quality-scan — for Claude Code quality-scan, meander, community, for Claude Code, ide skills, pnpm run check, file:line, min-release-age=7, git stash, git add -A

v1.0.0

Об этом навыке

Подходящий сценарий: Ideal for AI agents that need read-only analysis. don't fix issues during the scan. Локализованное описание: # quality-scan <task Perform a read-only quality sweep over the meander codebase. This AI agent skill supports Claude Code, Cursor, and Windsurf workflows.

Возможности

Read-only analysis. Don't fix issues during the scan.
Run all enabled scans before reporting.
Findings are prioritized Critical High Medium Low.
Every finding must include a file:line reference and a suggested fix.
Don't bypass min-release-age=7 (.npmrc) if a scan suggests a dependency bump.

# Core Topics

divmain divmain
[1]
[1]
Updated: 4/25/2026

Killer-Skills Review

Decision support comes first. Repository text comes second.

Reference-Only Page Review Score: 10/11

This page remains useful for teams, but Killer-Skills treats it as reference material instead of a primary organic landing page.

Original recommendation layer Concrete use-case guidance Explicit limitations and caution Quality floor passed for review
Review Score
10/11
Quality Score
55
Canonical Locale
en
Detected Body Locale
en

Подходящий сценарий: Ideal for AI agents that need read-only analysis. don't fix issues during the scan. Локализованное описание: # quality-scan <task Perform a read-only quality sweep over the meander codebase. This AI agent skill supports Claude Code, Cursor, and Windsurf workflows.

Зачем использовать этот навык

Рекомендация: quality-scan helps agents read-only analysis. don't fix issues during the scan. quality-scan <task Perform a read-only quality sweep over the meander codebase. This AI agent skill supports Claude Code

Подходит лучше всего

Подходящий сценарий: Ideal for AI agents that need read-only analysis. don't fix issues during the scan.

Реализуемые кейсы использования for quality-scan

Сценарий использования: Applying Read-only analysis. Don't fix issues during the scan
Сценарий использования: Applying Run all enabled scans before reporting
Сценарий использования: Applying Findings are prioritized Critical High Medium Low

! Безопасность и ограничения

  • Ограничение: Read-only analysis. Don't fix issues during the scan.
  • Ограничение: Every finding must include a file:line reference and a suggested fix.
  • Ограничение: Don't bypass min-release-age=7 (.npmrc) if a scan suggests a dependency bump.

Why this page is reference-only

  • - Current locale does not satisfy the locale-governance contract.

Source Boundary

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

After The Review

Decide The Next Action Before You Keep Reading Repository Material

Killer-Skills should not stop at opening repository instructions. It should help you decide whether to install this skill, when to cross-check against trusted collections, and when to move into workflow rollout.

Labs Demo

Browser Sandbox Environment

⚡️ Ready to unleash?

Experience this Agent in a zero-setup browser environment powered by WebContainers. No installation required.

Boot Container Sandbox

FAQ & Installation Steps

These questions and steps mirror the structured data on this page for better search understanding.

? Frequently Asked Questions

What is quality-scan?

Подходящий сценарий: Ideal for AI agents that need read-only analysis. don't fix issues during the scan. Локализованное описание: # quality-scan <task Perform a read-only quality sweep over the meander codebase. This AI agent skill supports Claude Code, Cursor, and Windsurf workflows.

How do I install quality-scan?

Run the command: npx killer-skills add divmain/meander/quality-scan. It works with Cursor, Windsurf, VS Code, Claude Code, and 19+ other IDEs.

What are the use cases for quality-scan?

Key use cases include: Сценарий использования: Applying Read-only analysis. Don't fix issues during the scan, Сценарий использования: Applying Run all enabled scans before reporting, Сценарий использования: Applying Findings are prioritized Critical High Medium Low.

Which IDEs are compatible with quality-scan?

This skill is compatible with Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer. Use the Killer-Skills CLI for universal one-command installation.

Are there any limitations for quality-scan?

Ограничение: Read-only analysis. Don't fix issues during the scan.. Ограничение: Every finding must include a file:line reference and a suggested fix.. Ограничение: Don't bypass min-release-age=7 (.npmrc) if a scan suggests a dependency bump..

How To Install

  1. 1. Open your terminal

    Open the terminal or command line in your project directory.

  2. 2. Run the install command

    Run: npx killer-skills add divmain/meander/quality-scan. The CLI will automatically detect your IDE or AI agent and configure the skill.

  3. 3. Start using the skill

    The skill is now active. Your AI agent can use quality-scan immediately in the current project.

! Reference-Only Mode

This page remains useful for installation and reference, but Killer-Skills no longer treats it as a primary indexable landing page. Read the review above before relying on the upstream repository instructions.

Upstream Repository Material

The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.

Upstream Source

quality-scan

# quality-scan <task Perform a read-only quality sweep over the meander codebase. This AI agent skill supports Claude Code, Cursor, and Windsurf workflows.

SKILL.md
Readonly
Upstream Repository Material
The section below is imported from the upstream repository and should be treated as secondary evidence. Use the Killer-Skills review above as the primary layer for fit, risk, and installation decisions.
Supporting Evidence

quality-scan

<task> Perform a read-only quality sweep over the meander codebase. Clean repository junk first, run `pnpm run check` for structural validation, then spawn general-purpose agents to scan for critical bugs, logic errors, workflow issues, GitHub Actions security findings, and documentation drift. Aggregate findings, deduplicate, and produce a prioritized report. </task> <constraints> - Read-only analysis. Don't fix issues during the scan. - Run all enabled scans before reporting. - Findings are prioritized Critical > High > Medium > Low. - Every finding must include a `file:line` reference and a suggested fix. - Don't bypass `min-release-age=7` (`.npmrc`) if a scan suggests a dependency bump. - Parallel-session safety: don't `git stash`, `git add -A` / `.`, `git checkout <branch>`, or `git reset --hard` in the primary checkout. Stage with surgical `git add <path>`. </constraints> <instructions>

Process

Phase 1: Validate environment

Follow _shared/env-check.md. Run git status (warn but continue if dirty). Confirm a valid branch and that node_modules/ exists. The pinned Node version (currently 25.9.0) is in .node-version.


Phase 2: Update dependencies

Run pnpm run update for the meander checkout. The script honors the 7-day maturity period from .config/taze.config.mts and the min-release-age=7 setting in .npmrc — don't add flags that bypass them. Report the number of packages updated. Continue with the scan even if the update step fails.


Phase 3: Repository cleanup

Clean junk files before scanning:

  1. SCREAMING_TEXT.md files (all-caps .md files) NOT inside .claude/ or docs/, and NOT named README.md, LICENSE, or SECURITY.md.
  2. Misplaced test files (.test.mts outside test/). Meander's tests live in test/**/*.test.mts; anything matching the pattern outside that root is misplaced.
  3. Temp files (*.tmp, *.temp, .DS_Store, Thumbs.db, *~, *.swp, *.swo, *.bak).
  4. Stray log files (*.log outside logs/ or dist/).

For each file: show the path, explain why it's junk, get user confirmation before deleting. Use git rm <path> if tracked, rm <path> if untracked. Don't sweep with git add -A / git rm -r.


Phase 4: Structural validation

Run pnpm run check (lint + type-check; what CI runs). Report errors as Critical findings; oxlint warnings are Low findings. Continue with the remaining scans regardless of the result.


Phase 5: Determine scan scope

Ask the user which scan types to run. Default is all of them.

Scan types:

  1. critical — crashes, prototype-pollution risk, resource leaks, data corruption, unhandled promise rejections.
  2. logic — algorithm errors, edge cases, type guards, off-by-one, malformed-input handling, classifier predicate bugs (src/classifiers.mts).
  3. workflowscripts/, package.json, .github/workflows/, .git-hooks/, cross-platform compatibility, CLAUDE.md convention drift.
  4. security — GitHub Actions workflow security via zizmor (delegate to the existing security-scan skill if scope is broader than this scan needs).
  5. documentationREADME.md, docs/contributing.md, CLAUDE.md accuracy against the actual code in src/ and scripts/.

There's no separate cache scan in meander — content caching lives in src/crypto.mts (AES-256-GCM at-rest encryption) and is covered by the critical + logic scans.


Phase 6: Execute scans

For each enabled scan type, spawn a general-purpose subagent via the Task tool. Load the agent prompt template from reference.md, customize for the meander context, and capture the findings.

Run scans sequentially in priority order: critical → logic → workflow → security → documentation.

Each finding must include: file path with line number, issue description, severity, code pattern, trigger, suggested fix, and impact.


Phase 7: Aggregate findings

Collect all findings. Deduplicate (same file:line and same issue across scans, keeping the highest-priority scan's version). Sort by severity descending, then scan-type priority, then alphabetical by file path.


Phase 8: Generate report

Generate a structured report using the "Report Template" section in reference.md. The report includes: scan metadata, dependency-update status, structural-validation results, findings grouped by severity, scan coverage, and prioritized recommendations.

Display the report to console. Optionally save it to a path the user picks (meander has no reports/ convention — ask before writing one).


Phase 9: Complete

<completion_signal>

xml
1<promise>QUALITY_SCAN_COMPLETE</promise>

</completion_signal>

Report final metrics: dependency-update count, structural-validation results, cleanup count, scans completed, total findings by severity, files scanned, and scan duration. See reference.md section "Completion Summary" for the template.

</instructions>

Success criteria

  • <promise>QUALITY_SCAN_COMPLETE</promise> emitted.
  • All enabled scans completed without errors.
  • Findings prioritized Critical > Low.
  • Every finding has file:line and a suggested fix.
  • Report includes statistics and coverage.
  • Duplicate findings removed.

Scan types

See reference.md for the per-scan agent prompt templates:

  • critical-scan — null/undefined access, unhandled promise rejections, race conditions, resource leaks, prototype-pollution gaps.
  • logic-scan — off-by-one, type guards, edge cases, classifier-predicate correctness, parser correctness in src/generate.mts.
  • workflow-scanscripts/, package.json, git hooks, .github/workflows/.
  • security-scan — GitHub Actions workflow security (zizmor). For a full security pass also run the dedicated security-scan skill (combined AgentShield + zizmor).
  • documentation-scan — README accuracy, CLAUDE.md drift, outdated examples in docs/.

Связанные навыки

Looking for an alternative to quality-scan or another community skill for your workflow? Explore these related open-source skills.

Показать все

openclaw-release-maintainer

Logo of openclaw
openclaw

Your own personal AI assistant. Any OS. Any Platform. The lobster way. 🦞

widget-generator

Logo of f
f

Создание настраиваемых плагинов виджетов для системы ленты новостей prompts.chat

flags

Logo of vercel
vercel

Фреймворк React

138.4k
0
Браузер

pr-review

Logo of pytorch
pytorch

Tensors and Dynamic neural networks in Python with strong GPU acceleration

98.6k
0
Разработчик