Guides Rust refactoring with diagnostic questions and transformations: simplify code, split large modules, remove forwarded parameters/feature flags, convert optional fields to enums.
npx claudepluginhub joshuarweaver/cascade-code-general-misc-1 --plugin pproenca-dot-skills-1This skill uses the workspace's default tool permissions.
This skill teaches you to look at working Rust code and see unnecessary complexity. Every refactoring starts with a diagnostic question, follows a transformation pattern, and ends with a self-review checklist.
Applies Acme Corporation brand guidelines including colors, fonts, layouts, and messaging to generated PowerPoint, Excel, and PDF documents.
Builds DCF models with sensitivity analysis, Monte Carlo simulations, and scenario planning for investment valuation and risk assessment.
Calculates profitability (ROE, margins), liquidity (current ratio), leverage, efficiency, and valuation (P/E, EV/EBITDA) ratios from financial statements in CSV, JSON, text, or Excel for investment analysis.
This skill teaches you to look at working Rust code and see unnecessary complexity. Every refactoring starts with a diagnostic question, follows a transformation pattern, and ends with a self-review checklist.
Before touching code, decide which mode you are in.
Defensive mode: Add abstraction for safety. Split types. Create From bridges. Audit every consumer. Use when: security-critical code, type evolution, multi-crate dependencies.
Offensive mode: Delete indirection. Remove forwarded parameters. Collapse layers. Use when: the abstraction adds complexity without adding safety, the mediator just forwards, the parameter is always None.
Know which mode you are in. Do not add abstraction when you should be deleting, and do not delete safety layers when you should be adding them.
Run these BEFORE touching any code. They determine WHAT to refactor.
Signal: The function body only passes the parameter to another function. No local logic depends on it. Action: Remove it. Replace with ambient/global access at the point of actual use. Remove from the lowest layer first, fix compilation errors upward.
Signal: Stage is Stable or equivalent, default is enabled, no rollback planned.
Action: Remove the flag. Delete the conditional. Rename gated functions (init_if_enabled -> init). Remove monitoring scaffolding.
Signal: File over ~500 lines with impl blocks operating on different domains (e.g., threads AND logs AND jobs).
Action: Split by domain (what it operates on), not by layer. See Module Decomposition Guide below.
Signal: 2+ Option<T> fields where only one should be set at a time. Code like if a.is_some() { assert!(b.is_none()) } or fields named x_config that only apply to one mode.
Action: Convert to an enum where each variant carries only its relevant data.
// BEFORE: invalid states representable
struct Auth { api_key: Option<String>, oauth_token: Option<String>, storage: Option<TokenStore> }
// AFTER: each variant carries only what it needs
enum Auth { ApiKey(String), OAuth { token: String, storage: TokenStore } }
// BEFORE: metrics threaded through every signature, never used locally
pub async fn process_batch(db: &Database, config: &Config,
metrics: Option<&MetricsClient>) { // forwarded
for item in db.pending_items(config).await? {
process_item(db, item, metrics).await?; // forwarded again
}
}
// AFTER: ambient access at the single point of use
pub async fn process_batch(db: &Database, config: &Config) {
for item in db.pending_items(config).await? {
process_item(db, item).await?;
}
}
pub async fn process_item(db: &Database, item: Item) {
let result = transform(item)?;
db.save(result).await?;
if let Some(m) = metrics::global().as_ref() { m.counter("items_processed", 1); }
}
Coordination: Remove from the lowest layer first. Every intermediate commit must compile.
// BEFORE: src/runtime.rs (950 lines, four concerns)
// AFTER:
src/runtime/mod.rs (~30 lines: struct def, init, re-exports)
src/runtime/threads.rs (~200 lines)
src/runtime/logs.rs (~250 lines)
src/runtime/jobs.rs (~300 lines)
src/runtime/cache.rs (~120 lines)
Each file is an impl block extension of the same struct. Tests move WITH their code.
