code-doc-guid

v1.0.2

Codebase navigation and documentation assistant. Helps AI locate code definitions, understand dependencies, and maintain documentation consistency. BLOCKING...

0· 277·1 current·1 all-time
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
Name/description match the observed behavior: an on-disk SQLite-based code index, search, inspect, graph, and update commands. No unrelated environment variables, binaries, or external services are requested.
Instruction Scope
SKILL.md prescribes that the agent MUST run this skill before any code modification and after modifications. This is consistent with a code-indexing workflow, but it is prescriptive and enforces a blocking step that can affect agent flows. The instructions operate on project files and expect reading many files and generating .trae artifacts—this behaviour is within the stated purpose.
Install Mechanism
Instruction-only skill (no install spec). A Python script is bundled; no external downloads or package installs are requested.
Credentials
No environment variables, credentials, or unrelated config paths are requested. The script will create/modify local files (.trae/, codebase.db) and expects filesystem write access — that's proportionate to a local indexer.
Persistence & Privilege
Skill is not always-enabled and does not request elevated platform privileges. It writes to project-local paths (e.g., .trae/) and manages its own DB; that is normal for this type of tool. The skill can be invoked autonomously (platform default) but that is not unusual by itself.
Assessment
This skill appears to be a local code-indexer and its requirements align with that purpose. Before allowing it to run: 1) Review the full scripts/codebase_manager.py for any subprocess/network calls (the visible portion imports subprocess but the file was truncated in the supplied content). 2) Expect the skill to create/modify .trae/ and a local SQLite DB (codebase.db) in your project — back up any important files if concerned. 3) If you run it, prefer doing so in a sandbox or a copy of the repository first. 4) If you do not want a tool writing runtime artifacts to the repo, decline or run it with a separate working directory. If you want higher assurance, provide the remaining portion of scripts/codebase_manager.py so it can be fully audited (particularly to confirm no network exfiltration or arbitrary shell execution).

Like a lobster shell, security has layers — review code before you run it.

latestvk97dh664fsphj0gddrnhac2qqh82f5x2
277downloads
0stars
3versions
Updated 1mo ago
v1.0.2
MIT-0

Code Documentation & Navigation Guide

This skill provides a Codebase Knowledge Graph to help you navigate complex projects without reading thousands of files. It uses a local SQLite database to store file relationships, dependency layers, and symbol definitions.

⚠️ CRITICAL: BLOCKING REQUIREMENTS (触发条件)

STOP! READ THIS BEFORE PROCEEDING.

You MUST invoke this skill (code-doc-guid) as a BLOCKING STEP before performing any of the following actions. Failure to do so is a violation of protocol.

🔴 Mandatory Pre-Action Check (Recon Phase)

Trigger: You are about to:

  • Modify any code file (Write, SearchReplace).
  • Rename or move files (RunCommand: mv/ren).
  • Delete files (DeleteFile).
  • Refactor a class, function, or variable.

Action: You MUST run python ... codebase_manager.py inspect/search FIRST. Reason: You cannot safely modify code without knowing who depends on it. "Guessing" is strictly prohibited.

🟢 Mandatory Post-Action Sync (Archive Phase)

Trigger: You have just finished a set of file modifications. Action: You MUST run python ... codebase_manager.py update. Reason: The knowledge graph must remain consistent with the disk state for the next turn.


Workflow & Commands

All commands are run via python scripts/codebase_manager.py <command> [args]. (Note: If running manually, adjust the path to where you saved the script)

1. search - Find Symbols & Concepts

Use this to locate code by name or intent (docstring).

  • Command: search <query>
  • Example: search "UserAuth"
  • Output: JSONL format containing file paths, symbol names, and docstrings.
  • Action: Use this to find the exact file path before reading it.

2. inspect - Analyze Dependencies & Risk

Use this to understand the impact of a change.

  • Command: inspect <filename_fragment>
  • Example: inspect "auth_service"
  • Output (JSON):
    • risk_score: HIGH / MEDIUM / LOW.
    • doc_file: Path to the detailed report (e.g., .trae/codeguiddoc.md).
  • Action Guidelines:
    1. Read the JSON summary first.
    2. IF RISK IS HIGH:
      • STOP. Do not modify code yet.
      • READ the generated markdown file (doc_file). It contains a Mermaid Graph and full dependency list.
      • SHOW the Mermaid graph to the user (if possible) or summarize the impact: "This change affects 25 files, including core modules A and B."
      • ASK for confirmation.

3. update - Refresh Index

Use this after ANY file modification.

  • Command: update
  • Output: "Processing X changed files..."
  • Note: It is incremental and very fast (<1s usually). Always run this before finishing your turn.

4. graph - Export Visuals (Optional)

Use this only when the user explicitly asks for an architecture overview.

  • Command: graph
  • Output: Generates .trae/architecture_layers.md (Human readable) and .trae/dependency_graph.json (Machine readable).

Token Economy Strategy

To save tokens and time:

  1. Don't read whole files to find one function. Use search -> Read(limit=20, offset=N).
  2. Don't guess dependencies. Use inspect to see the exact relationship graph.
  3. Trust the Layering. If you are modifying a Layer 0 file, be extremely careful—it breaks everything. If modifying Layer 5, it's likely safe.

Comments

Loading comments...