Slash Commands API Reference

Complete API documentation for all slash commands in the Claude Context Plugin.

Table of Contents


Quick Reference

By Use Case

Code Quality & Analysis

Development Workflow

Documentation & Planning

Project Management

Session Management


Command Categories

Analyze Commands

/analyze:code

Description: Comprehensive code analysis across quality, security, performance, and architecture domains

Category: utility Complexity: basic

Triggers:

Usage:

/analyze:code [target] [--focus quality|security|performance|architecture] [--depth quick|deep|ultra] [--reasoning-profile default|security|performance] [--format text|json|report]

Behavioral Flow:

  1. Discover: Categorize source files using language detection and project analysis
  2. Scan: Apply domain-specific analysis techniques and pattern matching
  3. Evaluate: Generate prioritized findings with severity ratings and impact assessment
  4. Recommend: Create actionable recommendations with implementation guidance
  5. Report: Present comprehensive analysis with metrics and improvement roadmap

Tool Coordination:

Reasoning Profiles:

default

security

performance

Key Patterns:

Examples:

# Comprehensive Project Analysis
/analyze:code
# Multi-domain analysis of entire project
# Generates comprehensive report with key findings and roadmap

# Focused Security Assessment
/analyze:code src/auth --focus security --depth deep
# Deep security analysis of authentication components
# Vulnerability assessment with detailed remediation guidance

# Performance Optimization Analysis
/analyze:code --focus performance --format report
# Performance bottleneck identification
# Generates HTML report with optimization recommendations

# Quick Quality Check
/analyze:code src/components --focus quality --depth quick
# Rapid quality assessment of component directory
# Identifies code smells and maintainability issues

Boundaries:

Will:

Will Not:

Related Commands: /analyze:security-scan, /dev:code-review, /quality:improve


/analyze:estimate

Description: Provide development estimates for tasks, features, or projects with intelligent analysis

Category: special Complexity: standard

MCP Servers: sequential, context7

Personas: architect, performance, project-manager

Triggers:

Usage:

/analyze:estimate [target] [--type time|effort|complexity] [--unit hours|days|weeks] [--breakdown]

Behavioral Flow:

  1. Analyze: Examine scope, complexity factors, dependencies, and framework patterns
  2. Calculate: Apply estimation methodology with historical benchmarks and complexity scoring
  3. Validate: Cross-reference estimates with project patterns and domain expertise
  4. Present: Provide detailed breakdown with confidence intervals and risk assessment
  5. Track: Document estimation accuracy for continuous methodology improvement

MCP Integration:

Tool Coordination:

Key Patterns:

Examples:

# Feature Development Estimation
/analyze:estimate "user authentication system" --type time --unit days --breakdown
# Systematic analysis: Database design (2 days) + Backend API (3 days) + Frontend UI (2 days) + Testing (1 day)
# Total: 8 days with 85% confidence interval

# Project Complexity Assessment
/analyze:estimate "migrate monolith to microservices" --type complexity --breakdown
# Architecture complexity analysis with risk factors and dependency mapping
# Multi-persona coordination for comprehensive assessment

# Performance Optimization Effort
/analyze:estimate "optimize application performance" --type effort --unit hours
# Performance persona analysis with benchmark comparisons
# Effort breakdown by optimization category and expected impact

Boundaries:

Will:

Will Not:

Related Commands: /design:workflow, /orchestrate:task, /orchestrate:brainstorm


/analyze:explain

Description: Provide clear explanations of code, concepts, and system behavior with educational clarity

Category: workflow Complexity: standard

MCP Servers: sequential, context7

Personas: educator, architect, security

Triggers:

Usage:

/analyze:explain [target] [--level basic|intermediate|advanced] [--format text|examples|interactive] [--context domain]

Behavioral Flow:

  1. Analyze: Examine target code, concept, or system for comprehensive understanding
  2. Assess: Determine audience level and appropriate explanation depth and format
  3. Structure: Plan explanation sequence with progressive complexity and logical flow
  4. Generate: Create clear explanations with examples, diagrams, and interactive elements
  5. Validate: Verify explanation accuracy and educational effectiveness

MCP Integration:

Tool Coordination:

Key Patterns:

Examples:

# Basic Code Explanation
/analyze:explain authentication.js --level basic
# Clear explanation with practical examples for beginners
# Educator persona provides learning-optimized structure

# Framework Concept Explanation
/analyze:explain react-hooks --level intermediate --context react
# Context7 integration for official React documentation patterns
# Structured explanation with progressive complexity

# System Architecture Explanation
/analyze:explain microservices-system --level advanced --format interactive
# Architect persona explains system design and patterns
# Interactive exploration with Sequential analysis breakdown

# Security Concept Explanation
/analyze:explain jwt-authentication --context security --level basic
# Security persona explains authentication concepts and best practices
# Framework-agnostic security principles with practical examples

Boundaries:

Will:

Will Not:

Related Commands: /docs:generate, /docs:index, /analyze:code


/analyze:security-scan

Description: Comprehensive security vulnerability assessment

Category: analysis

Agents: security-auditor

Triggers:

Usage:

/analyze:security-scan [path] [--standard OWASP|GDPR|SOC2|HIPAA]

Security Analysis Process:

  1. Threat Modeling
    • Identify potential attack vectors
    • Map trust boundaries
    • Analyze data flow
    • Assess risk levels
    • Create threat matrix
  2. Vulnerability Scanning
    • Dependency vulnerability check
    • Static code analysis
    • Secret scanning
    • Configuration review
    • API security assessment
  3. Code Security Review
    • Input validation analysis
    • Output encoding checks
    • Authentication logic review
    • Authorization verification
    • Session management audit
    • Cryptography usage validation
  4. Penetration Testing
    • SQL injection testing
    • XSS attack simulation
    • CSRF vulnerability check
    • Authentication bypass attempts
    • Privilege escalation testing
    • API abuse scenarios
  5. Compliance Validation
    • OWASP Top 10 compliance
    • GDPR data protection
    • SOC 2 security controls
    • HIPAA requirements (if applicable)
    • Industry-specific standards

Security Checks:

Authentication & Authorization

Data Protection

API Security

Infrastructure

Severity Levels:

Output Format:

Executive Summary

Detailed Findings

Compliance Report

Example:

/analyze:security-scan src/auth --standard OWASP

Boundaries:

Will:

Will Not:

Related Commands: /analyze:code, /dev:code-review, /quality:improve


/analyze:troubleshoot

Description: Diagnose and resolve issues in code, builds, deployments, and system behavior

Category: utility Complexity: basic

Triggers:

Usage:

/analyze:troubleshoot [issue] [--type bug|build|performance|deployment] [--trace] [--fix]

Behavioral Flow:

  1. Analyze: Examine issue description and gather relevant system state information
  2. Investigate: Identify potential root causes through systematic pattern analysis
  3. Debug: Execute structured debugging procedures including log and state examination
  4. Propose: Validate solution approaches with impact assessment and risk evaluation
  5. Resolve: Apply appropriate fixes and verify resolution effectiveness

Tool Coordination:

Key Patterns:

Examples:

# Code Bug Investigation
/analyze:troubleshoot "Null pointer exception in user service" --type bug --trace
# Systematic analysis of error context and stack traces
# Identifies root cause and provides targeted fix recommendations

# Build Failure Analysis
/analyze:troubleshoot "TypeScript compilation errors" --type build --fix
# Analyzes build logs and TypeScript configuration
# Automatically applies safe fixes for common compilation issues

# Performance Issue Diagnosis
/analyze:troubleshoot "API response times degraded" --type performance
# Performance metrics analysis and bottleneck identification
# Provides optimization recommendations and monitoring guidance

# Deployment Problem Resolution
/analyze:troubleshoot "Service not starting in production" --type deployment --trace
# Environment and configuration analysis
# Systematic verification of deployment requirements and dependencies

Boundaries:

Will:

Will Not:

Related Commands: /analyze:code, /dev:build, /dev:test


Deploy Commands

/deploy:prepare-release

Description: Prepare application for production deployment

Category: deployment

Agents: deployment-engineer, quality-engineer

Triggers:

Usage:

/deploy:prepare-release [version] [--type major|minor|patch]

Release Preparation Process:

  1. Pre-Release Validation
    • Run full test suite (unit, integration, e2e)
    • Execute security audit
    • Perform performance benchmarking
    • Validate configuration for production
    • Check dependency vulnerabilities
  2. Version Management
    • Update version numbers (package.json, etc.)
    • Generate changelog from commits
    • Tag release in version control
    • Update API documentation versions
  3. Build Optimization
    • Create production build
    • Optimize bundle size
    • Generate source maps
    • Minify and compress assets
    • Validate build artifacts
  4. Documentation Updates
    • Update README if needed
    • Generate API documentation
    • Create release notes
    • Document breaking changes
    • Update migration guides
  5. Deployment Planning
    • Create deployment checklist
    • Generate rollback plan
    • Document environment variables
    • Prepare database migrations
    • Configure monitoring and alerts
  6. Final Checks
    • Smoke test production build
    • Verify all services health
    • Validate external integrations
    • Check SSL certificates
    • Review security headers

Checklist Output:

Pre-Release

Version Control

Build

Documentation

Deployment

Example:

/deploy:prepare-release 2.1.0 --type minor

Boundaries:

Will:

Will Not:

Related Commands: /dev:build, /dev:test, /analyze:security-scan


Design Commands

/design:system

Description: Design system architecture, APIs, and component interfaces with comprehensive specifications

Category: utility Complexity: basic

Triggers:

Usage:

/design:system [target] [--type architecture|api|component|database] [--format diagram|spec|code]

Behavioral Flow:

  1. Analyze: Examine target requirements and existing system context
  2. Plan: Define design approach and structure based on type and format
  3. Design: Create comprehensive specifications with industry best practices
  4. Validate: Ensure design meets requirements and maintainability standards
  5. Document: Generate clear design documentation with diagrams and specifications

Tool Coordination:

Key Patterns:

Examples:

# System Architecture Design
/design:system user-management-system --type architecture --format diagram
# Creates comprehensive system architecture with component relationships
# Includes scalability considerations and best practices

# API Specification Design
/design:system payment-api --type api --format spec
# Generates detailed API specification with endpoints and data models
# Follows RESTful design principles and industry standards

# Component Interface Design
/design:system notification-service --type component --format code
# Designs component interfaces with clear contracts and dependencies
# Provides implementation guidance and integration patterns

# Database Schema Design
/design:system e-commerce-db --type database --format diagram
# Creates database schema with entity relationships and constraints
# Includes normalization and performance considerations

Boundaries:

Will:

Will Not:

Related Commands: /design:workflow, /analyze:estimate, /dev:implement


/design:workflow

Description: Generate structured implementation workflows from PRDs and feature requirements

Category: orchestration Complexity: advanced

MCP Servers: sequential, context7, magic, playwright, morphllm, serena

Personas: architect, analyzer, frontend, backend, security, devops, project-manager

Triggers:

Usage:

/design:workflow [prd-file|feature-description] [--strategy systematic|agile|enterprise] [--depth shallow|normal|deep] [--parallel]

Behavioral Flow:

  1. Analyze: Parse PRD and feature specifications to understand implementation requirements
  2. Plan: Generate comprehensive workflow structure with dependency mapping and task orchestration
  3. Coordinate: Activate multiple personas for domain expertise and implementation strategy
  4. Execute: Create structured step-by-step workflows with automated task coordination
  5. Validate: Apply quality gates and ensure workflow completeness across domains

