From devx-qa
Analyzes project architecture, detects entrypoints, and generates ASCII state machine graphs and sequence diagrams for codebases.
npx claudepluginhub agentic-dev3o/devx-plugins --plugin devx-qaThis skill uses the workspace's default tool permissions.
Analyze project architecture and produce ASCII state machine and sequence diagrams for a given codebase or feature.
Automatically analyzes codebases to generate zero-config architecture diagrams by detecting project type, tech stack, and structure. For repo overviews without custom specs.
Scans codebases to auto-generate Mermaid diagrams like ER for DB schemas/models, sequence for API routes, architecture for services, and state diagrams from file structure.
Queries and visualizes project architecture: domains, APIs, layers, tech stack via /architecture subcommands or natural queries like 'show me the structure'. Analyzes filesystem patterns with Mermaid diagrams.
Share bugs, ideas, or general feedback.
Analyze project architecture and produce ASCII state machine and sequence diagrams for a given codebase or feature.
Target: $ARGUMENTS
Copy this checklist and track progress:
Architecture Analysis:
- [ ] Step 1: Analyze project composition
- [ ] Step 2: Find entrypoint
- [ ] Step 3: Build state machine graph
- [ ] Step 4: Generate sequence diagram
- [ ] Step 5: Output synthesis
Run language statistics: tokei || echo 'not installed'
If tokei is unavailable, use Glob to count files by extension and estimate composition.
Detect and read the first package manifest found (package.json, Cargo.toml, go.mod, pyproject.toml, requirements.txt, pom.xml, build.gradle). Identify framework from config files and directory structure.
If $ARGUMENTS is specified, locate that feature or module first.
Otherwise search for the main entrypoint: main field in manifest, common files (main.*, index.*, app.*, cmd/main.go), or framework-specific entries (pages/_app.tsx, src/main.rs, manage.py).
From the entrypoint, trace initialization, configuration loading, service bootstrapping, and main event loop or request handler.
Analyze the target for state variables, transition triggers, guards, side effects, and terminal states. Generate an ASCII acyclic graph using box-drawing characters (─ │ ┌ ┐ └ ┘ ├ ┤ ┬ ┴ ┼ ► ◄ ▲ ▼). Max 80 chars wide.
Identify actors (client, controllers, services, data layer, external APIs). Generate an ASCII sequence diagram showing control flow between them. Max 80 chars wide.
Present findings using this template:
╔════════════════════════════════════════╗
║ PROJECT: <name> ║
╠════════════════════════════════════════╣
║ Language: <primary> ║
║ Framework: <detected> ║
║ Type: <CLI/API/Web/Library> ║
╚════════════════════════════════════════╝
Then include in order: