launchdarkly-flag-discovery
npx machina-cli add skill launchdarkly/agent-skills/launchdarkly-flag-discovery --openclawLaunchDarkly Flag Discovery
You're using a skill that will guide you through auditing and understanding the feature flag landscape in a LaunchDarkly project. Your job is to explore the project, assess the health of its flags, identify what needs attention, and provide actionable recommendations.
Prerequisites
This skill requires the remotely hosted LaunchDarkly MCP server to be configured in your environment.
Required MCP tools:
list-flags— search and browse flags with filtering by state, type, tagsget-flag— get full configuration for a single flag in a specific environmentget-flag-status-across-envs— check a flag's lifecycle status across all environments
Optional MCP tools (enhance depth):
find-stale-flags— find flags that are candidates for cleanup, sorted by stalenessget-flag-health— get combined health view for a single flag (merges status + config)check-removal-readiness— detailed safety check for a specific flag
Workflow
Step 1: Understand the Project
Before diving into flag data, establish context:
- Identify the project. Confirm the
projectKeywith the user. If they haven't specified one, ask. - Understand scope. Ask the user what they're trying to accomplish:
- Broad audit? ("What's the state of our flags?")
- Targeted investigation? ("Is this specific flag still needed?")
- Cleanup planning? ("What flags can we remove?")
Step 2: Explore the Flag Landscape
Adapt your approach to the user's goal:
For a broad audit:
- Use
list-flagsscoped to a critical environment (default toproduction). - Note the total count — this tells you the scale of the flag surface area.
- Filter by
state(active, inactive, launched, new) to segment the landscape. - Filter by
type(temporary vs permanent) — temporary flags are the primary cleanup targets.
For cleanup planning:
- Use
find-stale-flags— this is the most efficient entry point. It returns a prioritized list of cleanup candidates sorted by staleness, categorized as:never_requested— created but never evaluated (possibly abandoned)inactive_30d— no SDK evaluations in the specified periodlaunched_no_changes— fully rolled out, no recent changes
- Default
inactiveDaysis 30. Increase for conservative cleanup (60, 90) or decrease for aggressive cleanup (7, 14). - Default
includeOnlyistemporary. Set toallto include permanent flags.
For a targeted investigation:
- Use
get-flag-healthfor a single-flag deep dive. It merges status data with configuration context in one call, returning lifecycle state, last-requested timestamp, targeting summary, age, and whether it's temporary. - Or use
get-flagfor the full configuration including rules, targets, and fallthrough details.
Step 3: Assess Flag Health
For flags that need deeper investigation, assess health signals. See Flag Health Signals for the full interpretation guide.
Key signals to evaluate:
| Signal | What it tells you |
|---|---|
| Lifecycle state | Where the flag is in its journey (new → active → launched → inactive) |
| Last requested | When an SDK last evaluated this flag — staleness indicator |
| Targeting complexity | Number of rules and targets — removal complexity indicator |
| Cross-environment consistency | Whether the flag behaves the same everywhere |
| Flag age + temporary status | Old temporary flags are strong cleanup candidates |
Use get-flag-status-across-envs to check if a flag is consistent across environments. A flag inactive in production but active in staging tells a different story than one inactive everywhere.
Step 4: Categorize and Prioritize
Group flags into actionable categories:
- Ready to remove — Inactive everywhere, temporary, no dependencies. Direct the user to the flag cleanup skill for code removal.
- Likely safe, needs verification — Launched (fully rolled out), no rule changes recently. The user should confirm the rollout is intentionally complete.
- Needs investigation — Active in some environments but not others, or has complex targeting. Don't recommend action without more context.
- Leave alone — Active flags doing their job, or permanent flags that are intentionally long-lived.
Step 5: Assess Removal Readiness (When Applicable)
If the user wants to know whether a specific flag can be removed, use check-removal-readiness. This tool orchestrates multiple API calls in parallel and returns a structured verdict:
safe— No blockers or warnings. Proceed with cleanup.caution— Warnings exist (code references, expiring targets, permanent flag type). Present and let the user decide.blocked— Hard blockers (dependent flags, active requests, targeting rules). Must resolve first.
See Removal Readiness Checklist for the full details on interpreting each signal.
Step 6: Present Findings
Structure your response based on what the user asked for:
For audits: Lead with a summary (total flags, breakdown by state and type), then highlight what needs attention, then provide specific recommendations.
For specific flags: Lead with the verdict (healthy / needs attention / ready to remove), then support it with the signals you found.
For cleanup planning: Lead with the count of cleanup candidates, prioritize by confidence (safest removals first), and link to the cleanup workflow for execution.
Important Context
- "Launched" means fully rolled out — targeting is on, a single variation is served to everyone, and no changes have been made recently. It doesn't mean "recently deployed."
- "Inactive" doesn't always mean safe to remove. The flag might be used in code that hasn't shipped yet, or referenced as a prerequisite by another flag.
- Permanent flags can be inactive on purpose. Some flags are designed to be dormant until needed (kill switches, emergency toggles). Don't automatically flag these for cleanup.
- Weights are scaled by 1000 in the API. A weight of
60000means 60%. Always convert to human-readable percentages. - This skill is for discovery, not action. If the user wants to remove a flag from code, direct them to the flag cleanup skill. If they want to change targeting, direct them to the flag targeting skill.
References
- Flag Health Signals — How to interpret lifecycle states, staleness, and health data
- Removal Readiness Checklist — Full safety assessment before recommending flag removal
Source
git clone https://github.com/launchdarkly/agent-skills/blob/main/skills/feature-flags/launchdarkly-flag-discovery/SKILL.mdView on GitHub Overview
LaunchDarkly Flag Discovery guides you through auditing a project's feature flags to understand the landscape, health, and readiness for removal. It helps identify stale or launched flags and prioritize cleanup, using MCP tools like list-flags, get-flag, and get-flag-health, with optional checks for removal readiness.
How This Skill Works
Connect to the remotely hosted LaunchDarkly MCP server and pull flag data using MCP tools (list-flags, get-flag, get-flag-status-across-envs). Optional tools like find-stale-flags, get-flag-health, and check-removal-readiness deepen the analysis. You then interpret lifecycle state, last-requested timestamps, targeting complexity, and cross-environment consistency to plan removals.
When to Use It
- Perform a broad audit of all project flags to understand the landscape (production focus by default).
- Identify cleanup candidates by scanning for stale or never-requested flags.
- Investigate health and lifecycle of a specific flag across environments.
- Assess how a flag's behavior differs across environments to detect inconsistencies.
- Prepare a removal readiness plan before deprecating flags in a release.
Quick Start
- Step 1: Configure and connect to the MCP server; confirm the projectKey.
- Step 2: Run list-flags and get-flag-status-across-envs to establish baseline; run find-stale-flags for cleanup candidates.
- Step 3: For a flag of interest, run get-flag (and optionally get-flag-health) and decide on removal readiness.
Best Practices
- Clarify the projectKey up front to scope the audit.
- Default to a production environment when doing broad audits.
- Use find-stale-flags to prioritize cleanup candidates.
- Pair get-flag-health with get-flag for a deep health picture.
- Run safety checks before deleting any flag.
Example Use Cases
- Audit a LaunchDarkly project to report total flag count and breakdown by state.
- Identify never_requested and inactive_30d flags for cleanup planning.
- Review a launched flag for recent changes to verify ongoing relevance.
- Compare flag behavior across production and staging to spot inconsistencies.
- Create a removal readiness plan for legacy flags before a release.