implementing-code
Implementing Code
Workflows
- Security Check: Injection flaws, auth issues, sensitive data exposure
- Performance Check: N+1 queries, memory leaks, inefficient algorithms
- Readability Check: SOLID principles, naming conventions, comments
- Testing Check: Edge cases, error paths, happy paths
Feedback Loops
- Implement feature or fix
- Run local tests (unit/integration)
- Run linter/formatter
- If failure, fix and repeat
Reference Implementation
SOLID Compliant Class (TypeScript)
// Abstraction (Interface Segregation)
interface ILogger {
log(message: string): void;
}
interface IUserRepository {
save(user: User): Promise<void>;
}
// Domain Entity
class User {
constructor(public readonly id: string, public readonly email: string) {}
}
// Implementation (Single Responsibility)
class UserService {
constructor(
private readonly userRepository: IUserRepository,
private readonly logger: ILogger
) {}
public async registerUser(email: string): Promise<User> {
if (!email.includes('@')) {
throw new Error("Invalid email format");
}
const user = new User(crypto.randomUUID(), email);
await this.userRepository.save(user);
this.logger.log(`User registered: ${user.id}`);
return user;
}
}
Code Review Checklist
- No hardcoded secrets or credentials
- Input validation on all external data
- Proper error handling with meaningful messages
- No N+1 query patterns
- Functions follow single responsibility principle
- Dependencies injected, not instantiated inline
- Tests cover happy path and edge cases
More from dralgorhythm/claude-agentic-framework
react-native-reanimated
React Native Reanimated 4.x animation patterns. Use when adding animations, transitions, entering/exiting effects, or gesture-driven animations to React Native screens. Replaces Framer Motion for mobile.
102brainstorming
Generate and explore ideas effectively. Use when starting new projects, solving problems, or exploring solutions. Covers ideation techniques and divergent thinking.
47security-review
Conduct security code reviews. Use when reviewing code for vulnerabilities, assessing security posture, or auditing applications. Covers security review checklist.
45compliance
Ensure regulatory compliance. Use when implementing GDPR, HIPAA, PCI-DSS, or SOC2 requirements. Covers compliance frameworks and controls.
45requirements-analysis
Analyze and refine product requirements. Use when clarifying scope, identifying gaps, or validating requirements. Covers requirement types and analysis techniques.
44optimizing-code
Improve code performance without changing behavior. Use when code fails latency/throughput requirements. Covers profiling, caching, and algorithmic optimization.
43