands from the reference file.
  • If local services, secrets, or network access are missing, move the issue to blocked, state the exact validation gap, and do not claim full coverage.

5. Prepare and Publish oris-runtime

  • Run the release execution command group in command-checklist.md in order. Do not skip ahead to cargo publish.
  • Publish only from an intentional state after validation passes.
  • Confirm the target crate version in crates/oris-runtime/Cargo.toml.
  • Choose the version bump with versioning-policy.md before editing crates/oris-runtime/Cargo.toml.
  • Start from the issue type default bump. Deviate only if the shipped impact is higher than the default mapping, and record the reason explicitly in the working notes or release note draft.
  • Apply an intentional version bump for the issue before publish. Use the policy file instead of intuition so patch, minor, and any deferred major decision stay explicit.
  • Draft or update RELEASE_v<version>.md before publish. Summarize only the changes shipped in this release, with the current issue as the primary source.
  • Use the exact structure in release-notes.md so the crate version, shipped change summary, and validation block stay consistent.
  • Prefer cargo publish -p oris-runtime --all-features --dry-run before the real publish when possible.
  • Use the exact release sequence in validation-and-release.md.
  • If any release step fails, follow publish-failure.md exactly. Stop the loop, keep the issue open, and report the failure precisely.

6. Close the Issue and Loop

  • Finish with the release finalization command group in command-checklist.md.
  • Push the branch and any release tag needed by the chosen workflow.
  • Determine the repository default branch dynamically with gh repo view --json defaultBranchRef -q .defaultBranchRef.name.
  • Open a PR targeting the default branch using gh pr create. The PR body must include Closes #<number>, a one-line behavior summary, the validation commands run, and the released crate version.
  • Enable auto-merge with gh pr merge --auto --squash so the PR merges automatically once required checks pass. If auto-merge is not enabled on the repository, merge manually after review instead.
  • Record the released state comment on the issue before the PR merges so the issue timeline shows the crate version shipped.
  • Close the issue only after the PR has successfully merged. If auto-merge is pending, leave the issue open until merge is confirmed.
  • Leave a short closeout comment on the issue with the PR number that completed the merge.
  • Return to gh issue list --state open and continue with the next issue.

Operating Rules

  • Do not close an issue if validation or publish is incomplete.
  • Do not bump crate versions speculatively. Bump versions only as part of a real release, and keep the crate version, git tag, release note, and issue closeout text consistent.
  • Do not reuse stale release notes. Each shipped crate version should have a matching RELEASE_v<version>.md file that reflects the actual contents of that release.
  • Do not assume gh authentication, crates.io credentials, or network access. Verify each dependency before using it.
  • Prefer narrow commands while iterating: rg, cargo test -p oris-runtime <pattern>, and file-targeted reads.
  • Do not move on to the next issue after a failed publish. Resolve the release state first or leave the repository in a clearly blocked state.
  • Keep one explicit issue status visible while the issue is open: in progress, blocked, or released.
  • Treat the command checklist as the default execution contract. Deviate only when the issue scope clearly requires a narrower subset, and state that deviation explicitly.
  • Treat the issue type as the default release class. If the final version bump differs from the issue type default, state the reason explicitly.
  • Surface blocked steps immediately when the workflow needs secrets, external services, or explicit user approval.

References

관련 스킬

Looking for an alternative to oris-maintainer or another community skill for your workflow? Explore these related open-source skills.

모두 보기

openclaw-release-maintainer

Logo of openclaw
openclaw

Your own personal AI assistant. Any OS. Any Platform. The lobster way. 🦞

333.8k
0
인공지능

widget-generator

Logo of f
f

prompts.chat 피드 시스템을 위한 사용자 지정 가능한 위젯 플러그인을 생성합니다

149.6k
0
인공지능

flags

Logo of vercel
vercel

리액트 프레임워크

138.4k
0
브라우저

pr-review

Logo of pytorch
pytorch

파이썬에서 텐서와 동적 신경망 구현 및 강력한 GPU 가속 지원

98.6k
0
개발자