Full design document lifecycle: guided authoring with principles discovery (/design-draft) followed by iterative principle-enforced review with auto-fix (/design-review). Start with /design-draft for new documents, /design-review for existing ones.
npx claudepluginhub l3digitalnet/claude-code-plugins --plugin design-assistantGuided design document authoring workflow. Use when the user asks to "design a system", "create a design doc", "write a spec", "document the architecture", "start an RFC", or says a project needs a design before implementation. Suggest proactively when /design-review is invoked but no existing document is present.
Iterative design document review with principle enforcement, gap analysis, and auto-fix. Use when reviewing, auditing, or improving any design document, architecture spec, API contract, system design, or technical plan. Triggers automatically when the user asks to "review a design", "audit a spec", "improve a technical doc", or similar. Invoke directly with /design-review.
Comprehensive skill pack with 66 specialized skills for full-stack developers: 12 language experts (Python, TypeScript, Go, Rust, C++, Swift, Kotlin, C#, PHP, Java, SQL, JavaScript), 10 backend frameworks, 6 frontend/mobile, plus infrastructure, DevOps, security, and testing. Features progressive disclosure architecture for 50% faster loading.
Complete collection of battle-tested Claude Code configs from an Anthropic hackathon winner - agents, skills, hooks, and rules evolved over 10+ months of intensive daily use
Semantic search for Claude Code conversations. Remember past discussions, decisions, and patterns.
Upstash Context7 MCP server for up-to-date documentation lookup. Pull version-specific documentation and code examples directly from source repositories into your LLM context.
Comprehensive startup business analysis with market sizing (TAM/SAM/SOM), financial modeling, team planning, and strategic research
SAST analysis, dependency vulnerability scanning, OWASP Top 10 compliance, container security scanning, and automated security hardening