Awesome-omni-skills nx-ci-monitor
CI Monitor Command workflow skill. Use this skill when the user needs Monitor Nx Cloud CI pipeline status and handle self-healing fixes automatically. Use when user says \"watch CI\", \"monitor pipeline\", \"check CI status\", \"fix CI failures\", or \"self-heal CI\". Requires Nx Cloud connection. Do NOT use for local task execution (use nx-run-tasks) or general CI debugging outside Nx Cloud and the operator should preserve the upstream workflow, copied support files, and provenance before merging or handing off.
git clone https://github.com/diegosouzapw/awesome-omni-skills
T=$(mktemp -d) && git clone --depth=1 https://github.com/diegosouzapw/awesome-omni-skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills_omni/nx-ci-monitor" ~/.claude/skills/diegosouzapw-awesome-omni-skills-nx-ci-monitor-8da08a && rm -rf "$T"
skills_omni/nx-ci-monitor/SKILL.mdCI Monitor Command
Overview
This public intake copy packages
packages/skills-catalog/skills/(tooling)/nx-ci-monitor from https://github.com/tech-leads-club/agent-skills into the native Omni Skills editorial shape without hiding its origin.
Use it when the operator needs the upstream workflow, support files, and repository context to stay intact while the public validator and private enhancer continue their normal downstream flow.
This intake keeps the copied upstream files intact and uses
metadata.json plus ORIGIN.md as the provenance anchor for review.
CI Monitor Command You are the orchestrator for monitoring Nx Cloud CI pipeline executions and handling self-healing fixes. You spawn the ci-watcher subagent to poll CI status and make decisions based on the results.
Imported source sections that did not map cleanly to the public headings are still preserved below or in the support files. Notable imported sections: Context, User Instructions, Configuration Defaults, Nx Cloud Connection Check, Session Context Behavior, Default Behaviors by Status.
When to Use This Skill
Use this section as the trigger filter. It should make the activation boundary explicit before the operator loads files, runs commands, or opens a pull request.
- Use when the request clearly matches the imported source intent: Monitor Nx Cloud CI pipeline status and handle self-healing fixes automatically. Use when user says "watch CI", "monitor pipeline", "check CI status", "fix CI failures", or "self-heal CI". Requires Nx Cloud connection.....
- Use when the operator should preserve upstream workflow detail instead of rewriting the process from scratch.
- Use when provenance needs to stay visible in the answer, PR, or review packet.
- Use when copied upstream references, examples, or scripts materially improve the answer.
- Use when the workflow should remain reviewable in the public intake repo before the private enhancer takes over.
Operating Table
| Situation | Start here | Why it matters |
|---|---|---|
| First-time use | | Confirms repository, branch, commit, and imported path before touching the copied workflow |
| Provenance review | | Gives reviewers a plain-language audit trail for the imported source |
| Workflow execution | | Starts with the smallest copied file that materially changes execution |
| Supporting context | | Adds the next most relevant copied source file without loading the entire package |
| Handoff decision | | Helps the operator switch to a stronger native skill when the task drifts |
Workflow
This workflow is intentionally editorial and operational at the same time. It keeps the imported source useful to the operator while still satisfying the public intake standards that feed the downstream enhancer flow.
- Confirm the user goal, the scope of the imported workflow, and whether this skill is still the right router for the task.
- Read the overview and provenance files before loading any copied upstream support files.
- Load only the references, examples, prompts, or scripts that materially change the outcome for the current request.
- Execute the upstream workflow while keeping provenance and source boundaries explicit in the working notes.
- Validate the result against the upstream expectations and the evidence you can point to in the copied files.
- Escalate or hand off to a related skill when the work moves out of this imported workflow's center of gravity.
- Before merge or closure, record what was used, what changed, and what the reviewer still needs to verify.
Imported Workflow Notes
Imported: Context
- Current Branch: !
git branch --show-current - Current Commit: !
git rev-parse --short HEAD - Remote Status: !
git status -sb | head -1
Examples
Example 1: Ask for the upstream workflow directly
Use @nx-ci-monitor to handle <task>. Start from the copied upstream workflow, load only the files that change the outcome, and keep provenance visible in the answer.
Explanation: This is the safest starting point when the operator needs the imported workflow, but not the entire repository.
Example 2: Ask for a provenance-grounded review
Review @nx-ci-monitor against metadata.json and ORIGIN.md, then explain which copied upstream files you would load first and why.
Explanation: Use this before review or troubleshooting when you need a precise, auditable explanation of origin and file selection.
Example 3: Narrow the copied support files before execution
Use @nx-ci-monitor for <task>. Load only the copied references, examples, or scripts that change the outcome, and name the files explicitly before proceeding.
Explanation: This keeps the skill aligned with progressive disclosure instead of loading the whole copied package by default.
Example 4: Build a reviewer packet
Review @nx-ci-monitor using the copied upstream files plus provenance, then summarize any gaps before merge.
Explanation: This is useful when the PR is waiting for human review and you want a repeatable audit packet.
Imported Usage Notes
Imported: User Instruction Examples
Users can override default behaviors:
| Instruction | Effect |
|---|---|
| "never auto-apply" | Always prompt before applying any fix |
| "always ask before git push" | Prompt before each push |
| "reject any fix for e2e tasks" | Auto-reject if contains e2e |
| "apply all fixes regardless of verification" | Skip verification check, apply everything |
| "if confidence < 70, reject" | Check confidence field before applying |
| "run 'nx affected -t typecheck' before applying" | Add local verification step |
| "auto-fix workflow failures" | Attempt lockfile updates on pre-CIPE failures |
| "wait 45 min for new CIPE" | Override new-CIPE timeout (default: 10 min) |
Imported: Example Session
Example 1: Normal Flow with Self-Healing (medium verbosity)
[ci-monitor] Starting CI monitor for branch 'feature/add-auth' [ci-monitor] Config: max-cycles=5, timeout=120m, verbosity=medium [ci-monitor] Spawning subagent to poll CI status... [CI Monitor] CI attempt: IN_PROGRESS | Self-Healing: NOT_STARTED | Elapsed: 1m [CI Monitor] CI attempt: FAILED | Self-Healing: IN_PROGRESS | Elapsed: 3m [CI Monitor] CI attempt: FAILED | Self-Healing: COMPLETED | Elapsed: 5m [ci-monitor] Fix available! Verification: COMPLETED [ci-monitor] Applying fix via MCP... [ci-monitor] Fix applied in CI. Waiting for new CI attempt... [ci-monitor] Spawning subagent to poll CI status... [CI Monitor] New CI attempt detected! [CI Monitor] CI attempt: SUCCEEDED | Elapsed: 8m [ci-monitor] CI passed successfully! [ci-monitor] Summary: - Total cycles: 2 - Total time: 12m 34s - Fixes applied: 1 - Result: SUCCESS
Example 2: Pre-CI Failure (medium verbosity)
[ci-monitor] Starting CI monitor for branch 'feature/add-products' [ci-monitor] Config: max-cycles=5, timeout=120m, auto-fix-workflow=true [ci-monitor] Spawning subagent to poll CI status... [CI Monitor] CI attempt: FAILED | Self-Healing: COMPLETED | Elapsed: 2m [ci-monitor] Applying fix locally, enhancing, and pushing... [ci-monitor] Committed: abc1234 [ci-monitor] Spawning subagent to poll CI status... [CI Monitor] Waiting for new CI attempt... (expected SHA: abc1234) [CI Monitor] ⚠️ CI attempt timeout (10 min). Returning no_new_cipe. [ci-monitor] Status: no_new_cipe [ci-monitor] --auto-fix-workflow enabled. Attempting lockfile update... [ci-monitor] Lockfile updated. Committed: def5678 [ci-monitor] Spawning subagent to poll CI status... [CI Monitor] New CI attempt detected! [CI Monitor] CI attempt: SUCCEEDED | Elapsed: 18m [ci-monitor] CI passed successfully! [ci-monitor] Summary: - Total cycles: 3 - Total time: 22m 15s - Fixes applied: 1 (self-healing) + 1 (lockfile) - Result: SUCCESS
Best Practices
Treat the generated public skill as a reviewable packaging layer around the upstream repository. The goal is to keep provenance explicit and load only the copied source material that materially improves execution.
- Keep the imported skill grounded in the upstream repository; do not invent steps that the source material cannot support.
- Prefer the smallest useful set of support files so the workflow stays auditable and fast to review.
- Keep provenance, source commit, and imported file paths visible in notes and PR descriptions.
- Point directly at the copied upstream files that justify the workflow instead of relying on generic review boilerplate.
- Treat generated examples as scaffolding; adapt them to the concrete task before execution.
- Route to a stronger native skill when architecture, debugging, design, or security concerns become dominant.
Troubleshooting
Problem: The operator skipped the imported context and answered too generically
Symptoms: The result ignores the upstream workflow in
packages/skills-catalog/skills/(tooling)/nx-ci-monitor, fails to mention provenance, or does not use any copied source files at all.
Solution: Re-open metadata.json, ORIGIN.md, and the most relevant copied upstream files. Load only the files that materially change the answer, then restate the provenance before continuing.
Problem: The imported workflow feels incomplete during review
Symptoms: Reviewers can see the generated
SKILL.md, but they cannot quickly tell which references, examples, or scripts matter for the current task.
Solution: Point at the exact copied references, examples, scripts, or assets that justify the path you took. If the gap is still real, record it in the PR instead of hiding it.
Problem: The task drifted into a different specialization
Symptoms: The imported skill starts in the right place, but the work turns into debugging, architecture, design, security, or release orchestration that a native skill handles better. Solution: Use the related skills section to hand off deliberately. Keep the imported provenance visible so the next skill inherits the right context instead of starting blind.
Related Skills
- Use when the work is better handled by that native specialization after this imported skill establishes context.@accessibility
- Use when the work is better handled by that native specialization after this imported skill establishes context.@ai-cold-outreach
- Use when the work is better handled by that native specialization after this imported skill establishes context.@ai-pricing
- Use when the work is better handled by that native specialization after this imported skill establishes context.@ai-sdr
Additional Resources
Use this support matrix and the linked files below as the operator packet for this imported skill. They should reflect real copied source material, not generic scaffolding.
| Resource family | What it gives the reviewer | Example path |
|---|---|---|
| copied reference notes, guides, or background material from upstream | |
| worked examples or reusable prompts copied from upstream | |
| upstream helper scripts that change execution or validation | |
| routing or delegation notes that are genuinely part of the imported package | |
| supporting assets or schemas copied from the source package | |
Imported Reference Notes
Imported: User Instructions
$ARGUMENTS
Important: If user provides specific instructions, respect them over default behaviors described below.
Imported: Configuration Defaults
| Setting | Default | Description |
|---|---|---|
| 10 | Maximum CIPE cycles before timeout |
| 120 | Maximum duration in minutes |
| medium | Output level: minimal, medium, verbose |
| (auto-detect) | Branch to monitor |
| 60 | Subagent polling timeout in minutes |
| false | Ignore previous context, start fresh |
| false | Attempt common fixes for pre-CIPE failures (e.g., lockfile updates) |
| 10 | Minutes to wait for new CIPE after action |
| 3 | Max local verification + enhance cycles before pushing to CI |
Parse any overrides from
$ARGUMENTS and merge with defaults.
Imported: Nx Cloud Connection Check
CRITICAL: Before starting the monitoring loop, verify the workspace is connected to Nx Cloud.
