axiom-audit
Audit Axiom logs to identify and prioritize errors and warnings, research probable causes, and flag log smells. Use when user asks to check Axiom logs, analyze production errors, investigate log issues, or audit logging patterns.
Best use case
axiom-audit is best used when you need a repeatable AI agent workflow instead of a one-off prompt. It is especially useful for teams working in multi. Audit Axiom logs to identify and prioritize errors and warnings, research probable causes, and flag log smells. Use when user asks to check Axiom logs, analyze production errors, investigate log issues, or audit logging patterns.
Audit Axiom logs to identify and prioritize errors and warnings, research probable causes, and flag log smells. Use when user asks to check Axiom logs, analyze production errors, investigate log issues, or audit logging patterns.
Users should expect a more consistent workflow output, faster repeated execution, and less time spent rewriting prompts from scratch.
Practical example
Example input
Use the "axiom-audit" skill to help with this workflow task. Context: Audit Axiom logs to identify and prioritize errors and warnings, research probable causes, and flag log smells. Use when user asks to check Axiom logs, analyze production errors, investigate log issues, or audit logging patterns.
Example output
A structured workflow result with clearer steps, more consistent formatting, and an output that is easier to reuse in the next run.
When to use this skill
- Use this skill when you want a reusable workflow rather than writing the same prompt again and again.
When not to use this skill
- Do not use this when you only need a one-off answer and do not need a reusable workflow.
- Do not use it if you cannot install or maintain the related files, repository context, or supporting tools.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/axiom-audit/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How axiom-audit Compares
| Feature / Agent | axiom-audit | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Audit Axiom logs to identify and prioritize errors and warnings, research probable causes, and flag log smells. Use when user asks to check Axiom logs, analyze production errors, investigate log issues, or audit logging patterns.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
Related Guides
AI Agent for Product Research
Browse AI agent skills for product research, competitive analysis, customer discovery, and structured product decision support.
AI Agent for SaaS Idea Validation
Use AI agent skills for SaaS idea validation, market research, customer discovery, competitor analysis, and documenting startup hypotheses.
SKILL.md Source
# Axiom Logs Audit Skill
Systematically audit Axiom logs to identify, prioritize, and research errors and warnings.
## Setup
**Install axiom-mcp:**
```bash
go install github.com/axiomhq/axiom-mcp@latest
```
**Install mcptools:**
```bash
# macOS
brew tap f/mcptools
brew install mcp
# Windows/Linux
go install github.com/f/mcptools/cmd/mcptools@latest
```
**Set credentials:**
```bash
export AXIOM_TOKEN="xaat-your-token"
export AXIOM_ORG_ID="your-org-id" # Optional
```
Find credentials in repo:
```bash
grep -r "AXIOM" . --include="*.env*" --include="*.config.*"
```
## Usage
**List datasets:**
```bash
mcp call listDatasets --params '{"arguments":{}}' ~/go/bin/axiom-mcp
```
**Query APL:**
```bash
# Query errors
mcp call queryApl --params '{"arguments":{"dataset":"logs","apl":"['\''now-24h'\'':now] | where level == \"error\" | summarize count() by message"}}' ~/go/bin/axiom-mcp
# Query warnings
mcp call queryApl --params '{"arguments":{"dataset":"logs","apl":"['\''now-24h'\'':now] | where level == \"warn\" | summarize count() by message"}}' ~/go/bin/axiom-mcp
```
**Interactive shell (recommended for multiple queries):**
```bash
mcp shell ~/go/bin/axiom-mcp
```
## Audit Process
### 1. Identify Dataset
```bash
mcp call listDatasets --params '{"arguments":{}}' ~/go/bin/axiom-mcp
```
Or search codebase for dataset names:
```bash
grep -r "axiom.*dataset" . --include="*.ts" --include="*.js"
```
### 2. Query Errors & Warnings
**Errors:**
```apl
['now-24h':now]
| where level in ("error", "ERROR", "fatal", "FATAL")
| summarize count() by error_message=coalesce(_error, message, msg), error_type
| order by count_desc
```
**Warnings:**
```apl
['now-24h':now]
| where level in ("warn", "WARNING", "WARN")
| summarize count() by message
| order by count_desc
```
**Error trends:**
```apl
['now-7d':now]
| where level in ("error", "ERROR", "fatal", "FATAL")
| summarize count() by bin_auto(_time), error_type
```
### 3. Prioritize Errors
**Priority scoring:**
- **P0**: CRITICAL + High Frequency (>100/hour)
- **P1**: CRITICAL + Low Frequency OR HIGH + High Frequency
- **P2**: HIGH + Low Frequency OR MEDIUM + High Frequency
- **P3**: MEDIUM + Low Frequency
- **P4**: LOW
**Severity levels:**
- **CRITICAL**: Data loss, security issues, service down
- **HIGH**: Feature broken, user-facing errors
- **MEDIUM**: Degraded functionality, intermittent issues
- **LOW**: Minor warnings, non-critical issues
### 4. Research Each Error
For each unique error:
1. Find source in codebase using Grep
2. Read surrounding code to understand context
3. Identify probable cause (code bug, infrastructure, data, integration, config)
4. Collect evidence from code patterns and related errors
5. Flag log smells (see below)
### 5. Flag Log Smells
- **Excessive logging**: Same message flooding logs
- **Missing context**: No request ID, user ID, trace info
