重要前提
安装AI Skills的关键前提是:必须科学上网,且开启TUN模式,这一点至关重要,直接决定安装能否顺利完成,在此郑重提醒三遍:科学上网,科学上网,科学上网。查看完整安装教程 →
reproduce-bug by everyinc/compound-engineering-plugin
npx skills add https://github.com/everyinc/compound-engineering-plugin --skill reproduce-bug一个与框架无关、基于假设的工作流程,用于复现和调查问题报告中的 Bug。适用于任何语言、框架或项目类型。
在接触代码库之前,获取并分析 Bug 报告以提取结构化信息。
如果未提供问题编号或 URL 作为参数,则在继续之前询问用户(使用平台的提问工具——例如 Claude Code 中的 AskUserQuestion、Codex 中的 request_user_input、Gemini 中的 ask_user——或呈现提示并等待回复)。
gh issue view $ARGUMENTS --json title,body,comments,labels,assignees
如果参数是 URL 而不是数字,则提取问题编号或将 URL 直接传递给 gh。
阅读问题和评论,然后识别:
广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
如果问题缺少复现步骤或含糊不清,请记下缺失的内容——这将决定调查策略。
在运行任何操作之前,先对根本原因形成理论。这有助于集中调查,避免漫无目的的探索。
使用原生内容搜索工具(例如 Claude Code 中的 Grep)查找与报告症状相关的代码路径。搜索:
根据问题详情和代码搜索结果,写下 2-3 个合理的假设。每个假设应明确:
按可能性对假设进行排序。首先调查最有可能的假设。
尝试触发 Bug。复现策略取决于 Bug 类型。
编写或查找一个测试来执行可疑的代码路径:
使用 agent-browser CLI 进行浏览器自动化。不要使用任何替代的浏览器 MCP 集成或内置的浏览器控制工具。有关设置和详细的 CLI 用法,请参阅 agent-browser 技能。
agent-browser open http://localhost:${PORT:-3000}
agent-browser snapshot -i
如果服务器未运行,请要求用户启动其开发服务器并提供正确的端口。
要检测正确的端口,请先检查项目说明文件(AGENTS.md、CLAUDE.md)中的端口引用,然后是 package.json 中的开发脚本,接着是 .env 文件,最后回退到 3000。
导航到受影响的区域并执行问题中的步骤:
agent-browser open "http://localhost:${PORT}/[affected_route]"
agent-browser snapshot -i
使用 agent-browser 命令与页面交互:
agent-browser click @ref —— 点击元素agent-browser fill @ref "text" —— 填写表单字段agent-browser snapshot -i —— 捕获当前状态agent-browser screenshot bug-evidence.png —— 保存视觉证据当 Bug 被复现时:
对于需要特定数据条件、用户角色、外部服务状态或无法自动化的 Bug:
AskUserQuestion、Codex 中的 request_user_input、Gemini 中的 ask_user——或呈现选项并等待回复)他们是否可以设置所需的条件如果在尝试了最可能的假设后仍无法复现 Bug:
git log --oneline -20 -- [affected_files]利用项目提供的任何可观测性工具,深入挖掘根本原因。
搜索复现时间附近的错误、警告或意外行为。检查内容取决于 Bug 和项目可用的工具:
从阶段 2 中确定的入口点开始,追踪执行路径:
git log --oneline -10 -- [file]总结调查过程中发现的一切。
将发现整理成:
app/services/example_service.rb:42)向用户展示完整的报告。未经明确确认,请勿在 GitHub 问题上发表评论或采取任何外部操作。
询问用户(使用平台的提问工具,或呈现选项并等待):
调查完成。如何继续?
1. 将发现作为评论发布到问题中
2. 开始着手修复
3. 仅查看发现(不采取外部操作)
如果用户选择发布到问题:
gh issue comment $ARGUMENTS --body "$(cat <<'EOF'
## Bug 调查
**根本原因:** [摘要]
**复现步骤(已验证):**
1. [步骤]
2. [步骤]
**相关代码:** [文件:行号引用]
**建议的修复:** [如果适用,请描述]
EOF
)"
每周安装次数
63
仓库
GitHub 星标数
11.0K
首次出现
13 天前
安全审计
安装于
codex63
cursor63
amp62
gemini-cli62
kimi-cli62
opencode62
A framework-agnostic, hypothesis-driven workflow for reproducing and investigating bugs from issue reports. Works across any language, framework, or project type.
