Bug Hunter

v1.0.0

Bug analysis, reproduction, and reporting assistant. Analyze logs, stack traces, screenshots to identify root cause. Generate structured bug reports with sev...

0· 85·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for zhanghengyi1986-afk/bug-hunter.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Bug Hunter" (zhanghengyi1986-afk/bug-hunter) from ClawHub.
Skill page: https://clawhub.ai/zhanghengyi1986-afk/bug-hunter
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install bug-hunter

ClawHub CLI

Package manager switcher

npx clawhub@latest install bug-hunter
Security Scan
Capability signals
CryptoCan make purchases
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (bug analysis, repro, reporting) matches the SKILL.md: it provides templates, log-analysis heuristics, grep/awk examples, screenshot guidance, and API-debug examples. No unrelated env vars, binaries, or installs are requested.
Instruction Scope
Instructions are scoped to analyzing logs, stack traces, screenshots, and API responses and include concrete shell commands (grep, awk, curl) and a recommendation to use an `image` tool for screenshots. These are appropriate for debugging, but the examples include commands (curl | tee) that — if used with real endpoints or real request/response content — could transmit data. The SKILL.md does not instruct the agent to access unrelated system paths or unknown credentials.
Install Mechanism
Instruction-only skill with no install spec and no code files. Lowest install risk (nothing written to disk by the skill itself).
Credentials
No required environment variables, credentials, or config paths are declared or referenced. The skill's needs are proportional to its purpose.
Persistence & Privilege
always:false and default autonomy settings. The skill does not request persistent or elevated platform privileges.
Assessment
This skill is internally consistent for bug triage and reporting. Before using it, avoid pasting secrets or highly sensitive PII into logs/screenshots you share; verify any example curl or remote endpoint you run (don’t send logs to unknown servers). Because it contains shell command examples that can transmit data, run those commands locally and inspect outputs before sharing. The skill has no installs or credential requests, so main remaining risk is accidental disclosure of sensitive data when following its examples.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

🐛 Clawdis
latestvk97dy1magyrrp074mxksks43vx84x2d6
85downloads
0stars
1versions
Updated 1w ago
v1.0.0
MIT-0

Bug Hunter

Analyze, reproduce, and report bugs with precision.

When to Use

USE this skill when:

  • Analyzing error logs, stack traces, crash dumps
  • Writing structured bug reports
  • Triaging and prioritizing bugs
  • Root cause analysis from symptoms
  • "这个报错是什么原因" / "帮我写个bug单"

DON'T use this skill when:

  • Fixing the code → use coding tools
  • Writing test cases → use test-case-gen
  • Testing APIs → use api-tester

Bug Report Template

When writing a bug report, use this structure:

## 🐛 Bug Report

**Title**: [Module] Brief description of the issue

**Severity**: 🔴 Critical / 🟠 Major / 🟡 Minor / 🟢 Trivial
**Priority**: P0-Blocker / P1-High / P2-Medium / P3-Low
**Environment**: OS / Browser / App Version / API Version
**Reporter**: 虫探 🔍
**Date**: YYYY-MM-DD

### Description
Clear, concise description of what went wrong.

### Steps to Reproduce
1. Step one (be specific: URL, button name, exact input)
2. Step two
3. Step three

### Test Data
- Account: xxx
- Input: xxx

### Expected Result
What should happen.

### Actual Result
What actually happened. Include error messages verbatim.

### Evidence
- Screenshot: [attached]
- Log snippet:
\`\`\`
ERROR 2024-01-01 10:00:00 NullPointerException at UserService.java:42
\`\`\`

### Root Cause Analysis (if identified)
- Location: file:line
- Cause: description
- Impact scope: what else might be affected

