Skip to content

Latest commit

 

History

History
360 lines (256 loc) · 8.91 KB

File metadata and controls

360 lines (256 loc) · 8.91 KB

Skills Reference

User-level skills available across all projects. Invoke with /skill-name or natural language.

Development Workflow

/worktree

Creates git worktrees for parallel development—useful for running multiple Claude Code sessions on the same project without branch conflicts.

Usage:

/worktree                           # Detect context and suggest
/worktree <branch>                  # Worktree for specified branch
/worktree <branch> <path>           # Explicit branch and path

Features:

  • Detects current branch and project path
  • Generates semantic slugs from branch names (e.g., feature/#1252_bootstrap-helper-bootstrap)
  • Uses 80/20 confidence rule: ≥80% assume, 20-80% confirm, <20% prompt
  • Runs dependency installation post-setup

Allowed tools: Bash, Read, AskUserQuestion


/merge-cleanup

Post-merge cleanup for branches after a PR has been merged. Renames the local branch with merged/ prefix and deletes the remote branch.

Usage:

/merge-cleanup                      # Clean up current branch
/merge-cleanup <branch-name>        # Clean up specified branch

Process:

  1. Verifies the PR was merged (warns if not)
  2. Deletes the remote branch from origin
  3. Renames local branch to merged/<branch-name>

Safety:

  • Refuses to touch master
  • Never deletes local branches—always renames with merged/ prefix
  • Preserves branch history locally for reference

Allowed tools: Bash, Read, AskUserQuestion


/read-email

Fetches and displays emails from Gmail using OAuth credentials.

Usage:

/read-email                                    # Interactive
"check emails from support@example.com"        # Filter by sender
"find emails about invoice"                    # Search query

Prerequisites:

  • GOOGLE_CLIENT_ID and GOOGLE_CLIENT_SECRET environment variables
  • OAuth token at ~/.claude/gmail_token.yaml

Allowed tools: Bash, Read


/repo-security-scan

Scans the repository for sensitive information, credentials, and security vulnerabilities.

Usage:

/repo-security-scan                  # Current files only (fast)
/repo-security-scan --history        # Include git history (slower)
"scan for security issues"
"check for sensitive data"
"scan history for secrets"

Scans for:

  • Hardcoded secrets (API keys, passwords, tokens)
  • Security vulnerabilities (SQL injection, XSS, command injection)
  • Sensitive files that shouldn't be tracked
  • Insecure configuration patterns
  • Secrets in git history (opt-in, uses gitleaks/trufflehog if available)

Output:

  • Report written to security/YYYYMMDD-scan.md
  • Findings labelled as "Current" or "History"
  • Remediation plan for Medium+ priority issues

Allowed tools: Bash, Read, Write, Glob, Grep, AskUserQuestion


/repo-security-clean

Scans for security issues and automatically remediates them. Action-oriented companion to /repo-security-scan.

Usage:

/repo-security-clean
"clean up security issues"
"fix the security problems"
"remove sensitive data"

Actions:

  • Moves hardcoded secrets to environment variables
  • Untracks sensitive files (preserves locally)
  • Fixes SQL injection with parameterised queries
  • Fixes XSS vulnerabilities
  • Updates .gitignore with security patterns

Safety:

  • Asks before committing or modifying git history
  • Preserves original files (untracks, doesn't delete)
  • Warns about credentials that need rotation
  • Never force pushes automatically

Output: Report to security/YYYYMMDD-clean.md with actions taken and manual follow-ups

Allowed tools: Bash, Read, Write, Edit, Glob, Grep, AskUserQuestion


/repo-security-purge

⚠️ DESTRUCTIVE — Rewrites git history to permanently remove sensitive data using git-filter-repo.

Usage:

/repo-security-purge
"purge secrets from git history"
"remove sensitive data from history"

Capabilities:

  • Removes files entirely from all commits
  • Scrubs sensitive patterns (replaces with [REDACTED])
  • Handles all branches and tags

Safety:

  • Requires git-filter-repo to be installed
  • Creates backup before any changes
  • Displays loud warning with impact summary
  • Requires typing PURGE HISTORY to proceed
  • Never force pushes automatically
  • Provides post-purge checklist (rotate creds, notify team)

Output: Report to security/YYYYMMDD-purge.md

Allowed tools: Bash, Read, Write, Glob, Grep, AskUserQuestion


/repo-consistency

Checks documentation consistency across the repository—ensures docs are aligned, references are valid, and nothing is stale.

