Claude Code Skills

Custom slash commands for AI-powered development workflows

Quick Reference

Jira Integration
/jiraFull ticket orchestrator — fetch, analyze, detect JAM recordings, design, implement, and update a Jira ticket end-to-end
/jira sprintSprint batch mode — fetches teams dynamically, lets you pick a team, then processes sprint tickets sequentially
/jira teamsLists all available Scrum teams fetched live from Jira — currently 13 teams in the FO project
/jamAnalyzes JAM bug recordings via MCP — video analysis, console logs, network requests, and user events
/tempoQuick time tracking for Jira tickets — add or view logged time without leaving the terminal
Feature Development
/new-featureSix-phase feature pipeline — plan, screenshot, design in Paper, parallel implementation, report, and optional testing
/code-analysisAnalyze only changed/new code for security, logic, quality, and performance issues — fix critical findings automatically
Code Quality
/dev-teamFull development team loop — security audit, quality scan, fixes, tests, and regression verification until zero findings
/security-auditOWASP Top 10 security scan of every file — injection, auth, XSS, access control, misconfig
/quality-auditCode quality scan — code smells, type safety, performance, error handling, API design
/fix-allFix all issues from security and quality audits, prioritized by severity
/test-allWrite comprehensive unit, security, integration, and regression tests — run until 100% pass
/master-reportCompile all agent reports into a single polished HTML master report
Docker & Deployment
/full-pipelineEnd-to-end delivery pipeline — quality loop, Playwright E2E, Docker build/deploy, integration tests, master report
/docker-buildBuild, validate, and security-scan Docker images
/docker-deployDeploy with Docker Compose, verify endpoints, collect access information
/docker-testRun comprehensive integration tests against a live Docker deployment
/docker-teardownGracefully tear down Docker containers and report freed resources
Testing
/unit-testScan projects for unit test coverage gaps, create missing tests, run and fix until green — supports full scan, single file, and project name resolution
/playwright-testRun full Playwright E2E browser test suite, analyze failures, write missing tests, generate HTML report
Security & Dependencies
/depsScan project dependencies for CVEs, outdated packages, and license risks — health grade A–F, auto-fix, and CI config export
/security-auditFull security audit of the codebase
Reporting
/reportAnalyze all branch changes, generate Jira-ready HTML report with categorized changes and QA testing instructions. Optional upload to Jira.
Universal
/createContext-aware feature creator — adapts role to project type, designs in Paper, generates HTML plan, implements, verifies with Playwright
/create-projectFull project creator from scratch — questions, Paper design, HTML plan, full agent team build, test, Docker, deliver
/bugContext-aware bug fixer — analyzes screenshots, diagnoses root cause, fixes, verifies with Playwright
/verifyE2E Playwright verification with project profile, screenshots, self-contained HTML report with clickable lightbox
/changelogGenerate HTML changelog from /create and /bug reports
Git Operations
/git syncMerge branch into current — pre-flight checks, AI conflict resolution with --fix-merge-errors, multi-project with --all
/git statusQuick branch overview: ahead/behind, uncommitted changes, stashes
Repository Onboarding & Impact
/repo-setupClone, analyze, install, build, test any repo. Org scan mode for GitHub orgs. --auto-setup, --search, --local-scan
/impact-scanCross-repo impact analysis — describe a change, scan all org repos to find exactly where it needs to be implemented. Per-repo file-level detail.

Jira Integration

/jira Jira Ticket Orchestrator

A senior technical lead that takes a Jira ticket from assignment to resolution. It fetches the ticket, downloads and inspects attachments (including images), automatically detects and analyzes JAM recordings linked in the ticket via MCP, classifies the work, creates UI designs in Paper when visual changes are needed, coordinates implementation agents, runs a code review on the changes, captures verification screenshots with Playwright, generates an HTML report, uploads everything back to Jira, and optionally logs time.

