Analyze Claude Code sessions via Braintrust
Analyze your Claude Code sessions for patterns, issues, and insights using Braintrust tracing data.
Run from the project directory:
# Analyze last session - summary with tool/agent/skill breakdown
uv run python -m runtime.harness scripts/braintrust_analyze.py --last-session
# List recent sessions
uv run python -m runtime.harness scripts/braintrust_analyze.py --sessions 5
# Agent usage statistics (last 7 days)
uv run python -m runtime.harness scripts/braintrust_analyze.py --agent-stats
# Skill usage statistics (last 7 days)
uv run python -m runtime.harness scripts/braintrust_analyze.py --skill-stats
# Detect loops - find repeated tool patterns (>5 same tool calls)
uv run python -m runtime.harness scripts/braintrust_analyze.py --detect-loops
# Replay specific session - show full sequence of actions
uv run python -m runtime.harness scripts/braintrust_analyze.py --replay <session-id>
# Weekly summary - daily activity breakdown
uv run python -m runtime.harness scripts/braintrust_analyze.py --weekly-summary
# Token trends - usage over time
uv run python -m runtime.harness scripts/braintrust_analyze.py --token-trends
--project NAME - Braintrust project name (default: agentica)Find sessions where the same tool was called repeatedly, which may indicate:
# What happened in my last session?
uv run python -m runtime.harness scripts/braintrust_analyze.py --last-session
Output:
## Session Analysis
**ID:** `92940b91...`
**Started:** 2025-12-24T01:31:05Z
**Spans:** 14
### Tool Usage
- Read: 4
- Bash: 2
- Edit: 2
...
uv run python -m runtime.harness scripts/braintrust_analyze.py --detect-loops
uv run python -m runtime.harness scripts/braintrust_analyze.py --weekly-summary