Back to Skills

auditing-context

verified

Auto-load active audit context when working with audited code. Use when user is working on code that has an active audit session, discussing audit findings, or making changes related to a runtime audit. Silently loads audit session data to inform responses.

View on GitHub

Marketplace

schuettc-claude-code-plugins

schuettc/claude-code-plugins

Plugin

feature-workflow

Repository

schuettc/claude-code-plugins
4stars

feature-workflow/skills/auditing-context/SKILL.md

Last Verified

January 23, 2026

Install Skill

Select agents to install to:

Scope:
npx add-skill https://github.com/schuettc/claude-code-plugins/blob/main/feature-workflow/skills/auditing-context/SKILL.md -a claude-code --skill auditing-context

Installation paths:

Claude
.claude/skills/auditing-context/
Powered by add-skill CLI

Instructions

# Auditing Context

Automatically load active audit session data when the user is working in the context of a runtime audit.

## When to Use

Invoke this skill when the user:
- Is working on code that has pending audit injections
- Asks about audit findings or captured data
- Discusses runtime behavior verification
- References "the audit" or a specific audit ID
- Is making changes to audited code paths
- Asks about injected logs or cleanup status

## Instructions

### Step 1: Check for Active Audits

Read `docs/audits/registry.json` to find active audit sessions.

```json
{
  "audits": [
    {
      "id": "auth-flow-001",
      "status": "in-progress",
      "name": "Login Flow Verification"
    }
  ]
}
```

Filter for audits with `status: "in-progress"`.

### Step 2: Load Active Audit Context

For relevant audits, read:

```
docs/audits/[audit-id]/
├── session.json      # Current phase, target description, questions
├── injections.json   # Active injections in code
└── report.md         # Findings (if analysis complete)
```

### Step 3: Check for Injected Code

If there are active injections:

1. Read `injections.json` to understand what's currently injected
2. Be aware of which files have audit instrumentation
3. Warn user if they're editing files with active injections

### Step 4: Use Context Naturally

Reference context when responding:

- **If injections are active**: Remind user of cleanup requirements
- **If discussing audited code**: Reference what was verified
- **If editing audited files**: Note any pending injections in that file
- **If asking about findings**: Reference the audit report

## Context Awareness Scenarios

### User Editing Injected File

```
Note: This file has active audit injections at lines 42, 67.
Consider running cleanup before making significant changes,
or be careful not to modify the AUDIT-INJECTED lines.
```

### User Asking About Behavior

```
The audit "auth-flow-001" verified this behavior:
- Credentials ARE validated before da

Validation Details

Front Matter
Required Fields
Valid Name Format
Valid Description
Has Sections
Allowed Tools
Instruction Length:
3810 chars