Help us improve
Share bugs, ideas, or general feedback.
How this skill is triggered — by the user, by Claude, or both
Slash command
/great_cto:well-architectedWhen to use
Apply when: - architect is writing ARCH-*.md for small/medium/large/enterprise project_size - regulated-reviewer or security-officer is auditing an existing system - project-auditor is reviewing a brownfield codebase Do NOT apply to: - nano project_size (overhead exceeds value) - bug-fix tasks (no architecture change) - pure refactor with no behaviour change
docs/architecture/**docs/decisions/**src/**This skill is limited to the following tools:
The summary Claude sees in its skill listing — used to decide when to auto-load this skill
Every ARCH document for non-nano work must answer the 6 pillar questions
Delivers systematic architecture reviews across 7 dimensions with scored reports, highlighting risks and recommendations.
Deep architectural review of a platform or product — cross-references code against claims, maps failure modes, evaluates scaling bottlenecks, and produces a decision-grade handoff document with ADRs. Use when: reviewing an existing system for scaling readiness, performing a CTO handoff, evaluating platform architecture for enterprise readiness, or auditing a codebase before a major migration. Triggers: architecture review, scaling review, platform review, CTO handoff, system audit, scaling analysis, architecture assessment, production readiness.
Standardized architecture review process with consistent criteria. Evaluate systems against principles, quality attributes, and operational readiness. Use when conducting architecture reviews.
Share bugs, ideas, or general feedback.
Every ARCH document for non-nano work must answer the 6 pillar questions below. Skipping a pillar is allowed only if explicitly justified (e.g. "Sustainability: N/A — backend-only, runs in shared infra.").
This is adapted from AWS Well-Architected (lens: small-team SaaS / LLM applications), trimmed to questions that matter at <10 engineer scale.
❌ "We'll add monitoring later." Monitoring is part of the feature.
❌ "JWT validates the user, that's our authz." JWT is authentication. Authorization is separate (this user can read THIS row).
docs/perf/❌ "Postgres has backups." Backups without a tested restore aren't backups.
❌ "Database can handle it." Quantify: queries/sec, row count, index hit rate.
cost-model to document explicit $ numbers❌ Defaulting to Opus / GPT-4 when Haiku would work. Test on Haiku first.
❌ Logs at debug level in prod, never reviewed. Waste of storage + carbon.
## Well-Architected review
### 1. Operational excellence
- Metrics: <list>
- Deploy path: <link to runbook>
- Verdict: PASS | RISKS LISTED
### 2. Security
- Trust boundaries: <list>
- Data classification: <PII / PHI / PCI / none>
- Verdict: PASS | RISKS LISTED
### 3. Reliability
- Failure modes: <link to pre-mortem>
- Idempotency: <yes/no per endpoint>
- Verdict: PASS | RISKS LISTED
### 4. Performance
- SLOs: p99=<ms>, error_rate=<%>, availability=<%>
- Verdict: PASS | RISKS LISTED
### 5. Cost
- Per-request cost: $<amount>
- Verdict: PASS | RISKS LISTED
### 6. Sustainability
- Hot-path complexity: O(<n>)
- Verdict: PASS | N/A | RISKS LISTED
## Open risks (rolled up)
<bullet list of all RISKS LISTED items + mitigation in plan>
Not every architecture is bulletproof. PASS-with-risks is OK if:
Gate:plan can approve a PASS-with-risks; gate:ship needs the mitigations shipped.