Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
Systematic 5-phase bug investigation workflow for unexpected behavior, test failures, performance regressions, data inconsistencies, and root cause tracing. Use when users ask to investigate/trace bugs or data flow (e.g., bug investigation, 測試失敗, 效能異常, 調查 Bug, 追蹤資料流, root cause analysis). --- name: bug-investigation description: "Systematic 5-phase bug investigation workflow for unexpected behavior, test failures, performance regressions, data inconsistencies, and root cause tracing. Use when users ask to investigate/trace bugs or data flow (e.g., bug investigation, 測試失敗, 效能異常, 調查 Bug, 追蹤資料流, root cause analysis)." --- Bug Investigation Skill 概述 一套系統化方法,用於調查複雜程式碼中的錯誤與異常行為。此技能包含五個階段: 1. **問題釐清** - 理解回報 Capability contract not published. No trust telemetry is available yet. 1 GitHub stars reported by the source. Last updated 4/15/2026.
Freshness
Last checked 4/15/2026
Best For
bug-investigation is best for general automation workflows where OpenClaw compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB OPENCLEW, runtime-metrics, public facts pack
Systematic 5-phase bug investigation workflow for unexpected behavior, test failures, performance regressions, data inconsistencies, and root cause tracing. Use when users ask to investigate/trace bugs or data flow (e.g., bug investigation, 測試失敗, 效能異常, 調查 Bug, 追蹤資料流, root cause analysis). --- name: bug-investigation description: "Systematic 5-phase bug investigation workflow for unexpected behavior, test failures, performance regressions, data inconsistencies, and root cause tracing. Use when users ask to investigate/trace bugs or data flow (e.g., bug investigation, 測試失敗, 效能異常, 調查 Bug, 追蹤資料流, root cause analysis)." --- Bug Investigation Skill 概述 一套系統化方法,用於調查複雜程式碼中的錯誤與異常行為。此技能包含五個階段: 1. **問題釐清** - 理解回報
Public facts
5
Change events
1
Artifacts
0
Freshness
Apr 15, 2026
Capability contract not published. No trust telemetry is available yet. 1 GitHub stars reported by the source. Last updated 4/15/2026.
Trust score
Unknown
Compatibility
OpenClaw
Freshness
Apr 15, 2026
Vendor
Hmj1026
Artifacts
0
Benchmarks
0
Last release
Unpublished
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. 1 GitHub stars reported by the source. Last updated 4/15/2026.
Setup snapshot
git clone https://github.com/hmj1026/bug-investigation.gitSetup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Hmj1026
Protocol compatibility
OpenClaw
Adoption signal
1 GitHub stars
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
6
Snippets
0
Languages
typescript
Parameters
text
未完成 Phase 1-3(尤其 Phase 3),不得提出修正方案或修改程式碼。
text
docs/knowledge/ ├── [feature-name]/ │ ├── investigation.md # 調查總表與進度 │ ├── data-flow.md # 資料流圖解 │ ├── key-functions.md # 關鍵函數說明 │ ├── related-tables.md # 相關資料表結構 │ └── solution-proposal.md # 修正方案與決策依據
text
1. 使用者動作 → [函式/API]
↓
2. 前端處理 → [JS 函式]
↓
3. 後端 API → [Controller/Action]
↓
4. 資料庫寫入 → [資料表]bash
# 使用 ripgrep (推薦) rg "<variable_name>" --type php --type js # 或使用技能提供的腳本 ./scripts/trace-data-flow.sh <variable_name> # 搜尋資料表操作 ./scripts/search-database-queries.sh <table_name>
bash
/opsx:new # 依推薦方案命名 change(kebab-case)
bash
# 搜尋知識庫是否已有相關文件 ls docs/knowledge/
Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB OPENCLEW
Editorial quality
ready
Systematic 5-phase bug investigation workflow for unexpected behavior, test failures, performance regressions, data inconsistencies, and root cause tracing. Use when users ask to investigate/trace bugs or data flow (e.g., bug investigation, 測試失敗, 效能異常, 調查 Bug, 追蹤資料流, root cause analysis). --- name: bug-investigation description: "Systematic 5-phase bug investigation workflow for unexpected behavior, test failures, performance regressions, data inconsistencies, and root cause tracing. Use when users ask to investigate/trace bugs or data flow (e.g., bug investigation, 測試失敗, 效能異常, 調查 Bug, 追蹤資料流, root cause analysis)." --- Bug Investigation Skill 概述 一套系統化方法,用於調查複雜程式碼中的錯誤與異常行為。此技能包含五個階段: 1. **問題釐清** - 理解回報
一套系統化方法,用於調查複雜程式碼中的錯誤與異常行為。此技能包含五個階段:
未完成 Phase 1-3(尤其 Phase 3),不得提出修正方案或修改程式碼。
強制要求:
調查過程中獲得的程式功能邏輯文件應同步存放在專案內部的知識庫資料夾:
docs/knowledge/
├── [feature-name]/
│ ├── investigation.md # 調查總表與進度
│ ├── data-flow.md # 資料流圖解
│ ├── key-functions.md # 關鍵函數說明
│ ├── related-tables.md # 相關資料表結構
│ └── solution-proposal.md # 修正方案與決策依據
好處:
範例參考:references/examples.md 與 examples/state-inconsistency-example/。
