# Config-Audit Plugin Claude Code Configuration Intelligence — know if your configuration is correct, find what could improve it, fix it automatically. ## What this plugin does Analyzes and optimizes Claude Code configuration across three pillars: - **Health** — Deterministic scanners verify correctness, consistency, and completeness - **Opportunities** — Context-aware recommendations for features that could benefit your project - **Action** — Auto-fix with backup/rollback ## Commands ### Core (just run `/config-audit` to get started) | Command | Description | |---------|-------------| | `/config-audit` | Full audit with auto-scope detection (no setup needed) | | `/config-audit posture` | Quick health scorecard (A-F grades, 10 quality areas incl. Token Efficiency, Plugin Hygiene) | | `/config-audit tokens` | Opus-4.7-aware token hotspots (6 patterns: cache-breaking, redundant perms, deep imports, oversized cascade, bloated SKILL.md desc, MCP tool-schema budget) — optional `--accurate-tokens` API calibration, `--with-telemetry-recipe` cache-hit recipe pointer | | `/config-audit manifest` | Ranked table of every system-prompt token source (CLAUDE.md, plugins, skills, MCP, hooks) sorted by estimated tokens | | `/config-audit feature-gap` | Context-aware feature recommendations grouped by impact | | `/config-audit fix` | Auto-fix deterministic issues with backup + verification | | `/config-audit rollback` | Restore configuration from backup | | `/config-audit plan` | Create action plan from audit findings | | `/config-audit implement` | Execute plan with backups + auto-verify | | `/config-audit help` | Show all commands | ### Additional | Command | Description | |---------|-------------| | `/config-audit drift` | Compare current config against saved baseline | | `/config-audit plugin-health` | Audit plugin structure, frontmatter, cross-plugin coherence | | `/config-audit whats-active` | Read-only inventory of plugins, skills, MCP, hooks, CLAUDE.md active for a repo (with token estimates) | | `/config-audit discover` | Run discovery phase only | | `/config-audit analyze` | Run analysis phase only | | `/config-audit interview` | Gather user preferences (opt-in) | | `/config-audit status` | Show current session state | | `/config-audit cleanup` | Clean up old sessions | ## Agents | Agent | Role | Model | Color | Tools | |-------|------|-------|-------|-------| | scanner-agent | Find config files | sonnet | cyan | Read, Glob, Grep, Write | | analyzer-agent | Generate report | sonnet | blue | Read, Glob, Grep, Write | | planner-agent | Create action plan | opus | yellow | Read, Glob, Write | | implementer-agent | Execute changes | sonnet | magenta | Read, Write, Edit, Bash, Glob | | verifier-agent | Verify results | sonnet | purple | Read, Glob, Grep | | feature-gap-agent | Context-aware feature recommendations | opus | green | Read, Glob, Grep, Write | ## Deterministic Scanners Node.js scanners (zero external dependencies), run via `node scanners/scan-orchestrator.mjs `. Posture CLI: `node scanners/posture.mjs [--json] [--global] [--full-machine] [--output-file path]`. Scanner CLI: `node scanners/scan-orchestrator.mjs [--global] [--full-machine] [--no-suppress]`. | Scanner | Prefix | Detects | |---------|--------|---------| | `claude-md-linter.mjs` | CML | Structure, length, sections, @imports, duplicates, TODOs | | `settings-validator.mjs` | SET | Schema, unknown/deprecated keys, type mismatches, permissions | | `hook-validator.mjs` | HKV | Format, script existence, event validity, timeouts | | `rules-validator.mjs` | RUL | Glob matching, orphan rules, deprecated fields, unscoped rules | | `mcp-config-validator.mjs` | MCP | Server types, trust levels, env vars, unknown fields | | `import-resolver.mjs` | IMP | Broken @imports, circular refs, deep chains, tilde paths | | `conflict-detector.mjs` | CNF | Settings conflicts, permission contradictions, hook duplicates | | `feature-gap-scanner.mjs` | GAP | 25 feature checks across 4 tiers — shown as opportunities, not grades | | `token-hotspots.mjs` | TOK | Cache-breaking volatile content, redundant tool permissions, deep import chains, oversized cascade, bloated SKILL.md descriptions, MCP tool-schema budget (Opus 4.7 patterns) | | `cache-prefix-scanner.mjs` | CPS | Volatile content in lines 31–150 of CLAUDE.md cascade (beyond Pattern A's top-30 window) | | `disabled-in-schema-scanner.mjs` | DIS | Tools listed in BOTH `permissions.deny` AND `permissions.allow` — deny wins, allow entries are dead config | | `collision-scanner.mjs` | COL | Cross-plugin skill name collisions (low); user-vs-plugin overlaps (medium); `details.namespaces` payload | ### Scanner Lib (`scanners/lib/`) | Module | Purpose | |--------|---------| | `severity.mjs` | Severity constants, risk scoring, verdict logic, `WEIGHTS` named export (v5 F3) | | `output.mjs` | Finding objects (CA-XXX-NNN format), scanner results, envelope, optional `details` payload (v5 N6) | | `file-discovery.mjs` | Config