// STEP 1: New types alongside old, with From bridges
impl From<&LegacyPolicy> for NetworkPolicy {
fn from(value: &LegacyPolicy) -> Self {
match value {
LegacyPolicy::FullAccess => NetworkPolicy::Enabled,
_ => NetworkPolicy::Restricted,
}
}
}
// STEP 2: Runtime carries both representations simultaneously
pub struct Permissions {
pub legacy: LegacyPolicy, // existing consumers keep working
pub network_policy: NetworkPolicy, // new consumers use richer types
}
Stacked changes -- each step is a separate, independently compilable commit:
From bridges// BEFORE: init_if_enabled(config) -> Option<Handle>
// AFTER: init(config) -> Handle (unconditional, renamed)
Full cleanup sequence:
init_if_enabled -> initOption<Handle> -> HandleStage::Removed in the features registry#[cfg(feature = "...")] in Cargo.toml -- make those deps unconditionalOrder: ship -> stabilize -> clean structure -> optimize -> remove flag -> remove scaffolding.
Not just code organization -- this is about build performance.
# 1. Measure baseline
cargo build -p parent-crate --timings # record check + test compile time
# 2. Extract: create new crate, move code, add re-exports for backward compat
# 3. Measure after
cargo build -p parent-crate --timings # compare
# 4. Report in commit message:
# cargo check: 57.08s -> 53.54s (~6.2% faster)
# cargo test --no-run: 2m39.9s -> 2m20s (~12.4% faster)
Extraction sequence:
cargo test -p parent-crate && cargo test -p new-crate// BEFORE: three options, only one valid at a time
struct ShellMode {
direct_cmd: Option<String>,
zsh_fork_config: Option<ZshForkConfig>,
pty_handle: Option<PtyHandle>,
}
// AFTER: disjoint union, invalid states unrepresentable
enum ShellMode { Direct(String), ZshFork(ZshForkConfig), Pty(PtyHandle) }
Steps: Audit construction sites for valid combinations -> define enum variants -> replace struct construction -> replace if x.is_some() with match -> remove defensive assertions.
When the bug is in a function's LOGIC (not its wiring), rewrite the body with explicit ordered checks. Do not delegate to an existing API that happens to produce correct results.
// WRONG: rewire through existing API ("happens to work")
fn resolve_policy(input: &Input) -> Policy {
default_policy(input).override_with(input.overrides())
}
// RIGHT: explicit ordered checks
fn resolve_policy(input: &Input) -> Policy {
if input.is_admin() { return Policy::FullAccess; }
if input.has_restriction("network") { return Policy::NetworkDenied; }
if input.is_sandbox_mode() { return Policy::ReadOnly; }
Policy::Standard
}
The explicit version is more auditable, more testable, and more robust to future changes in the delegated implementation.
Group code by WHAT it operates on, not by architectural layer. Each domain file contains the impl block for that domain's methods on the shared struct.
Wrong: models.rs / services.rs / controllers.rs (layer split).
Right: runtime/threads.rs / runtime/logs.rs / runtime/jobs.rs (domain split).
Rules:
mod.rs contains only re-exports. Target ~30 lines.cargo test.Run this after every refactoring. Every item must pass.
After refactoring, verify:
[ ] Every intermediate state compiles (no big-bang rewrites)
[ ] From bridges exist for any split types
[ ] Tests moved with their code (not left behind)
[ ] No new single-use helper functions introduced
[ ] Removed more code than you added (or justified why not)
[ ] No forwarded parameters remain (each param is used locally)
[ ] Module re-exports are clean (public API in mod.rs)
[ ] Feature flags for stable features removed
[ ] Structs with mutually exclusive options converted to enums
[ ] Build performance measured before/after crate extraction
[ ] Feature flag removal includes function renames and branch deletion
[ ] Chose the right refactoring mode (defensive vs offensive)
[ ] Function logic rewritten, not just rewired through delegation
If any item fails, you are not done. Fix it before declaring the refactoring complete.