SKILL: implementation-planner
Purpose
Convert a feature idea into a concrete technical execution plan (architecture, modules, interfaces, validations, and rollout).
When to Use
- The request requires design decisions before code.
- Multiple components must be coordinated (frontend/backend/infra/contracts).
- The user asked for an “implementation plan†or “architectureâ€.
Inputs
feature_description(required, string): what to build and why.constraints(optional, string[]): non-negotiables (security, budget, tooling, timeline).environment(optional, object): runtime (OS, container), deploy targets, CI.existing_system(optional, string): relevant current architecture and boundaries.
Steps
- Define success criteria (what “done†means) and explicit non-goals.
- Identify actors and interfaces (users, services, contracts, external APIs).
- Choose an architecture that minimizes risk and change surface.
- Define modules and ownership boundaries (what lives where).
- Specify data flow (inputs, outputs, persistence, logs/audit trail).
- Specify validation path:
- unit tests
- integration tests
- security checks (as applicable)
- Define rollout:
- feature flags / guarded modes
- backwards compatibility
- migration steps (if any)
- List open questions and assumptions; ask for clarification when risk is material.
Validation
- Plan satisfies all stated constraints.
- Every module has an interface and responsibility.
- Testing/validation is included (not “laterâ€).
- Rollout avoids accidental production impact.
Output
Structured plan (example schema):
overview: "<1 paragraph>"
modules:
- name: "<module>"
responsibility: "<what it owns>"
interfaces: ["<api/events/files>"]
data_flow:
inputs: ["..."]
outputs: ["..."]
validation:
unit: ["..."]
integration: ["..."]
rollout:
guardrails: ["..."]
open_questions: ["..."]
Safety Rules
- Do not select tools that violate constraints.
- Do not propose deployments that can impact production without explicit gating.
- Prefer simplest architecture that meets requirements.
Example
Feature: “Add webhook ingestion with idempotency and audit logs.†Output (excerpt):
modules:
- name: "webhook-controller"
responsibility: "request validation + signature checks"
- name: "event-store"
responsibility: "persist raw payload + processing status"
validation:
integration: ["replay same event id results in no duplicate side effects"]