Usage

/jira FO-2872 /jira sprint /jira teams

Prerequisites

.env file (JIRA_BASE_URL, JIRA_EMAIL, JIRA_API_TOKEN) Paper MCP (for UI tickets) JAM MCP (for bug recording analysis) Playwright (for verification screenshots)
Pipeline Phases (5 phases)
  1. Fetch & Analyze — Load credentials, fetch ticket via Jira REST API, download attachments, visually inspect images, detect and analyze JAM recordings via MCP (video analysis, console errors, network failures, user events), ask user for project paths (never assumes), present ticket summary, classify the work (Bug Fix / UI Change / Backend / Full-stack / Config), find relevant codebase files, get user approval on the approach.
  2. Visual Capture & Design (mandatory for any UI change) — Screenshot existing UI with Playwright, create before/after design mockups in Paper with artboards prefixed by the ticket key, user reviews and approves designs.
  3. Implementation — Decide single or parallel agents based on scope, launch Backend and/or Frontend developer agents with full ticket context and design references, capture Paper design screenshots, run a Code Analyst agent on the diff (fixes CRITICAL issues automatically), take Playwright verification screenshots of the running app.
  4. Report & Jira Update — Generate a comprehensive HTML report, present results to user, optionally post a comment to Jira, upload report and screenshots as attachments, transition ticket status, log time.
  5. Final Summary — Present a complete summary of changes, Jira updates, files modified, and report location.

Key Features

Multi-Stack Support

The pipeline always asks the user for project paths — it never assumes or auto-detects which codebase a ticket belongs to. The current working directory (AIComp) is the orchestration project, not the ticket's codebase. After the user provides paths, the stack is detected from file indicators (package.json, *.csproj, pom.xml, go.mod, etc.):

Backend: D:\Kunder\247\Finago\control-backend-api Frontend: D:\Kunder\247\Finago\control-frontend Database: SQL Server

Agent prompts are tailored to the detected stack so agents write idiomatic code in the correct language and follow the correct conventions.

Before/After Visual Comparison

Sprint Batch Processing

/jira sprint

Team Listing

/jira teams

JAM Recording Detection

When processing a ticket, the pipeline automatically scans the description and comments for jam.dev links. When found, it uses the JAM MCP tools in parallel:

/tempo Jira Time Tracking

A quick utility for logging and viewing time on Jira tickets without opening a browser. Supports both clock-time ranges (14:00–16:00) and duration shorthand (2h, 45m). Handles timezone offset detection automatically.

Usage

/tempo addTime FO-2872 14:00 16:00 "Implemented invoice reference fix" /tempo addTime FO-2872 2h "Quick bug fix" /tempo addTime FO-2872 45m "Standup and planning" /tempo getTime FO-2872

Prerequisites

.env file (JIRA_BASE_URL, JIRA_EMAIL, JIRA_API_TOKEN)

Key Features

/jam JAM Session Analyzer

Analyzes JAM (jam.dev) bug recordings to understand bugs, issues, and feature requests captured in video sessions. Connects to the JAM MCP server to fetch full recording data including AI video analysis, console logs, network requests, and user interaction timelines.

Usage

/jam https://jam.dev/c/4828d597-d49b-4fa8-99b8-f696321af056 /jam abc123 /jam FO-2847

Prerequisites

JAM MCP server .env file (for Jira ticket lookup mode)

Input Modes

Analysis Output

Follow-up Actions

MCP Tools Used

Feature Development

/new-feature Feature Development Pipeline

A senior product manager and architect that guides a feature from idea to implementation. It plans the feature, captures the current app state, creates visual designs in Paper for user approval, launches parallel frontend and backend implementation agents, runs a code analysis pass, and produces a polished master HTML report.

Usage

/new-feature Add a user profile page with avatar upload and bio editing

Prerequisites

Paper MCP (for UI design) Playwright (for screenshots)
Pipeline Phases (6 phases)
  1. Feature Planning — Analyze the codebase, draft a structured plan (scope, backend changes, API contract, UI changes, dependencies, risks), get user approval, save the plan.
  2. Visual Capture (for UI/Full-stack) — Check if the app is running, capture Playwright screenshots of relevant existing pages for the designer's reference.
  3. UI Design in Paper (for UI/Full-stack) — Launch a UI Designer agent that creates artboards in Paper matching the app's design language, documents component hierarchy, interaction flows, and CSS approach. User must review and approve before continuing.
  4. Parallel Implementation — Launch Frontend Developer and/or Backend Developer agents in parallel based on scope. Each follows the approved plan and API contract exactly.
  5. Code Change Analysis — Run a Code Analyst agent on the diff to catch security issues, logic errors, and quality problems. Fix critical issues automatically.
  6. Master Feature Report — A Documentation Lead agent compiles all reports into a single HTML report with dashboard, plan, design, implementation details, integration map, and testing checklist.

Key Features

Multi-Stack Support

Step 1.0 now detects the project stack and asks for paths before anything else. Auto-detects from file indicators (package.json, *.csproj, pom.xml, go.mod, etc.), always asks user for project paths (supports multi-project setups), and builds a stack profile passed to all agents. Supported stacks: C#/.NET, Java/Spring, Python/Django/Flask/FastAPI, Go, Rust, C++, PHP/Laravel, Ruby/Rails, Dart/Flutter, Swift, React, Angular, Vue, Next.js, and more. Falls back to /project-index if auto-detection is unclear.

/code-analysis Code Change Analysis

A senior code reviewer that analyzes only the files changed during the current session (not the entire codebase). It reviews every changed line for security vulnerabilities, logic errors, code quality issues, and performance problems, then automatically fixes critical findings.

Usage

/code-analysis /code-analysis FO-2872 invoice fix changes

Key Features

Code Quality

/dev-team Full Development Team

Orchestrates a complete development team of five specialized agents in an iterative loop. Security Auditor and Code Quality Engineer scan in parallel, a Backend Developer fixes all findings, a Test Engineer writes and runs tests, then the auditors re-scan. This loop continues until a verification round produces zero new findings, then a master HTML report is generated.

Usage

/dev-team
Pipeline Workflow
  1. Round 1 — Parallel Scan: Security Auditor + Code Quality Engineer scan every file in parallel. Findings categorized as CRITICAL / WARNING / INFO.
  2. Fix: Backend Developer agent receives all findings and fixes every issue (CRITICAL first, then WARNING, then INFO).
  3. Test: Test Engineer writes tests for every fix plus edge cases, runs all tests, iterates until 100% pass.
  4. Verify: If test failures remain, the Backend Developer fixes them and tests re-run.
  5. Round 2..N — Regression Check: Auditors re-scan modified code. If new issues are found, the fix-test-verify cycle repeats. Loop continues until zero new findings.
  6. Master Report: Documentation Writer compiles all rounds into a professional HTML report with executive summary, per-round breakdown, before/after snippets, test coverage, and production-readiness assessment.

Key Features

/security-audit Security Auditor

A senior security auditor that performs a thorough OWASP Top 10 review of every file in the codebase. Checks for injection, broken authentication, sensitive data exposure, XSS, broken access control, security misconfiguration, and more.

Usage

/security-audit

Key Features

/quality-audit Code Quality Engineer

A senior code quality engineer that scans every file for code smells, anti-patterns, performance issues, type safety bugs, error handling gaps, inconsistent API design, and maintainability concerns.

Usage

/quality-audit

Key Features

/fix-all Backend Developer (Fixer)

A senior backend developer that reads all findings from the security and quality audit reports and fixes every issue, prioritized by severity: CRITICAL first (security vulnerabilities, data-loss bugs), then WARNING (correctness, quality), then INFO (improvements, best practices).

Usage

/fix-all

Prerequisites

Requires reports/security-audit.md and/or reports/quality-audit.md from prior audit runs.

Key Features

/test-all Test Engineer

A senior test engineer that ensures comprehensive test coverage for the entire codebase. Writes unit tests, security regression tests, integration tests, and edge-case tests, then runs them iteratively until all pass.

Usage

/test-all

Prerequisites

Requires reports/fixes-applied.md from a prior fix run.

Key Features

/master-report Master Report Generator

A documentation lead that compiles all individual agent reports (security audit, quality audit, fixes, tests) into a single, polished master HTML report with a dark theme, severity badges, collapsible sections, and print-friendly styling.

Usage

/master-report

Prerequisites

Requires reports from prior audit/fix/test runs in the reports/ directory.

Key Features

Docker & Deployment

/full-pipeline Full Pipeline Orchestrator

The ultimate delivery pipeline that coordinates the entire software delivery process: an iterative code quality loop (scan, fix, test, repeat), Playwright E2E browser testing, Docker build and deployment, live integration testing against the container, and a comprehensive master report.

