EasyPlatform prove-fix
[Code Quality] Prove fix correctness with code proof traces, confidence scoring, and stack-trace-style evidence chains. Use after /fix in bugfix workflows.
git clone https://github.com/duc01226/EasyPlatform
T=$(mktemp -d) && git clone --depth=1 https://github.com/duc01226/EasyPlatform "$T" && mkdir -p ~/.claude/skills && cp -r "$T/.claude/skills/prove-fix" ~/.claude/skills/duc01226-easyplatform-prove-fix && rm -rf "$T"
.claude/skills/prove-fix/SKILL.md<!-- SYNC:critical-thinking-mindset -->[IMPORTANT] Use
to break ALL work into small tasks BEFORE starting — including tasks for each file read. This prevents context loss from long files. For simple tasks, AI MUST ATTENTION ask user whether to skip.TaskCreate
<!-- /SYNC:critical-thinking-mindset --> <!-- SYNC:ai-mistake-prevention -->Critical Thinking Mindset — Apply critical thinking, sequential thinking. Every claim needs traced proof, confidence >80% to act. Anti-hallucination: Never present guess as fact — cite sources for every claim, admit uncertainty freely, self-check output for errors, cross-reference independently, stay skeptical of own confidence — certainty without evidence root of all hallucination.
<!-- /SYNC:ai-mistake-prevention -->AI Mistake Prevention — Failure modes to avoid on every task:
- Check downstream references before deleting. Deleting components causes documentation and code staleness cascades. Map all referencing files before removal.
- Verify AI-generated content against actual code. AI hallucinates APIs, class names, and method signatures. Always grep to confirm existence before documenting or referencing.
- Trace full dependency chain after edits. Changing a definition misses downstream variables and consumers derived from it. Always trace the full chain.
- Trace ALL code paths when verifying correctness. Confirming code exists is not confirming it executes. Always trace early exits, error branches, and conditional skips — not just happy path.
- When debugging, ask "whose responsibility?" before fixing. Trace whether bug is in caller (wrong data) or callee (wrong handling). Fix at responsible layer — never patch symptom site.
- Assume existing values are intentional — ask WHY before changing. Before changing any constant, limit, flag, or pattern: read comments, check git blame, examine surrounding code.
- Verify ALL affected outputs, not just the first. Changes touching multiple stacks require verifying EVERY output. One green check is not all green checks.
- Holistic-first debugging — resist nearest-attention trap. When investigating any failure, list EVERY precondition first (config, env vars, DB names, endpoints, DI registrations, data preconditions), then verify each against evidence before forming any code-layer hypothesis.
- Surgical changes — apply the diff test. Bug fix: every changed line must trace directly to the bug. Don't restyle or improve adjacent code. Enhancement task: implement improvements AND announce them explicitly.
- Surface ambiguity before coding — don't pick silently. If request has multiple interpretations, present each with effort estimate and ask. Never assume all-records, file-based, or more complex path.
Prerequisites: MUST ATTENTION READ before executing:
<!-- SYNC:understand-code-first --><!-- /SYNC:understand-code-first --> <!-- SYNC:fix-layer-accountability -->Understand Code First — HARD-GATE: Do NOT write, plan, or fix until you READ existing code.
- Search 3+ similar patterns (
/grep) — citeglobevidencefile:line- Read existing files in target area — understand structure, base classes, conventions
- Run
whenpython .claude/scripts/code_graph trace <file> --direction both --jsonexists.code-graph/graph.db- Map dependencies via
orconnections— know what depends on your targetcallers_of- Write investigation to
for non-trivial tasks (3+ files).ai/workspace/analysis/- Re-read analysis file before implementing — never work from memory alone
- NEVER invent new patterns when existing ones work — match exactly or document deviation
BLOCKED until:
Read target files- [ ]Grep 3+ patterns- [ ]Graph trace (if graph.db exists)- [ ]Assumptions verified with evidence- [ ]
<!-- /SYNC:fix-layer-accountability -->Fix-Layer Accountability — NEVER fix at the crash site. Trace the full flow, fix at the owning layer.
AI default behavior: see error at Place A → fix Place A. This is WRONG. The crash site is a SYMPTOM, not the cause.