file discovery: single-path, multi-path (`discoverConfigFilesMulti`), full-machine (`discoverFullMachinePaths`) | | `yaml-parser.mjs` | Frontmatter parsing, JSON parsing, @import/section extraction | | `string-utils.mjs` | Line counting, truncation, similarity, key extraction | | `scoring.mjs` | Severity-weighted `scoreByArea` (v5 F3), health scorecard, dedup-by-area (v5 N3), `scoringVersion: 'v5'` | | `backup.mjs` | Backup creation, manifest parsing, checksum verification | | `diff-engine.mjs` | Drift diffing: diffEnvelopes(), formatDiffReport() | | `baseline.mjs` | Baseline save/load/list/delete for drift detection | | `report-generator.mjs` | Unified markdown reports: posture, drift, plugin health | | `suppression.mjs` | .config-audit-ignore parsing, finding suppression, audit trail | | `active-config-reader.mjs` | Read-only inventory: readActiveConfig(), detectGitRoot(), walkClaudeMdCascade(), readClaudeJsonProjectSlice() (longest-prefix match), enumeratePlugins(), enumerateSkills(), readActiveHooks(), readActiveMcpServers() (with cache → package.json tool-count fallback), estimateTokens() (v5: `'mcp'` kind = 500 + toolCount × 200) | | `tokenizer-api.mjs` | Anthropic `count_tokens` wrapper for `--accurate-tokens` (v5 N5); 5s AbortController timeout, exponential 429 backoff, key masking | ### Action Engines (`scanners/`) | Module | Purpose | |--------|---------| | `fix-engine.mjs` | planFixes(), applyFixes(), verifyFixes() — 9 fix types | | `rollback-engine.mjs` | listBackups(), restoreBackup(), deleteBackup() | | `fix-cli.mjs` | CLI: `node fix-cli.mjs [--apply] [--json] [--global]` | | `drift-cli.mjs` | CLI: `node drift-cli.mjs [--save] [--baseline name] [--json]` | | `whats-active.mjs` | CLI: `node whats-active.mjs [--json] [--verbose] [--suggest-disables]` — read-only active-config inventory | | `token-hotspots-cli.mjs` | CLI: `node token-hotspots-cli.mjs [--json] [--global] [--output-file path] [--accurate-tokens] [--with-telemetry-recipe]` — Opus-4.7 token hotspots ranking with optional API calibration | | `manifest.mjs` | CLI: `node manifest.mjs [--json]` — ranked system-prompt token-source table (v5 N2) | ### Standalone Scanner | Module | Prefix | Purpose | |--------|--------|---------| | `plugin-health-scanner.mjs` | PLH | Plugin structure, frontmatter, cross-plugin conflicts (runs independently) | | `self-audit.mjs` | — | Runs all scanners + plugin health on this plugin itself | ## Knowledge Base (`knowledge/`) | File | Content | |------|---------| | `claude-code-capabilities.md` | Feature register: 18 config surfaces, Anthropic guidance, relevance table | | `configuration-best-practices.md` | Per-layer best practices (v5: Opus 4.7 cache-stability guidance replaces Sonnet-era 200-line rule) | | `anti-patterns.md` | Common mistakes mapped to scanner IDs | | `hook-events-reference.md` | All 26 hook events with details | | `feature-evolution.md` | Feature timeline for staleness detection | | `gap-closure-templates.md` | Config-specific templates for closing gaps | | `opus-4.7-patterns.md` | Token-cost dynamics for Opus 4.7 era — patterns powering the TOK scanner | | `cache-telemetry-recipe.md` | Manual `jq` recipe for verifying prompt-cache hit rate from session transcripts (v5 M7) | ## Hooks | Event | Script | Purpose | |-------|--------|---------| | PreToolUse | `auto-backup-config.mjs` | Auto-backup config files before Edit/Write | | PostToolUse | `post-edit-verify.mjs` | Verify config files after Edit/Write, block on new critical/high | | SessionStart | `session-start.mjs` | Checks for active (unfinished) sessions | | Stop | `stop-session-reminder.mjs` | Reminds about current session phase | ## Suppressions Create `.config-audit-ignore` at project root to suppress known findings: ``` CA-SET-003 # Exact ID CA-GAP-* # Glob pattern (all GAP findings) ``` Suppressed findings tracked in envelope's `suppressed_findings` for audit trail. Disable with `--no-suppress`. ## Architecture ### Workflow ``` /config-audit → discover + analyze (auto) → plan → implement → verify ``` Default: auto-detects scope from git context. Override with `/config-audit full|repo|home|current`. Delta mode: `--delta` (incremental). ### Session Directory ``` ~/.claude/config-audit/sessions/{session-id}/ ├── scope.yaml, discovery.json, state.yaml ├── findings/, analysis-report.md, action-plan.md ├── backups/, implementation-log.md └── interview.md (if interview run) ``` ### Finding ID Format `CA-{SCANNER}-{NNN}` — e.g. `CA-CML-001`, `CA-SET-003`, `CA-HKV-002`, `CA-RUL-005`, `CA-TOK-005`, `CA-CPS-001`, `CA-DIS-001`, `CA-COL-001` ## Testing ```bash node --test 'tests/**/*.test.mjs' ``` 635 tests across 36 test files (12 lib + 23 scanner + 1 hook). Test fixtures in `tests/fixtures/`. ## Gotchas - Session directories accumulate — use `/config-audit cleanup` to manage - Scanners run on Node.js >= 18 (uses node:test, node:fs/promises) - Plugin CLAUDE.md files in node_modules should be excluded via scope