Reconcile README/CLAUDE.md/commands/agents to filesystem truth ahead of v5.0.0 release. Self-audit --check-readme now passes (counts: scanners 12, commands 18, tests 635, knowledge 8, agents 6, hooks 4). Self-audit (scanners/self-audit.mjs): - Exclude plugin-health-scanner.mjs from countScannerShape (it is a "standalone" scanner per README/CLAUDE.md taxonomy; orchestrated scanners stay at 12) - countTestCases: spawn `node --test` and parse the `tests N` line so the badge reflects test cases (635), not test files (36). countTestFiles kept as fallback when subprocess fails. README.md: - Badges: scanners 9→12, commands 17→18, tests 543→635 - Body counts updated: 8 quality scanners → 12 deterministic scanners; 8 quality areas → 10 (incl. Plugin Hygiene from N6); 9 Node.js scanners → 12 - Scanner table extended with CPS / DIS / COL rows; TOK row reflects the v5 Pattern E/F/N1 expansion (sonnet-era removed) - CLI table adds manifest, whats-active, --accurate-tokens, --with-telemetry-recipe - Knowledge table adds opus-4.7-patterns.md and cache-telemetry-recipe.md - Scanner Lib table notes WEIGHTS export, severity-weighted scoring, tokenizer-api - Action Engines table adds manifest.mjs, whats-active.mjs, token-hotspots-cli.mjs - Test count text 486→635, file count 27→36 (12 lib + 23 scanner + 1 hook) - Tokens command: 4-pattern phrasing → 6 patterns + --accurate-tokens - Adds /config-audit manifest and /config-audit whats-active to command tables CLAUDE.md: - Posture row: 8 → 10 quality areas - Tokens row: 4 patterns (incl. sonnet-era) → 6 patterns + --accurate-tokens - Adds /config-audit manifest entry - Scanner table: TOK description rewritten; CPS, DIS, COL rows added - Scanner Lib table: tokenizer-api.mjs added; v5 annotations on severity, output, scoring, active-config-reader - Action Engines table: manifest.mjs added; token-hotspots-cli.mjs flags expanded - Knowledge table: cache-telemetry-recipe.md added; configuration-best-practices notes Opus-4.7 cache-stability rewrite - Finding ID examples extended with CA-TOK-005, CA-CPS-001, CA-DIS-001, CA-COL-001 - Test count text 543→635, file count 31→36 commands/help.md: tokens/manifest added to Core commands/posture.md: 8 → 10 quality areas commands/config-audit.md: argument-hint adds tokens/manifest; router adds tokens and manifest; "Running 8 configuration scanners" → 12 agents/feature-gap-agent.md: 8 → 10 quality areas No production code paths changed beyond self-audit's badge-counting heuristic. All 635 tests still green. Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
2.7 KiB
2.7 KiB
| name | description | allowed-tools | model |
|---|---|---|---|
| config-audit:help | Show all available config-audit commands | Read | sonnet |
Config-Audit: Help
Getting Started
Just run /config-audit — it auto-detects your project scope and runs a full audit. No setup needed.
All Commands
Core
| Command | Description |
|---|---|
/config-audit |
Full audit with auto-scope detection |
/config-audit posture |
Quick scorecard with A-F grades per area (10 areas) |
/config-audit tokens |
Opus-4.7 token hotspots; optional --accurate-tokens API calibration |
/config-audit manifest |
Ranked table of every system-prompt token source |
/config-audit feature-gap |
Deep analysis of features you're not using |
/config-audit fix |
Auto-fix deterministic issues with backup |
/config-audit rollback |
Restore configuration from a backup |
Planning & Implementation
| Command | Description |
|---|---|
/config-audit plan |
Generate prioritized action plan from audit findings |
/config-audit implement |
Execute action plan with automatic backup + verification |
/config-audit interview |
Set preferences to customize the action plan (optional) |
Monitoring
| Command | Description |
|---|---|
/config-audit drift |
Compare current config against a saved baseline |
/config-audit plugin-health |
Audit plugin structure and frontmatter quality |
/config-audit whats-active |
Show active plugins/skills/MCP/hooks/CLAUDE.md with token estimates |
Utility
| Command | Description |
|---|---|
/config-audit status |
Show current session state and progress |
/config-audit cleanup |
Clean up old session directories |
Advanced (workflow phases)
| Command | Description |
|---|---|
/config-audit discover |
Run only the discovery phase (find config files) |
/config-audit analyze |
Run only the analysis phase (generate report) |
Scope Override
By default, /config-audit auto-detects scope from your current directory:
- Inside a git repo → scans the repo
- In
$HOME→ scans global config only - Elsewhere → scans current directory
Override with: /config-audit current, /config-audit repo, /config-audit home, /config-audit full
Typical Workflows
First time? Just run /config-audit.
Want to fix things? Run /config-audit then /config-audit fix.
Full optimization:
/config-audit— see what you have/config-audit plan— create action plan/config-audit implement— execute with backups
Track changes over time:
/config-audit drift --save— save baseline- (make changes)
/config-audit drift— see what changed