Agent SkillsAgent Skills
jezweb

developer-toolbox

@jezweb/developer-toolbox
jezweb
696
56 forks
Updated 4/6/2026
View on GitHub

Essential development workflow agents for code review, debugging, testing, documentation, and git operations. Includes 7 specialized agents with strong auto-discovery triggers. Use when: setting up development workflows, code reviews, debugging errors, writing tests, generating documentation, creating commits, or verifying builds.

Installation

$npx agent-skills-cli install @jezweb/developer-toolbox
Claude Code
Cursor
Copilot
Codex
Antigravity

Details

Pathskills/developer-toolbox/SKILL.md
Branchmain
Scoped Name@jezweb/developer-toolbox

Usage

After installing, this skill will be available to your AI coding assistant.

Verify installation:

npx agent-skills-cli list

Skill Instructions


name: developer-toolbox description: | Essential development workflow agents for code review, debugging, testing, documentation, and git operations. Includes 7 specialized agents with strong auto-discovery triggers.

Use when: setting up development workflows, code reviews, debugging errors, writing tests, generating documentation, creating commits, or verifying builds. license: MIT metadata: version: "1.0.0" last_verified: "2025-01-20" author: "Jezweb"

Developer Toolbox

A collection of essential development workflow agents that integrate seamlessly with Claude Code.

What's Included

Agents (7)

AgentPurposeTriggers On
commit-helperGenerate conventional commit messages"commit message", "staged changes"
build-verifierVerify dist/ matches source after builds"changes not appearing", "verify build"
code-reviewerSecurity audits and code quality reviews"code review", "security audit", "OWASP"
debuggerSystematic debugging with root cause analysis"error", "TypeError", "stack trace", "bug"
test-runnerTDD workflow and test creation"write tests", "TDD", "coverage", "jest"
orchestratorCoordinate complex multi-step projects"coordinate", "multi-step", "complex feature"
documentation-expertREADME, API docs, architecture diagrams"document", "README", "API docs"

Rules (1)

RulePurpose
agent-first-thinkingBehavioral interrupt - consider agents before manual work

Installation

# Via marketplace
/plugin install developer-toolbox

# Or local development
/plugin install ./skills/developer-toolbox

After installation, restart Claude Code to load the agents.

Usage Examples

Commit Helper

"Help me write a commit message for these staged changes"

Build Verifier

"My changes aren't appearing in production, verify the build output"

Code Reviewer

"Review this authentication code for security vulnerabilities"

Debugger

"I'm getting TypeError: Cannot read property 'map' of undefined"

Test Runner

"Use TDD to implement this user validation function"

Orchestrator

"Coordinate a refactor of the authentication system across 5 services"

Documentation Expert

"Create comprehensive API documentation for this REST endpoint"

Agent Design Philosophy

All agents follow the "MUST BE USED when" pattern for reliable auto-discovery:

description: |
  [Role] specialist. MUST BE USED when: [trigger 1], [trigger 2], [trigger 3].
  Use PROACTIVELY for [broad task category].

  Keywords: keyword1, keyword2, error-message-fragment

This ensures Claude Code discovers and proposes the right agent automatically based on user requests.

Agent-First Thinking Rule

The included agent-first-thinking.md rule encourages using agents by default:

The Inversion:

  • Wrong: "I'll do this manually unless it's big enough for agents"
  • Right: "I'll use agents unless there's a reason not to"

Triggers:

If about to...Use instead...
grep/glob 3+ timesExplore agent
Read 5+ filesExplore agent
Same edit across filesParallel agents
Audit multiple itemsParallel swarm

Customization

Each agent can be extended by editing its markdown file after installation:

# Find installed agents
ls ~/.claude/plugins/cache/*/developer-toolbox/*/agents/

# Or copy to user-level for customization
cp [plugin-path]/agents/code-reviewer.md ~/.claude/agents/

Combining Agents

Agents work well together:

"Review this code for security issues, then write tests for the critical paths"
# → code-reviewer first, then test-runner
"Debug this failing test, document the root cause, and commit the fix"
# → debugger → documentation-expert → commit-helper

Version History

  • 1.0.0 (2025-01-20): Initial release with 7 agents and 1 rule

More by jezweb

View all
dependency-audit
696

Comprehensive dependency health auditing for JavaScript/TypeScript projects. Run npm audit, detect outdated packages, check for security advisories, and verify license compliance. Prioritises vulnerabilities by severity and provides actionable fix recommendations. Use when: auditing project dependencies, checking for vulnerabilities, updating packages, preparing for release, or investigating "npm audit" warnings. Keywords: audit, vulnerabilities, outdated, security, npm audit, pnpm audit, CVE, GHSA, license.

deep-debug
696

Multi-agent investigation for stubborn bugs. Use when: going in circles debugging, need to investigate browser/API interactions, complex bugs resisting normal debugging, or when symptoms don't match expectations. Launches parallel agents with different perspectives and uses Chrome tools for evidence gathering.

firebase-storage
696

Build with Firebase Cloud Storage - file uploads, downloads, and secure access. Use when: uploading images/files, generating download URLs, implementing file pickers, setting up storage security rules, or troubleshooting storage/unauthorized, cors errors, quota exceeded, or upload failed errors. Prevents 9 documented errors.

electron-base
696

Build secure desktop applications with Electron 33, Vite, React, and TypeScript. Covers type-safe IPC via contextBridge, OAuth with custom protocol handlers, native module compatibility (better-sqlite3, electron-store), and electron-builder packaging. Use when building cross-platform desktop apps, implementing OAuth flows in Electron, handling main/renderer process communication, or packaging with code signing. Prevents: NODE_MODULE_VERSION mismatch, hardcoded encryption keys, context isolation bypasses, sandbox conflicts with native modules.