Orchestrates end-to-end backend development workflow: API design, database architecture, security, testing, DevOps automation, and deployment for scalable systems.
npx claudepluginhub joshuarweaver/cascade-code-general-misc-4 --plugin julianromli-ai-skillsThis skill uses the workspace's default tool permissions.
This skill provides end-to-end backend development services by orchestrating multiple expert systems, advanced development techniques, and specialized tools. It transforms business requirements into production-ready backend systems with comprehensive architecture, security, scalability, and operational excellence.
Generates design tokens/docs from CSS/Tailwind/styled-components codebases, audits visual consistency across 10 dimensions, detects AI slop in UI.
Records polished WebM UI demo videos of web apps using Playwright with cursor overlay, natural pacing, and three-phase scripting. Activates for demo, walkthrough, screen recording, or tutorial requests.
Delivers idiomatic Kotlin patterns for null safety, immutability, sealed classes, coroutines, Flows, extensions, DSL builders, and Gradle DSL. Use when writing, reviewing, refactoring, or designing Kotlin code.
This skill provides end-to-end backend development services by orchestrating multiple expert systems, advanced development techniques, and specialized tools. It transforms business requirements into production-ready backend systems with comprehensive architecture, security, scalability, and operational excellence.
Key Capabilities:
Perfect for:
Triggers:
Use when: Starting new backend development or modernizing existing systems
Tools Used:
/sc:analyze backend-requirements
BMAD PM Agent: business requirement analysis
Requirements Analyst: technical specification creation
Deep Research Agent: technology stack research
Activities:
Use when: Designing the technical architecture and system components
Tools Used:
/sc:design --type architecture backend-system
/sc:design --type api restful-apis
/sc:design --type database data-model
Backend Architect: comprehensive system design
Security Engineer: security architecture planning
Activities:
Use when: Preparing for actual code implementation
Tools Used:
/sc:design --type component implementation-strategy
Python Expert: technology-specific implementation patterns
DevOps Architect: deployment and infrastructure planning
Performance Engineer: optimization and monitoring setup
Activities:
Use when: Writing production-ready backend code
Tools Used:
/sc:implement backend-service
Python Expert: production-quality code implementation
Security Engineer: secure coding practices and vulnerability prevention
Database Specialist: optimized database interactions
Performance Engineer: efficient algorithms and caching strategies
Activities:
Use when: Ensuring system reliability and security
Tools Used:
/sc:test backend-comprehensive
Quality Engineer: testing strategy implementation
Security Engineer: security testing and vulnerability scanning
Performance Engineer: load testing and performance validation
Playwright MCP: end-to-end API testing
Activities:
Use when: Preparing for production deployment
Tools Used:
/sc:implement production-deployment
DevOps Architect: CI/CD pipeline and infrastructure setup
Security Engineer: production security hardening
Monitoring Setup: observability and alerting systems
Activities:
| Command | Use Case | Output |
|---|---|---|
/sc:design --type architecture | System architecture | Technical architecture specifications |
/sc:design --type api | API design | RESTful/GraphQL API specifications |
/sc:design --type database | Database design | Optimized schema and data models |
/sc:implement backend | Code implementation | Production-ready backend services |
/sc:test backend | Testing strategy | Comprehensive testing plans |
/sc:build deploy | Deployment setup | CI/CD and infrastructure automation |
| Technique | Role | Capabilities |
|---|---|---|
| Greenfield Service Workflow | New project development | Complete backend service development |
| Brownfield Integration | Legacy modernization | Safe system evolution and integration |
| Security-First Development | Secure implementation | Built-in security practices and validation |
| Performance Optimization | Scalability planning | Bottleneck identification and optimization |
| Server | Expertise | Use Case |
|---|---|---|
| Sequential | Complex reasoning | Architecture analysis and problem-solving |
| Context7 | Technical patterns | Framework best practices and implementation guides |
| Playwright | API testing | End-to-end API validation and testing |
| Serena | Project memory | Large codebase navigation and context management |
User: "Create a backend API for an e-commerce platform with user management, product catalog, and order processing"
Workflow:
1. Phase 1: Analyze e-commerce requirements and technical constraints
2. Phase 2: Design microservices architecture with API contracts
3. Phase 3: Plan implementation with Node.js/Express and PostgreSQL
4. Phase 4: Implement secure APIs with JWT authentication
5. Phase 5: Test with comprehensive test suites and load testing
6. Phase 6: Deploy with Docker, Kubernetes, and CI/CD pipeline
Output: Production-ready e-commerce backend with 99.9% uptime target
User: "Optimize our database architecture for better performance and scalability"
Workflow:
1. Phase 1: Analyze current database performance and bottlenecks
2. Phase 2: Design optimized schema with proper indexing
3. Phase 3: Plan migration strategy with zero downtime
4. Phase 4: Implement caching layer and query optimization
5. Phase 5: Performance test and validate improvements
6. Phase 6: Deploy with monitoring and alerting
Output: 60% performance improvement with horizontal scaling capability
User: "Implement comprehensive security for our financial services backend"
Workflow:
1. Phase 1: Analyze security requirements and compliance needs (SOC2, PCI-DSS)
2. Phase 2: Design zero-trust security architecture
3. Phase 3: Plan secure implementation with encryption and audit logging
4. Phase 4: Implement security controls and monitoring
5. Phase 5: Conduct security testing and vulnerability assessment
6. Phase 6: Deploy with security monitoring and incident response
Output: Fully compliant financial services backend with comprehensive security
backend-system/
โโโ api/
โ โโโ controllers/ # API endpoint implementations
โ โโโ middleware/ # Authentication, validation, error handling
โ โโโ routes/ # API routing and endpoint definitions
โ โโโ documentation/ # API documentation and contracts
โโโ services/
โ โโโ business/ # Business logic and domain services
โ โโโ data/ # Data access and database services
โ โโโ external/ # Third-party service integrations
โ โโโ security/ # Security services and utilities
โโโ database/
โ โโโ migrations/ # Database schema migrations
โ โโโ seeds/ # Initial data setup
โ โโโ models/ # Data models and relationships
โ โโโ queries/ # Optimized database queries
โโโ tests/
โ โโโ unit/ # Unit tests for individual components
โ โโโ integration/ # Integration tests for service interactions
โ โโโ e2e/ # End-to-end API tests
โ โโโ performance/ # Load and stress tests
โโโ infrastructure/
โ โโโ docker/ # Container configurations
โ โโโ kubernetes/ # K8s deployment manifests
โ โโโ ci-cd/ # CI/CD pipeline configurations
โ โโโ monitoring/ # Logging, metrics, and alerting
โโโ documentation/
โ โโโ architecture.md # System architecture documentation
โ โโโ api-specs.md # API specifications and contracts
โ โโโ deployment.md # Deployment procedures and runbooks
โ โโโ security.md # Security procedures and compliance
โโโ config/
โโโ development/ # Development environment configurations
โโโ staging/ # Staging environment configurations
โโโ production/ # Production environment configurations
This backend development skill transforms the complex process of backend system creation into a guided, expert-supported workflow that leverages the full power of your integrated development toolset. It ensures that backend systems are secure, scalable, maintainable, and production-ready from day one.