ktg-plugin-marketplace/plugins/config-audit/commands/help.md
Kjell Tore Guttormsen 5bf500e1a8 docs(config-audit): straggler sweep for v5.0.0 — sync all badge counts
Reconcile README/CLAUDE.md/commands/agents to filesystem truth ahead of v5.0.0
release. Self-audit --check-readme now passes (counts: scanners 12, commands 18,
tests 635, knowledge 8, agents 6, hooks 4).

Self-audit (scanners/self-audit.mjs):
- Exclude plugin-health-scanner.mjs from countScannerShape (it is a "standalone"
  scanner per README/CLAUDE.md taxonomy; orchestrated scanners stay at 12)
- countTestCases: spawn `node --test` and parse the `tests N` line so the badge
  reflects test cases (635), not test files (36). countTestFiles kept as
  fallback when subprocess fails.

README.md:
- Badges: scanners 9→12, commands 17→18, tests 543→635
- Body counts updated: 8 quality scanners → 12 deterministic scanners; 8 quality
  areas → 10 (incl. Plugin Hygiene from N6); 9 Node.js scanners → 12
- Scanner table extended with CPS / DIS / COL rows; TOK row reflects the v5
  Pattern E/F/N1 expansion (sonnet-era removed)
- CLI table adds manifest, whats-active, --accurate-tokens, --with-telemetry-recipe
- Knowledge table adds opus-4.7-patterns.md and cache-telemetry-recipe.md
- Scanner Lib table notes WEIGHTS export, severity-weighted scoring, tokenizer-api
- Action Engines table adds manifest.mjs, whats-active.mjs, token-hotspots-cli.mjs
- Test count text 486→635, file count 27→36 (12 lib + 23 scanner + 1 hook)
- Tokens command: 4-pattern phrasing → 6 patterns + --accurate-tokens
- Adds /config-audit manifest and /config-audit whats-active to command tables

CLAUDE.md:
- Posture row: 8 → 10 quality areas
- Tokens row: 4 patterns (incl. sonnet-era) → 6 patterns + --accurate-tokens
- Adds /config-audit manifest entry
- Scanner table: TOK description rewritten; CPS, DIS, COL rows added
- Scanner Lib table: tokenizer-api.mjs added; v5 annotations on severity, output,
  scoring, active-config-reader
- Action Engines table: manifest.mjs added; token-hotspots-cli.mjs flags expanded
- Knowledge table: cache-telemetry-recipe.md added; configuration-best-practices
  notes Opus-4.7 cache-stability rewrite
- Finding ID examples extended with CA-TOK-005, CA-CPS-001, CA-DIS-001, CA-COL-001
- Test count text 543→635, file count 31→36

commands/help.md: tokens/manifest added to Core
commands/posture.md: 8 → 10 quality areas
commands/config-audit.md: argument-hint adds tokens/manifest; router adds tokens
  and manifest; "Running 8 configuration scanners" → 12
agents/feature-gap-agent.md: 8 → 10 quality areas

No production code paths changed beyond self-audit's badge-counting heuristic.
All 635 tests still green.

Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2026-05-01 09:34:43 +02:00

2.7 KiB

name description allowed-tools model
config-audit:help Show all available config-audit commands Read sonnet

Config-Audit: Help

Getting Started

Just run /config-audit — it auto-detects your project scope and runs a full audit. No setup needed.

All Commands

Core

Command Description
/config-audit Full audit with auto-scope detection
/config-audit posture Quick scorecard with A-F grades per area (10 areas)
/config-audit tokens Opus-4.7 token hotspots; optional --accurate-tokens API calibration
/config-audit manifest Ranked table of every system-prompt token source
/config-audit feature-gap Deep analysis of features you're not using
/config-audit fix Auto-fix deterministic issues with backup
/config-audit rollback Restore configuration from a backup

Planning & Implementation

Command Description
/config-audit plan Generate prioritized action plan from audit findings
/config-audit implement Execute action plan with automatic backup + verification
/config-audit interview Set preferences to customize the action plan (optional)

Monitoring

Command Description
/config-audit drift Compare current config against a saved baseline
/config-audit plugin-health Audit plugin structure and frontmatter quality
/config-audit whats-active Show active plugins/skills/MCP/hooks/CLAUDE.md with token estimates

Utility

Command Description
/config-audit status Show current session state and progress
/config-audit cleanup Clean up old session directories

Advanced (workflow phases)

Command Description
/config-audit discover Run only the discovery phase (find config files)
/config-audit analyze Run only the analysis phase (generate report)

Scope Override

By default, /config-audit auto-detects scope from your current directory:

  • Inside a git repo → scans the repo
  • In $HOME → scans global config only
  • Elsewhere → scans current directory

Override with: /config-audit current, /config-audit repo, /config-audit home, /config-audit full

Typical Workflows

First time? Just run /config-audit.

Want to fix things? Run /config-audit then /config-audit fix.

Full optimization:

  1. /config-audit — see what you have
  2. /config-audit plan — create action plan
  3. /config-audit implement — execute with backups

Track changes over time:

  1. /config-audit drift --save — save baseline
  2. (make changes)
  3. /config-audit drift — see what changed