Bring Antimetal's software investigation intelligence into your AI coding environment. Triage problems, investigate root causes, fetch observability artifacts, and apply remediations—all without leaving your editor or terminal.
Sign up at antimetal.com and generate an API key from your account settings.
export ANTIMETAL_API_KEY="your-api-key-here"Add this to your shell profile (~/.zshrc, ~/.bashrc, etc.) so it persists.
Within a claude-code session, add the Antimetal marketplace:
/plugin marketplace add antimetal/skills
Then install the plugin:
/plugin install antimetal@antimetal-marketplace
Install from the Cursor Marketplace by searching for Antimetal, or use the command palette:
/add-plugin antimetal
Connects to Antimetal's remote MCP server at mcp.antimetal.com, giving the AI agent access to these tools:
| Tool | Description |
|---|---|
search_issues |
Paginated list of issues with severity, status, and environment |
get_issue_report |
Full investigative report—root cause, timeline, causal graph |
get_issue_fixes |
Remediation steps (code changes, CLI commands, context) |
investigate_issue |
Create a new issue and start async automated investigation |
get_artifact |
Retrieve raw evidence: logs, traces, metrics, events, files, topology |
ask |
Ask Antimetal's AI about infrastructure, software, deployments, telemetry, logs, code |
- investigate—Entry point for any software problem. Searches issues, queries Antimetal's AI, reads investigative reports and causal graphs, and routes to fix
- fix—Apply Antimetal's remediation to your codebase, adapted for your local environment
- antimetal-conventions -- Conventions for working with Antimetal data (artifact ID formats, status values, etc.)
Investigate issue #42
What are the open high severity issues?
Apply the remediation for issue #15
What services had the most errors last week?
Triage my current incidents