Help us improve
Share bugs, ideas, or general feedback.
From acc
Analyzes PHP codebases for SOLID violations: God classes (SRP), type switches (OCP), LSP contract breaks, fat interfaces (ISP), concrete dependencies (DIP). Outputs severity-rated reports with remediation steps.
npx claudepluginhub dykyi-roman/awesome-claude-code --plugin accHow this skill is triggered — by the user, by Claude, or both
Slash command
/acc:analyze-solid-violationsThe summary Claude sees in its skill listing — used to decide when to auto-load this skill
This skill analyzes PHP codebases for SOLID principle violations and generates detailed reports with severity levels and remediation recommendations.
Provides SOLID principles (SRP, OCP, LSP, ISP, DIP) reference for PHP 8.4 with bash detection patterns, examples, and violation signs for audits and reviews.
Reviews code for SOLID design-principles compliance (SRP/OCP/LSP/ISP/DIP). Use as a quality gate or standalone review. Does not modify code.
Checks Java code for SOLID principles violations using patterns like multi-duty managers, if/else type chains, concrete dependencies, and empty interface methods. Suggests refactors.
Share bugs, ideas, or general feedback.
This skill analyzes PHP codebases for SOLID principle violations and generates detailed reports with severity levels and remediation recommendations.
Determine analysis scope from user input or detect automatically:
# Detect project structure
ls -la src/
# Identify key directories
find . -type d -name "Domain" -o -name "Application" -o -name "Infrastructure"
Execute detection patterns for each SOLID principle.
# Find large classes (>500 lines)
find . -name "*.php" -path "*/src/*" -exec wc -l {} \; | awk '$1 > 500 {print "CRITICAL: " $0}'
# Find classes with many methods
for file in $(find . -name "*.php" -path "*/src/*"); do
count=$(grep -c "public function" "$file" 2>/dev/null || echo 0)
if [ "$count" -gt 15 ]; then
echo "WARNING: $file has $count public methods"
fi
done
# Classes with problematic names
grep -rn "class.*Manager\|class.*Handler\|class.*Helper\|class.*Util" --include="*.php" src/
# Count constructor dependencies
grep -rn "__construct" --include="*.php" -A 20 src/ | \
grep -E "private|readonly" | \
awk -F: '{files[$1]++} END {for(f in files) if(files[f]>7) print "WARNING: " f " has " files[f] " dependencies"}'
# Classes with "And" in name
grep -rn "class\s\+\w*And\w*" --include="*.php" src/
# Check for mixed concerns
grep -rn "class.*Service" --include="*.php" src/ -l | while read file; do
if grep -q "Repository\|Mailer\|Logger" "$file"; then
echo "INFO: $file may have mixed concerns"
fi
done
# Switch on type property
grep -rn "switch.*->type\|match.*->type\|match.*::class" --include="*.php" src/
# instanceof chains
grep -rn "if.*instanceof\|elseif.*instanceof" --include="*.php" src/
# Type-based conditionals
grep -rn "if.*getType\(\)\s*===\|if.*->type\s*===" --include="*.php" src/
# Hardcoded type maps
grep -rn "\[.*::class\s*=>" --include="*.php" src/
# Classes that need frequent modification (check git history if available)
git log --since="3 months ago" --name-only --pretty=format: -- "*.php" | \
sort | uniq -c | sort -rn | head -20
# NotImplementedException throws
grep -rn "throw.*NotImplemented\|throw.*NotSupported\|throw.*UnsupportedOperation" --include="*.php" src/
# Empty method overrides
grep -rn "public function.*\{[\s]*\}" --include="*.php" src/
# Parent type checks in child classes
grep -rn "if.*parent::\|parent::.*?:" --include="*.php" src/
# Additional validation in overrides
grep -rn "function.*override" --include="*.php" -A 10 src/ | grep "if.*throw"
# Return null where parent might not
grep -rn "return\s*null;" --include="*.php" src/
# Count methods in interfaces
for file in $(find . -name "*.php" -path "*/src/*" -exec grep -l "^interface" {} \;); do
count=$(grep -c "public function" "$file" 2>/dev/null || echo 0)
if [ "$count" -gt 5 ]; then
