Use when the user wants regression hunting after a change. Identify nearby flows, shared code paths, error states, and configuration edges that may have broken even if the main fix works. Good triggers include "check for regressions", "what else might this have broken", and "test the surrounding area".
96
94%
Does it follow best practices?
Impact
98%
2.72xAverage score across 8 eval scenarios
Passed
No known issues
A developer has just merged a PR that refactored a Node.js Express REST API's authentication middleware to use JWT tokens instead of sessions. They want you to scout for any regressions caused by this change. You are given a diff and a description of the codebase below. Produce a regression scout report as a markdown file called report.md.
=============== FILE: inputs/codebase-description.md ===============
src/middleware/auth.js — authentication middleware (CHANGED)src/routes/users.js — user CRUD routes, uses auth middlewaresrc/routes/orders.js — order routes, uses auth middlewaresrc/routes/admin.js — admin panel routes, uses auth middlewaresrc/services/session.js — session management (now unused)src/services/tokenBlacklist.js — token revocation list (NEW)tests/middleware/auth.test.js — auth middleware teststests/routes/users.test.js — user route teststests/routes/orders.test.js — order route testsThe authentication middleware was refactored from express-session (cookie-based sessions) to jsonwebtoken (JWT Bearer tokens). The session store (Redis) is no longer used for auth. Token revocation now relies on a blacklist in tokenBlacklist.js.
evals
scenario-1
scenario-2
scenario-3
scenario-4
scenario-5
scenario-6
scenario-7
scenario-8
skills
regression-scout