vt-v-audit¶
Audit VMS vault content quality. Validates YAML frontmatter compliance, checks cross-reference integrity, scores content depth, detects skeleton content, and calculates compliance-score. Produces a structured audit report. Use after content development batches or for periodic quality assessment.
Plugin: vms
Category: Other
Command: /vt-v-audit
VMS Content Audit¶
This skill validates vault content quality across multiple dimensions and produces a structured audit report.
Process¶
- Determine scope from argument:
--full— Audit entire vault (all domains)--changed— Audit only git-changed files (git diff --name-only)--cwp CWP-NN— Audit only files belonging to a specific CWP (resolved viacwp_file_resolver.py)--snapshot— Output machine-readable JSON metrics (combine with--cwpor--full)<path>— Audit specific path or glob- Run audit scripts from
scripts/directory: yaml_audit.py— YAML schema validationcross_ref_checker.py— Wiki-link integrity (forward links)impact_analyzer.py— Reverse reference integrity (inbound links)reifegrad_validator.py— Reifegrad cross-validation across shared norm_refsfield_consistency_checker.py— Review date and approved_by consistency across shared norm_refs
4b. Reifegrad Cross-Validation¶
- Run
reifegrad_validator.pyto detect maturity level inconsistencies - For each
norm_ref, collects all control files and their reifegrad values - Flags when reifegrad spread exceeds threshold (default: >1 level difference)
- Skips
reifegrad: naentries and non-control file types - Output includes affected files, min/max reifegrad, and assessment dates
5. Reverse Reference Integrity¶
- Run
impact_analyzer.pyin summary mode to build the full reverse index - Top-10 most-referenced files (highest inbound
[[wikilink]]count) - Stale references: files whose
review_dateis older than the last edit of files that reference them - Orphaned files: zero inbound references, excluding
index.mdand dashboard pages - HIGH priority flag: files with 10+ inbound references and
review_dateolder than 90 days
5b. Change Cascade Report¶
- Run
cascade_report.pyto trace impact of git changes through the reverse wikilink index - Accepts
--ref-range(default:main..HEAD) or explicit--fileslist - Produces tree-format report: changed file → directly affected → transitively affected
- Respects
--max-depth(default: 3) to cap cascade traversal - Domains (ISMS, QMS, DSMS, VMS) shown per affected file for cross-domain awareness
5c. Field Consistency Check¶
- Run
field_consistency_checker.pyto detect review_date and approved_by inconsistencies - For each
norm_ref, collects all files and theirreview_dateandapproved_byvalues - Flags
review_datespread > 6 months (configurable via--threshold-months) - Reports
approved_bymismatches within same norm domain (informational, not error) - Output includes affected files, date spread, and approver discrepancies
6. Compliance Score¶
score = (populated_fields / expected_fields) * 100- Per-file, per-domain, and vault-wide
Report Location¶
Reports are written to: reports/vt-v-audit-YYYY-MM-DD.md
Read references/audit-criteria.md for detailed pass/warn/fail thresholds.
Integration¶
- Run after each
/vt-v-writebatch to validate content - Run before
/vt-v-sprintto establish baseline - Results feed into the next
/vt-v-plansprint planning --snapshotmode is used by/vt-v-cwpto record metrics before/after CWP work- CWP file resolution uses
cwp_file_resolver.pyfrom/vt-v-cwpskill
Open Brain Capture (Optional)¶
After completing the audit, if the capture_thought MCP tool is available, capture the audit outcome.
How:
1. Check if capture_thought tool is available. If not: skip silently.
2. Call capture_thought with: