Files
gh-dhofheinz-open-plugins-p…/commands/architect/review.md
2025-11-29 18:20:21 +08:00

26 KiB

Architecture Review Operation

You are executing the review operation using the 10x-fullstack-engineer agent to assess existing architecture quality, security, performance, and maintainability.

Parameters

Received: $ARGUMENTS (after removing 'review' operation name)

Expected format: [path:"directory"] [focus:"security|performance|scalability|maintainability"] [depth:"shallow|deep"]

Parse the arguments to extract:

  • path (optional): Specific directory or component to review (defaults to entire codebase)
  • focus (optional): Primary concern area - security, performance, scalability, maintainability, or "all"
  • depth (optional): Review depth - "shallow" for quick assessment, "deep" for comprehensive analysis (default: "deep")

Workflow

Phase 1: Context Discovery

Discover and understand the existing architecture:

  1. Directory Structure Analysis:

    • Examine project organization
    • Identify major components and layers
    • Detect framework and patterns used
    • Map file relationships and dependencies
  2. Technology Stack Identification:

    • Frontend: Framework, state management, build tools
    • Backend: Language, framework, libraries
    • Database: Type, ORM/query builder, migrations
    • Infrastructure: Deployment, orchestration, monitoring
    • Dependencies: Third-party packages and versions
  3. Configuration Review:

    • Environment configuration
    • Build and deployment configurations
    • Database connection and pooling
    • Caching configuration
    • Logging and monitoring setup
  4. Documentation Assessment:

    • README quality and completeness
    • API documentation
    • Architecture diagrams if available
    • ADRs in docs/adr/
    • Code comments and inline documentation
  5. Testing Infrastructure:

    • Unit test coverage
    • Integration test presence
    • E2E test setup
    • Testing frameworks and patterns

Use available tools:

  • Glob to find relevant files by patterns
  • Read to examine key architectural files
  • Grep to search for patterns, anti-patterns, and security issues
  • Bash to run analysis scripts (e.g., analyze-dependencies.sh, complexity-metrics.py)

Phase 2: Layer-by-Layer Analysis

Analyze each architectural layer systematically:

Database Layer Review

Schema Quality:

  • Table design and normalization
  • Index coverage for common queries
  • Foreign key relationships and referential integrity
  • Constraint usage (unique, not null, check)
  • Data types appropriateness

Performance:

  • Index effectiveness (check for missing or unused indexes)
  • Query patterns (N+1 queries, table scans)
  • Connection pooling configuration
  • Transaction isolation levels
  • Read replica usage if applicable

Scalability:

  • Sharding readiness
  • Data volume handling
  • Migration patterns
  • Backup and recovery strategy

Security:

  • SQL injection protection
  • Encryption at rest
  • Access control and permissions
  • Audit logging
  • PII handling

Issues to Flag:

  • Missing indexes on frequently queried columns
  • Lack of foreign key constraints
  • Unoptimized queries (SELECT *, missing WHERE clauses)
  • Missing migration strategy
  • Hardcoded credentials
  • Insufficient connection pooling

Backend Layer Review

API Design Quality:

  • RESTful principles adherence
  • Consistent naming conventions
  • Versioning strategy
  • Error response formats
  • HTTP status code usage
  • Request/response validation

Code Organization:

  • Separation of concerns
  • Layer isolation (controller/service/repository)
  • Dependency injection usage
  • Module boundaries
  • Code duplication

Business Logic:

  • Complexity and readability
  • Error handling completeness
  • Input validation and sanitization
  • Transaction management
  • Domain modeling quality

Authentication & Authorization:

  • Token management (JWT, OAuth)
  • Session handling
  • Authorization checks at appropriate layers
  • RBAC/ABAC implementation
  • Password hashing (bcrypt, argon2)

Performance:

  • Response time profiling
  • Database query efficiency
  • Caching effectiveness
  • Async/await usage
  • Connection pooling
  • Rate limiting

Security:

  • Input validation and sanitization
  • SQL injection prevention
  • XSS prevention
  • CSRF protection
  • Secrets management
  • Security headers
  • Dependency vulnerabilities

Maintainability:

  • Code complexity metrics
  • Test coverage
  • Code comments
  • Consistent error handling
  • Logging completeness
  • Dead code elimination

Issues to Flag:

  • Synchronous blocking operations in async contexts
  • Missing error handling
  • Hardcoded secrets or credentials
  • Insufficient input validation
  • Missing authentication/authorization checks
  • Poor error messages
  • Excessive code complexity
  • Lack of logging
  • Dependency vulnerabilities