Step 0: Verify Nx Cloud Connection
-
Check
at workspace root fornx.json
ornxCloudIdnxCloudAccessToken -
If
missing OR neither property exists → exit with:nx.json[ci-monitor] Nx Cloud not connected. Unlock 70% faster CI and auto-fix broken PRs with https://nx.dev/nx-cloud -
If connected → continue to main loop
Imported: Session Context Behavior
Important: Within a Claude Code session, conversation context persists. If you Ctrl+C to interrupt the monitor and re-run
/ci-monitor, Claude remembers the previous state and may continue from where it left off.
- To continue monitoring: Just re-run
(context is preserved)/ci-monitor - To start fresh: Use
to ignore previous context/ci-monitor --fresh - For a completely clean slate: Exit Claude Code and restart
claude
Imported: Default Behaviors by Status
The subagent returns with one of the following statuses. This table defines the default behavior for each status. User instructions can override any of these.
| Status | Default Behavior |
|---|---|
| Exit with success. Log "CI passed successfully!" |
| Fix will be auto-applied by self-healing. Do NOT call MCP. Record , spawn new subagent in wait mode to poll for new CIPE. |
| Compare vs to determine verification state. See Fix Available Decision Logic section below. |
| Self-healing failed to generate fix. Attempt local fix based on . If successful → commit, push, loop. If not → exit with failure. |
| Call MCP to request rerun: . New CIPE spawns automatically. Loop to poll for new CIPE. |
| CI failed, no fix available (self-healing disabled or not executable). Attempt local fix if possible. Otherwise exit with failure. |
| Expected CIPE never spawned (CI workflow likely failed before Nx tasks). Report to user, attempt common fixes if configured, or exit with guidance. |
| Subagent polling timeout reached. Exit with timeout. |
| CIPE was canceled. Exit with canceled status. |
| CIPE timed out. Exit with timeout status. |
| Increment . If >= 3 → exit with circuit breaker. Otherwise wait 60s and loop. |
Fix Available Decision Logic
When subagent returns
fix_available, main agent compares failedTaskIds vs verifiedTaskIds:
Step 1: Categorize Tasks
- Verified tasks = tasks in both
ANDfailedTaskIdsverifiedTaskIds - Unverified tasks = tasks in
but NOT infailedTaskIdsverifiedTaskIds - E2E tasks = unverified tasks where target contains "e2e" (task format:
or<project>:<target>
)<project>:<target>:<config> - Verifiable tasks = unverified tasks that are NOT e2e
Step 2: Determine Path
| Condition | Path |
|---|---|
| No unverified tasks (all verified) | Apply via MCP |
| Unverified tasks exist, but ALL are e2e | Apply via MCP (treat as verified enough) |
| Verifiable tasks exist | Local verification flow |
Step 3a: Apply via MCP (fully/e2e-only verified)
- Call
update_self_healing_fix({ shortLink, action: "APPLY" }) - Record
, spawn subagent in wait modelast_cipe_url
Step 3b: Local Verification Flow
When verifiable (non-e2e) unverified tasks exist:
-
Detect package manager:
exists →pnpm-lock.yamlpnpm nx
exists →yarn.lockyarn nx- Otherwise →
npx nx
-
Run verifiable tasks in parallel:
- Spawn
subagents to run each task concurrentlygeneral - Each subagent runs:
<pm> nx run <taskId> - Collect pass/fail results from all subagents
- Spawn
-
Evaluate results:
| Result | Action |
|---|---|
| ALL verifiable tasks pass | Apply via MCP |
| ANY verifiable task fails | Apply-locally + enhance flow |
-
Apply-locally + enhance flow:
- Run
nx apply-locally <shortLink> - Enhance the code to fix failing tasks
