{ "$schema": "internal://schemas/plugin.lock.v1.json", "pluginId": "gh:tachyon-beep/skillpacks:plugins/axiom-system-archaeologist", "normalized": { "repo": null, "ref": "refs/tags/v20251128.0", "commit": "9b73880639989805a21f1d2d51ea7159bb6e4685", "treeHash": "a0b025306866f14daa93bc823087f5e65612e1d897ffc9e193b3d463944dc4bc", "generatedAt": "2025-11-28T10:28:31.152300Z", "toolVersion": "publish_plugins.py@0.2.0" }, "origin": { "remote": "git@github.com:zhongweili/42plugin-data.git", "branch": "master", "commit": "aa1497ed0949fd50e99e70d6324a29c5b34f9390", "repoRoot": "/Users/zhongweili/projects/openmind/42plugin-data" }, "manifest": { "name": "axiom-system-archaeologist", "description": "Deep architectural analysis of existing codebases through autonomous subagent-driven exploration - produces comprehensive documentation, C4 diagrams, subsystem catalogs, code quality assessments, refactoring priorities, and architect handover reports", "version": "1.1.0" }, "content": { "files": [ { "path": "README.md", "sha256": "ada1fa9bf30914a3c122e03697acbe7a8e0dd63449a714951c6fd56685d7fee6" }, { "path": ".claude-plugin/plugin.json", "sha256": "5152b8e739539e59369e22d5ed8bb0e8fdd784a89d462a0a025f2c0f753bd9e2" }, { "path": "skills/using-system-archaeologist/generating-architecture-diagrams.md", "sha256": "423d02bee4ff4264627cf4d759d7f3c33e2f3182cc891fc8ca349252133e4273" }, { "path": "skills/using-system-archaeologist/assessing-code-quality.md", "sha256": "c4c6e0be3e959e4e7b99122af7526a8357ee14ef6dd43d93915080ba27a15665" }, { "path": "skills/using-system-archaeologist/analyzing-unknown-codebases.md", "sha256": "ac04cff9d0cc8e039874e29cb2c80ae6d34379442e6108382b1ecc1556e0ab20" }, { "path": "skills/using-system-archaeologist/creating-architect-handover.md", "sha256": "49971ac205519096889b5dfbfc33c6eafd3acab4ffc46760c097417c2e499232" }, { "path": "skills/using-system-archaeologist/documenting-system-architecture.md", "sha256": "d14029178e964dccac97ea700b0c15b9fc1272cce8260e41d83348a185aeed6e" }, { "path": "skills/using-system-archaeologist/validating-architecture-analysis.md", "sha256": "b6b10f9c6e7aaa4a5154bbef727a5bcc645cf342d5b452e73453455bdbe95e3a" }, { "path": "skills/using-system-archaeologist/SKILL.md", "sha256": "3bc877559c237a5012526b1e7abb28b68b80efc4893a81bd80609d05494e7e0a" }, { "path": "skills/using-system-archaeologist/.archive/README.md", "sha256": "5395a43116c9843f0a59da4a7efc124f41050bc846b29cb86c71b3e881d077bc" }, { "path": "skills/using-system-archaeologist/.archive/untested/creating-architect-handover-v1-untested.md", "sha256": "053ce73971205d9358caf022c6dee73b6737cd898c340f6c7835b4c587e6406f" }, { "path": "skills/using-system-archaeologist/.archive/untested/assessing-code-quality-v1-untested.md", "sha256": "fd3b351dff4d31346313ebaae229a5762c36b1972c22ca3e1e0cb15bea70d1d4" } ], "dirSha256": "a0b025306866f14daa93bc823087f5e65612e1d897ffc9e193b3d463944dc4bc" }, "security": { "scannedAt": null, "scannerVersion": null, "flags": [] } }