Oh-my-agent oma-scm
SCM (software configuration management) and Git — branching, merges, conflicts, worktrees, baselines, audit readiness, plus Conventional Commits and safe staging.
git clone https://github.com/first-fluke/oh-my-agent
T=$(mktemp -d) && git clone --depth=1 https://github.com/first-fluke/oh-my-agent "$T" && mkdir -p ~/.claude/skills && cp -r "$T/.agents/skills/oma-scm" ~/.claude/skills/first-fluke-oh-my-agent-oma-scm && rm -rf "$T"
.agents/skills/oma-scm/SKILL.mdSoftware configuration management — SCM (oma-scm
)
oma-scmThis skill is the single place for configuration management (CM) on a software repo and for Conventional Commits / safe staging.
When to use
- Commits: “commit this”,
, message type/scope, splitting staged changes into multiple commits./scm - CM / Git: branching (gitflow, GitHub Flow, GitLab Flow, trunk-based), protected branches, merge queue, merge conflicts, rebase, cherry-pick, worktrees, submodules/subtrees, tags and releases.
- Governance: issue/ADR links, breaking-change footers, changelog or release-tool alignment.
- Audit posture: signed commits, CI before merge, secret-sensitive paths.
Configuration
| File | Role |
|---|---|
| Conventional Commit types, branch prefixes, message rules |
| CM pointers — documented process, branching model, baselines, changelog |
Operating mode (choose first)
Quick Path (commit-focused, default)
Use this when the user intent is mainly "commit this safely."
- Follow Conventional Commits section only
- Stage explicit files only
- Validate message type/scope/length from
commit-config.yaml - Stop after safe commit unless user asks CM/governance operations
Full CM Path (repo governance / risky history operations)
Use this when the user asks about branching strategy, merges, rebase/cherry-pick, worktrees, release refs, CODEOWNERS, or audit posture.
- Run CM workflows in order (Planning -> Identification -> Control -> Status accounting -> Verification)
- Add onboarding risk scan when inheriting or auditing a repository
- Include commit governance from Conventional Commits when creating commits
- For large-scope merge operations, use risk scoring and Ask Gate criteria from
../../workflows/scm.md
CM process map (software)
| CM function | Intent | Typical artefacts / actions |
|---|---|---|
| Management & planning | Agreed rules | , , |
| Configuration identification | What is managed, naming | Branch/tag rules, version files, , LFS |
| Configuration control | Reviewed change | PRs, checks, issue links, footers |
| Status accounting | As-built truth | / release refs, , tags, CI status |
| Verification & audit | Evidence | CI logs, signed commits, lockfiles / SBOM policy |
CM workflows (use before risky history operations)
1) Planning
- Read
and files listed undercm-config.yaml
.documented_process - If missing, infer from
/CONTRIBUTING.md
; state assumptions.README - Confirm branching model and whether force-push on shared branches is allowed (default: not without explicit approval).
2) Identification
- Canonical refs: default branch, release branches/tags, version sources (
, etc.).package.json
/ LFS for binaries and generated assets..gitattributes- Branch names vs
commit-config.yaml
when the project uses them.branch_prefixes
3) Control
- Small, reviewable units; align commits with PR / issue intent.
- Conflicts:
,merge-base
, resolve markers, tests; suggestgit status
when conflicts repeat.rerere - Worktrees:
; merge/rebase from the target branch’s checkout; all worktrees share one object database.git worktree add - Do not rewrite shared history without maintainer approval; prefer
if force-push is unavoidable.--force-with-lease
4) Status accounting
: branch, remote tracking, ahead/behind, merge state.git status -sb- Relate last tag / release branch to
or tooling (semantic-release, release-please, changesets) if present.CHANGELOG
5) Verification & audit
- Required CI and
when merge queue applies.merge_group - Never stage/commit secrets (
, keys, raw tokens)..env - Call out signed-commit expectations when the org cares about verification badges.
CODEOWNERS maintenance checklist
- Validate CODEOWNERS file exists (prefer
)..github/CODEOWNERS - Ensure critical paths are explicitly owned (not only fallback
).* - Ensure owners are active and mapped to current teams.
- Confirm branch protection requires CODEOWNERS review where needed.
- Flag overlapping/ambiguous rules that can hide intended owners.
Read
change_governance.require_codeowners and ownership.* in cm-config.yaml when present.
6) Onboarding risk scan (optional, recommended)
Use this quick scan when joining or inheriting a repository to identify risky areas before major changes.
- High churn files in
window.lookback - Ownership concentration / bus-factor signals.
- Bug hotspot files from fix-related history.
- Velocity trend by month.
- Revert/hotfix/emergency frequency.
Read thresholds from
cm-config.yaml onboarding_metrics when present and cite caveats:
- squash merge teams can distort ownership metrics,
- weak commit labeling reduces hotspot accuracy,
- monorepo commit counts can bias subsystem interpretation.
Conventional Commits
Commit types
| Type | Description | Branch Prefix |
|---|---|---|
| feat | New feature | feature/ |
| fix | Bug fix | fix/ |
| refactor | Code improvement | refactor/ |
| docs | Documentation changes | docs/ |
| test | Test additions/modifications | test/ |
| chore | Build, configuration, etc. | chore/ |
| style | Code style changes | style/ |
| perf | Performance improvements | perf/ |
Commit format
<type>(<scope>): <description> [optional body] Co-Authored-By: First Fluke <our.first.fluke@gmail.com>
Commit workflow
Step 1: Analyze changes
git status git diff --staged git log --oneline -5
Step 1.5: Split by feature (if needed)
If changes span multiple features/domains, split commits by feature.
Split when: different scopes, different types, logically independent work.
Do not split when: one feature, few files (≤5), or user asked for a single commit.
Step 2: Determine type
- New capability →
· Bug fix →feat
· Structure-only →fix
· Docs only →refactor
· Tests →docs
· Build/config →testchore
Step 3: Scope
Use module/component:
feat(auth):, fix(api):, or omit: chore: update dependencies
Step 4: Description
≤72 chars (per
commit-config.yaml), imperative mood, lowercase start, no trailing period.
Step 5: Execute commit
Show the message, then commit with explicit paths:
git add <specific-files> git commit -m "$(cat <<'EOF' <type>(<scope>): <description> [optional body] EOF )"
If HEREDOC is unstable in your shell (or body is long), use file-based commit input:
git add <specific-files> cat > /tmp/oma-commit-msg.txt <<'EOF' <type>(<scope>): <description> [optional body] EOF git commit -F /tmp/oma-commit-msg.txt
Use HEREDOC by default, and switch to
-F for long or flaky terminal sessions.
References
config/commit-config.yamlconfig/cm-config.yamlresources/conventional-commits.mdresources/onboarding-risk-signals.mdresources/codeowners-playbook.md
Important notes
- NEVER
orgit add -A
without explicit user permission.git add . - NEVER commit likely-secret material.
- ALWAYS stage by explicit paths; tie non-trivial CM work to the five CM rows above, even briefly.