User-level skills available across all projects. Invoke with /skill-name or natural language.
Creates git worktrees for parallel development—useful for running multiple Claude Code sessions on the same project without branch conflicts.
Usage:
/worktree # Detect context and suggest
/worktree <branch> # Worktree for specified branch
/worktree <branch> <path> # Explicit branch and path
Features:
- Detects current branch and project path
- Generates semantic slugs from branch names (e.g.,
feature/#1252_bootstrap-helper→-bootstrap) - Uses 80/20 confidence rule: ≥80% assume, 20-80% confirm, <20% prompt
- Runs dependency installation post-setup
Allowed tools: Bash, Read, AskUserQuestion
Post-merge cleanup for branches after a PR has been merged. Renames the local branch with merged/ prefix and deletes the remote branch.
Usage:
/merge-cleanup # Clean up current branch
/merge-cleanup <branch-name> # Clean up specified branch
Process:
- Verifies the PR was merged (warns if not)
- Deletes the remote branch from origin
- Renames local branch to
merged/<branch-name>
Safety:
- Refuses to touch
master - Never deletes local branches—always renames with
merged/prefix - Preserves branch history locally for reference
Allowed tools: Bash, Read, AskUserQuestion
Fetches and displays emails from Gmail using OAuth credentials.
Usage:
/read-email # Interactive
"check emails from support@example.com" # Filter by sender
"find emails about invoice" # Search query
Prerequisites:
GOOGLE_CLIENT_IDandGOOGLE_CLIENT_SECRETenvironment variables- OAuth token at
~/.claude/gmail_token.yaml
Allowed tools: Bash, Read
Scans the repository for sensitive information, credentials, and security vulnerabilities.
Usage:
/repo-security-scan # Current files only (fast)
/repo-security-scan --history # Include git history (slower)
"scan for security issues"
"check for sensitive data"
"scan history for secrets"
Scans for:
- Hardcoded secrets (API keys, passwords, tokens)
- Security vulnerabilities (SQL injection, XSS, command injection)
- Sensitive files that shouldn't be tracked
- Insecure configuration patterns
- Secrets in git history (opt-in, uses gitleaks/trufflehog if available)
Output:
- Report written to
security/YYYYMMDD-scan.md - Findings labelled as "Current" or "History"
- Remediation plan for Medium+ priority issues
Allowed tools: Bash, Read, Write, Glob, Grep, AskUserQuestion
Scans for security issues and automatically remediates them. Action-oriented companion to /repo-security-scan.
Usage:
/repo-security-clean
"clean up security issues"
"fix the security problems"
"remove sensitive data"
Actions:
- Moves hardcoded secrets to environment variables
- Untracks sensitive files (preserves locally)
- Fixes SQL injection with parameterised queries
- Fixes XSS vulnerabilities
- Updates .gitignore with security patterns
Safety:
- Asks before committing or modifying git history
- Preserves original files (untracks, doesn't delete)
- Warns about credentials that need rotation
- Never force pushes automatically
Output: Report to security/YYYYMMDD-clean.md with actions taken and manual follow-ups
Allowed tools: Bash, Read, Write, Edit, Glob, Grep, AskUserQuestion
git-filter-repo.
Usage:
/repo-security-purge
"purge secrets from git history"
"remove sensitive data from history"
Capabilities:
- Removes files entirely from all commits
- Scrubs sensitive patterns (replaces with
[REDACTED]) - Handles all branches and tags
Safety:
- Requires
git-filter-repoto be installed - Creates backup before any changes
- Displays loud warning with impact summary
- Requires typing
PURGE HISTORYto proceed - Never force pushes automatically
- Provides post-purge checklist (rotate creds, notify team)
Output: Report to security/YYYYMMDD-purge.md
Allowed tools: Bash, Read, Write, Glob, Grep, AskUserQuestion
Checks documentation consistency across the repository—ensures docs are aligned, references are valid, and nothing is stale.
Usage:
/repo-consistency
"check the consistency of the repo"
"are the documents consistent"
"is everything aligned"
Checks:
- Cross-references between files are valid
- SKILLS.md matches actual skills
- SETUP.md accurately reflects repo contents
- No broken links or orphaned documentation
- Naming conventions followed (kebab-case, British English)
Behaviour:
- Prefers fixing local docs over contributed files (speckit, ai-software-architect)
- Offers to auto-fix common issues
- Reports errors, warnings, and suggestions
Allowed tools: Bash, Read, Glob, Grep, Write, Edit, AskUserQuestion
Creates a new Rails project with personal conventions (RSpec, PostgreSQL, Docker, master branch).
Usage:
/new-project-rails # Interactive - prompt for name
/new-project-rails <project-name> # Create with specified name
Conventions:
- Location:
/opt/ruby/<project-name> - Ruby/Rails: Latest stable (auto-detected)
- Testing: RSpec (not Minitest)
- Database: PostgreSQL via Docker
- Branch:
master(not main)
Creates:
- Rails app with RSpec configured
- Dockerfile and docker-compose.yml for local dev
- Proper database.yml for Docker/local switching
- CI workflow with correct branch references
Reference: ~/.claude/NEW-PROJECT-RAILS.md (troubleshooting, details)
Allowed tools: Bash, Read, Write, Edit, AskUserQuestion
A suite of skills for managing architecture documentation, reviews, and decisions. Requires the framework to be set up in a project first.
Installs the AI Software Architect framework in a new project.
Usage:
/setup-architect
"Setup ai-software-architect"
"Initialize architecture framework"
Process:
- Verifies prerequisites
- Analyses project (languages, frameworks, patterns)
- Installs framework files and directory structure
- Customises team members for detected tech stack
- Performs initial system analysis
Allowed tools: Read, Write, Edit, Glob, Grep, Bash
Reports on architecture documentation health—ADR counts, review activity, documentation gaps.
Usage:
/architecture-status
"What's our architecture status?"
"How many ADRs do we have?"
Allowed tools: Read, Glob, Grep
Displays the architecture team roster with specialties and expertise areas.
Usage:
/list-members
"Who's on the architecture team?"
"What specialists are available?"
Allowed tools: Read
Conducts a comprehensive multi-perspective review using ALL architecture team members.
Usage:
/architecture-review
"Start architecture review"
"Review architecture for version 2.0"
Process:
- Determine scope (version, feature, or component)
- Load team from
.architecture/members.yml - Each member reviews from their perspective
- Synthesise findings and establish priorities
- Generate comprehensive review document
Allowed tools: Read, Write, Glob, Grep, Bash(git:*)
Conducts a focused review from ONE specific specialist's perspective.
Usage:
/specialist-review
"Ask Security Specialist to review authentication"
"Get Performance Expert's opinion on the API"
Use this for deep single-domain expertise. For multi-perspective reviews, use /architecture-review.
Allowed tools: Read, Write, Glob, Grep
Creates a new Architectural Decision Record documenting a specific decision.
Usage:
/create-adr
"Create ADR for using PostgreSQL"
"Document decision about authentication approach"
Captures:
- What decision was made
- What problem it solves
- Alternatives considered
- Trade-offs and consequences
Allowed tools: Read, Write, Bash(ls:, grep:)
Enables Pragmatic Guard Mode (YAGNI enforcement) to prevent over-engineering.
Usage:
/pragmatic-guard
"Enable pragmatic mode"
"Turn on YAGNI enforcement"
Configures:
- Intensity level (strict/balanced/lenient)
- Exemption categories
- Complexity triggers
Allowed tools: Read, Edit
- Git worktree guide:
~/.claude/docs/worktree-setup.md - Architecture framework:
~/.claude/skills/ARCHITECTURE.md - Skill patterns:
~/.claude/skills/_patterns.md