Usage

/full-pipeline

Prerequisites

Docker Playwright
Pipeline Phases (4 phases)
  1. Phase 1 — Code Quality Loop: Parallel security audit + quality scan, Backend Developer fixes all issues, Test Engineer writes and runs tests, regression check. Loop until zero new findings.
  2. Phase 2 — Playwright E2E Testing: Run the full Playwright suite against the web UI, fix any failures (app bugs or test bugs), check coverage gaps, write additional tests.
  3. Phase 3 — Docker Pipeline: Build image (validate size, security scan, non-root user), deploy with Docker Compose (health check, endpoint verification), run integration tests against the live container (auth, CRUD, orders, security, edge cases).
  4. Phase 4 — Master Report: Compile all reports into a single HTML report with executive summary, security findings, quality improvements, test results, Docker build/deploy info, integration test matrix, and recommendations.

Key Features

/docker-build Docker Build

A Docker build engineer that builds the Docker image, validates it (size, non-root user, health check, no secrets in layers), runs a security scan for CVEs, and checks optimization opportunities (multi-stage builds, layer ordering, slim base).

Usage

/docker-build

Prerequisites

Docker

Key Features

/docker-deploy Docker Deploy

A deployment engineer that deploys the application using Docker Compose, waits for health checks, tests key endpoints, and collects comprehensive deployment information including container ID, IP, network, port mappings, resource usage, and logs.

Usage

/docker-deploy

Prerequisites

Docker

Key Features

/docker-test Docker Integration Tests

A QA engineer that runs comprehensive integration tests against the live Docker deployment using curl. Covers smoke tests, authentication flows, CRUD operations, order lifecycle, security tests (XSS, SQL injection, auth bypass), edge cases, and container health verification.

Usage

/docker-test

Prerequisites

Docker (container running on port 3000)

Key Features

/docker-teardown Docker Teardown

A cleanup engineer that captures the current Docker state, performs a graceful shutdown with docker compose down, verifies containers are removed and ports are released, and reports on remaining resources that could be cleaned up.

Usage

/docker-teardown

Prerequisites

Docker

Key Features

Testing

/unit-test Unit Test Engineer

A senior unit test engineer that analyzes codebases, maps existing test coverage, identifies gaps, creates comprehensive unit tests, and runs them iteratively until they all pass. Supports any tech stack and resolves project names from prior work sessions.

Usage

/unit-test * /unit-test * control-backend-api /unit-test se/inbooks/backend/admin/auth/AdminAuth.java /unit-test AdminAuth.java control-backend-api /unit-test --fix-ignored /unit-test --fix-ignored control-backend-api

Modes

Multi-Stack Support

Project Name Resolution

The command resolves project names from prior work. For example, typing control-backend-api is resolved to the full path based on known project directories. If the name can't be resolved, the user is asked for the full path.

Pipeline Phases (5 phases)
  1. Parse & Resolve — Parse arguments, resolve project name to path, detect tech stack, find test directory and conventions.
  2. Map Coverage (full scan) — Find all test files, document what each tests, find all source files, create a coverage map (Full / Partial / None), identify gaps sorted by priority.
  3. Create Tests — Launch specialized test agents for each file. Tests cover happy path, edge cases, error handling, return values, and side effects. Mocks external dependencies only.
  4. Run & Fix — Run new tests, analyze failures (compilation errors, mock issues, assertion failures, source bugs), fix and re-run up to 5 iterations. Then run full test suite to check for regressions.
  5. Report — Generate detailed HTML report with coverage map, tests created, fixes applied, source bugs found, test run results, and remaining gaps.

Key Features

/deps Dependency Health Auditor

A senior security & dependency engineer that scans all project dependencies for known vulnerabilities (CVEs), outdated packages, and license compatibility risks. Produces a risk-scored health grade and can auto-apply safe updates or generate CI automation configs.

Usage

/deps /deps control-backend-api /deps --vuln-only /deps --outdated gateway-backend /deps --license

Modes

Multi-Stack Support

Project Name Resolution

Resolves project names from prior work. For example, control-backend-api resolves to the full path. If unresolvable, the user is asked for the full path.

Pipeline Phases (4 phases)
  1. Parse & Resolve — Parse arguments, resolve project path, detect stack and package manager, identify lock files and native audit commands.
  2. Vulnerability Scan — Run native audit tools, parse CVEs with severity/CVSS scores, assess exploitability in the project context (exploitable / potentially exploitable / not exploitable).
  3. Outdated & License — Check all dependencies for newer versions (patch/minor/major), compute staleness score. Audit licenses for copyleft/unknown/no-license risks.
  4. Report & Action — Generate health score (0–100, grade A–F), produce detailed HTML report, offer to auto-fix safe updates or export Dependabot/Renovate configs.

Key Features

/playwright-test Playwright E2E Tests

A senior E2E test engineer that runs the full Playwright browser test suite against the web application. It verifies Playwright installation, runs all tests, analyzes failures (distinguishing app bugs from test bugs), identifies coverage gaps, writes new tests for untested flows, and generates both a Playwright HTML report and a markdown summary.

Usage

/playwright-test

Prerequisites

Playwright App running on port 3000 (or Docker container)

Key Features

Reporting

/report Change Report Generator

Analyzes ALL code changes on the current branch (vs main/develop), categorizes them, and generates a comprehensive HTML report with detailed QA testing instructions. Works for both AI-assisted and manual changes. Can upload directly to Jira.

Usage

/report /report FO-2847 /report --compare develop /report --since abc1234

Report Contents

Jira Upload

Universal Commands

/create Feature Creator

Context-aware feature creator that adapts to any project type. Reads ProjectType from .claude/.env, assumes the matching senior role, designs in Paper, generates an HTML plan with embedded mockup screenshots, auto-opens in browser for user approval, implements, and verifies with Playwright.

Usage

/create "Add dark mode toggle to settings" /create "REST endpoint for bulk invoice export" /create "Monsters that hunt the player using pathfinding"

Key Features

/create-project Project Creator

Creates a complete project from scratch. Asks clarifying questions, designs architecture and UI in Paper, generates HTML plan, then orchestrates the full agent team: Backend Dev, Frontend Dev, Security Auditor, Quality Engineer, Test Engineer, Code Analyst, and Documentation Lead.

Usage

/create-project "Task management app with Kanban boards" /create-project "SaaS dashboard for IoT monitoring" /create-project "2D platformer with procedural levels"

Pipeline (10 steps)

/bug Bug Fixer

Context-aware bug fixer. Same role adaptation as /create. Analyzes pasted screenshots, diagnoses root cause, applies minimum fix, verifies with Playwright.

Usage

/bug "Player falls through floor when jumping near walls" /bug "Login shows 500 error after session timeout"

/verify E2E Verification

Playwright-based verification that features work and bugs are fixed. Uses a project profile (.claude/project-profile.json) for login and navigation. Takes before/after screenshots. Generates self-contained HTML report with clickable lightbox.

Usage

/verify # Auto-verify latest report /verify reports/jira-FO-2847-report.html # Verify specific report /verify setup # Create/update project profile /verify "Check login redirects properly" # Manual verification

Key Features

/changelog Changelog Generator

Reads reports from .claude/unprocessed_reports/ and generates a project-themed HTML changelog. Design automatically matches the project type: dark neon patch notes for games, clean corporate for apps, terminal-style for APIs. Saves design to project profile for consistency across all reports.

Usage

/changelog

Project-Aware Design

Git & Repository Onboarding

/git Git Operations

Branch syncing with AI-powered conflict resolution and multi-project support.

Usage

/git sync develop /git sync develop --fix-merge-errors /git sync develop --all /git status

Key Features

/repo-setup Repository Onboarding

Analyzes and sets up any repository or entire GitHub organization for local development.

Usage

/repo-setup https://github.com/org/project.git /repo-setup https://github.com/nexum-fo /repo-setup https://github.com/nexum-fo --auto-setup --search "API" /repo-setup --local-scan D:\Projects

Key Features

/impact-scan Cross-Repository Impact Scanner

Describe a change you want to make, and this command scans all repositories in an organization to find exactly where it needs to be implemented. Produces a detailed HTML report with per-repo file-level change descriptions, dependency chain, implementation order, and risk assessment.

Usage

/impact-scan "Add product price to payload response for REST public api" /impact-scan "Add price field" --org https://github.com/nexum-fo /impact-scan "Add price field" --local-scan D:\Projects /impact-scan "Add price" --repos backend-api,frontend,shared-types

Key Features