MCP Integration:

Tool Coordination:

Key Patterns:

Examples:

# Systematic PRD Workflow
/design:workflow ClaudeDocs/PRD/feature-spec.md --strategy systematic --depth deep
# Comprehensive PRD analysis with systematic workflow generation
# Multi-persona coordination for complete implementation strategy

# Agile Feature Workflow
/design:workflow "user authentication system" --strategy agile --parallel
# Agile workflow generation with parallel task coordination
# Context7 and Magic MCP for framework and UI workflow patterns

# Enterprise Implementation Planning
/design:workflow enterprise-prd.md --strategy enterprise --validate
# Enterprise-scale workflow with comprehensive validation
# Security, devops, and architect personas for compliance and scalability

# Cross-Session Workflow Management
/design:workflow project-brief.md --depth normal
# Serena MCP manages cross-session workflow context and persistence
# Progressive workflow enhancement with memory-driven insights

Boundaries:

Will:

Will Not:

Related Commands: /orchestrate:brainstorm, /orchestrate:task, /design:system, /analyze:estimate


Dev Commands

/dev:build

Description: Build, compile, and package projects with intelligent error handling and optimization

Category: utility Complexity: enhanced

MCP Servers: playwright

Personas: devops-engineer

Triggers:

Usage:

/dev:build [target] [--type dev|prod|test] [--clean] [--optimize] [--verbose]

Behavioral Flow:

  1. Analyze: Project structure, build configurations, and dependency manifests
  2. Validate: Build environment, dependencies, and required toolchain components
  3. Execute: Build process with real-time monitoring and error detection
  4. Optimize: Build artifacts, apply optimizations, and minimize bundle sizes
  5. Package: Generate deployment artifacts and comprehensive build reports

MCP Integration:

Tool Coordination:

Key Patterns:

Examples:

# Standard Project Build
/dev:build
# Builds entire project using default configuration
# Generates artifacts and comprehensive build report

# Production Optimization Build
/dev:build --type prod --clean --optimize
# Clean production build with advanced optimizations
# Minification, tree-shaking, and deployment preparation

# Targeted Component Build
/dev:build frontend --verbose
# Builds specific project component with detailed output
# Real-time progress monitoring and diagnostic information

# Development Build with Validation
/dev:build --type dev --validate
# Development build with Playwright validation
# UI testing and build verification integration

Boundaries:

Will:

Will Not:

Related Commands: /dev:test, /deploy:prepare-release, /analyze:troubleshoot


/dev:code-review

Description: Comprehensive code quality review and analysis

Category: development

Agents: code-reviewer, security-auditor

Triggers:

Usage:

/dev:code-review [path] [--focus quality|security|performance|all]

Review Process:

  1. Code Quality Analysis
    • Identify code smells and anti-patterns
    • Check naming conventions and consistency
    • Review error handling patterns
    • Assess code readability and maintainability
    • Find unused imports, variables, or dead code
  2. Security Assessment
    • Scan for common vulnerabilities (OWASP Top 10)
    • Check for hardcoded secrets or credentials
    • Review authentication and authorization logic
    • Examine input validation and sanitization
    • Identify security risks in dependencies
  3. Performance Review
    • Identify potential performance bottlenecks
    • Check for inefficient algorithms or queries
    • Review memory usage patterns
    • Analyze bundle size and optimization opportunities
  4. Architecture Evaluation
    • Evaluate code organization and separation of concerns
    • Check for proper abstraction and modularity
    • Review dependency management and coupling
    • Assess scalability and maintainability

Output Format:

Summary: Overall code health score and key findings

Critical Issues: Must-fix problems (blocking) Important Issues: Should-fix problems (high priority) Suggestions: Nice-to-have improvements

Best Practices: Recommendations for improvement

Example:

/dev:code-review src/auth --focus security

Boundaries:

Will:

Will Not:

Related Commands: /analyze:code, /analyze:security-scan, /quality:improve


/dev:git

Description: Git operations with intelligent commit messages and workflow optimization

Category: utility Complexity: basic

Triggers:

Usage:

/dev:git [operation] [args] [--smart-commit] [--interactive]

Behavioral Flow:

  1. Analyze: Check repository state and working directory changes
  2. Validate: Ensure operation is appropriate for current Git context
  3. Execute: Run Git command with intelligent automation
  4. Optimize: Apply smart commit messages and workflow patterns
  5. Report: Provide status and next steps guidance

Tool Coordination:

Key Patterns:

Examples:

# Smart Status Analysis
/dev:git status
# Analyzes repository state with change summary
# Provides next steps and workflow recommendations

# Intelligent Commit
/dev:git commit --smart-commit
# Generates conventional commit message from change analysis
# Applies best practices and consistent formatting

# Interactive Operations
/dev:git merge feature-branch --interactive
# Guided merge with conflict resolution assistance

Boundaries:

Will:

Will Not:

Note: Does not sign off commits or name Claude as co-author

Related Commands: /dev:code-review, /deploy:prepare-release


/dev:implement

Description: Feature and code implementation with intelligent persona activation and MCP integration

Category: workflow Complexity: standard

MCP Servers: context7, sequential, magic, playwright

Personas: architect, frontend, backend, security, qa-specialist

Triggers:

Usage:

/dev:implement [feature-description] [--type component|api|service|feature] [--framework react|vue|express] [--safe] [--with-tests]

Behavioral Flow:

  1. Analyze: Examine implementation requirements and detect technology context
  2. Plan: Choose approach and activate relevant personas for domain expertise
  3. Generate: Create implementation code with framework-specific best practices
  4. Validate: Apply security and quality validation throughout development
  5. Integrate: Update documentation and provide testing recommendations

MCP Integration:

Tool Coordination:

Key Patterns:

Examples:

# React Component Implementation
/dev:implement user profile component --type component --framework react
# Magic MCP generates UI component with design system integration
# Frontend persona ensures best practices and accessibility

# API Service Implementation
/dev:implement user authentication API --type api --safe --with-tests
# Backend persona handles server-side logic and data processing
# Security persona ensures authentication best practices

# Full-Stack Feature
/dev:implement payment processing system --type feature --with-tests
# Multi-persona coordination: architect, frontend, backend, security
# Sequential MCP breaks down complex implementation steps

# Framework-Specific Implementation
/dev:implement dashboard widget --framework vue
# Context7 MCP provides Vue-specific patterns and documentation
# Framework-appropriate implementation with official best practices

Boundaries:

Will:

Will Not:

Related Commands: /design:system, /dev:test, /quality:improve


/dev:test

Description: Execute tests with coverage analysis and automated quality reporting

Category: utility Complexity: enhanced

MCP Servers: playwright

Personas: qa-specialist

Triggers:

Usage:

/dev:test [target] [--type unit|integration|e2e|all] [--coverage] [--watch] [--fix]

Behavioral Flow:

  1. Discover: Categorize available tests using runner patterns and conventions
  2. Configure: Set up appropriate test environment and execution parameters
  3. Execute: Run tests with monitoring and real-time progress tracking
  4. Analyze: Generate coverage reports and failure diagnostics
  5. Report: Provide actionable recommendations and quality metrics

MCP Integration:

Tool Coordination:

Key Patterns:

Examples:

# Basic Test Execution
/dev:test
# Discovers and runs all tests with standard configuration
# Generates pass/fail summary and basic coverage

# Targeted Coverage Analysis
/dev:test src/components --type unit --coverage
# Unit tests for specific directory with detailed coverage metrics

# Browser Testing
/dev:test --type e2e
# Activates Playwright MCP for comprehensive browser testing
# Cross-browser compatibility and visual validation

# Development Watch Mode
/dev:test --watch --fix
# Continuous testing with automatic simple failure fixes
# Real-time feedback during development

Boundaries:

Will:

Will Not:

Related Commands: /test:generate-tests, /dev:build, /quality:improve


Docs Commands

/docs:generate

Description: Generate focused documentation for components, functions, APIs, and features

Category: utility Complexity: basic

Triggers:

Usage:

/docs:generate [target] [--type inline|external|api|guide] [--style brief|detailed]

Behavioral Flow:

  1. Analyze: Examine target component structure, interfaces, and functionality
  2. Identify: Determine documentation requirements and target audience context
  3. Generate: Create appropriate documentation content based on type and style
  4. Format: Apply consistent structure and organizational patterns
  5. Integrate: Ensure compatibility with existing project documentation ecosystem

Tool Coordination:

Key Patterns:

Examples:

# Inline Code Documentation
/docs:generate src/auth/login.js --type inline
# Generates JSDoc comments with parameter and return descriptions
# Adds comprehensive inline documentation for functions and classes

# API Reference Generation
/docs:generate src/api --type api --style detailed
# Creates comprehensive API documentation with endpoints and schemas
# Generates usage examples and integration guidelines

# User Guide Creation
/docs:generate payment-module --type guide --style brief
# Creates user-focused documentation with practical examples
# Focuses on implementation patterns and common use cases

# Component Documentation
/docs:generate components/ --type external
# Generates external documentation files for component library
# Includes props, usage examples, and integration patterns

Boundaries:

Will:

Will Not:

Related Commands: /docs:index, /analyze:explain, /design:system


/docs:index

Description: Generate comprehensive project documentation and knowledge base with intelligent organization

Category: special Complexity: standard

MCP Servers: sequential, context7

Personas: architect, scribe, quality

Triggers:

Usage:

/docs:index [target] [--type docs|api|structure|readme] [--format md|json|yaml]

Behavioral Flow:

  1. Analyze: Examine project structure and identify key documentation components
  2. Organize: Apply intelligent organization patterns and cross-referencing strategies
  3. Generate: Create comprehensive documentation with framework-specific patterns
  4. Validate: Ensure documentation completeness and quality standards
  5. Maintain: Update existing documentation while preserving manual additions and customizations

MCP Integration:

Tool Coordination:

Key Patterns:

Examples:

# Project Structure Documentation
/docs:index project-root --type structure --format md
# Comprehensive project structure documentation with intelligent organization
# Creates navigable structure with cross-references and component relationships

# API Documentation Generation
/docs:index src/api --type api --format json
# API documentation with systematic analysis and validation
# Scribe and quality personas ensure completeness and accuracy

# Knowledge Base Creation
/docs:index . --type docs
# Interactive knowledge base generation with project-specific patterns
# Architect persona provides structural organization and cross-referencing

Boundaries:

Will:

Will Not:

Related Commands: /docs:generate, /design:system, /analyze:explain


Orchestrate Commands

/orchestrate:brainstorm

Description: Interactive requirements discovery through Socratic dialogue and systematic exploration

Category: orchestration Complexity: advanced

MCP Servers: sequential, context7, magic, playwright, morphllm, serena

Personas: architect, analyzer, frontend, backend, security, devops, project-manager

Triggers:

Usage:

/orchestrate:brainstorm [topic/idea] [--strategy systematic|agile|enterprise] [--depth shallow|normal|deep] [--parallel]

Behavioral Flow:

  1. Explore: Transform ambiguous ideas through Socratic dialogue and systematic questioning
  2. Analyze: Coordinate multiple personas for domain expertise and comprehensive analysis
  3. Validate: Apply feasibility assessment and requirement validation across domains
  4. Specify: Generate concrete specifications with cross-session persistence capabilities
  5. Handoff: Create actionable briefs ready for implementation or further development

MCP Integration:

