Comprehensive analysis using parallel orchestrator with multiple perspectives.
Runs comprehensive multi-perspective analysis on files or directories using parallel agents. Use for deep code reviews, security audits, architecture evaluation, and pre-production validation when you need thorough, multi-angle insights.
/plugin marketplace add dansasser/claude-code-marketplace/plugin install ollama-agents@dansasser-marketplaceComprehensive analysis using parallel orchestrator with multiple perspectives.
Usage: /deep-analyze <file_or_directory> [perspectives]
Perspectives: (comma-separated, max 4)
security: Security vulnerabilities and threat modelingarchitecture: Design patterns and structural analysisimplementation: Code quality and best practicestesting: Test coverage and validation strategiesperformance: Bottlenecks and optimization opportunitiesExamples:
/deep-analyze implementation-plan.md - Auto-select perspectives/deep-analyze src/auth.py security,testing - Focus on security and testing/deep-analyze src/ architecture,security - Directory analysis with multiple perspectives/deep-analyze src/api/ security,performance - API directory deep analysisYou are performing deep multi-perspective analysis using the parallel orchestrator agent.
Target: $1 Perspectives: ${2:-auto}
Your Process:
Validate Target:
Determine Perspectives:
Auto-Select (if perspectives=$ARGUMENTS or empty): Based on file type:
User-Specified: Parse comma-separated list from $2 Validate 2-4 perspectives
Invoke Parallel Orchestrator Agent:
Use Task tool to invoke ollama-parallel-orchestrator:
Directory Operations by Perspective:
Each perspective uses optimal directory operations:
| Perspective | Primary Operation | Example |
|---|---|---|
| security | @./dir/:search:PATTERN | @./src/:search:eval, @./src/:search:password |
| architecture | @./dir/:tree | @./src/:tree |
| implementation | @./dir/:search:TODO | @./src/:search:TODO, @./src/:search:FIXME |
| testing | @./tests/:tree | @./tests/:tree, @./src/:search:test |
| performance | @./dir/:search:PATTERN | @./src/:search:for.*in, @./src/:search:query |
Perspectives Explained:
Security:
@./src/:search:eval, @./src/:search:password, @./src/:search:secretArchitecture:
@./src/:tree, @./src/:search:importImplementation:
@./src/:search:TODO, @./src/:search:FIXME, @./src/:treeTesting:
@./tests/:tree, @./src/:search:@pytestPerformance:
@./src/:search:for.*range, @./src/:search:while, @./src/:search:queryYour Role:
Expected Report Format (from agent):
# Deep Analysis Report
**Target:** $1
**Perspectives:** [list]
**Orchestration ID:** [id]
## Executive Summary
[High-level summary across all perspectives]
## Critical Findings
### Security Critical
- [Issues requiring immediate attention]
### Architecture Critical
- [Structural issues with major impact]
### Implementation Critical
- [Code quality issues needing urgent fix]
## Analysis by Perspective
[Detailed findings from each perspective]
## Cross-Perspective Insights
[Common themes and patterns]
## Prioritized Recommendations
1. [Highest priority]
2. [Second priority]
...
## Next Steps
[Actionable items]
Session Tracking:
~/.claude/orchestrations/[id].jsonWhen to Use Deep Analysis:
When NOT to Use:
/analyze instead)/review quick)Token Efficiency:
Directory Analysis Benefits:
@./dir/:search: finds vulnerability patterns across codebase@./dir/:tree shows complete structure in ~500 tokens@./dir/:search:TODO finds all incomplete workRemember: This invokes the most comprehensive analysis. The parallel orchestrator handles all complexity. You just present the synthesized results clearly.