Search, create, and manage GitHub issues for the Ark project. Use when you need to find existing issues, create new ones, or update issue status.
Installation
Details
Usage
After installing, this skill will be available to your AI coding assistant.
Verify installation:
skills listSkill Instructions
name: ark-issues description: Search, create, and manage GitHub issues for the Ark project. Use when you need to find existing issues, create new ones, or update issue status.
Ark Issues
Manage GitHub issues for the Ark project (mckinsey/agents-at-scale-ark).
When to use this skill
Use this skill when:
- Searching for existing issues by keyword or CVE number
- Finding issues related to security vulnerabilities
- Creating new issues to track bugs or features
- Viewing issue details and status
- Listing open or closed issues
Note: This skill is commonly used by the ark-security-patcher agent to:
- Search for existing CVE-related issues before starting work
- Link PRs to existing issues with "Closes #N" syntax
- Create new issues for tracking discovered vulnerabilities
GitHub CLI Commands
Use the gh CLI tool for all issue operations:
Searching Issues
# Search issues by keyword
gh search issues --repo mckinsey/agents-at-scale-ark "CVE"
# Search for specific CVE numbers
gh search issues --repo mckinsey/agents-at-scale-ark "CVE-2025-55183"
# Search with filters
gh search issues --repo mckinsey/agents-at-scale-ark "security" --state open
gh search issues --repo mckinsey/agents-at-scale-ark "vulnerability" --label security
Listing Issues
# List all open issues
gh issue list --repo mckinsey/agents-at-scale-ark
# List issues with filters
gh issue list --repo mckinsey/agents-at-scale-ark --state open
gh issue list --repo mckinsey/agents-at-scale-ark --label bug
gh issue list --repo mckinsey/agents-at-scale-ark --assignee @me
# List with custom fields
gh issue list --repo mckinsey/agents-at-scale-ark --json number,title,state,labels
Viewing Issue Details
# View specific issue
gh issue view 123 --repo mckinsey/agents-at-scale-ark
# View with comments
gh issue view 123 --repo mckinsey/agents-at-scale-ark --comments
# View as JSON for parsing
gh issue view 123 --repo mckinsey/agents-at-scale-ark --json number,title,body,state,labels
Creating Issues
# Create issue interactively
gh issue create --repo mckinsey/agents-at-scale-ark
# Create with title and body
gh issue create --repo mckinsey/agents-at-scale-ark \
--title "Security: Fix CVE-2025-XXXXX" \
--body "Description of the vulnerability..."
# Create with labels
gh issue create --repo mckinsey/agents-at-scale-ark \
--title "Bug: API endpoint fails" \
--body "Steps to reproduce..." \
--label bug,priority:high
Updating Issues
# Close an issue
gh issue close 123 --repo mckinsey/agents-at-scale-ark
# Reopen an issue
gh issue reopen 123 --repo mckinsey/agents-at-scale-ark
# Add comment
gh issue comment 123 --repo mckinsey/agents-at-scale-ark \
--body "Fixed in PR #456"
# Edit issue
gh issue edit 123 --repo mckinsey/agents-at-scale-ark \
--title "New title" \
--add-label security
Common Workflows
Workflow 1: Check for Existing CVE Issues
Before creating a new security fix, check if an issue already exists:
# Search for CVE number
gh search issues --repo mckinsey/agents-at-scale-ark "CVE-2025-55183"
# If found, note the issue number
# If not found, you may want to create one
Tip: When creating PRs, reference the issue number using Closes #123 in the PR body to automatically close the issue when the PR merges.