MANDATORY before ANY fix:
- Trace full data flow — Map the complete path from data origin to crash site across ALL layers (storage → backend → API → frontend → UI). Identify where the bad state ENTERS, not where it CRASHES.
- Identify the invariant owner — Which layer's contract guarantees this value is valid? That layer is responsible. Fix at the LOWEST layer that owns the invariant — not the highest layer that consumes it.
- One fix, maximum protection — Ask: "If I fix here, does it protect ALL downstream consumers with ONE change?" If fix requires touching 3+ files with defensive checks, you are at the wrong layer — go lower.
- Verify no bypass paths — Confirm all data flows through the fix point. Check for: direct construction skipping factories, clone/spread without re-validation, raw data not wrapped in domain models, mutations outside the model layer.
BLOCKED until:
Full data flow traced (origin → crash)- [ ]Invariant owner identified with- [ ]evidencefile:lineAll access sites audited (grep count)- [ ]Fix layer justified (lowest layer that protects most consumers)- [ ]Anti-patterns (REJECT these):
- "Fix it where it crashes" — Crash site ≠ cause site. Trace upstream.
- "Add defensive checks at every consumer" — Scattered defense = wrong layer. One authoritative fix > many scattered guards.
- "Both fix is safer" — Pick ONE authoritative layer. Redundant checks across layers send mixed signals about who owns the invariant.
— Domain entity catalog, relationships, cross-service sync (read when task involves business entities/models) (content auto-injected by hook — check for [Injected: ...] header before reading)docs/project-reference/domain-entities-reference.md
External Memory: For complex or lengthy work (research, analysis, scan, review), write intermediate findings and final results to a report file in
— prevents context loss and serves as deliverable.plans/reports/
Evidence Gate: MANDATORY IMPORTANT MUST ATTENTION — every claim, finding, and recommendation requires
proof or traced evidence with confidence percentage (>80% to act, <80% must verify first).file:line
Quick Summary
Goal: Prove (or disprove) that each fix change is correct by building a code proof trace — like a debugger stack trace — with confidence percentages per change.
Workflow:
- Inventory — List every code change made by the fix (file:line, before/after)
- Trace — For each change, build a proof chain tracing from symptom → root cause → fix
- Score — Assign confidence percentage per change with evidence
- Verify — Cross-check fix against edge cases and side effects
- Verdict — Overall fix confidence and any remaining risks
Key Rules:
- Every claim MUST ATTENTION have
evidence — no exceptionsfile:line - Each change gets its OWN proof trace and confidence score
- If ANY change scores below 80%, flag it and recommend additional investigation
- This step is non-negotiable after
— never skip it/fix
Frontend/UI Context (if applicable)
<!-- SYNC:ui-system-context -->When this task involves frontend or UI changes,
<!-- /SYNC:ui-system-context -->UI System Context — For ANY task touching
,.ts,.html, or.scssfiles:.cssMUST ATTENTION READ before implementing:
— component base classes, stores, formsdocs/project-reference/frontend-patterns-reference.md — BEM methodology, SCSS variables, mixins, responsivedocs/project-reference/scss-styling-guide.md — design tokens, component inventory, iconsdocs/project-reference/design-system/README.mdReference
for project-specific paths.docs/project-config.json
- Component patterns:
docs/project-reference/frontend-patterns-reference.md - Styling/BEM guide:
docs/project-reference/scss-styling-guide.md - Design system tokens:
docs/project-reference/design-system/README.md
Be skeptical. Apply critical thinking, sequential thinking. Every claim needs traced proof, confidence percentages (Idea should be more than 80%).
Prove Fix
Post-fix verification skill that builds evidence-based proof chains for every code change. Think of it as a code debugger's stack trace, but for proving WHY a fix is correct.
When to Use
- After
in bugfix, hotfix, or any fix workflow/fix - After applying code changes that fix a reported bug
- When you need to verify fix correctness before review/commit
When NOT to Use
- Before the fix is applied (use
instead)/debug - For new feature verification (use
instead)/test - For code quality review (use
instead)/code-review
Step 1: Change Inventory
List ALL changes made by the fix. For each change, document:
CHANGE #N: [short description] File: [path/to/file.ext] Lines: [start-end] Before: [code snippet — the broken version] After: [code snippet — the fixed version] Type: [root-cause-fix | secondary-fix | defensive-fix | cleanup]
Change types:
- root-cause-fix — Directly addresses the root cause of the bug
- secondary-fix — Fixes a related issue discovered during investigation
- defensive-fix — Prevents the same class of bug from recurring
- cleanup — Removed dead code or simplified logic (no behavior change)
Step 2: Proof Trace (per change)
For EACH change, build a stack-trace-style proof chain. This is the core of the skill.
Proof Trace Format
PROOF TRACE — Change #N: [description] ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ SYMPTOM (what the user sees): → [Observable behavior, e.g., "UI doesn't refresh after assigning PIC"] TRIGGER PATH (how the symptom occurs): 1. [file:line] User action → [method/event] 2. [file:line] → calls [method] 3. [file:line] → dispatches [action/event] 4. [file:line] → handler/effect [name] 5. [file:line] ← BUG HERE: [exact broken behavior] ROOT CAUSE (proven): → [One sentence: what exactly is wrong and why] → Evidence: [file:line] shows [specific code proving the bug] FIX MECHANISM (how the change fixes it): → [One sentence: what the fix does differently] → Before: [broken code path with file:line] → After: [fixed code path with file:line] WHY THIS FIX IS CORRECT: → [Reasoning backed by code evidence] → Pattern precedent: [file:line] shows same pattern working elsewhere → Framework behavior: [file:line or doc reference] confirms expected behavior EDGE CASES CHECKED: → [edge case 1]: [verified/not-verified] — [evidence] → [edge case 2]: [verified/not-verified] — [evidence] SIDE EFFECTS: → [None / List of potential side effects with evidence] CONFIDENCE: [X%] Verified: [list of verified items] Not verified: [list of unverified items, if any]
Proof Trace Rules
- Every arrow (→) MUST ATTENTION have a
reference — no exceptionsfile:line - TRIGGER PATH must be traceable — someone should be able to follow it step-by-step in the code
- Pattern precedent is REQUIRED — find at least 1 working example of the same pattern elsewhere in the codebase
- Edge cases MUST ATTENTION be enumerated — at minimum: error path, null/empty input, concurrent access
- Side effects MUST ATTENTION be assessed — what else could this change affect?
Step 3: Confidence Scoring
Each change gets an individual confidence score:
| Score | Meaning | Action Required |
|---|---|---|
| 95-100% | Full proof trace complete, all edge cases verified, pattern precedent found | Ship it |
| 80-94% | Main proof trace complete, some edge cases unverified | Ship with caveats noted |
| 60-79% | Proof trace partial, some links unverified | Flag to user — recommend additional investigation |
| <60% | Insufficient evidence | BLOCK — do not proceed until evidence gathered |
Scoring Criteria
Award points for each verified item:
| Criterion | Points | Evidence Required |
|---|---|---|
| Root cause identified with file:line | +25 | Code reference |
| Fix mechanism explained with before/after | +20 | Code diff |
| Pattern precedent found in codebase | +15 | Working example at file:line |
| Framework behavior confirmed | +10 | Framework source or docs |
| Edge cases checked (per case) | +5 each | Verification result |
| Side effects assessed | +10 | Impact analysis |
| No regressions identified | +5 | Test results or code analysis |
Total possible: 100+ (normalize to percentage)
Step 4: Cross-Verification
After individual proof traces, perform cross-change verification:
- Interaction check — Do the changes interact with each other? Could one change break another?
- Completeness check — Does the combined fix address ALL reported symptoms?
- Regression check — Could the combined changes introduce new bugs?
- Dependency check — Are there other code paths that depend on the changed behavior?
- Performance regression check — Does the fix introduce performance issues?
[IMPORTANT] Database Performance Protocol (MANDATORY):
- Paging Required — ALL list/collection queries MUST ATTENTION use pagination. NEVER load all records into memory. Verify: no unbounded
,GetAll(), orToList()withoutFind()or cursor-based paging.Skip/Take- Index Required — ALL query filter fields, foreign keys, and sort columns MUST ATTENTION have database indexes configured. Verify: entity expressions match index field order, database collections have index management methods, migrations include indexes for WHERE/JOIN/ORDER BY columns.
Step 5: Final Verdict
Produce a summary verdict:
FIX VERIFICATION VERDICT ━━━━━━━━━━━━━━━━━━━━━━━ Overall Confidence: [X%] Changes Summary: #1: [description] — [X%] ✅/⚠️/❌ #2: [description] — [X%] ✅/⚠️/❌ #N: [description] — [X%] ✅/⚠️/❌ Symbols: ✅ ≥80% (ship) | ⚠️ 60-79% (flag) | ❌ <60% (block) Remaining Risks: - [risk 1]: [likelihood] × [impact] — [mitigation] - [risk 2]: [likelihood] × [impact] — [mitigation] Verification Method: - [Manual testing required? Which scenarios?] - [Automated tests cover this? Which tests?] - [Additional monitoring needed post-deploy?] Recommendation: [SHIP / SHIP WITH CAVEATS / INVESTIGATE FURTHER / BLOCK]
Example: Proof Trace for NgRx Effect Fix
PROOF TRACE — Change #1: Move catchError inside switchMap ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ SYMPTOM: → UI doesn't refresh after assigning PIC, Job Opening, or changing stage TRIGGER PATH: 1. candidate-quick-card-v2.component.ts:445 — User clicks "Assign PIC" 2. candidate-card.container.component.ts:892 — onPersonInChargeChange($event) 3. candidate-card.effect.ts:275 — SavePersonInCharge effect 4. candidate-card.effect.ts:284 — dispatches LoadCandidateDetailsAction 5. candidate-card.effect.ts:48 ← EFFECT IS DEAD — never processes the action ROOT CAUSE: → catchError at outer pipe level (effect.ts:64) causes effect completion on ANY error → Evidence: effect.ts:43-69 shows catchError OUTSIDE switchMap → Evidence: ngrx-effects.js:156-165 confirms defaultEffectsErrorHandler only catches errors, not completions FIX MECHANISM: → Move catchError INSIDE switchMap so errors are caught per-request → Before: effect.ts:64 — catchError at outer pipe → effect COMPLETES → DEAD → After: effect.ts:52 — catchError inside switchMap → inner obs completes → outer SURVIVES WHY THIS FIX IS CORRECT: → RxJS: catchError inside switchMap catches per-emission, outer stream continues → Pattern precedent: effect.ts:120 (moveApplicationToNextState) uses same inner pattern → Framework: NgRx effects auto-resubscribe on ERROR but NOT on COMPLETION EDGE CASES: → 403 Forbidden: verified — returns SetCandidateDetails with isAllowDisplayed=false → Network timeout: verified — returns EMPTY, effect survives → Multiple rapid requests: verified — switchMap cancels previous (unchanged) SIDE EFFECTS: → None — same error handling logic, only scope changed CONFIDENCE: 95% Verified: root cause, fix mechanism, pattern precedent, framework source, all edge cases Not verified: behavior under specific proxy/auth middleware errors (very unlikely)
<!-- SYNC:graph-assisted-investigation -->
<!-- /SYNC:graph-assisted-investigation -->Graph-Assisted Investigation — MANDATORY when
exists..code-graph/graph.dbHARD-GATE: MUST ATTENTION run at least ONE graph command on key files before concluding any investigation.