Fetch and analyze the bug report to extract structured information before touching the codebase.
If no issue number or URL was provided as an argument, ask the user for one before proceeding (using the platform's question tool -- e.g., AskUserQuestion in Claude Code, request_user_input in Codex, ask_user in Gemini -- or present a prompt and wait for a reply).
gh issue view $ARGUMENTS --json title,body,comments,labels,assignees
If the argument is a URL rather than a number, extract the issue number or pass the URL directly to gh.
Read the issue and comments, then identify:
If the issue lacks reproduction steps or is ambiguous, note what is missing -- this shapes the investigation strategy.
Before running anything, form theories about the root cause. This focuses the investigation and prevents aimless exploration.
Use the native content-search tool (e.g., Grep in Claude Code) to find code paths related to the reported symptoms. Search for:
Based on the issue details and code search results, write down 2-3 plausible hypotheses. Each should identify:
Rank hypotheses by likelihood. Start investigating the most likely one first.
Attempt to trigger the bug. The reproduction strategy depends on the bug type.
Write or find an existing test that exercises the suspected code path:
Use the agent-browser CLI for browser automation. Do not use any alternative browser MCP integration or built-in browser-control tool. See the agent-browser skill for setup and detailed CLI usage.
agent-browser open http://localhost:${PORT:-3000}
agent-browser snapshot -i
If the server is not running, ask the user to start their development server and provide the correct port.
To detect the correct port, check project instruction files (AGENTS.md, CLAUDE.md) for port references, then package.json dev scripts, then .env files, falling back to 3000.
Navigate to the affected area and execute the steps from the issue:
agent-browser open "http://localhost:${PORT}/[affected_route]"
agent-browser snapshot -i
Use agent-browser commands to interact with the page:
agent-browser click @ref -- click elementsagent-browser fill @ref "text" -- fill form fieldsagent-browser snapshot -i -- capture current stateagent-browser screenshot bug-evidence.png -- save visual evidenceWhen the bug is reproduced:
For bugs that require specific data conditions, user roles, external service state, or cannot be automated:
AskUserQuestion in Claude Code, request_user_input in Codex, ask_user in Gemini -- or present options and wait for a reply) whether they can set up the required conditionsIf the bug cannot be reproduced after trying the most likely hypotheses:
git log --oneline -20 -- [affected_files]Dig deeper into the root cause using whatever observability the project offers.
Search for errors, warnings, or unexpected behavior around the time of reproduction. What to check depends on the bug and what the project has available:
Starting from the entry point identified in Phase 2, trace the execution path:
git log --oneline -10 -- [file]Summarize everything discovered during the investigation.
Organize findings into:
app/services/example_service.rb:42)Present the full report to the user. Do not post comments to the GitHub issue or take any external action without explicit confirmation.
Ask the user (using the platform's question tool, or present options and wait):
Investigation complete. How to proceed?
1. Post findings to the issue as a comment
2. Start working on a fix
3. Just review the findings (no external action)
If the user chooses to post to the issue:
gh issue comment $ARGUMENTS --body "$(cat <<'EOF'
## Bug Investigation
**Root Cause:** [summary]
**Reproduction Steps (verified):**
1. [step]
2. [step]
**Relevant Code:** [file:line references]
**Suggested Fix:** [description if applicable]
EOF
)"
Weekly Installs
63
Repository
GitHub Stars
11.0K
First Seen
13 days ago
Security Audits
Gen Agent Trust HubPassSocketPassSnykWarn
Installed on
codex63
cursor63
amp62
gemini-cli62
kimi-cli62
opencode62
后端测试指南:API端点、业务逻辑与数据库测试最佳实践
11,800 周安装
Bitbucket CLI (bkt) 命令行工具:统一管理 Data Center 和 Cloud 的自动化利器
343 周安装
Paperclip AI 智能体创建技能 - 自动化雇佣与配置AI助手工作流
335 周安装
专利图表生成器 - 使用Graphviz创建专利流程图、系统架构图和技术示意图
62 周安装
AI智囊团工具:多模型代码审查与架构设计第二意见,提升开发质量
333 周安装
JSON 转 SVG/PNG 图像渲染器 | 基于 Satori 的 Vercel Labs 开源工具
337 周安装
React Testing Library 中文指南:查询方法、用户事件与最佳实践
342 周安装