Workflow 2: Find All Security-Related Issues
# Search by keyword
gh search issues --repo mckinsey/agents-at-scale-ark "security OR vulnerability OR CVE"
# Filter by label if security labels exist
gh issue list --repo mckinsey/agents-at-scale-ark --label security
Workflow 3: Create Security Issue for Tracking
gh issue create --repo mckinsey/agents-at-scale-ark \
--title "fix: CVE-2025-XXXXX in [component]" \
--body "$(cat <<'EOF'
## Vulnerability Details
- **CVE**: CVE-2025-XXXXX
- **Severity**: High
- **Component**: [package name]
## Description
[What the vulnerability is]
## Impact on Ark
[How it affects Ark]
## Proposed Fix
[Update package to version X.Y.Z]
## References
- CVE: https://cve.circl.lu/cve/CVE-2025-XXXXX
- Advisory: [URL]
EOF
)" \
--label security
Best Practices
Before Creating Issues
-
Always search first: Check if a similar issue already exists
gh search issues --repo mckinsey/agents-at-scale-ark "keyword" -
Be specific: Use clear, descriptive titles
- Good: "fix: CVE-2025-55183 in Next.js affects dashboard"
- Bad: "security issue"
-
Include context: Provide all relevant details in the issue body
When Linking Issues to PRs
- Use
Closes #123orFixes #123in PR descriptions to auto-close issues - Reference multiple issues:
Closes #123, Closes #456 - Use issue numbers in commit messages for traceability
Issue Formatting
For security issues, use this template:
## Vulnerability Details
- **CVE**: CVE-YYYY-NNNNN
- **Severity**: [Critical/High/Medium/Low]
- **Component**: [Package/library name]
## Description
[Clear explanation of the vulnerability]
## Impact on Ark
[Which services are affected and how]
## Proposed Fix
[Recommended mitigation approach]
## References
- CVE: [URL]
- Advisory: [URL]
Error Handling
Issue Not Found
gh issue view 999 --repo mckinsey/agents-at-scale-ark
# Error: issue not found
Solution: Verify the issue number is correct
Permission Denied
gh issue create --repo mckinsey/agents-at-scale-ark
# Error: permission denied
Solution: Ensure you're authenticated with gh auth status and have write access to the repo
Rate Limiting
If you hit GitHub API rate limits:
- Wait a few minutes before retrying
- Use
gh auth statusto check your rate limit status - Consider batching operations
Integration with Security Workflow
The ark-security-patcher agent uses this skill to:
-
Search for existing CVE issues before starting work:
gh search issues --repo mckinsey/agents-at-scale-ark "CVE-2025-55183" -
Link PRs to issues by including in PR body:
Closes #33 -
Track vulnerability fixes by creating issues when CVEs are discovered
Example workflow:
# Agent searches for CVE issue
ISSUE=$(gh search issues --repo mckinsey/agents-at-scale-ark "CVE-2025-55183" --json number --jq '.[0].number')
if [ -n "$ISSUE" ]; then
echo "Found existing issue #$ISSUE"
# Include "Closes #$ISSUE" in PR
else
echo "No existing issue found"
# Optionally create a new issue
fi
Important Notes
- Repository: All commands target
mckinsey/agents-at-scale-ark - Authentication: Requires
ghCLI to be authenticated (gh auth login) - Permissions: Need read access to search/view, write access to create/update
- Rate limits: GitHub API has rate limits; be mindful of excessive searches
Common Patterns
Parse JSON Output
# Get issue numbers matching a search
gh search issues --repo mckinsey/agents-at-scale-ark "CVE" \
--json number,title --jq '.[] | "\(.number): \(.title)"'
# Check if issue exists
EXISTS=$(gh search issues --repo mckinsey/agents-at-scale-ark "CVE-2025-55183" --json number --jq 'length')
if [ "$EXISTS" -gt 0 ]; then
echo "Issue exists"
fi
Batch Operations
# List all open security issues
gh issue list --repo mckinsey/agents-at-scale-ark \
--label security --state open \
--json number,title --jq '.[] | "\(.number): \(.title)"'
# Create multiple issues from a list
for cve in CVE-2025-001 CVE-2025-002; do
gh issue create --repo mckinsey/agents-at-scale-ark \
--title "Security: Fix $cve" \
--body "Track fix for $cve"
done
More by mckinsey
View allRegenerate and debug types across the ARK stack (SDK, API, Dashboard). Use when fixing TypeScript type errors in ark-dashboard, updating types after CRD changes, regenerating types.ts from OpenAPI spec, debugging "Property does not exist on type" schema errors, or adding custom SDK functionality via overlays. Covers the full type pipeline from Kubernetes CRDs to TypeScript.
Analyze the Ark codebase by cloning the repository to a temporary location. Use this skill when the user asks questions about how Ark works, wants to understand Ark's implementation, or needs to examine Ark source code.
Guidance for developing the Ark Kubernetes operator. Use when modifying Go types, CRDs, controllers, or webhooks. Helps with CRD generation and Helm chart sync issues.
CVE research and security patch workflow for Ark. Provides CVE API integration, mitigation strategies, and security-focused PR templates. Works with research, analysis, and setup skills for comprehensive vulnerability fixing.
