Get the FREE Ultimate OpenClaw Setup Guide →

Triage Issue

npx machina-cli add skill aden-hive/hive/triage-issue --openclaw
Files (1)
SKILL.md
4.2 KB

Triage Issue Skill

Analyze a GitHub issue, verify claims against the codebase, and close invalid issues with a technical response.

Trigger

User provides a GitHub issue URL or number, e.g.:

  • /triage-issue 1970
  • /triage-issue https://github.com/adenhq/hive/issues/1970

Workflow

Step 1: Fetch Issue Details

gh issue view <number> --repo adenhq/hive --json title,body,state,labels,author

Extract:

  • Title
  • Body (the claim/bug report)
  • Current state
  • Labels
  • Author

If issue is already closed, inform user and stop.

Step 2: Analyze the Claim

Read the issue body and identify:

  1. The core claim - What is the user asserting?
  2. Technical specifics - File paths, function names, code snippets mentioned
  3. Expected behavior - What do they think should happen?
  4. Severity claimed - Security issue? Bug? Feature request?

Step 3: Investigate the Codebase

For each technical claim:

  1. Find the referenced code using Grep/Glob/Read
  2. Understand the actual implementation
  3. Check if the claim accurately describes the behavior
  4. Look for related tests, documentation, or design decisions

Step 4: Evaluate Validity

Categorize the issue as one of:

CategoryAction
Valid BugDo NOT close. Inform user this is a real issue.
Valid Feature RequestDo NOT close. Suggest labeling appropriately.
MisunderstandingPrepare technical explanation for why behavior is correct.
Fundamentally FlawedPrepare critique explaining the technical impossibility or design rationale.
DuplicateFind the original issue and prepare duplicate notice.
IncompletePrepare request for more information.

Step 5: Draft Response

For issues to be closed, draft a response that:

  1. Acknowledges the concern - Don't be dismissive
  2. Explains the actual behavior - With code references
  3. Provides technical rationale - Why it works this way
  4. References industry standards - If applicable
  5. Offers alternatives - If there's a better approach for the user

Use this template:

## Analysis

[Brief summary of what was investigated]

## Technical Details

[Explanation with code references]

## Why This Is Working As Designed

[Rationale]

## Recommendation

[What the user should do instead, if applicable]

---
*This issue was reviewed and closed by the maintainers.*

Step 6: User Review

Present the draft to the user with:

## Issue #<number>: <title>

**Claim:** <summary of claim>

**Finding:** <valid/invalid/misunderstanding/etc>

**Draft Response:**
<the markdown response>

---
Do you want me to post this comment and close the issue?

Use AskUserQuestion with options:

  • "Post and close" - Post comment, close issue
  • "Edit response" - Let user modify the response
  • "Skip" - Don't take action

Step 7: Execute Action

If user approves:

# Post comment
gh issue comment <number> --repo adenhq/hive --body "<response>"

# Close issue
gh issue close <number> --repo adenhq/hive --reason "not planned"

Report success with link to the issue.

Important Guidelines

  1. Never close valid issues - If there's any merit to the claim, don't close it
  2. Be respectful - The reporter took time to file the issue
  3. Be technical - Provide code references and evidence
  4. Be educational - Help them understand, don't just dismiss
  5. Check twice - Make sure you understand the code before declaring something invalid
  6. Consider edge cases - Maybe their environment reveals a real issue

Example Critiques

Security Misunderstanding

"The claim that secrets are exposed in plaintext misunderstands the encryption architecture. While SecretStr is used for logging protection, actual encryption is provided by Fernet (AES-128-CBC) at the storage layer. The code path is: serialize → encrypt → write. Only encrypted bytes touch disk."

Impossible Request

"The requested feature would require [X] which violates [fundamental constraint]. This is not a limitation of our implementation but a fundamental property of [technology/protocol]."

Already Handled

"This scenario is already handled by [code reference]. The reporter may be using an older version or misconfigured environment."

Source

git clone https://github.com/aden-hive/hive/blob/main/.claude/skills/triage-issue/SKILL.mdView on GitHub

Overview

Analyzes a GitHub issue, verifies user claims against the repository, and closes invalid issues with a technical, evidence-backed response. It fetches issue details, inspects code references, and crafts a reasoned draft for user review before acting.

How This Skill Works

The workflow fetches issue details via gh, analyzes the core claim and technical specifics, then investigates the codebase to validate or refute the claim. It drafts a structured response using a template and presents it for user approval before posting and closing if instructed.

When to Use It

  • When a user reports a bug with a specific file path or code path and asks for reproduction.
  • When an issue describes behavior that can be validated or refuted by checking the codebase.
  • When you need to determine whether an issue is a duplicate or misinterpretation.
  • When an issue is invalid or not planned, requiring a clear technical rationale.
  • When more information is needed to validate the claim (request for details).

Quick Start

  1. Step 1: Run the triage workflow on /triage-issue <number> or URL.
  2. Step 2: For each technical claim, locate code references with grep/grep-like tooling and verify behavior.
  3. Step 3: Draft a technical response using the template and present it for user approval.

Best Practices

  • Never close a valid issue; verify evidence before deciding.
  • Be respectful and acknowledge the reporter's effort.
  • Provide concrete code references and tests to support your claim.
  • Explain the actual behavior and rationale clearly, not just a verdict.
  • Suggest alternatives or better approaches if applicable.

Example Use Cases

  • Security Misunderstanding: The issue claims plaintext secrets; respond with how SecretStr protects logs and where encryption occurs.
  • Impossible Request: User asks for a feature that contradicts current design; explain constraints and rationale.
  • Duplicate: Similar issue exists; point to original and provide a concise summary.
  • Incomplete: Issue lacks steps to reproduce; request more info with a checklist.
  • Valid Bug: Reproducible crash in a specific path; do not close and propose next steps.

Frequently Asked Questions

Add this skill to your agents
Sponsor this space

Reach thousands of developers