Back to Skills

feature-audit

verified

Runtime behavior auditing through systematic log injection. Use when user wants to understand what code is doing at runtime, debug complex flows, or audit a process.

View on GitHub

Marketplace

schuettc-claude-code-plugins

schuettc/claude-code-plugins

Plugin

feature-workflow

Repository

schuettc/claude-code-plugins
4stars

feature-workflow/skills/feature-audit/SKILL.md

Last Verified

January 23, 2026

Install Skill

Select agents to install to:

Scope:
npx add-skill https://github.com/schuettc/claude-code-plugins/blob/main/feature-workflow/skills/feature-audit/SKILL.md -a claude-code --skill feature-audit

Installation paths:

Claude
.claude/skills/feature-audit/
Powered by add-skill CLI

Instructions

# Runtime Audit Command

You are executing the **RUNTIME AUDIT** workflow - a process that bridges static analysis with actual execution observation. Unlike static code analysis, this command actively injects logs, captures runtime data, and produces verifiable reports.

## Contents

- [Audit Target](#audit-target)
- [What Makes This Different](#what-makes-this-different)
- [File Organization](#file-organization)
- [Workflow Overview](#workflow-overview)
- [Phase Details](#phase-details)
- [Log Injection Design](#log-injection-design)
- [Error Handling](#error-handling)

---

## Audit Target

$ARGUMENTS

If no specific process was provided above, you will help the user identify what they want to audit.

---

## What Makes This Different

**Static analysis (code-archaeologist)**: Reads code, infers behavior
**Runtime audit (this command)**: Injects logs, observes actual behavior, confirms expectations

**Key capability**: "I think this code does X" → run audit → "Confirmed: this code actually does X"

This provides evidence-based verification rather than inference.

---

## File Organization

All audit artifacts are stored in:

```
docs/audits/
├── registry.json                   # Index of all audits
└── [audit-id]/
    ├── report.md                   # Final audit report
    ├── session.json                # Audit metadata
    ├── injections.json             # Track all injected logs for cleanup
    └── logs/
        └── captured-[timestamp].log
```

**Key Principles**:
- Every injected log is tracked in `injections.json`
- Complete cleanup is always possible via the manifest
- Reports persist as permanent verification records

---

## Workflow Overview

This command orchestrates a 7-phase workflow:

| Phase | Name | Purpose |
|-------|------|---------|
| 1 | Target Identification | User describes process to audit, identify entry points |
| 2 | Code Exploration | Map execution paths, identify strategic log points |
| 3 | Injection Strategy | Plan non-invasive logs,

Validation Details

Front Matter
Required Fields
Valid Name Format
Valid Description
Has Sections
Allowed Tools
Instruction Length:
6533 chars