Catalog
affaan-m/automation-audit-ops

affaan-m

automation-audit-ops

Evidence-first automation inventory and overlap audit workflow for ECC. Use when the user wants to know which jobs, hooks, connectors, MCP servers, or wrappers are live, broken, redundant, or missing before fixing anything.

global
0installs0uses~1.0k
v1.1Saved Apr 20, 2026

Automation Audit Ops

Use this when the user asks what automations are live, which jobs are broken, where overlap exists, or what tooling and connectors are actually doing useful work right now.

This is an audit-first operator skill. The job is to produce an evidence-backed inventory and a keep / merge / cut / fix-next recommendation set before rewriting anything.

Skill Stack

Pull these ECC-native skills into the workflow when relevant:

  • workspace-surface-audit for connector, MCP, hook, and app inventory
  • knowledge-ops when the audit needs to reconcile live repo truth with durable context
  • github-ops when the answer depends on CI, scheduled workflows, issues, or PR automation
  • ecc-tools-cost-audit when the real problem is webhook fanout, queued jobs, or billing burn in the sibling app repo
  • research-ops when local inventory must be compared against current platform support or public docs
  • verification-loop for proving post-fix state instead of relying on assumed recovery

When to Use

  • user asks "what automations do I have", "what is live", "what is broken", or "what overlaps"
  • the task spans cron jobs, GitHub Actions, local hooks, MCP servers, connectors, wrappers, or app integrations
  • the user wants to know what was ported from another agent system and what still needs to be rebuilt inside ECC
  • the workspace has accumulated multiple ways to do the same thing and the user wants one canonical lane

Guardrails

  • start read-only unless the user explicitly asked for fixes
  • separate:
    • configured
    • authenticated
    • recently verified
    • stale or broken
    • missing entirely
  • do not claim a tool is live just because a skill or config references it
  • do not merge or delete overlapping surfaces until the evidence table exists

Workflow

1. Inventory the real surface

Read the current live surface before theorizing:

  • repo hooks and local hook scripts
  • GitHub Actions and scheduled workflows
  • MCP configs and enabled servers
  • connector- or app-backed integrations
  • wrapper scripts and repo-specific automation entrypoints

Group them by surface:

  • local runtime
  • repo CI / automation
  • connected external systems
  • messaging / notifications
  • billing / customer operations
  • research / monitoring

2. Classify each item by live state

For every surfaced automation, mark:

  • configured
  • authenticated
  • recently verified
  • stale or broken
  • missing

Then classify the problem type:

  • active breakage
  • auth outage
  • stale status
  • overlap or redundancy
  • missing capability

3. Trace the proof path

Back every important claim with a concrete source:

  • file path
  • workflow run
  • hook log
  • config entry
  • recent command output
  • exact failure signature

If the current state is ambiguous, say so directly instead of pretending the audit is complete.

4. End with keep / merge / cut / fix-next

For each overlapping or suspect surface, return one call:

  • keep
  • merge
  • cut
  • fix next

The value is in collapsing noisy automation into one canonical ECC lane, not in preserving every historical path.

Output Format

CURRENT SURFACE
- automation
- source
- live state
- proof

FINDINGS
- active breakage
- overlap
- stale status
- missing capability

RECOMMENDATION
- keep
- merge
- cut
- fix next

NEXT ECC MOVE
- exact skill / hook / workflow / app lane to strengthen

Pitfalls

  • do not answer from memory when the live inventory can be read
  • do not treat "present in config" as "working"
  • do not fix lower-value redundancy before naming the broken high-signal path
  • do not widen the task into a repo rewrite if the user asked for inventory first

Verification

  • important claims cite a live proof path
  • each surfaced automation is labeled with a clear live-state category
  • the final recommendation distinguishes keep / merge / cut / fix-next
Files1
1 files · 1.0 KB

Select a file to preview

Overall Score

82/100

Grade

B

Good

Safety

95

Quality

82

Clarity

78

Completeness

72

Summary

An audit-first workflow skill for inventorying live automations across ECC infrastructure—jobs, hooks, connectors, MCP servers, and wrappers—and classifying them by state (configured, authenticated, verified, stale, missing) before recommending fixes. The skill emphasizes evidence-backed analysis over assumption, producing structured keep/merge/cut/fix-next recommendations.

Detected Capabilities

read workspace hooks and local hook scriptsenumerate GitHub Actions and scheduled workflowsinspect MCP configs and enabled serverscatalog connector and app integrationsclassify automation by live state (configured, authenticated, verified, stale, broken, missing)trace proof paths to concrete sources (file paths, workflow runs, logs, configs)produce structured inventory reports with evidence citationsrecommend keep/merge/cut/fix-next actions for overlapping surfacescross-reference with cost audit and research-ops for platform reconciliation

Trigger Keywords

Phrases that MCP clients use to match this skill to user intent.

audit automationsinventory jobs and hooksfind overlapping automationcheck broken workflowsconsolidate ci/cdwhat runs where

Use Cases

  • Inventory all live automations in a workspace
  • Identify broken, stale, or redundant automation paths
  • Detect duplicate automation across hooks, GitHub Actions, and MCP servers
  • Plan consolidation of overlapping automation into a single canonical lane
  • Audit ported automation from legacy agent systems

Quality Notes

  • ✓ Clear guardrails: explicitly states 'start read-only unless user asks for fixes' and forbids merging/deleting until evidence table exists
  • ✓ Well-scoped scope: focuses on inventory and recommendation, not implementation
  • ✓ Evidence-first methodology: requires proof paths (file paths, logs, configs) for every important claim; explicitly warns against treating 'present in config' as 'working'
  • ✓ Structured output format provided with clear sections (CURRENT SURFACE, FINDINGS, RECOMMENDATION, NEXT ECC MOVE)
  • ✓ Integration points documented: skill stack references five complementary ECC skills for specialized concerns (cost audit, research, verification, CI, knowledge ops)
  • ✓ Pitfall section identifies common mistakes (answering from memory, treating config as proof, fixing low-value redundancy first)
  • ✓ Classification scheme is concrete: seven live-state categories plus five problem types
  • - Skill content is read-only operational guidance; no example command templates or sample output provided (acceptable for an audit workflow but limits agent clarity on output format details)
  • - No explicit timeout or scope-limiting guidance for large workspaces with many automated surfaces
  • - 'Recently verified' classification lacks a defined time window (e.g., 'within last 30 days')
Model: claude-haiku-4-5-20251001Analyzed: Apr 20, 2026

Reviews

Add this skill to your library to leave a review.

No reviews yet

Be the first to share your experience.

Version History

v1.1

Content updated

2026-04-20

Latest
v1.0

No changelog

2026-04-12

Add affaan-m/automation-audit-ops to your library

Command Palette

Search for a command to run...