references/scripts.md:工具安裝與腳本使用說明references/examples.md:調查案例與寫作模板references/root-cause-tracing.md:根因回溯追蹤技巧references/defense-in-depth.md:多層防護驗證模式references/condition-based-waiting.md:以條件為基準的等待(解決 flaky 測試)references/wait-for-helper.ts:條件等待 helper 範本(可直接複製)references/phase-templates.md:各 Phase 文件與 SQL/表格模板references/checklists.md:完整檢查清單提示:首次使用先執行
./scripts/check-tools.sh(詳見references/scripts.md)。
向使用者詢問以下資訊:
在 docs/knowledge/[feature-name]/investigation.md 建立調查文件,模板見 references/phase-templates.md。
產生 SQL 查詢以驗證問題,模板見 references/phase-templates.md。
在 docs/knowledge/[feature-name]/investigation.md 中記錄資料庫證據,表格模板見 references/phase-templates.md。
尋找資料不一致的地方:
當流程跨越多層(前端 → API → 背景作業 → DB)時:
描繪資料從輸入到資料庫的完整路徑:
1. 使用者動作 → [函式/API]
↓
2. 前端處理 → [JS 函式]
↓
3. 後端 API → [Controller/Action]
↓
4. 資料庫寫入 → [資料表]
需要完整回溯技巧時,參考 references/root-cause-tracing.md。
對資料流中的每個步驟:
搜尋關鍵變數 (使用專業工具):
# 使用 ripgrep (推薦)
rg "<variable_name>" --type php --type js
# 或使用技能提供的腳本
./scripts/trace-data-flow.sh <variable_name>
# 搜尋資料表操作
./scripts/search-database-queries.sh <table_name>
追蹤資料來源:
analyze-function-calls.sh 分析函式呼叫關係識別分歧點:
generate-flow-diagram.sh 生成流程圖輔助分析更新 docs/knowledge/[feature-name]/investigation.md,模板見 references/phase-templates.md。
在 docs/knowledge/[feature-name]/solution-proposal.md 記錄修正方案與判斷依據,模板見 references/phase-templates.md。
提出 2-3 個解決方案,並回填到 solution-proposal.md。
向使用者呈現建議:
test-driven-development 技能references/condition-based-waiting.md 的條件等待Phase 4 完成後必須進入 OpenSpec 流程,不得跳過:
/opsx:new # 依推薦方案命名 change(kebab-case)
依序建立所有 artifacts:
proposal.md - 根因摘要 + 推薦方案design.md - 技術決策與架構specs/[capability]/spec.md - 行為規格tasks.md - 實作檢查清單建立完成後執行 /opsx:apply 按 TDD 實作。
鐵律: bug-investigation 觸發 → 調查完成 → 必接 OpenSpec → 再實作。 不允許從 Phase 4 直接跳到程式碼修改。
修復涉及資料驗證時,採用 references/defense-in-depth.md 的多層防護。
在深入研究程式碼之前,檢查是否已有相關文件:
# 搜尋知識庫是否已有相關文件
ls docs/knowledge/
調查完成後,記錄功能邏輯供未來參考:
建立以下文件,模板見 references/phase-templates.md:
data-flow.mdkey-functions.mdrelated-tables.md檢查清單模板見 references/checklists.md。
若調查確認問題源於外部系統/環境/時序:
完整版本請見 references/checklists.md。
Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/hmj1026-bug-investigation/snapshot"
curl -s "https://xpersona.co/api/v1/agents/hmj1026-bug-investigation/contract"
curl -s "https://xpersona.co/api/v1/agents/hmj1026-bug-investigation/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Rank
70
AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs
Traction
No public download signal
Freshness
Updated 5d ago
Rank
70
Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!
Traction
No public download signal
Freshness
Updated 6d ago
Rank
70
The Frontend for Agents & Generative UI. React + Angular
Traction
No public download signal
Freshness
Updated 23d ago
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/hmj1026-bug-investigation/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/hmj1026-bug-investigation/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/hmj1026-bug-investigation/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/hmj1026-bug-investigation/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/hmj1026-bug-investigation/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/hmj1026-bug-investigation/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"OPENCLEW"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_OPENCLEW",
"generatedAt": "2026-04-16T23:41:18.267Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "OPENCLEW",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
}
],
"flattenedTokens": "protocol:OPENCLEW|unknown|profile"
}Facts JSON
[
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Hmj1026",
"href": "https://github.com/hmj1026/bug-investigation",
"sourceUrl": "https://github.com/hmj1026/bug-investigation",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-04-15T00:19:07.472Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "OpenClaw",
"href": "https://xpersona.co/api/v1/agents/hmj1026-bug-investigation/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/hmj1026-bug-investigation/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-04-15T00:19:07.472Z",
"isPublic": true
},
{
"factKey": "traction",
"category": "adoption",
"label": "Adoption signal",
"value": "1 GitHub stars",
"href": "https://github.com/hmj1026/bug-investigation",
"sourceUrl": "https://github.com/hmj1026/bug-investigation",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-04-15T00:19:07.472Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/hmj1026-bug-investigation/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/hmj1026-bug-investigation/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to bug-investigation and adjacent AI workflows.