Tool Coordination:

Key Patterns:

Examples:

# Systematic Product Discovery
/orchestrate:brainstorm "AI-powered project management tool" --strategy systematic --depth deep
# Multi-persona analysis: architect (system design), analyzer (feasibility), project-manager (requirements)
# Sequential MCP provides structured exploration framework

# Agile Feature Exploration
/orchestrate:brainstorm "real-time collaboration features" --strategy agile --parallel
# Parallel exploration paths with frontend, backend, and security personas
# Context7 and Magic MCP for framework and UI pattern analysis

# Enterprise Solution Validation
/orchestrate:brainstorm "enterprise data analytics platform" --strategy enterprise --validate
# Comprehensive validation with security, devops, and architect personas
# Serena MCP for cross-session persistence and enterprise requirements tracking

# Cross-Session Refinement
/orchestrate:brainstorm "mobile app monetization strategy" --depth normal
# Serena MCP manages cross-session context and iterative refinement
# Progressive dialogue enhancement with memory-driven insights

Boundaries:

Will:

Will Not:

Related Commands: /design:workflow, /orchestrate:task, /analyze:estimate


/reasoning:adjust

/reasoning:budget

Description: Control internal reasoning token budget for cost and quality optimization

Category: utility Complexity: basic

Triggers:

Usage:

/reasoning:budget [4000|10000|32000|128000] [--auto-adjust] [--show-usage]

Budget Levels:

Examples:

# Extended thinking for critical issue
/reasoning:budget 128000 --show-usage

# Budget-conscious analysis
/reasoning:budget 10000
/analyze:code src/auth --reasoning-profile security

Related Commands: /reasoning:adjust, /reasoning:metrics


/reasoning:metrics

Description: Track reasoning effectiveness and optimization metrics across commands

Category: utility Complexity: basic

Triggers:

Usage:

/reasoning:metrics [--command <name>] [--timeframe 7d|30d|all] [--export json|markdown|csv]

Metrics Tracked:

Examples:

# Overall dashboard
/reasoning:metrics

# Command-specific analysis
/reasoning:metrics --command analyze:code

# Export for analysis
/reasoning:metrics --timeframe 30d --export json

Related Commands: /reasoning:budget, /reasoning:adjust


Description: Dynamically adjust reasoning depth during task execution

Category: utility Complexity: basic

Triggers:

Usage:

/reasoning:adjust [low|medium|high|ultra] [--scope current|remaining]

Reasoning Depth Levels:

low (~2K tokens)

medium (~4K tokens)

high (~10K tokens)

ultra (~32K tokens)

Scope Control:

Examples:

# Escalate for complex subtask
/reasoning:adjust ultra --scope current
# Maximum depth for current subtask, then revert

# Optimize long-running analysis
/reasoning:adjust medium --scope remaining
# Reduce depth for faster iteration

# Spike for architecture decision
/reasoning:adjust high --scope current
# Deep analysis for decision, return to standard depth

Related Commands: /orchestrate:spawn, /analyze:code, /design:system


/orchestrate:spawn

Description: Meta-system task orchestration with intelligent breakdown and delegation

Category: special Complexity: high

Triggers:

Usage:

/orchestrate:spawn [complex-task] [--strategy sequential|parallel|adaptive] [--depth normal|deep]

Behavioral Flow:

  1. Analyze: Parse complex operation requirements and assess scope across domains
  2. Decompose: Break down operation into coordinated subtask hierarchies
  3. Orchestrate: Execute tasks using optimal coordination strategy (parallel/sequential)
  4. Monitor: Track progress across task hierarchies with dependency management
  5. Integrate: Aggregate results and provide comprehensive orchestration summary

MCP Integration:

Tool Coordination:

Key Patterns:

Examples:

# Complex Feature Implementation
/orchestrate:spawn "implement user authentication system"
# Breakdown: Database design → Backend API → Frontend UI → Testing
# Coordinates across multiple domains with dependency management

# Large-Scale System Operation
/orchestrate:spawn "migrate legacy monolith to microservices" --strategy adaptive --depth deep
# Enterprise-scale operation with sophisticated orchestration
# Adaptive coordination based on operation characteristics

# Cross-Domain Infrastructure
/orchestrate:spawn "establish CI/CD pipeline with security scanning"
# System-wide infrastructure operation spanning DevOps, Security, Quality domains
# Parallel execution of independent components with validation gates

Boundaries:

Will:

Will Not:

Related Commands: /orchestrate:task, /design:workflow, /orchestrate:brainstorm


/orchestrate:task

Description: Execute complex tasks with intelligent workflow management and delegation

Category: special Complexity: advanced

MCP Servers: sequential, context7, magic, playwright, morphllm, serena

Personas: architect, analyzer, frontend, backend, security, devops, project-manager

Triggers:

Usage:

/orchestrate:task [action] [target] [--strategy systematic|agile|enterprise] [--parallel] [--delegate]

Behavioral Flow:

  1. Analyze: Parse task requirements and determine optimal execution strategy
  2. Delegate: Route to appropriate MCP servers and activate relevant personas
  3. Coordinate: Execute tasks with intelligent workflow management and parallel processing
  4. Validate: Apply quality gates and comprehensive task completion verification
  5. Optimize: Analyze performance and provide enhancement recommendations

MCP Integration:

Tool Coordination:

Key Patterns:

Examples:

# Complex Feature Development
/orchestrate:task create "enterprise authentication system" --strategy systematic --parallel
# Comprehensive task breakdown with multi-domain coordination
# Activates architect, security, backend, frontend personas

# Agile Sprint Coordination
/orchestrate:task execute "feature backlog" --strategy agile --delegate
# Iterative task execution with intelligent delegation
# Cross-session persistence for sprint continuity