- Run failing tasks again to verify fix
- If still failing → increment
, loop back to enhancelocal_verify_count - If passing → commit and push, record
, spawn subagent in wait modeexpected_commit_sha
- Run
-
Track attempts (wraps step 4):
- Increment
after each enhance cyclelocal_verify_count - If
(default: 3):local_verify_count >= local_verify_attempts-
Get code in commit-able state
-
Commit and push with message indicating local verification failed
-
Report to user:
[ci-monitor] Local verification failed after <N> attempts. Pushed to CI for final validation. Failed: <taskIds> -
Record
, spawn subagent in wait mode (let CI be final judge)expected_commit_sha
-
- Increment
Commit Message Format
git commit -m "fix(<projects>): <brief description> Failed tasks: <taskId1>, <taskId2> Local verification: passed|enhanced|failed-pushing-to-ci"
Unverified Fix Flow (No Verification Attempted)
When
verificationStatus is FAILED, NOT_EXECUTABLE, or fix has couldAutoApplyTasks != true with no verification:
- Analyze fix content (
,suggestedFix
,suggestedFixReasoning
)taskOutputSummary - If fix looks correct → apply via MCP
- If fix needs enhancement → use Apply Locally + Enhance Flow above
- If fix is wrong → reject via MCP, fix from scratch, commit, push
Auto-Apply Eligibility
The
couldAutoApplyTasks field indicates whether the fix is eligible for automatic application:
: Fix is eligible for auto-apply. Subagent keeps polling while verification is in progress. Returnstrue
when verified, orfix_auto_applying
if verification fails.fix_available
orfalse
: Fix requires manual action (apply via MCP, apply locally, or reject)null
Key point: When subagent returns
fix_auto_applying, do NOT call MCP to apply - self-healing handles it. Just spawn a new subagent in wait mode.
Apply vs Reject vs Apply Locally
- Apply via MCP: Calls
. Self-healing agent applies the fix in CI and a new CIPE spawns automatically. No local git operations needed.update_self_healing_fix({ shortLink, action: "APPLY" }) - Apply Locally: Runs
. Applies the patch to your local working directory and sets state tonx apply-locally <shortLink>
. Use this when you want to enhance the fix before pushing.APPLIED_LOCALLY - Reject via MCP: Calls
. Marks fix as rejected. Use only when the fix is completely wrong and you'll fix from scratch.update_self_healing_fix({ shortLink, action: "REJECT" })
Apply Locally + Enhance Flow
When the fix needs enhancement (use
nx apply-locally, NOT reject):
-
Apply the patch locally:
(this also updates state tonx apply-locally <shortLink>
)APPLIED_LOCALLY -
Make additional changes as needed
-
Commit and push:
git add -A git commit -m "fix: resolve <failedTaskIds>" git push origin $(git branch --show-current) -
Loop to poll for new CIPE
Reject + Fix From Scratch Flow
When the fix is completely wrong:
-
Call MCP to reject:
update_self_healing_fix({ shortLink, action: "REJECT" }) -
Fix the issue from scratch locally
-
Commit and push:
git add -A git commit -m "fix: resolve <failedTaskIds>" git push origin $(git branch --show-current) -
Loop to poll for new CIPE
Environment Issue Handling
When
failureClassification == 'ENVIRONMENT_STATE':
- Call MCP to request rerun:
update_self_healing_fix({ shortLink, action: "RERUN_ENVIRONMENT_STATE" }) - New CIPE spawns automatically (no local git operations needed)
- Loop to poll for new CIPE with
setpreviousCipeUrl
No-New-CIPE Handling
When
status == 'no_new_cipe':
This means the expected CIPE was never created - CI likely failed before Nx tasks could run.