Usage:

/repo-consistency
"check the consistency of the repo"
"are the documents consistent"
"is everything aligned"

Checks:

  • Cross-references between files are valid
  • SKILLS.md matches actual skills
  • SETUP.md accurately reflects repo contents
  • No broken links or orphaned documentation
  • Naming conventions followed (kebab-case, British English)

Behaviour:

  • Prefers fixing local docs over contributed files (speckit, ai-software-architect)
  • Offers to auto-fix common issues
  • Reports errors, warnings, and suggestions

Allowed tools: Bash, Read, Glob, Grep, Write, Edit, AskUserQuestion


Project Scaffolding

/new-project-rails

Creates a new Rails project with personal conventions (RSpec, PostgreSQL, Docker, master branch).

Usage:

/new-project-rails                    # Interactive - prompt for name
/new-project-rails <project-name>     # Create with specified name

Conventions:

  • Location: /opt/ruby/<project-name>
  • Ruby/Rails: Latest stable (auto-detected)
  • Testing: RSpec (not Minitest)
  • Database: PostgreSQL via Docker
  • Branch: master (not main)

Creates:

  • Rails app with RSpec configured
  • Dockerfile and docker-compose.yml for local dev
  • Proper database.yml for Docker/local switching
  • CI workflow with correct branch references

Reference: ~/.claude/NEW-PROJECT-RAILS.md (troubleshooting, details)

Allowed tools: Bash, Read, Write, Edit, AskUserQuestion


AI Software Architect Framework

A suite of skills for managing architecture documentation, reviews, and decisions. Requires the framework to be set up in a project first.

/setup-architect

Installs the AI Software Architect framework in a new project.

Usage:

/setup-architect
"Setup ai-software-architect"
"Initialize architecture framework"

Process:

  1. Verifies prerequisites
  2. Analyses project (languages, frameworks, patterns)
  3. Installs framework files and directory structure
  4. Customises team members for detected tech stack
  5. Performs initial system analysis

Allowed tools: Read, Write, Edit, Glob, Grep, Bash


/architecture-status

Reports on architecture documentation health—ADR counts, review activity, documentation gaps.

Usage:

/architecture-status
"What's our architecture status?"
"How many ADRs do we have?"

Allowed tools: Read, Glob, Grep


/list-members

Displays the architecture team roster with specialties and expertise areas.

Usage:

/list-members
"Who's on the architecture team?"
"What specialists are available?"

Allowed tools: Read


/architecture-review

Conducts a comprehensive multi-perspective review using ALL architecture team members.

Usage:

/architecture-review
"Start architecture review"
"Review architecture for version 2.0"

Process:

  1. Determine scope (version, feature, or component)
  2. Load team from .architecture/members.yml
  3. Each member reviews from their perspective
  4. Synthesise findings and establish priorities
  5. Generate comprehensive review document

Allowed tools: Read, Write, Glob, Grep, Bash(git:*)


/specialist-review

Conducts a focused review from ONE specific specialist's perspective.

Usage:

/specialist-review
"Ask Security Specialist to review authentication"
"Get Performance Expert's opinion on the API"

Use this for deep single-domain expertise. For multi-perspective reviews, use /architecture-review.

Allowed tools: Read, Write, Glob, Grep


/create-adr

Creates a new Architectural Decision Record documenting a specific decision.

Usage:

/create-adr
"Create ADR for using PostgreSQL"
"Document decision about authentication approach"

Captures:

  • What decision was made
  • What problem it solves
  • Alternatives considered
  • Trade-offs and consequences

Allowed tools: Read, Write, Bash(ls:, grep:)


/pragmatic-guard

Enables Pragmatic Guard Mode (YAGNI enforcement) to prevent over-engineering.

Usage:

/pragmatic-guard
"Enable pragmatic mode"
"Turn on YAGNI enforcement"

Configures:

  • Intensity level (strict/balanced/lenient)
  • Exemption categories
  • Complexity triggers

Allowed tools: Read, Edit


Related Documentation

  • Git worktree guide: ~/.claude/docs/worktree-setup.md
  • Architecture framework: ~/.claude/skills/ARCHITECTURE.md
  • Skill patterns: ~/.claude/skills/_patterns.md