technical-analysis

Technical Analysis Skill

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "technical-analysis" with this command: npx skills add doubleslashse/claude-marketplace/doubleslashse-claude-marketplace-technical-analysis

Technical Analysis Skill

Overview

This skill provides techniques for analyzing technical aspects of software systems including APIs, data models, integrations, and security requirements.

API Analysis

REST API Analysis

Endpoint Discovery

Look for these patterns:

  • Route definitions

  • Controller classes

  • OpenAPI/Swagger specifications

  • API documentation

Endpoint Documentation Template

Endpoint: {METHOD} {PATH}

Purpose: {DESCRIPTION}

Authentication: {AUTH_METHOD}

Request:

  • Headers: {HEADERS}
  • Parameters: {PARAMS}
  • Body: {BODY_SCHEMA}

Response:

  • Success (200): {SUCCESS_SCHEMA}
  • Error (4xx/5xx): {ERROR_SCHEMA}

Business Rules:

  • {RULE_1}
  • {RULE_2}

API Quality Checklist

  • Consistent naming conventions

  • Proper HTTP methods used

  • Appropriate status codes

  • Error responses standardized

  • Pagination implemented for lists

  • Versioning strategy in place

  • Rate limiting configured

  • Authentication documented

GraphQL API Analysis

Schema Analysis

type Query { user(id: ID!): User orders(userId: ID!, status: OrderStatus): [Order] }

type Mutation { createOrder(input: CreateOrderInput!): Order updateOrderStatus(id: ID!, status: OrderStatus!): Order }

Document

  • Queries available (read operations)

  • Mutations available (write operations)

  • Types and their relationships

  • Required vs optional fields

  • Custom scalars

  • Directives used

Message/Event APIs

Event Schema Documentation

Event: {EVENT_NAME}

Topic/Queue: {TOPIC} Producer: {PRODUCER_SERVICE} Consumers: {CONSUMER_LIST}

Payload Schema: {JSON_SCHEMA}

Business Trigger: {WHEN_PUBLISHED} Expected Response: {CONSUMER_BEHAVIOR}

Data Model Analysis

Entity Analysis

Entity Documentation Template

Entity: {ENTITY_NAME}

Description

{BUSINESS_DESCRIPTION}

Attributes

NameTypeRequiredDescriptionConstraints
idUUIDYesPrimary keyAuto-generated
namestringYesDisplay nameMax 100 chars
statusenumYesCurrent stateActive, Inactive

Relationships

Related EntityTypeDescription
Order1:NCustomer has many orders
Address1:1Customer has one address

Business Rules

  • {RULE_1}
  • {RULE_2}

Indexes

Index NameColumnsPurpose
idx_emailemailUnique lookup

Data Flow Analysis

Data Flow Documentation

Data Flow: {FLOW_NAME}

Overview

{DESCRIPTION}

Source

  • System: {SOURCE_SYSTEM}
  • Entity: {SOURCE_ENTITY}
  • Trigger: {TRIGGER_EVENT}

Transformations

  1. {TRANSFORMATION_1}
  2. {TRANSFORMATION_2}

Destination

  • System: {DEST_SYSTEM}
  • Entity: {DEST_ENTITY}
  • Action: {CREATE/UPDATE/DELETE}

Error Handling

  • {ERROR_SCENARIO}: {HANDLING}

Diagram

[Source] → [Transform] → [Destination]

Database Schema Analysis

Schema Documentation

Table: {TABLE_NAME}

Columns

ColumnTypeNullableDefaultDescription
idbigintNoautoPrimary key

Constraints

NameTypeDefinition
pk_tablePrimary Key(id)
fk_userForeign Keyuser_id → users(id)
chk_statusCheckstatus IN ('A', 'I')

Indexes

NameColumnsUniquePurpose
idx_emailemailYesLookup

Integration Analysis

Integration Point Documentation

Integration: {INTEGRATION_NAME}

Overview

AttributeValue
External System{SYSTEM_NAME}
Integration TypeAPI / File / Message Queue / Database
DirectionInbound / Outbound / Bidirectional
FrequencyReal-time / Batch / Event-driven
ProtocolREST / SOAP / SFTP / MQ / etc.