Pattern: Grep finds files →
reveals full system flow → Grep verifies detailstrace --direction both
Task Minimum Graph Action Investigation/Scout on 2-3 entry filestrace --direction bothFix/Debug on buggy function +callers_oftests_forFeature/Enhancement on files to be modifiedconnectionsCode Review on changed functionstests_forBlast Radius trace --direction downstreamCLI:
. Usepython .claude/scripts/code_graph {command} --jsonfirst (10-30x less noise), then--node-mode filefor detail.--node-mode function
Run
to prove fix doesn't break downstream.python .claude/scripts/code_graph trace <file> --direction downstream --json
Graph Intelligence (RECOMMENDED if graph.db exists)
If
.code-graph/graph.db exists, enhance analysis with structural queries:
- Verify test coverage:
python .claude/scripts/code_graph query tests_for <function> --json - Trace affected code paths:
python .claude/scripts/code_graph query callers_of <function> --json - Batch analysis:
python .claude/scripts/code_graph batch-query file1 file2 --json
Graph-Trace for Fix Verification
When graph DB is available, use
trace to PROVE the fix doesn't break downstream consumers:
— verify all downstream consumers, event handlers, and bus message listeners are unaffectedpython .claude/scripts/code_graph trace <fixed-file> --direction downstream --json
— full context: what triggered the bug (upstream) + what the fix affects (downstream)python .claude/scripts/code_graph trace <fixed-file> --direction both --json- Include trace results as evidence in the proof chain
Integration with Other Skills
This skill is the mandatory verification gate between
/fix and /code-simplifier in fix workflows.
Workflow position:
... → /fix → /prove-fix → /code-simplifier → /review-changes → ...
If proof trace reveals issues:
- Score ≥80%: proceed to next step
- Score 60-79%: ask user whether to proceed or investigate further
- Score <60%: BLOCK — return to
or/debug
step/fix
<prove-context>$ARGUMENTS</prove-context>
Workflow Recommendation
MANDATORY IMPORTANT MUST ATTENTION — NO EXCEPTIONS: If you are NOT already in a workflow, you MUST ATTENTION use
to ask the user. Do NOT judge task complexity or decide this is "simple enough to skip" — the user decides whether to use a workflow, not you:AskUserQuestion
- Activate
workflow (Recommended) — scout → investigate → debug → plan → fix → prove-fix → review → testbugfix- Execute
directly — run this skill standalone/prove-fix
Next Steps
MANDATORY IMPORTANT MUST ATTENTION — NO EXCEPTIONS after completing this skill, you MUST ATTENTION use
AskUserQuestion to present these options. Do NOT skip because the task seems "simple" or "obvious" — the user decides:
- "/code-simplifier (Recommended)" — Clean up fix implementation
- "/integration-test" — Generate/update regression integration tests
- "/workflow-review-changes" — Review all changes before commit
- "Skip, continue manually" — user decides
Closing Reminders
MANDATORY IMPORTANT MUST ATTENTION break work into small todo tasks using
TaskCreate BEFORE starting.
MANDATORY IMPORTANT MUST ATTENTION validate decisions with user via AskUserQuestion — never auto-decide.
MANDATORY IMPORTANT MUST ATTENTION add a final review todo task to verify work quality.
MANDATORY IMPORTANT MUST ATTENTION READ the following files before starting:
<!-- SYNC:understand-code-first:reminder -->
- IMPORTANT MUST ATTENTION search 3+ existing patterns and read code BEFORE any modification. Run graph trace when graph.db exists. <!-- /SYNC:understand-code-first:reminder --> <!-- SYNC:ui-system-context:reminder -->
- IMPORTANT MUST ATTENTION read frontend-patterns-reference, scss-styling-guide, design-system/README before any UI change. <!-- /SYNC:ui-system-context:reminder --> <!-- SYNC:graph-assisted-investigation:reminder -->
- IMPORTANT MUST ATTENTION run at least ONE graph command on key files when graph.db exists. Pattern: grep → graph trace → grep verify. <!-- /SYNC:graph-assisted-investigation:reminder --> <!-- SYNC:fix-layer-accountability:reminder -->
- IMPORTANT MUST ATTENTION trace full data flow and fix at the owning layer, not the crash site. Audit all access sites before adding
. <!-- /SYNC:fix-layer-accountability:reminder --> <!-- SYNC:critical-thinking-mindset:reminder -->?. - MUST ATTENTION apply critical thinking — every claim needs traced proof, confidence >80% to act. Anti-hallucination: never present guess as fact. <!-- /SYNC:critical-thinking-mindset:reminder --> <!-- SYNC:ai-mistake-prevention:reminder -->
- MUST ATTENTION apply AI mistake prevention — holistic-first debugging, fix at responsible layer, surface ambiguity before coding, re-read files after compaction. <!-- /SYNC:ai-mistake-prevention:reminder -->