- **Poor error messages**: Vague or unhelpful
- **Logged but not handled**: Errors logged then ignored
- **Inconsistent logging**: Different levels for similar issues
- **Sensitive data exposure**: PII, secrets, tokens in logs
- **No stack traces**: Errors without stack traces
- **Generic catch-all handlers**: Hiding real issues
### 6. Generate Report
Create `.audits/axiom-audit-[timestamp].md` with:
```markdown
# Axiom Logs Audit Report
**Date**: [timestamp]
**Time Range**: [start] to [end]
**Total Errors**: X | **Total Warnings**: Y
## Executive Summary
- **P0 Issues**: X (immediate action required)
- **P1 Issues**: Y (urgent)
- **P2 Issues**: Z
- **P3+ Issues**: W
## Prioritized Error List
### P0: [Error Type]
**Occurrences**: X times | **Trend**: [↑/→/↓]
**First Seen**: [timestamp] | **Last Seen**: [timestamp]
**Error Message**:
```
[Actual error message]
```
**Source**: `path/to/file.ts:line`
**Probable Cause**: [Analysis]
**Evidence**:
- [Code patterns, related errors]
---
### P1: [Next Error]
[Same structure]
---
## Log Smells Detected
### Excessive Logging
- `[error pattern]` - X,000 times in Y minutes
- **Location**: `file.ts:line`
### Sensitive Data Exposure
- User emails logged in `auth.ts:42`
- **Impact**: Privacy/compliance risk
---
## Error Categories
**Infrastructure**: X% | **Code Bugs**: Y% | **Data Issues**: Z% | **External**: W%
---
## Trend Analysis
**New Errors**: [Errors that appeared recently]
**Increasing**: [Errors with rising frequency]
**Resolved**: [Errors that stopped]
```
### 7. Provide Summary
Brief summary for user highlighting:
- P0/P1 count and top issues
- Critical log smells
- Category breakdown
- Link to full report
## Critical Rules
- **NEVER EDIT FILES** - Audit only, no fixes
- **NEVER ASSUME** - Research each error in codebase
- **DO PRIORITIZE** - Use consistent priority scoring
- **DO IDENTIFY PATTERNS** - Group similar errors
- **DO FLAG LOG SMELLS** - Document logging anti-patterns
- **DO PROVIDE EVIDENCE** - Support analysis with code/data
## Success Criteria
✅ All errors/warnings extracted from Axiom
✅ Prioritized with severity + frequency scoring
✅ Root cause research for each error type
✅ Log smells identified
✅ Categorization and trend analysis complete
✅ Structured report generatedRelated Skills
audit-website
Audit websites for SEO, technical, content, and security issues using squirrelscan CLI. Returns LLM-optimized reports with health scores, broken links, meta tag analysis, and actionable recommendations. Use when analyzing websites, debugging SEO issues, or checking site health.
wcag-audit-patterns
Conduct WCAG 2.2 accessibility audits with automated testing, manual verification, and remediation guidance. Use when auditing websites for accessibility, fixing WCAG violations, or implementing accessible design patterns.
seo-content-auditor
Analyzes provided content for quality, E-E-A-T signals, and SEO best practices. Scores content and provides improvement recommendations based on established guidelines. Use PROACTIVELY for content review.
security-auditor
Expert security auditor specializing in DevSecOps, comprehensive cybersecurity, and compliance frameworks. Masters vulnerability assessment, threat modeling, secure authentication (OAuth2/OIDC), OWASP standards, cloud security, and security automation. Handles DevSecOps integration, compliance (GDPR/HIPAA/SOC2), and incident response. Use PROACTIVELY for security audits, DevSecOps, or compliance implementation.
production-code-audit
Autonomously deep-scan entire codebase line-by-line, understand architecture and patterns, then systematically transform it to production-grade, corporate-level professional quality with optimizations
laravel-security-audit
Security auditor for Laravel applications. Analyzes code for vulnerabilities, misconfigurations, and insecure practices using OWASP standards and Laravel security best practices.
dependency-management-deps-audit
You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain security. Analyze project dependencies for known vulnerabilities, licensing issues, outdated packages, and provide actionable remediation strategies.
codebase-cleanup-deps-audit
You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain security. Analyze project dependencies for known vulnerabilities, licensing issues, outdated packages, and provide actionable remediation strategies.
aws-security-audit
Comprehensive AWS security posture assessment using AWS CLI and security best practices
accessibility-compliance-accessibility-audit
You are an accessibility expert specializing in WCAG compliance, inclusive design, and assistive technology compatibility. Conduct audits, identify barriers, and provide remediation guidance.
minimal-run-and-audit
Trusted-lane execution and reporting skill for README-first AI repo reproduction. Use when the task is specifically to capture or normalize evidence from the selected smoke test or documented inference or evaluation command and write standardized `repro_outputs/` files, including patch notes when repository files changed. Do not use for training execution, initial repo intake, generic environment setup, paper lookup, target selection, or end-to-end orchestration by itself.
claude-settings-audit
Analyze a repository to generate recommended Claude Code settings.json permissions. Use when setting up a new project, auditing existing settings, or determining which read-only bash commands to allow. Detects tech stack, build tools, and monorepo structure.