echo "WARNING: $file interface has $count methods"
fi
if [ "$count" -gt 8 ]; then
echo "CRITICAL: $file interface has $count methods - consider splitting"
fi
done
# Find "// TODO" or "// not implemented" in interface implementations
grep -rn "//\s*TODO\|//\s*not implemented\|//\s*unused" --include="*.php" src/
# Empty implementations
grep -rn "function.*\{[\s]*return;\s*\}" --include="*.php" src/
# Overly generic interface names
grep -rn "interface\s\+\(Service\|Manager\|Handler\)\s*$" --include="*.php" src/
# New in methods (excluding exceptions, DateTime, stdClass)
grep -rn "new\s\+[A-Z]" --include="*.php" src/ | \
grep -v "Exception\|DateTime\|stdClass\|DateTimeImmutable\|ArrayObject\|SplQueue"
# Static method calls to concrete classes
grep -rn "[A-Z][a-z]*::[a-z]" --include="*.php" src/ | \
grep -v "self::\|static::\|parent::\|Uuid::\|Money::"
# Constructor with concrete types (not interfaces)
grep -rn "__construct" --include="*.php" -A 15 src/ | \
grep -E "(private|readonly)\s+[A-Z][a-z]*[A-Z][a-z]*\s+\\\$" | \
grep -v "Interface\|Abstract\|Contract"
# Container/locator usage
grep -rn "container->get\|app()->make\|\\\$this->get(" --include="*.php" src/
# SOLID Violations Report
## Summary
| Principle | Critical | Warning | Info |
|-----------|----------|---------|------|
| SRP | X | X | X |
| OCP | X | X | X |
| LSP | X | X | X |
| ISP | X | X | X |
| DIP | X | X | X |
## Critical Violations
### SRP-001: God Class
- **File:** `src/Service/UserManager.php`
- **Lines:** 847
- **Issue:** Class exceeds 500 lines with 23 public methods
- **Recommendation:** Extract into focused classes
- **Skills:** `create-use-case`, `create-domain-service`
### OCP-001: Type Switch
- **File:** `src/Payment/PaymentProcessor.php:45`
- **Issue:** Switch on payment type requires modification for new types
- **Recommendation:** Apply Strategy pattern
- **Skills:** `create-strategy`
## Warning Violations
### ISP-001: Fat Interface
- **File:** `src/Repository/UserRepository.php`
- **Methods:** 12
- **Issue:** Interface too large, clients forced to depend on unused methods
- **Recommendation:** Segregate into UserReader, UserWriter, UserStats
## Remediation Priority
1. **Immediate:** God classes blocking testing
2. **High:** Type switches preventing extension
3. **Medium:** Fat interfaces causing coupling
4. **Low:** Minor DIP violations
| Severity | Criteria | Action |
|---|---|---|
| CRITICAL | >500 LOC, >10 deps, NotImplementedException | Immediate refactoring |
| WARNING | 300-500 LOC, 7-10 deps, type switches | Plan refactoring |
| INFO | 200-300 LOC, minor issues | Monitor in next iteration |
| Violation | Recommended Skill |
|---|---|
| God Class | create-use-case |
| Type Switch | create-strategy |
| No Interface | create-repository |
| Domain Logic | create-domain-service |
| Value Extraction | create-value-object |
| Factory Missing | create-factory |
| Decorator Need | create-decorator |
# Full analysis
echo "=== SRP ===" && \
find . -name "*.php" -path "*/src/*" -exec wc -l {} \; | awk '$1 > 400' && \
echo "=== OCP ===" && \
grep -rn "switch.*type\|match.*::class" --include="*.php" src/ && \
echo "=== LSP ===" && \
grep -rn "NotImplemented\|NotSupported" --include="*.php" src/ && \
echo "=== ISP ===" && \
for f in $(find . -name "*.php" -exec grep -l "^interface" {} \;); do \
c=$(grep -c "public function" "$f"); [ $c -gt 5 ] && echo "$f: $c methods"; \
done && \
echo "=== DIP ===" && \
grep -rn "new\s\+[A-Z]" --include="*.php" src/ | grep -v "Exception\|DateTime" | head -20
This analyzer uses detection patterns from solid-knowledge. For detailed principle explanations and patterns, refer to:
solid-knowledge/references/srp-patterns.mdsolid-knowledge/references/ocp-patterns.mdsolid-knowledge/references/lsp-patterns.mdsolid-knowledge/references/isp-patterns.mdsolid-knowledge/references/dip-patterns.mdsolid-knowledge/references/antipatterns.mdSee assets/report-template.md for the full report format.