Multi-agent investigation for stubborn bugs. Use when: going in circles debugging, need to investigate browser/API interactions, complex bugs resisting normal debugging, or when symptoms don't match expectations. Launches parallel agents with different perspectives and uses Chrome tools for evidence gathering.
View on GitHubskills/deep-debug/SKILL.md
February 4, 2026
Select agents to install to:
npx add-skill https://github.com/jezweb/claude-skills/blob/main/skills/deep-debug/SKILL.md -a claude-code --skill deep-debugInstallation paths:
.claude/skills/deep-debug/# Deep Debug - Multi-Agent Investigation **Status**: Production Ready **Last Updated**: 2026-02-03 **Dependencies**: Chrome MCP tools (optional), debugger agent, code-reviewer agent --- ## When to Use - **Going in circles** - You've tried multiple fixes but nothing works - **Browser + API interaction bugs** - Need to see Network tab, console logs - **Symptoms don't match expectations** - Something deeper is wrong - **Complex state management bugs** - React hooks, closures, race conditions ## Commands | Command | Purpose | |---------|---------| | `/debug` | Guided debugging workflow with evidence gathering and parallel investigation | ## Quick Start ``` /debug [description of the bug] ``` Or invoke naturally: - "I'm stuck on this bug, can you do a deep investigation?" - "This bug is resisting normal debugging" - "I need you to really dig into this" --- ## The Process ### Phase 1: Gather Evidence (Before Hypothesizing) **For browser-related bugs**, use Chrome MCP tools: ```typescript // Get network requests (look for duplicates, failures, timing) mcp__claude-in-chrome__read_network_requests // Get console logs (errors, warnings, debug output) mcp__claude-in-chrome__read_console_messages // Get page state mcp__claude-in-chrome__read_page ``` **For backend bugs**, gather: - Error logs and stack traces - Request/response payloads - Database query logs - Timing information ### Phase 2: Launch Parallel Investigation (3 Agents) Launch these agents simultaneously with the gathered evidence: #### Agent 1: Execution Tracer (debugger) ``` Task(subagent_type="debugger", prompt=""" EVIDENCE: [paste network/console evidence] Trace the execution path that leads to this bug. Find: 1. Where the bug originates 2. What triggers it 3. The exact line/function causing the issue Focus on TRACING, not guessing. """) ``` #### Agent 2: Pattern Analyzer (code-reviewer) ``` Task(subagent_type="code-reviewer", prompt=""" EVIDENCE: [paste evidence] Review the relevant code