beyond-solid-principles

Beyond SOLID — System-Level Architecture Principles

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "beyond-solid-principles" with this command: npx skills add florianbuetow/claude-code/florianbuetow-claude-code-beyond-solid-principles

Beyond SOLID — System-Level Architecture Principles

Analyze source code and system architecture for violations of ten foundational design principles that govern how modules, services, layers, and components are structured and interact. Produce actionable findings with severity ratings, code/architecture locations, and concrete remediation suggestions.

These principles operate at the architecture scale — modules, services, bounded contexts, layers, APIs — complementing the class-level SOLID principles.

Subcommands

Request a full audit or focus on a single principle:

Command Pattern Principle Reference

sw-soc

Separation of Concerns references/soc.md

sw-srp-sys

Single Responsibility (system-level) references/srp-sys.md

sw-dry

Don't Repeat Yourself (DRY) references/dry.md

sw-demeter

Law of Demeter / Principle of Least Knowledge references/demeter.md

sw-coupling

Loose Coupling, High Cohesion references/coupling.md

sw-evolvability

Build for Change (Evolvability) references/evolvability.md

sw-resilience

Design for Failure / Resilience references/resilience.md

sw-kiss

KISS — Keep It Simple references/kiss.md

sw-pola

Principle of Least Surprise (POLA) references/pola.md

sw-yagni

YAGNI at Architecture Level references/yagni.md

beyond-solid-principles

All ten principles All references

When no subcommand is specified, default to checking all ten principles. When a principle is mentioned by name (even without the command prefix), match it to the appropriate subcommand.

Workflow

  1. Identify Target Code

Determine what code or architecture to analyze:

  • When files or a directory are provided, use those.

  • When a service, module, or component is referenced by name, locate it.

  • When ambiguous, ask which files, directories, or services to scan.

These principles apply to any language and any architecture style — monoliths, modular monoliths, microservices, serverless, event-driven, layered, hexagonal, etc. Adapt the principle checks to the idioms and scale of the target system.

For smaller codebases, focus on module/package boundaries, dependency direction, and internal layering. For distributed systems, also consider service boundaries, API contracts, data ownership, messaging patterns, and operational resilience.

  1. Load Principle References

Before analyzing, read the reference file(s) for the requested principle(s):

  • references/soc.md for Separation of Concerns

  • references/srp-sys.md for Single Responsibility (system-level)

  • references/dry.md for DRY

  • references/demeter.md for Law of Demeter

  • references/coupling.md for Loose Coupling, High Cohesion

  • references/evolvability.md for Build for Change

  • references/resilience.md for Design for Failure

  • references/kiss.md for KISS

  • references/pola.md for Principle of Least Surprise

  • references/yagni.md for YAGNI

For a full audit (beyond-solid-principles ), read all ten.

  1. Analyze

For each target file, module, or service boundary, apply the violation patterns from the loaded references. Think carefully about each pattern — not every heuristic match is a true violation. Consider context, system scale, team size, and maturity.

Key analysis dimensions:

  • Static structure: dependency direction, import graphs, layer boundaries.

  • Change patterns: which files/modules change together (if VCS history is available).

  • Runtime topology: service call chains, data flow, failure propagation paths.

  • API contracts: consistency, encapsulation, versioning, naming conventions.

  • Operational posture: timeouts, retries, circuit breakers, health checks.

  1. Report Findings

Present findings using this structure:

Per Violation

[PRINCIPLE] Violation — Severity: HIGH | MEDIUM | LOW Location: filename or service/module, lines ~XX-YY (if applicable) Issue: Clear description of what violates the principle and why it matters. Suggestion: Concrete remediation approach with brief code or architecture sketch if helpful.

Severity guidelines:

  • HIGH: Active maintenance pain, production risk, blocks independent evolution, or causes cascading failures.

  • MEDIUM: Architecture smell that will cause problems as the system grows or as more teams contribute.

  • LOW: Minor design impurity, worth noting but fine to defer.

Summary

After all findings, provide:

  • A count table: | Principle | HIGH | MEDIUM | LOW |

  • Top 3 priorities: which violations to fix first and why.

  • Overall assessment: one paragraph on the system's structural health and evolvability posture.

  1. Refactor Mode (Optional)

When a fix or refactoring is requested (e.g., "fix this", "refactor it", "show me the clean version"), produce refactored code or an architecture proposal that resolves the identified violations. Explain each change briefly.

Pragmatism Guidelines

These are guidelines, not laws. Apply judgment:

  • Small projects and prototypes get a lighter touch. Don't flag a weekend project for lacking circuit breakers or API versioning.

  • Some "violations" are conscious trade-offs. When a rationale is documented (e.g., in an ADR), acknowledge it rather than insisting on purity.

  • Scale matters. A single-service CRUD app does not need the same architectural rigor as a platform serving millions of requests. Calibrate severity to context.

  • Principles have productive tensions. DRY conflicts with loose coupling across service boundaries. KISS conflicts with resilience patterns. YAGNI conflicts with evolvability. Flag the tension and offer judgment, not dogma.

  • Prefer actionable findings over exhaustive catalogs. Five important findings beat twenty trivial ones.

Example Interaction

User: sw-coupling (with a codebase directory)

Claude:

  • Reads references/coupling.md

  • Analyzes the directory for coupling/cohesion violations

  • Reports findings with locations, severity, and suggestions

  • Provides a summary with priorities

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Coding

spec-writer

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

access-control

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

sans25

No summary provided by upstream source.

Repository SourceNeeds Review