### Suggested Fix (if obvious)
Brief suggestion for the developer.

Log Analysis

Common Error Patterns

PatternLikely CauseAction
NullPointerExceptionNull reference not handledCheck null checks, data flow
ConnectionTimeoutNetwork/service issueCheck service health, timeout config
OutOfMemoryErrorMemory leak or insufficient heapAnalyze heap dump, check for leaks
DeadlockExceptionConcurrent resource contentionReview lock ordering, transaction scope
401 UnauthorizedToken expired/invalidCheck auth flow, token refresh
429 Too Many RequestsRate limitingCheck request frequency, add throttling
CORS errorCross-origin misconfigurationCheck server CORS headers

Log Analysis Steps

  1. Identify the error: Find the first error in the chain (root cause, not symptom)
  2. Check timestamp: When did it first occur? Is it recurring?
  3. Check context: What request/operation triggered it?
  4. Check stack trace: Which module/function? What line?
  5. Check related logs: What happened before the error?
  6. Reproduce: Can you trigger the same error consistently?
# Quick log analysis commands
# Find errors in log file
grep -n -i "error\|exception\|fatal\|failed" app.log | tail -20

# Count error types
grep -oP '\w+Exception' app.log | sort | uniq -c | sort -rn

# Find errors in time range
awk '/2024-01-01 10:0[0-5]/' app.log | grep -i error

# Get context around an error (5 lines before and after)
grep -B5 -A5 "NullPointerException" app.log

Severity Classification

SeverityDefinitionExample
🔴 CriticalSystem crash, data loss, security breach, no workaroundPayment charged but order not created
🟠 MajorCore feature broken, has workaroundLogin fails on Chrome but works on Firefox
🟡 MinorNon-core feature issue, cosmetic with functional impactSort order wrong on list page
🟢 TrivialCosmetic only, typo, UI alignmentButton color slightly off

Triage Decision Matrix

                    High Impact          Low Impact
High Frequency   →  P0 Fix Now          P1 Fix Soon
Low Frequency    →  P1 Fix Soon         P2/P3 Backlog

Root Cause Categories

When analyzing root cause, classify into:

  • Code Defect: Logic error, missing validation, wrong algorithm
  • Config Error: Wrong environment config, missing feature flag
  • Data Issue: Corrupt data, migration problem, encoding issue
  • Infrastructure: Server capacity, network, third-party service
  • Design Flaw: Architectural issue, race condition by design
  • Requirement Gap: Ambiguous or missing requirement

Tips

  • Always include the exact error message, not a paraphrase
  • Screenshots > descriptions for UI bugs
  • Include both expected AND actual results — never skip either
  • Note if the bug is intermittent (include frequency)
  • Check if the bug exists in previous versions (regression?)
  • For API bugs, include the full request and response

Screenshot / UI Bug Analysis

When provided with screenshots:

  1. Describe the visual issue: Element misaligned? Missing? Wrong state?
  2. Identify affected component: Which UI component/area?
  3. Check viewport: Is it responsive-related? Note screen size if visible.
  4. Compare: Expected design vs actual rendering
  5. Classify: Layout bug / Style bug / Functional state bug / Data display bug

Use the image tool to analyze screenshots, then include findings in the bug report's Evidence section.

API Error Response Analysis

When analyzing API errors:

# Save full request + response for bug report
curl -v -X POST "https://api.example.com/endpoint" \
  -H "Content-Type: application/json" \
  -d '{"key": "value"}' 2>&1 | tee /tmp/api-debug.log

# Key things to capture:
# - Request URL, method, headers, body
# - Response status code, headers, body
# - Timing information
# - Any redirect chain

Common API error patterns:

StatusCheckLikely Root Cause
400Request body/paramsValidation logic or schema mismatch
401Auth headerToken expired, wrong auth scheme
403PermissionsRBAC config, resource ownership
404URL pathRoute not registered, wrong ID
409Business logicDuplicate entry, state conflict
422Validation detailSemantic validation (format, range)
500Server logsUnhandled exception, null ref, DB error
502/503InfrastructureUpstream service down, deployment in progress

Comments

Loading comments...