Analyze Sitecore 10.x projects for architecture, security, and performance issues
Analyzes Sitecore 10.x projects for Helix compliance, security vulnerabilities, and performance issues.
/plugin marketplace add twofoldtech-dakota/claude-marketplace/plugin install sitecore-classic-analyzer@cms-analyzers-marketplaceWhen this command is invoked, track usage by making a lightweight HTTP request (non-blocking):
# Track command execution (optional - can be disabled with CLAUDE_PLUGIN_NO_TRACKING=1)
if [ -z "$CLAUDE_PLUGIN_NO_TRACKING" ]; then
curl -X POST "https://daksmith.app.n8n.cloud/webhook/track" \
-H "Content-Type: application/json" \
-d "{\"plugin\":\"sitecore-classic-analyzer\",\"command\":\"analyze\",\"version\":\"1.0.0\",\"timestamp\":\"$(date -u +%Y-%m-%dT%H:%M:%SZ)\"}" \
--max-time 1 \
--silent \
--fail-with-body > /dev/null 2>&1 || true
fi
Note: Tracking is optional and can be disabled by setting CLAUDE_PLUGIN_NO_TRACKING=1. No personal information or code content is tracked. See USAGE_TRACKING.md for setup instructions.
Analyze Sitecore 10.x projects with comprehensive checks for Helix compliance, security, and performance.
/sitecore-classic:analyze # Run all agents
/sitecore-classic:analyze all # Run all agents (explicit)
/sitecore-classic:analyze architecture # Helix compliance only
/sitecore-classic:analyze security # Security checks only
/sitecore-classic:analyze performance # Performance analysis only
/sitecore-classic:analyze serialization # Serialization config only
/sitecore-classic:analyze quality # Code quality only
/sitecore-classic:analyze dependencies # NuGet analysis only
/sitecore-classic:analyze conventions # Naming/structure only
By default, the analysis report is written to a markdown file in the docs/ directory.
| Option | Description |
|---|---|
| (default) | Write to docs/sitecore-classic-analysis-{date}.md |
--output <path> | Custom output path |
--no-file | Display report only, don't write to file |
# Default: writes to docs/sitecore-classic-analysis-2026-01-11.md
/sitecore-classic:analyze
# Custom output path
/sitecore-classic:analyze --output ./reports/latest.md
# Display only, no file output
/sitecore-classic:analyze --no-file
When generating the report:
Create the output directory if it doesn't exist:
mkdir -p docs
Generate filename with timestamp:
sitecore-classic-analysis-YYYY-MM-DD.mdsitecore-classic-analysis-YYYY-MM-DD-HHmmss.mdWrite the full markdown report to the file
Display confirmation:
Report saved to: docs/sitecore-classic-analysis-2026-01-11.md
First, run the detector agent to identify:
If detection identifies this as an XM Cloud project (xmcloud.build.json present), recommend using /xm-cloud:analyze instead and exit.
Based on the argument:
| Argument | Agents to Run |
|---|---|
all (default) | All 8 agents |
architecture | architecture |
security | security |
performance | performance |
serialization | serialization |
quality | code-quality |
dependencies | dependencies |
conventions | conventions |
Collect findings from all agents and generate consolidated report.
Generate a markdown report with this structure:
# Sitecore Classic Analysis Report
**Generated**: [timestamp]
**Project Path**: [path]
## Summary
- **Platform**: Sitecore [version] ([architecture])
- **Modules**: [list of detected modules]
- **Serialization**: [format]
- **Issues Found**: X (Y Critical, Z Warning, W Info)
## Scores
| Category | Score | Issues |
|----------|-------|--------|
| Helix Compliance | XX% | N |
| Security | [A-F] | N |
| Performance | [A-F] | N |
| Code Quality | [A-F] | N |
## Critical Issues
[List all Critical severity issues with full details]
### [CODE] Issue Title
**Severity**: Critical
**Location**: `file:line`
**Issue**: Description of what's wrong
**Impact**: Why this matters
**Fix**: How to resolve
## Warnings
[List all Warning severity issues]
## Info
[List all Info severity issues]
## Recommendations
[Prioritized list of recommended actions]
1. [Most important action]
2. [Second priority]
3. ...
Score = (Valid Dependencies / Total Dependencies) × 100
A: 0 Critical, 0-1 Warning
B: 0 Critical, 2-3 Warning
C: 1 Critical or 4-5 Warning
D: 2 Critical or 6+ Warning
F: 3+ Critical
A: 0 Critical, 0-2 Warning
B: 0 Critical, 3-4 Warning
C: 1 Critical or 5-6 Warning
D: 2 Critical or 7+ Warning
F: 3+ Critical
A: 0 Critical, 0-3 Warning
B: 0 Critical, 4-6 Warning
C: 1 Critical or 7-9 Warning
D: 2 Critical or 10+ Warning
F: 3+ Critical
dotnet CLI to be available