-
Report to user:
[ci-monitor] No CI attempt for <sha> after 10 min. Check CI provider for pre-Nx failures (install, checkout, auth). Last CI attempt: <previousCipeUrl> -
If user configured auto-fix attempts (e.g.,
):--auto-fix-workflow-
Detect package manager: check for
,pnpm-lock.yaml
,yarn.lockpackage-lock.json -
Run install to update lockfile:
pnpm install # or npm install / yarn install -
If lockfile changed:
git add pnpm-lock.yaml # or appropriate lockfile git commit -m "chore: update lockfile" git push origin $(git branch --show-current) -
Record new commit SHA, loop to poll with
expectedCommitSha
-
-
Otherwise: Exit with
status, providing guidance for user to investigateno_new_cipe
Imported: Exit Conditions
Exit the monitoring loop when ANY of these conditions are met:
| Condition | Exit Type |
|---|---|
CI passes () | Success |
| Max CIPE cycles reached | Timeout |
| Max duration reached | Timeout |
| 3 consecutive no-progress iterations | Circuit breaker |
| No fix available and local fix not possible | Failure |
| No new CIPE and auto-fix not configured | Pre-CIPE failure |
| User cancels | Cancelled |
Imported: Main Loop
Step 1: Initialize Tracking
cycle_count = 0 start_time = now() no_progress_count = 0 local_verify_count = 0 last_state = null last_cipe_url = null expected_commit_sha = null
Step 2: Spawn Subagent
Spawn the
ci-watcher subagent to poll CI status:
Fresh start (first spawn, no expected CIPE):
Task( agent: "ci-watcher", prompt: "Monitor CI for branch '<branch>'. Subagent timeout: <subagent-timeout> minutes. New-CIPE timeout: <new-cipe-timeout> minutes. Verbosity: <verbosity>." )
After action that triggers new CIPE (wait mode):
Task( agent: "ci-watcher", prompt: "Monitor CI for branch '<branch>'. Subagent timeout: <subagent-timeout> minutes. New-CIPE timeout: <new-cipe-timeout> minutes. Verbosity: <verbosity>. WAIT MODE: A new CIPE should spawn. Ignore old CIPE until new one appears. Expected commit SHA: <expected_commit_sha> Previous CIPE URL: <last_cipe_url>" )
Step 3: Handle Subagent Response
When subagent returns:
- Check the returned status
- Look up default behavior in the table above
- Check if user instructions override the default
- Execute the appropriate action
- If action expects new CIPE, update tracking (see Step 3a)
- If action results in looping, go to Step 2
Step 3a: Track State for New-CIPE Detection
After actions that should trigger a new CIPE, record state before looping:
| Action | What to Track | Subagent Mode |
|---|---|---|
| Fix auto-applying | | Wait mode |
| Apply via MCP | | Wait mode |
| Apply locally + push | | Wait mode |
| Reject + fix + push | | Wait mode |
| Fix failed + local fix + push | | Wait mode |
| No fix + local fix + push | | Wait mode |
| Environment rerun | | Wait mode |
| No-new-CIPE + auto-fix + push | | Wait mode |
CRITICAL: When passing
expectedCommitSha or last_cipe_url to the subagent, it enters wait mode:
- Subagent will completely ignore the old/stale CIPE
- Subagent will only wait for new CIPE to appear
- Subagent will NOT return to main agent with stale CIPE data
- Once new CIPE detected, subagent switches to normal polling
Why wait mode matters for context preservation: Stale CIPE data can be very large (task output summaries, suggested fix patches, reasoning). If subagent returns this to main agent, it pollutes main agent's context with useless data since we already processed that CIPE. Wait mode keeps stale data in the subagent, never sending it to main agent.
Step 4: Progress Tracking
After each action:
- If state changed significantly → reset
no_progress_count = 0 - If state unchanged →
no_progress_count++ - On new CI attempt detected → reset
local_verify_count = 0
Imported: Status Reporting
Based on verbosity level:
| Level | What to Report |
|---|---|
| Only final result (success/failure/timeout) |
| State changes + periodic updates ("Cycle N | Elapsed: Xm | Status: ...") |
| All of medium + full subagent responses, git outputs, MCP responses |
Imported: Error Handling
| Error | Action |
|---|---|
| Git rebase conflict | Report to user, exit |
fails | Report to user, attempt manual patch or exit |
| MCP tool error | Retry once, if fails report to user |
| Subagent spawn failure | Retry once, if fails exit with error |
| No new CIPE detected | If , try lockfile update; otherwise report to user with guidance |
| Lockfile auto-fix fails | Report to user, exit with guidance to check CI logs |