Data Exchange

Data ElementSourceDestinationTransform
Customer IDSystem ASystem BDirect map
Order TotalSystem ASystem BConvert currency

Authentication

  • Method: {AUTH_METHOD}
  • Credentials: {CREDENTIAL_LOCATION}
  • Rotation: {ROTATION_POLICY}

Error Handling

Error TypeDetectionResponseRetry
Timeout30s limitLog + Alert3x exponential
4xx ErrorResponse codeLog + SkipNo retry
5xx ErrorResponse codeLog + Alert3x exponential

SLA

  • Availability: {UPTIME_REQUIREMENT}
  • Response Time: {LATENCY_REQUIREMENT}
  • Throughput: {VOLUME_REQUIREMENT}

Monitoring

  • Health Check: {ENDPOINT}
  • Metrics: {METRICS_COLLECTED}
  • Alerts: {ALERT_CONDITIONS}

Integration Pattern Analysis

Synchronous Patterns

  • Request-Response: Direct API calls

  • API Gateway: Centralized routing

  • Service Mesh: Sidecar proxies

Asynchronous Patterns

  • Message Queue: Point-to-point messaging

  • Publish-Subscribe: Event distribution

  • Event Sourcing: Event log as source of truth

Data Integration Patterns

  • ETL: Extract, Transform, Load

  • Change Data Capture: Real-time sync

  • Data Virtualization: On-demand access

Security Analysis

Security Requirements Documentation

Authentication Analysis

Authentication

Current Implementation

  • Method: {JWT / OAuth2 / SAML / etc.}
  • Identity Provider: {IDP_NAME}
  • Token Lifetime: {DURATION}
  • Refresh Strategy: {STRATEGY}

Multi-Factor Authentication

  • Required For: {USER_TYPES}
  • Methods: {MFA_METHODS}
  • Bypass Conditions: {EXCEPTIONS}

Session Management

  • Timeout: {IDLE_TIMEOUT}
  • Concurrent Sessions: {ALLOWED / PREVENTED}
  • Session Storage: {MECHANISM}

Authorization Analysis

Authorization

Access Control Model

  • Type: RBAC / ABAC / ACL / Custom

Roles

RoleDescriptionUser Count
AdminFull access5
ManagerDepartment access20
UserLimited access500

Permissions Matrix

ResourceAdminManagerUser
UsersCRUDR-
OrdersCRUDCRUDCRU
ReportsCRUDRR

Business Rules

  • {RULE_1}
  • {RULE_2}

Data Protection Analysis

Data Protection

Sensitive Data Inventory

Data ElementClassificationProtection
PasswordSecretHashed (bcrypt)
SSNPIIEncrypted at rest
Credit CardPCITokenized

Encryption

  • At Rest: {METHOD}
  • In Transit: {METHOD}
  • Key Management: {STRATEGY}

Data Masking

FieldMask TypeExample
SSNPartial*--1234
EmailPartialj***@***.com

Compliance Analysis

Compliance Requirements

Applicable Regulations

RegulationScopeRequirements
GDPREU usersConsent, Right to erasure
HIPAAHealth dataPHI protection
PCI-DSSPayment dataCard data security

Compliance Controls

ControlImplementationEvidence
Access loggingAudit tableLogs
EncryptionAES-256Config
Retention7 yearsPolicy doc

Audit Requirements

  • Audit logging enabled: {YES/NO}
  • Retention period: {DURATION}
  • Access review frequency: {FREQUENCY}

Infrastructure Analysis

Infrastructure Documentation

Infrastructure Overview

Environments

EnvironmentPurposeURL
DevelopmentDev testingdev.app.com
StagingPre-prod testingstaging.app.com
ProductionLive systemapp.com

Compute

ComponentTypeSpecsCount
Web ServerVM/Container4 CPU, 8GB3
API ServerContainer2 CPU, 4GB5
DatabaseRDSdb.r5.large2

Networking

  • VPC/VNET: {NETWORK_ID}
  • Subnets: {SUBNET_LIST}
  • Load Balancer: {LB_TYPE}
  • CDN: {CDN_PROVIDER}

Storage

TypePurposeSizeBackup
RDSPrimary DB500GBDaily
S3File storage1TBCross-region
RedisCache10GBNone

Analysis Output Summary

After technical analysis, document:

  • API Contracts: All endpoints with schemas

  • Data Models: Entities, relationships, constraints

  • Integrations: External systems, data flows

  • Security: Auth, authorization, data protection

  • Infrastructure: Compute, storage, networking

  • Technical Debt: Issues and recommendations

See integration-patterns.md for common integration patterns.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Research

static-analysis

No summary provided by upstream source.

Repository SourceNeeds Review
Research

platform-knowledge

No summary provided by upstream source.

Repository SourceNeeds Review
Research

log-analysis

No summary provided by upstream source.

Repository SourceNeeds Review
General

requirements-clarification

No summary provided by upstream source.

Repository SourceNeeds Review