Frontend Layer Review

Component Architecture:

  • Component size and complexity
  • Reusability and composition
  • Smart vs presentational separation
  • Component communication patterns
  • Prop drilling issues

State Management:

  • State organization and structure
  • Global vs local state balance
  • State update patterns
  • Performance implications
  • Redux/MobX/Context usage quality

Performance:

  • Bundle size analysis
  • Code splitting effectiveness
  • Lazy loading usage
  • Rendering optimization (memoization, virtualization)
  • Image optimization
  • Web Vitals compliance

User Experience:

  • Loading states
  • Error boundaries
  • Accessibility (WCAG compliance)
  • Responsive design
  • Progressive enhancement
  • Offline support

Security:

  • XSS prevention
  • Content Security Policy
  • Secure cookies
  • Token storage
  • Sensitive data exposure

Build & Deployment:

  • Build configuration
  • Asset optimization
  • Source maps
  • Environment configuration
  • CI/CD integration

Issues to Flag:

  • Large bundle sizes (> 500KB)
  • Missing code splitting
  • Prop drilling through multiple levels
  • Unnecessary re-renders
  • Missing loading/error states
  • Accessibility violations
  • Insecure token storage (localStorage for sensitive tokens)
  • Missing error boundaries
  • Large components (> 300 lines)
  • Unused dependencies

Infrastructure Layer Review

Deployment Architecture:

  • Containerization quality
  • Orchestration configuration
  • Service discovery
  • Load balancing
  • Auto-scaling configuration

Scalability:

  • Horizontal scaling readiness
  • Stateless service design
  • Session management
  • Database scaling strategy
  • CDN usage

Monitoring & Observability:

  • Application monitoring
  • Infrastructure monitoring
  • Log aggregation
  • Distributed tracing
  • Alerting configuration
  • SLO/SLA definition

CI/CD Pipeline:

  • Build automation
  • Test automation
  • Deployment automation
  • Rollback procedures
  • Blue-green or canary deployment

Security:

  • Network segmentation
  • Firewall rules
  • WAF configuration
  • DDoS protection
  • Encryption in transit and at rest
  • Secrets management
  • Vulnerability scanning

Disaster Recovery:

  • Backup strategy
  • Recovery procedures
  • RTO and RPO targets
  • Failover mechanisms

Issues to Flag:

  • Single point of failure
  • Missing monitoring/alerting
  • No rollback strategy
  • Insufficient logging
  • Missing backups
  • Insecure network configuration
  • Hardcoded secrets in deployment configs
  • No health checks
  • Missing auto-scaling
  • Lack of disaster recovery plan

Phase 3: Cross-Cutting Concerns Analysis

Security Audit

Authentication:

  • Strong password requirements
  • Multi-factor authentication
  • Token expiration and rotation
  • Session management

Authorization:

  • Proper access control checks
  • Principle of least privilege
  • Resource-level permissions

Data Protection:

  • Encryption at rest and in transit
  • PII handling and anonymization
  • Data retention policies
  • GDPR/CCPA compliance

Dependency Security:

  • Known vulnerabilities in dependencies
  • Outdated packages
  • License compliance

Common Vulnerabilities:

  • OWASP Top 10 coverage
  • Injection attacks
  • Broken authentication
  • Sensitive data exposure
  • XML external entities
  • Broken access control
  • Security misconfiguration
  • Cross-site scripting
  • Insecure deserialization
  • Insufficient logging

Performance Analysis

Response Times:

  • API endpoint latency
  • Database query performance
  • External API call times
  • Cache hit rates

Resource Utilization:

  • CPU usage patterns
  • Memory consumption
  • Database connections
  • Network bandwidth

Bottlenecks:

  • Slow database queries
  • Synchronous blocking calls
  • Unoptimized algorithms
  • Missing caching

Frontend Performance:

  • Page load times
  • Time to interactive
  • Bundle sizes
  • Asset optimization

Scalability Assessment

Current Limits:

  • Concurrent user capacity
  • Request throughput
  • Data volume limits
  • Connection pool sizes

Scaling Strategy:

  • Horizontal scaling readiness
  • Database scaling approach
  • Stateless design
  • Caching layers

Potential Bottlenecks:

  • Database write contention
  • Shared state
  • Single-threaded processing
  • Synchronous dependencies

Maintainability Review

Code Quality:

  • Cyclomatic complexity
  • Code duplication
  • Consistent naming conventions
  • Code organization

Testing:

  • Test coverage percentage
  • Test quality and effectiveness
  • Testing pyramid balance
  • Flaky tests

Documentation:

  • README completeness
  • API documentation
  • Architecture diagrams
  • Onboarding guides
  • Runbooks

Technical Debt:

  • TODO comments
  • Deprecated code
  • Workarounds and hacks
  • Outdated dependencies

Phase 4: Issue Identification and Scoring

For each issue found, document:

Issue Template:

**Issue**: [Brief description]
**Category**: [Security/Performance/Scalability/Maintainability]
**Severity**: [Critical/High/Medium/Low]
**Location**: [File and line number or component]
**Impact**: [Detailed explanation of consequences]
**Recommendation**: [How to fix]
**Effort**: [Estimated effort to fix]
**Priority**: [Immediate/High/Medium/Low]

Severity Levels:

  • Critical: Security vulnerability, data loss risk, production outage risk
  • High: Significant performance impact, major security concern, scalability blocker
  • Medium: Performance degradation, maintainability issues, minor security concerns
  • Low: Code quality issues, minor optimizations, documentation gaps

Scoring System (0-10 scale):

Score each dimension:

  • Security: 0 (critical vulnerabilities) to 10 (best practices throughout)
  • Performance: 0 (unacceptably slow) to 10 (optimized)
  • Scalability: 0 (won't scale) to 10 (proven scalable architecture)
  • Maintainability: 0 (unmaintainable) to 10 (excellent code quality)
  • Reliability: 0 (frequent failures) to 10 (highly reliable)

Overall Architecture Health: Average of all dimensions

Phase 5: Recommendations and Roadmap

Provide actionable recommendations prioritized by impact and effort:

Quick Wins (High Impact, Low Effort):

  • Issues that can be fixed quickly with significant benefit
  • Typically security fixes, configuration changes, missing indexes

Important Improvements (High Impact, Medium Effort):

  • Architectural changes with significant value
  • Performance optimizations requiring code changes
  • Security hardening requiring moderate work

Strategic Initiatives (High Impact, High Effort):

  • Major architectural refactoring
  • Technology migrations
  • Comprehensive test suite development

Technical Debt Paydown (Medium Impact, Variable Effort):

  • Code quality improvements
  • Documentation updates
  • Dependency updates
  • Test coverage improvements

Nice-to-Haves (Low-Medium Impact, Any Effort):

  • Minor optimizations
  • Code style improvements
  • Additional monitoring

Output Format

Provide a comprehensive architecture review report:

# Architecture Review Report

**Review Date**: [Date]
**Scope**: [Full system / specific component]
**Focus**: [All / Security / Performance / Scalability / Maintainability]
**Depth**: [Shallow / Deep]
**Reviewer**: 10x-fullstack-engineer agent

## Executive Summary

[2-3 paragraph summary of findings, overall health, and key recommendations]

**Overall Architecture Health**: [Score]/10

**Key Findings**:
- [Most critical finding]
- [Second most critical finding]
- [Third most critical finding]

**Recommended Priority Actions**:
1. [Top priority action]
2. [Second priority action]
3. [Third priority action]

## Architecture Health Scores

| Dimension | Score | Status | Trend |
|-----------|-------|--------|-------|
| Security | [0-10] | [Critical/Poor/Fair/Good/Excellent] | [↑↓→] |
| Performance | [0-10] | [Critical/Poor/Fair/Good/Excellent] | [↑↓→] |
| Scalability | [0-10] | [Critical/Poor/Fair/Good/Excellent] | [↑↓→] |
| Maintainability | [0-10] | [Critical/Poor/Fair/Good/Excellent] | [↑↓→] |
| Reliability | [0-10] | [Critical/Poor/Fair/Good/Excellent] | [↑↓→] |
| **Overall** | **[0-10]** | **[Status]** | **[Trend]** |

**Score Interpretation**:
- 9-10: Excellent - Industry best practices
- 7-8: Good - Minor improvements needed
- 5-6: Fair - Moderate improvements needed
- 3-4: Poor - Significant issues to address
- 0-2: Critical - Urgent action required

## System Overview

### Technology Stack
**Frontend**: [Technologies]
**Backend**: [Technologies]
**Database**: [Technologies]
**Infrastructure**: [Technologies]
**Monitoring**: [Technologies]

### Architecture Pattern
[Monolith / Microservices / Serverless / Hybrid]

### Key Characteristics
- [Characteristic 1]
- [Characteristic 2]
- [Characteristic 3]

## Detailed Findings

### Security Analysis (Score: [X]/10)

**Strengths**:
- [Positive security practices]
- [What's done well]

**Issues Identified**:

**CRITICAL Issues**:
1. **[Issue Name]**
   - **Location**: [File/component]
   - **Impact**: [Security risk description]
   - **Recommendation**: [How to fix]
   - **Effort**: [Time estimate]

**HIGH Severity Issues**:
1. **[Issue Name]**
   - **Location**: [File/component]
   - **Impact**: [Security risk description]
   - **Recommendation**: [How to fix]
   - **Effort**: [Time estimate]

**MEDIUM Severity Issues**:
[List of medium issues with brief descriptions]

**LOW Severity Issues**:
[List of low issues with brief descriptions]

**Security Best Practices Compliance**:
- ✅ [Practice followed]
- ✅ [Practice followed]
- ❌ [Practice missing]
- ❌ [Practice missing]

**Recommendations**:
1. [Top security recommendation]
2. [Second security recommendation]
3. [Third security recommendation]

### Performance Analysis (Score: [X]/10)

**Strengths**:
- [What performs well]
- [Good performance practices]

**Performance Metrics** (if available):
- API Response Time (p50): [Xms]
- API Response Time (p95): [Xms]
- API Response Time (p99): [Xms]
- Database Query Time (avg): [Xms]
- Page Load Time: [Xs]
- Bundle Size: [XKB]

**Issues Identified**:

**CRITICAL Issues**:
1. **[Performance bottleneck]**
   - **Location**: [File/component]
   - **Impact**: [Performance impact - response times, throughput]
   - **Current**: [Current performance]
   - **Target**: [Target performance]
   - **Recommendation**: [Optimization approach]
   - **Expected Improvement**: [Performance gain estimate]
   - **Effort**: [Time estimate]

**HIGH Severity Issues**:
[Similar format as critical]

**MEDIUM Severity Issues**:
[List with brief descriptions]

**Optimization Opportunities**:
- [Opportunity 1]: [Potential gain]
- [Opportunity 2]: [Potential gain]
- [Opportunity 3]: [Potential gain]

**Recommendations**:
1. [Top performance recommendation]
2. [Second performance recommendation]
3. [Third performance recommendation]

### Scalability Analysis (Score: [X]/10)

**Current Scale**:
- Users: [Estimated current users]
- Requests: [Current request volume]
- Data: [Current data volume]

**Scaling Capabilities**:
- **Horizontal Scaling**: [Yes/No/Limited] - [Explanation]
- **Vertical Scaling**: [Current headroom]
- **Database Scaling**: [Current approach]

**Strengths**:
- [Scalable design elements]
- [Good scaling practices]

**Limitations**:
1. **[Scalability bottleneck]**
   - **Current Limit**: [When this breaks]
   - **Impact**: [What happens at scale]
   - **Recommendation**: [How to scale past this]
   - **Effort**: [Time estimate]

**Scaling Readiness Assessment**:
- ✅ Stateless application design
- ✅ Connection pooling configured
- ❌ Database sharding not implemented
- ❌ No caching layer
- ✅ Horizontal auto-scaling configured
- ❌ No rate limiting

**Projected Capacity**:
- Maximum concurrent users: [Estimate]
- Maximum requests/second: [Estimate]
- Bottleneck at: [What fails first]

**Recommendations**:
1. [Top scalability recommendation]
2. [Second scalability recommendation]
3. [Third scalability recommendation]

### Maintainability Analysis (Score: [X]/10)

**Code Quality Metrics** (if available):
- Test Coverage: [X]%
- Average Cyclomatic Complexity: [X]
- Code Duplication: [X]%
- Lines of Code: [X]
- Technical Debt Ratio: [X]%

**Strengths**:
- [Good maintainability practices]
- [What makes code maintainable]

**Issues Identified**:

**HIGH Impact Issues**:
1. **[Maintainability issue]**
   - **Location**: [Component/file]
   - **Impact**: [How this affects maintenance]
   - **Recommendation**: [Improvement approach]
   - **Effort**: [Time estimate]

**MEDIUM Impact Issues**:
[List with brief descriptions]

**Technical Debt Items**:
- [Debt item 1]: [Impact]
- [Debt item 2]: [Impact]
- [Debt item 3]: [Impact]

**Documentation Assessment**:
- ✅ [Documentation present]
- ✅ [Documentation present]
- ❌ [Documentation missing]
- ❌ [Documentation missing]

**Testing Assessment**:
- Unit Tests: [X]% coverage - [Quality assessment]
- Integration Tests: [Present/Missing] - [Assessment]
- E2E Tests: [Present/Missing] - [Assessment]
- Test Quality: [Assessment]

**Recommendations**:
1. [Top maintainability recommendation]
2. [Second maintainability recommendation]
3. [Third maintainability recommendation]

### Reliability Analysis (Score: [X]/10)

**Strengths**:
- [Reliability features]
- [Good practices]

**Issues Identified**:
1. **[Reliability concern]**
   - **Impact**: [Potential for failure]
   - **Likelihood**: [How likely]
   - **Recommendation**: [Mitigation]
   - **Effort**: [Time estimate]

**Monitoring & Observability**:
- Application Monitoring: [Present/Missing]
- Error Tracking: [Present/Missing]
- Logging: [Assessment]
- Alerting: [Assessment]
- Health Checks: [Present/Missing]

**Error Handling**:
- Error handling coverage: [Assessment]
- Graceful degradation: [Yes/No]
- Circuit breakers: [Present/Missing]
- Retry logic: [Present/Missing]

**Disaster Recovery**:
- Backup strategy: [Assessment]
- Recovery procedures: [Documented/Missing]
- RTO target: [X hours/unknown]
- RPO target: [X hours/unknown]

**Recommendations**:
1. [Top reliability recommendation]
2. [Second reliability recommendation]
3. [Third reliability recommendation]

## Architecture Patterns Analysis

### Positive Patterns Identified
- **[Pattern Name]**: [Where used] - [Benefits]
- **[Pattern Name]**: [Where used] - [Benefits]

### Anti-Patterns Identified
- **[Anti-Pattern Name]**: [Where found] - [Issues] - [Recommendation]
- **[Anti-Pattern Name]**: [Where found] - [Issues] - [Recommendation]

### Recommended Patterns to Adopt
- **[Pattern Name]**: [Use case] - [Benefits] - [Implementation approach]
- **[Pattern Name]**: [Use case] - [Benefits] - [Implementation approach]

## Dependency Analysis

### Security Vulnerabilities
| Package | Severity | Vulnerability | Recommendation |
|---------|----------|---------------|----------------|
| [package] | Critical | [CVE/description] | Update to [version] |
| [package] | High | [CVE/description] | Update to [version] |

### Outdated Dependencies
| Package | Current | Latest | Breaking Changes |
|---------|---------|--------|------------------|
| [package] | [version] | [version] | Yes/No |

### Unused Dependencies
- [package]: [reason it's unused]
- [package]: [reason it's unused]

## Recommendations Roadmap

### Immediate Actions (This Sprint)
**Priority**: CRITICAL - Address immediately

1. **[Action Item]**
   - **Category**: [Security/Performance/etc.]
   - **Impact**: [What improves]
   - **Effort**: [Time estimate]
   - **Owner**: [Team/person]

2. **[Action Item]**
   [Same format]

### Short-Term Improvements (Next 1-2 Months)
**Priority**: HIGH - Schedule soon

1. **[Action Item]**
   [Same format as above]

### Medium-Term Initiatives (Next 3-6 Months)
**Priority**: MEDIUM - Plan and schedule

1. **[Action Item]**
   [Same format]

### Long-Term Strategic Changes (6+ Months)
**Priority**: STRATEGIC - Begin planning

1. **[Action Item]**
   [Same format]

## Cost-Benefit Analysis

| Recommendation | Impact | Effort | Cost | ROI | Priority |
|----------------|--------|--------|------|-----|----------|
| [Item 1] | High | Low | $X | High | 1 |
| [Item 2] | High | Medium | $X | Medium | 2 |
| [Item 3] | Medium | Low | $X | High | 3 |

## Risk Assessment

### Current Risks
1. **[Risk Description]**
   - **Likelihood**: High/Medium/Low
   - **Impact**: Critical/High/Medium/Low
   - **Mitigation**: [Recommendation]
   - **Timeline**: [When to address]

### Risks If Recommendations Not Implemented
1. **[Risk Description]**
   - **Likelihood**: [Assessment]
   - **Impact**: [Assessment]
   - **Timeline**: [When risk materializes]

## Comparison to Industry Standards

| Aspect | Current State | Industry Standard | Gap |
|--------|---------------|-------------------|-----|
| Security | [Assessment] | [Standard] | [Gap] |
| Performance | [Assessment] | [Standard] | [Gap] |
| Scalability | [Assessment] | [Standard] | [Gap] |
| Test Coverage | [X]% | 80%+ | [Gap] |
| Monitoring | [Assessment] | [Standard] | [Gap] |

## Conclusion

[Summary of overall architecture state, key findings, and recommended next steps]

**Overall Assessment**: [Narrative assessment of architecture health]

**Critical Success Factors**:
1. [What needs to happen for success]
2. [Key factor 2]
3. [Key factor 3]

**Next Steps**:
1. [Immediate next step]
2. [Following step]
3. [Third step]

## Appendices

### Appendix A: Detailed Issue List
[Comprehensive list of all issues with full details]

### Appendix B: Performance Profiling Results
[Detailed performance data if available]

### Appendix C: Security Audit Details
[Comprehensive security findings]

### Appendix D: Code Quality Metrics
[Detailed code quality measurements]

### Appendix E: References
- [Related ADRs]
- [Industry standards referenced]
- [Tools used for analysis]

Agent Invocation

This operation MUST invoke the 10x-fullstack-engineer agent for expert architecture review.

Agent context to provide:

  • Parsed parameters (path, focus, depth)
  • Discovered technology stack
  • Current architecture patterns
  • Issues found during analysis
  • Performance metrics if available
  • Security concerns identified

Agent responsibilities:

  • Apply 15+ years of architectural review experience
  • Identify subtle issues and anti-patterns
  • Assess architecture health across all dimensions
  • Provide actionable recommendations
  • Prioritize findings by impact and effort
  • Suggest industry best practices
  • Compare to similar production systems

Agent invocation approach: Present comprehensive architecture analysis and explicitly request: "Using your 15+ years of full-stack architecture experience, review this system architecture. Assess security, performance, scalability, maintainability, and reliability. Provide scored assessment, identify critical issues, and recommend prioritized improvements. Consider both immediate risks and long-term technical debt."

Error Handling

Path Not Found

If specified path doesn't exist:

Error: Path not found: [path]

Available paths to review:
- [directory 1]
- [directory 2]
- [directory 3]

Would you like to:
a) Review the entire codebase (no path specified)
b) Specify a different path
c) List available directories

Please specify a valid path or choose an option.

Insufficient Permissions

If cannot read files:

Error: Insufficient permissions to read files in [path]

I need read access to:
- Source code files
- Configuration files
- Documentation

Please ensure the files are readable or specify a different path.

Unknown Focus Area

If focus parameter is invalid:

Error: Unknown focus area: [focus]

Valid focus areas:
- security       Focus on security vulnerabilities and best practices
- performance    Focus on response times, throughput, and optimization
- scalability    Focus on scaling capabilities and limitations
- maintainability Focus on code quality, testing, and documentation
- all            Comprehensive review across all areas (default)

Example: /architect review focus:"security" depth:"deep"

Empty Codebase

If no code found to review:

Error: No code found to review in [path]

The specified path appears empty or contains no reviewable files.

Please specify a path containing:
- Source code files
- Configuration files
- Application logic

Or I can search for code in the current directory.

Examples

Example 1 - Comprehensive System Review:

/architect review

Reviews entire codebase across all dimensions with deep analysis.

Example 2 - Security-Focused Review:

/architect review focus:"security" depth:"deep"

Deep security audit covering OWASP Top 10, dependency vulnerabilities, and security best practices.

Example 3 - Quick Performance Assessment:

/architect review focus:"performance" depth:"shallow"

Quick performance review identifying obvious bottlenecks and optimization opportunities.

Example 4 - Specific Component Review:

/architect review path:"src/services/payment" focus:"security"

Focused security review of payment service component.

Example 5 - Pre-Production Review:

/architect review focus:"all" depth:"deep"

Comprehensive production-readiness review before deployment.

Example 6 - Scalability Assessment:

/architect review focus:"scalability" depth:"deep"

Detailed analysis of scaling capabilities and limitations for capacity planning.

Example 7 - Code Quality Review:

/architect review path:"src/api" focus:"maintainability"

Maintainability review of API layer for technical debt and refactoring opportunities.