Skills-4-SE trace-collection-assistant
Collect, normalize, and structure execution traces from instrumented programs (strace, ltrace) into JSON format for downstream analysis. Use when working with system call traces, library call traces, or execution logs that need to be analyzed for debugging, test case reproduction, or verification. Supports parsing strace/ltrace output, filtering noise, extracting debug information, and preparing traces for bug analysis or reproduction workflows.
git clone https://github.com/ArabelaTso/Skills-4-SE
T=$(mktemp -d) && git clone --depth=1 https://github.com/ArabelaTso/Skills-4-SE "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/trace-collection-assistant" ~/.claude/skills/arabelatso-skills-4-se-trace-collection-assistant && rm -rf "$T"
skills/trace-collection-assistant/SKILL.mdTrace Collection Assistant
Overview
This skill helps collect, normalize, and structure execution traces produced by instrumented programs (strace, ltrace), making them suitable for downstream analysis such as debugging, reproduction, or verification. It converts raw trace output into structured JSON format and provides tools for filtering, cleaning, and extracting relevant information.
Quick Start
Basic Workflow
- Parse raw traces - Convert strace/ltrace output to JSON
- Filter and clean - Remove noise and focus on relevant calls
- Extract debug info - Identify errors, file operations, network activity
Example: Debugging with strace
# 1. Capture trace strace -o trace.txt python buggy_program.py # 2. Parse to JSON python scripts/parse_strace.py trace.txt -o trace.json --pretty # 3. Extract errors python scripts/extract_debug_info.py trace.json --category errors --pretty # 4. Filter to relevant operations python scripts/filter_trace.py trace.json --error-only --remove-noise -o filtered.json --pretty
Example: Analyzing library calls with ltrace
# 1. Capture trace ltrace -o trace.txt ./program # 2. Parse to JSON python scripts/parse_ltrace.py trace.txt -o trace.json --pretty # 3. Analyze specific functions python scripts/filter_trace.py trace.json --include-calls "malloc,free,strlen" --pretty
Core Operations
1. Parsing Traces
Convert raw trace output to normalized JSON format.
For strace:
python scripts/parse_strace.py <input_file> [--output <output_file>] [--pretty]
For ltrace:
python scripts/parse_ltrace.py <input_file> [--output <output_file>] [--pretty]
Both parsers produce the same normalized JSON structure (see
references/json_schema.md for details).
2. Filtering Traces
Remove noise and focus on relevant operations.
Common filtering operations:
# Show only errors python scripts/filter_trace.py trace.json --error-only --pretty # Remove common noise syscalls python scripts/filter_trace.py trace.json --remove-noise --pretty # Include specific calls python scripts/filter_trace.py trace.json --include-calls "open,read,write,close" --pretty # Exclude specific calls python scripts/filter_trace.py trace.json --exclude-calls "gettimeofday,clock_gettime" --pretty # Filter by argument pattern python scripts/filter_trace.py trace.json --arg-pattern "config.json" --pretty # Combine filters python scripts/filter_trace.py trace.json --error-only --remove-noise --arg-pattern "/etc" -o filtered.json --pretty
3. Extracting Debug Information
Extract structured information for specific analysis tasks.
Extract all debug info:
python scripts/extract_debug_info.py trace.json --pretty
Extract specific categories:
# File operations only python scripts/extract_debug_info.py trace.json --category file --pretty # Network operations only python scripts/extract_debug_info.py trace.json --category network --pretty # Process operations only python scripts/extract_debug_info.py trace.json --category process --pretty # Errors only python scripts/extract_debug_info.py trace.json --category errors --pretty
Use Cases
Bug Debugging
When debugging a failing program:
- Parse the trace to JSON
- Extract all errors to identify failure points
- Filter to relevant operations around the error
- Analyze file/network/process operations for root cause
See
references/analysis_guide.md for detailed debugging patterns.
Test Case Reproduction
When reproducing a bug:
- Parse the trace from the failing execution
- Extract file operations to identify input dependencies
- Filter to the minimal sequence of operations
- Use the structured trace to reconstruct the execution environment
See
references/analysis_guide.md for reproduction workflows.
Reference Documentation
- Detailed documentation on strace and ltrace output formats, common syscalls, error codesreferences/trace_formats.md
- Schema for normalized JSON output formatreferences/json_schema.md
- Comprehensive guide on using traces for debugging and reproduction, including common patternsreferences/analysis_guide.md
Output Format
All tools produce JSON output following the normalized schema:
{ "trace_type": "strace", "source_file": "trace.txt", "total_calls": 1234, "traces": [ { "syscall": "open", "arguments": ["\"/etc/passwd\"", "O_RDONLY"], "return_value": "3", "line_number": 42, "raw_line": "open(\"/etc/passwd\", O_RDONLY) = 3" } ] }
See
assets/schema_template.json for the complete JSON schema definition.
Tips
- Use
flag for human-readable JSON output--pretty - Use
to filter out common irrelevant syscalls--remove-noise - Combine multiple filters for focused analysis
- Check
for common debugging patternsreferences/analysis_guide.md - The
field preserves execution order for sequence analysisline_number