with one click
scan-integration-tests
// [Documentation] Use when scanning integration test base classes, fixtures, helpers, configuration, and service setup.
// [Documentation] Use when scanning integration test base classes, fixtures, helpers, configuration, and service setup.
[HINT] Download the complete skill directory including SKILL.md and all related files
| name | scan-integration-tests |
| version | 2.0.0 |
| last_reviewed | "2026-04-22T00:00:00.000Z" |
| description | [Documentation] Use when scanning integration test base classes, fixtures, helpers, configuration, and service setup. |
Goal: Scan test codebase → populate docs/project-reference/integration-test-reference.md with test architecture, base classes, fixtures, helpers, configuration patterns, and service-specific setup conventions.
Workflow:
file:line evidenceKey Rules:
file:line[BLOCKING] Before any other step, run in parallel:
Read docs/project-reference/integration-test-reference.md
Detect test framework:
| Signal | Framework | Key Patterns to Search |
|---|---|---|
*.csproj with xUnit | .NET xUnit | [Fact], [Theory], IAsyncLifetime, IClassFixture |
*.csproj with NUnit | .NET NUnit | [Test], [SetUp], [TearDown], [OneTimeSetUp] |
package.json with jest | Jest | describe, it, beforeAll, afterAll, jest.mock |
package.json with vitest | Vitest | describe, test, vi.mock, beforeEach |
package.json with playwright | Playwright | test.describe, page, expect, fixtures |
pytest.ini/conftest.py | Python pytest | @pytest.fixture, conftest, @pytest.mark |
pom.xml with JUnit | Java JUnit | @Test, @BeforeAll, @SpringBootTest |
| Signal | Approach | Agent Focus |
|---|---|---|
Testcontainers in deps | Docker-based real infra | Container lifecycle, startup time |
WebApplicationFactory | In-process server | DI override patterns, test server setup |
appsettings.test.json | Config-based test infra | Connection string overrides, env vars |
| In-memory DB patterns | Fake infra | DB reset strategies, seeding |
WaitUntilAsync, polling | Eventual consistency | Async assertion patterns |
| Mode | Condition | Action |
|---|---|---|
| Init | Target doc doesn't exist or placeholder | Full scan, create all sections |
| Sync | Target doc has real content | Diff scan — check for new base classes, helper changes |
docs/project-config.json → integrationTestVerify if available:
referenceDocs[] — read these project-specific setup docs before documenting how verification should runrunScript / startupScript — inspect to capture Docker/system startup behavior and supported argumentssystemCheckCommand — document what readiness check must pass before direct test commandsquickRunCommand, testProjectPattern, testProjects[] — use as the source of truth for runner commands and project discoveryintegrationRules[] — document repeatability/data-integrity gates, including 3 consecutive verification runs without DB resetEvidence gate: Confidence <60% on framework detection → report uncertainty, ask user before proceeding.
Create TaskCreate entries for each sub-agent and each verification step. Do not start Phase 2 without tasks created.
Launch 2 general-purpose sub-agents in parallel. Each MUST:
file:line for every pattern exampleAll findings → plans/reports/scan-integration-tests-{YYMMDD}-{HHMM}-report.md
Think (Base Class dimension): What does the base class provide — DI container, test server, database connection, fixture lifecycle? Is there a hierarchy (base → service-specific → test)? What must a new test author know to write their first test?
Think (Isolation dimension): How is test isolation achieved — unique IDs per run, database reset, transaction rollback, separate tenant? Can tests run in parallel? What breaks parallelism?
Think (Infrastructure dimension): What must be running for tests to pass? How is the infrastructure provisioned — Docker, in-memory, seeded fixtures? What's the startup cost?
Security flag: If test credentials are found hardcoded in source files (not env vars or secret stores), flag as CRITICAL security issue in report.
extends.*Test, TestBase, IntegrationTest, IClassFixture, PlatformServiceIntegrationTestWithAssertions)WebApplicationFactory, TestFixture, conftest, module bootstrappers)appsettings.test.json, .env.test, test container setup, port bindings)Think (Assertion dimension): What assertion patterns are used? Is there a waiting/polling mechanism for async operations? Are assertions on specific field values or just "does not throw"?
Think (Data dimension): How is test data created — builders, factories, seed methods? How is uniqueness ensured across runs? Is there a cleanup strategy? Flag direct repository create/update setup as a risk unless it is a valid, idempotent fixture seeder for service-owned reference data. Flag verification guidance as incomplete if it does not require 3 consecutive successful runs without DB reset.
Think (Coverage dimension): Which services have tests? Which are missing? What's the test-to-feature ratio?
WaitUntilAsync, custom assertion extensions, Should* methods)Ulid.NewUlid(), Guid.NewGuid(), timestamp suffixes)Read full report. Apply fresh-eyes protocol:
Round 1 (main agent): Build section drafts from report findings.
Round 2 (fresh sub-agent, zero memory):
file:line? (Glob + Grep verify)| Section | Content |
|---|---|
| Test Architecture | Overall test strategy, framework, infrastructure approach, isolation mechanism |
| Test Base Classes | Hierarchy with what each base provides; when to use which |
| Fixtures & Factories | Test fixture setup, DI overrides, module bootstrappers |
| Test Helpers | Assertion helpers, data builders, wait patterns with examples |
| Configuration | Test config files, connection strings, environment variables |
| Service-Specific Setup | Per-service test differences, custom overrides, module registration |
| Test Data Patterns | How data is created, unique naming, cleanup strategies |
| New Test Quickstart | Minimal steps to add a new test for a new service |
| Running Tests | Commands for all, filtered, parallel, CI integration |
<!-- Last scanned: YYYY-MM-DD --> at top[IMPORTANT] Use
TaskCreateto break ALL work into small tasks BEFORE starting — including tasks per file read. Prevents context loss from long files. Simple tasks: ask user whether to skip.
Prerequisites: MUST ATTENTION READ before executing:
Critical Thinking Mindset — Every claim needs traced proof, confidence >80% to act. Anti-hallucination: Never present guess as fact — cite sources, admit uncertainty, self-check output, cross-reference independently. Certainty without evidence = root of all hallucination.
Scan & Update Reference Doc — Surgical updates only, NEVER full rewrite.
- Read existing doc first — understand structure and manual annotations
- Detect mode: Placeholder (headings only) → Init. Has content → Sync.
- Scan codebase (grep/glob) for current patterns
- Diff findings vs doc — identify stale sections only
- Update ONLY diverged sections. Preserve manual annotations.
- Update metadata (date, version) in frontmatter/header
- NEVER rewrite entire doc. NEVER remove sections without evidence obsolete.
Output Quality — Token efficiency without sacrificing quality.
- No inventories/counts — stale instantly
- No directory trees — use 1-line path conventions
- No TOCs — AI reads linearly
- One example per pattern — only if non-obvious
- Lead with answer, not reasoning
- Sacrifice grammar for concision in reports
- Unresolved questions at end
AI Mistake Prevention — Failure modes to avoid:
Verify AI-generated content against actual code. AI hallucinates base class names, fixture methods, and assertion helpers. Grep to confirm existence before documenting. Trace full dependency chain after edits. Always trace full chain. Surface ambiguity before coding. NEVER pick silently. NEVER hardcode test file counts. Use grep-expression stats, not hardcoded numbers.
IMPORTANT MUST ATTENTION read existing doc first, scan codebase, diff, surgical update only. Never rewrite entire doc.
IMPORTANT MUST ATTENTION output quality: no counts/trees/TOCs, 1 example per pattern, lead with answer.
MUST ATTENTION apply critical thinking — every claim needs traced proof, confidence >80% to act. Anti-hallucination: never present guess as fact.
MUST ATTENTION apply AI mistake prevention — holistic-first debugging, fix at responsible layer, surface ambiguity before coding, re-read files after compaction.
IMPORTANT MUST ATTENTION break work into small TaskCreate tasks BEFORE starting
IMPORTANT MUST ATTENTION detect framework AND infrastructure type in Phase 0 — patterns depend on both
IMPORTANT MUST ATTENTION cite file:line for every code example — NEVER fabricate class or method names
IMPORTANT MUST ATTENTION sub-agents write findings incrementally after each service — NEVER batch at end
IMPORTANT MUST ATTENTION NEVER hardcode test file counts — use grep expressions
IMPORTANT MUST ATTENTION if Round 1 finds issues, Round 2 fresh-eyes is non-negotiable after fixing. Clean Round 1 ENDS the scan.
Anti-Rationalization:
| Evasion | Rebuttal |
|---|---|
| "Framework obvious, skip Phase 0 detection" | Phase 0 is BLOCKING — infrastructure approach determines which patterns to scan |
| "Smoke-only test assertions are fine" | NEVER document smoke-only as acceptable unless infrastructure is truly unobservable |
| "Direct repository setup is just test data" | Flag it unless it creates valid owned fixture data; tests should exercise real use cases, not impossible states. |
| "Base class looks right from memory" | Grep-verify every base class name — AI hallucinates class hierarchies |
| "Coverage stats obvious from directory scan" | NEVER hardcode counts — use grep expressions that stay accurate as tests are added |
| "Skip Round 2 even when Round 1 found issues" | Clean Round 1 ends the scan. When issues exist, fresh-eyes mandatory after fixing — main agent rationalizes own fabricated examples. |
| "Credential security flag not needed" | Hardcoded test creds are a CRITICAL security issue — ALWAYS flag if found |
[TASK-PLANNING] Before acting, analyze task scope and break into small todo tasks and sub-tasks using TaskCreate.