# Multi-Domain Integration
/orchestrate:task execute "microservices platform" --strategy enterprise --parallel
# Enterprise-scale coordination with compliance validation
# Parallel execution across multiple technical domains

Boundaries:

Will:

Will Not:

Related Commands: /orchestrate:spawn, /design:workflow, /dev:implement


Quality Commands

/quality:cleanup

Description: Systematically clean up code, remove dead code, and optimize project structure

Category: workflow Complexity: standard

MCP Servers: sequential, context7

Personas: architect, quality, security

Triggers:

Usage:

/quality:cleanup [target] [--type code|imports|files|all] [--safe|--aggressive] [--interactive]

Behavioral Flow:

  1. Analyze: Assess cleanup opportunities and safety considerations across target scope
  2. Plan: Choose cleanup approach and activate relevant personas for domain expertise
  3. Execute: Apply systematic cleanup with intelligent dead code detection and removal
  4. Validate: Ensure no functionality loss through testing and safety verification
  5. Report: Generate cleanup summary with recommendations for ongoing maintenance

MCP Integration:

Tool Coordination:

Key Patterns:

Examples:

# Safe Code Cleanup
/quality:cleanup src/ --type code --safe
# Conservative cleanup with automatic safety validation
# Removes dead code while preserving all functionality

# Import Optimization
/quality:cleanup --type imports --preview
# Analyzes and shows unused import cleanup without execution
# Framework-aware optimization via Context7 patterns

# Comprehensive Project Cleanup
/quality:cleanup --type all --interactive
# Multi-domain cleanup with user guidance for complex decisions
# Activates all personas for comprehensive analysis

# Framework-Specific Cleanup
/quality:cleanup components/ --aggressive
# Thorough cleanup with Context7 framework patterns
# Sequential analysis for complex dependency management

Boundaries:

Will:

Will Not:

Related Commands: /quality:improve, /analyze:code, /dev:code-review


/quality:improve

Description: Apply systematic improvements to code quality, performance, and maintainability

Category: workflow Complexity: standard

MCP Servers: sequential, context7

Personas: architect, performance, quality, security

Triggers:

Usage:

/quality:improve [target] [--type quality|performance|maintainability|style] [--safe] [--interactive]

Behavioral Flow:

  1. Analyze: Examine codebase for improvement opportunities and quality issues
  2. Plan: Choose improvement approach and activate relevant personas for expertise
  3. Execute: Apply systematic improvements with domain-specific best practices
  4. Validate: Ensure improvements preserve functionality and meet quality standards
  5. Document: Generate improvement summary and recommendations for future work

MCP Integration:

Tool Coordination:

Key Patterns:

Examples:

# Code Quality Enhancement
/quality:improve src/ --type quality --safe
# Systematic quality analysis with safe refactoring application
# Improves code structure, reduces technical debt, enhances readability

# Performance Optimization
/quality:improve api-endpoints --type performance --interactive
# Performance persona analyzes bottlenecks and optimization opportunities
# Interactive guidance for complex performance improvement decisions

# Maintainability Improvements
/quality:improve legacy-modules --type maintainability --preview
# Architect persona analyzes structure and suggests maintainability improvements
# Preview mode shows changes before application for review

# Security Hardening
/quality:improve auth-service --type security --validate
# Security persona identifies vulnerabilities and applies security patterns
# Comprehensive validation ensures security improvements are effective

Boundaries:

Will:

Will Not:

Related Commands: /quality:cleanup, /analyze:code, /dev:code-review


Session Commands

/session:load

Description: Session lifecycle management with Serena MCP integration for project context loading

Category: session Complexity: standard

MCP Servers: serena

Triggers:

Usage:

/session:load [target] [--type project|config|deps|checkpoint] [--refresh] [--analyze]

Behavioral Flow:

  1. Initialize: Establish Serena MCP connection and session context management
  2. Discover: Analyze project structure and identify context loading requirements
  3. Load: Retrieve project memories, checkpoints, and cross-session persistence data
  4. Activate: Establish project context and prepare for development workflow
  5. Validate: Ensure loaded context integrity and session readiness

MCP Integration:

Tool Coordination:

Key Patterns:

Examples:

# Basic Project Loading
/session:load
# Loads current directory project context with Serena memory integration
# Establishes session context and prepares for development workflow

# Specific Project Loading
/session:load /path/to/project --type project --analyze
# Loads specific project with comprehensive analysis
# Activates project context and retrieves cross-session memories

# Checkpoint Restoration
/session:load --type checkpoint --checkpoint session_123
# Restores specific checkpoint with session context
# Continues previous work session with full context preservation

# Dependency Context Loading
/session:load --type deps --refresh
# Loads dependency context with fresh analysis
# Updates project understanding and dependency mapping

Boundaries:

Will:

Will Not:

Related Commands: /session:save, /session:reflect


/session:reflect

Description: Task reflection and validation using Serena MCP analysis capabilities

Category: special Complexity: standard

MCP Servers: serena

Triggers:

Usage:

/session:reflect [--type task|session|completion] [--analyze] [--validate]

Behavioral Flow:

  1. Analyze: Examine current task state and session progress using Serena reflection tools
  2. Validate: Assess task adherence, completion quality, and requirement fulfillment
  3. Reflect: Apply deep analysis of collected information and session insights
  4. Document: Update session metadata and capture learning insights
  5. Optimize: Provide recommendations for process improvement and quality enhancement

MCP Integration:

Tool Coordination:

Key Patterns:

Examples:

# Task Adherence Reflection
/session:reflect --type task --analyze
# Validates current approach against project goals
# Identifies deviations and provides course correction recommendations

# Session Progress Analysis
/session:reflect --type session --validate
# Comprehensive analysis of session work and information gathering
# Quality assessment and gap identification for project improvement

# Completion Validation
/session:reflect --type completion
# Evaluates task completion criteria against actual progress
# Determines readiness for task completion and identifies remaining blockers

Boundaries:

Will:

Will Not:

Related Commands: /session:load, /session:save


/session:save

Description: Session lifecycle management with Serena MCP integration for session context persistence

Category: session Complexity: standard

MCP Servers: serena

Triggers:

Usage:

/session:save [--type session|learnings|context|all] [--summarize] [--checkpoint]

Behavioral Flow:

  1. Analyze: Examine session progress and identify discoveries worth preserving
  2. Persist: Save session context and learnings using Serena MCP memory management
  3. Checkpoint: Create recovery points for complex sessions and progress tracking
  4. Validate: Ensure session data integrity and cross-session compatibility
  5. Prepare: Ready session context for seamless continuation in future sessions

MCP Integration:

Tool Coordination:

Key Patterns:

Examples:

# Basic Session Save
/session:save
# Saves current session discoveries and context to Serena MCP
# Automatically creates checkpoint if session exceeds 30 minutes

# Comprehensive Session Checkpoint
/session:save --type all --checkpoint
# Complete session preservation with recovery checkpoint
# Includes all learnings, context, and progress for session restoration

# Session Summary Generation
/session:save --summarize
# Creates session summary with discovery documentation
# Updates cross-session learning patterns and project insights

# Discovery-Only Persistence
/session:save --type learnings
# Saves only new patterns and insights discovered during session
# Updates project understanding without full session preservation

Boundaries:

Will:

Will Not:

Related Commands: /session:load, /session:reflect


Test Commands

/test:generate-tests

Description: Generate comprehensive test suite with high coverage

Category: testing

Agents: test-automator, quality-engineer

Triggers:

Usage:

/test:generate-tests [path] [--type unit|integration|e2e|all] [--coverage-target 80]

Test Generation Process:

  1. Code Analysis
    • Analyze code structure and dependencies
    • Identify testable units and edge cases
    • Map code paths and decision points
    • Determine test requirements
  2. Test Creation
    • Generate unit tests for core logic
    • Create integration tests for component interactions
    • Build e2e tests for user workflows
    • Add edge case and error scenario tests
  3. Coverage Analysis
    • Measure code coverage percentage
    • Identify uncovered code paths
    • Generate coverage reports
    • Suggest additional test cases
  4. Test Quality
    • Ensure test independence and isolation
    • Implement proper setup and teardown
    • Add descriptive test names and documentation
    • Follow testing best practices

Test Types:

Unit Tests

Integration Tests

End-to-End Tests

Coverage Targets:

Output:

Example:

/test:generate-tests src/api --type integration --coverage-target 90

Boundaries:

Will:

Will Not:

Related Commands: /dev:test, /dev:code-review, /quality:improve


Tools Commands

/tools:select

Description: Intelligent MCP tool selection based on complexity scoring and operation analysis

Category: special Complexity: high

MCP Servers: serena, morphllm

Triggers:

Usage:

/tools:select [operation] [--analyze] [--explain]

Behavioral Flow:

  1. Parse: Analyze operation type, scope, file count, and complexity indicators
  2. Score: Apply multi-dimensional complexity scoring across various operation factors
  3. Match: Compare operation requirements against Serena and Morphllm capabilities
  4. Select: Choose optimal tool based on scoring matrix and performance requirements
  5. Validate: Verify selection accuracy and provide confidence metrics

MCP Integration:

Tool Coordination:

Key Patterns:

Examples:

# Complex Refactoring Operation
/tools:select "rename function across 10 files" --analyze
# Analysis: High complexity (multi-file, symbol operations)
# Selection: Serena MCP (LSP capabilities, semantic understanding)

# Pattern-Based Bulk Edit
/tools:select "update console.log to logger.info across project" --explain
# Analysis: Pattern-based transformation, speed priority
# Selection: Morphllm MCP (pattern matching, bulk operations)

# Memory Management Operation
/tools:select "save project context and discoveries"
# Direct mapping: Memory operations → Serena MCP
# Rationale: Project context and cross-session persistence

Boundaries:

Will:

Will Not:

Related Commands: All commands that leverage MCP tool routing


Flag Reference

Mode Activation Flags

–brainstorm

–introspect

–task-manage

–orchestrate

–token-efficient / –uc / –ultracompressed

MCP Server Flags

–c7 / –context7

–seq / –sequential

–magic

–morph / –morphllm

–serena

–play / –playwright

–all-mcp

–no-mcp

Analysis Depth Flags

–think

–think-hard

–ultrathink

Execution Control Flags

–delegate [auto|files|folders]

–concurrency [n]

–loop

–iterations [n]

–validate

–safe-mode

Output Optimization Flags

–scope [file|module|project|system]

–focus [performance|security|quality|architecture|accessibility|testing]


MCP Integration Patterns

Sequential MCP Pattern

Use Case: Complex multi-step reasoning, systematic analysis

Best For:

Commands Using Sequential:

Integration Pattern:

User Request → Sequential Analysis → Structured Breakdown → Systematic Execution

Context7 MCP Pattern

Use Case: Framework-specific patterns, official documentation

Best For:

Commands Using Context7:

Integration Pattern:

Framework Detection → Context7 Lookup → Official Patterns → Implementation

Magic MCP Pattern

Use Case: UI component generation, design systems

Best For:

Commands Using Magic:

Integration Pattern:

Component Request → Magic Generation → Design System → Framework Integration

Playwright MCP Pattern

Use Case: Browser testing, E2E validation

Best For:

Commands Using Playwright:

Integration Pattern:

Test Request → Playwright Setup → Browser Automation → Validation Report

Serena MCP Pattern

Use Case: Project memory, cross-session persistence

Best For:

Commands Using Serena:

Integration Pattern:

Session Start → Serena Activation → Context Loading → Memory Persistence

Morphllm MCP Pattern

Use Case: Pattern-based bulk edits, transformations

Best For:

Commands Using Morphllm:

Integration Pattern:

Pattern Detection → Morphllm Processing → Bulk Transform → Validation

Common Workflows

Feature Development Workflow

# 1. Requirements Discovery
/orchestrate:brainstorm "user profile management" --strategy agile

# 2. Design System Architecture
/design:system user-profile --type component --format spec

# 3. Generate Implementation Workflow
/design:workflow user-profile-spec.md --strategy systematic

# 4. Implement Feature
/dev:implement user-profile-component --framework react --with-tests

# 5. Run Tests
/dev:test src/components/UserProfile --type unit --coverage

# 6. Code Review
/dev:code-review src/components/UserProfile --focus all

# 7. Optimize and Improve
/quality:improve src/components/UserProfile --type quality --safe

# 8. Generate Documentation
/docs:generate src/components/UserProfile --type external --style detailed

Code Quality Improvement Workflow

# 1. Analyze Current Code Quality
/analyze:code src/ --focus quality --depth deep

# 2. Clean Up Dead Code and Imports
/quality:cleanup src/ --type all --safe

# 3. Apply Systematic Improvements
/quality:improve src/ --type quality --safe

# 4. Security Audit
/analyze:security-scan src/ --standard OWASP

# 5. Performance Optimization
/quality:improve src/ --type performance --interactive

# 6. Code Review
/dev:code-review src/ --focus all

# 7. Generate Tests
/test:generate-tests src/ --type all --coverage-target 85

# 8. Run Test Suite
/dev:test --type all --coverage

Project Documentation Workflow

# 1. Generate Project Structure Documentation
/docs:index . --type structure --format md

# 2. Generate API Documentation
/docs:index src/api --type api --format json

# 3. Generate Component Documentation
/docs:generate src/components --type external --style detailed

# 4. Explain Complex Systems
/analyze:explain src/core/engine --level advanced --format interactive

# 5. Create User Guides
/docs:generate src/features --type guide --style brief

# 6. Update README
/docs:index . --type readme

Deployment Preparation Workflow

# 1. Run Full Test Suite
/dev:test --type all --coverage

# 2. Security Audit
/analyze:security-scan src/ --standard OWASP

# 3. Performance Analysis
/analyze:code src/ --focus performance --depth deep

# 4. Build Optimization
/dev:build --type prod --clean --optimize

# 5. Code Review
/dev:code-review src/ --focus all

# 6. Prepare Release
/deploy:prepare-release 1.2.0 --type minor

# 7. Generate Documentation
/docs:index . --type all --format md

Troubleshooting Workflow

# 1. Analyze the Issue
/analyze:troubleshoot "API timeout errors" --type performance --trace

# 2. Review Affected Code
/dev:code-review src/api --focus performance

# 3. Analyze Code Quality
/analyze:code src/api --focus performance --depth deep

# 4. Apply Fixes
/quality:improve src/api --type performance --safe

# 5. Test Changes
/dev:test src/api --type integration --coverage

# 6. Validate Fix
/analyze:troubleshoot "API timeout errors" --type performance --validate

Session Management Workflow

# 1. Load Project Context
/session:load --type project --analyze

# 2. Work on Tasks
# ... perform development work ...

# 3. Reflect on Progress
/session:reflect --type session --validate

# 4. Save Session Context
/session:save --type all --checkpoint

# 5. Next Session - Restore Context
/session:load --type checkpoint --checkpoint session_123

Enterprise Development Workflow

# 1. Requirements Discovery
/orchestrate:brainstorm "enterprise analytics platform" --strategy enterprise --depth deep

# 2. Architectural Planning
/design:system analytics-platform --type architecture --format diagram

# 3. Estimate Development
/analyze:estimate "analytics platform implementation" --type time --unit weeks --breakdown

# 4. Generate Implementation Workflow
/design:workflow analytics-platform-prd.md --strategy enterprise --validate

# 5. Complex Task Orchestration
/orchestrate:spawn "implement analytics platform" --strategy adaptive --depth deep

# 6. Security Scan
/analyze:security-scan src/ --standard SOC2

# 7. Comprehensive Testing
/dev:test --type all --coverage

# 8. Deployment Preparation
/deploy:prepare-release 2.0.0 --type major

Best Practices

Command Selection

  1. Start Simple: Use basic commands for straightforward tasks
  2. Escalate Complexity: Move to orchestration commands for complex multi-domain tasks
  3. Leverage MCP: Enable relevant MCP servers for specialized capabilities
  4. Use Flags: Apply appropriate flags to fine-tune command behavior

Workflow Organization

  1. Plan First: Use brainstorm and design commands before implementation
  2. Iterate: Use improvement and cleanup commands regularly
  3. Validate Often: Run tests and reviews frequently during development
  4. Document Continuously: Generate docs alongside implementation

Session Management

  1. Load Context: Start sessions with /session:load
  2. Reflect Regularly: Use /session:reflect to validate progress
  3. Save Progress: End sessions with /session:save --checkpoint
  4. Persist Learning: Capture insights for cross-session enhancement

Quality Assurance

  1. Test Early: Generate and run tests throughout development
  2. Review Regularly: Use code review commands frequently
  3. Security First: Run security scans before deployment
  4. Performance Matters: Include performance analysis in workflow

Command Index by Complexity

Basic (Complexity: basic)

Standard (Complexity: standard)

Enhanced (Complexity: enhanced)

Advanced (Complexity: advanced)

High (Complexity: high)


Troubleshooting

Common Issues

MCP Server Not Available

Command Not Responding

Unexpected Results

Performance Issues

Getting Help


Last Updated: 2025-10-17 Version: 1.0.0 Total Commands: 26 slash commands + 8 agent-based commands