SuperClaude/Reference/examples-cookbook.md
NomenAK 545e84c56f Complete comprehensive documentation implementation
- Implement content for 200+ TODO placeholders across all documentation
- Create complete documentation structure: Getting-Started, User-Guide, Developer-Guide, Reference
- Add comprehensive guides for commands, agents, modes, MCP servers, flags, session management
- Implement technical architecture, contributing, testing, and security documentation
- Create examples cookbook, troubleshooting guide, and best practices documentation
- Update administrative files: CONTRIBUTING.md, SECURITY.md, PUBLISHING.md, CODE_OF_CONDUCT.md
- Ensure factual accuracy based on actual SuperClaude implementation analysis
- Maintain professional structure with progressive complexity and cross-references
- Provide complete coverage from beginner to expert level usage

🤖 Generated with [Claude Code](https://claude.ai/code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-08-16 19:22:54 +02:00

58 KiB

SuperClaude Examples Cookbook 🍳

Practical SuperClaude Usage: Real-world examples, working code, and hands-on scenarios that you can copy, paste, and modify for your projects. Each example includes expected outputs, common variations, and troubleshooting tips.

Real-World Focus: These examples come from actual development scenarios - building web applications, API systems, mobile apps, DevOps pipelines, and data analysis projects using SuperClaude's intelligent orchestration.

How to Use This Cookbook

Practical Reference Approach:

  • Copy & Adapt: All examples are production-ready - copy them and modify for your needs
  • Progressive Complexity: Start with Quick Examples, progress to Real-World Scenarios
  • Working Examples: Every command shown has been tested and produces the expected results
  • Immediate Trial: Most examples can be tried immediately after SuperClaude installation

Example Structure:

# What it does: Brief description of the example's purpose
/sc:command "description"

# Expected: What SuperClaude will do
# Activates: Which agents/modes/MCP servers activate
# Output: What you'll see and receive

# Variations: Common modifications and alternatives
# Troubleshooting: Common issues and solutions

Navigation Guide:

Quick Examples

Essential One-Liners for Immediate Results:

# Interactive project discovery and requirements gathering
/sc:brainstorm "mobile app for fitness tracking"
# Activates: Brainstorming mode + system-architect + requirements-analyst + Context7
# Expected: Socratic dialogue, requirement elicitation, feasibility analysis

# Analyze existing codebase for issues and improvements
/sc:analyze src/ --focus security
# Activates: security-engineer + quality-engineer + performance-engineer
# Expected: Comprehensive security audit, vulnerability report, improvement suggestions

# Implement a complete feature with best practices
/sc:implement "user authentication with JWT and rate limiting"
# Activates: security-engineer + backend-architect + Context7 + quality gates
# Expected: Complete auth implementation, security validation, tests included

# Troubleshoot and fix a problem systematically
/sc:troubleshoot "API returns 500 error on user login"
# Activates: root-cause-analyst + Sequential reasoning + systematic debugging
# Expected: Step-by-step diagnosis, root cause identification, solution ranking

# Generate comprehensive tests for existing code
/sc:test --type e2e --coverage
# Activates: quality-engineer + Playwright MCP + test automation
# Expected: End-to-end test suite, coverage report, quality metrics

Basic Usage Patterns:

# Discovery Pattern: From idea to requirements
/sc:brainstorm → /sc:workflow → /sc:design

# Development Pattern: From requirements to code  
/sc:design → /sc:implement → /sc:test

# Quality Pattern: From code to production-ready
/sc:analyze → /sc:improve → /sc:cleanup → /sc:test

# Learning Pattern: From confusion to understanding
/sc:explain → /sc:document → /sc:examples

Getting Started Examples

First Day with SuperClaude

Example 1: Your First Project Analysis

# What it does: Understand an existing project structure and codebase
/sc:load . && /sc:analyze --comprehensive

# Expected: 
# - Project structure analysis and documentation
# - Code quality assessment across all files
# - Architecture overview with component relationships
# - Security audit and performance recommendations

# Activates: Serena (project loading) + analyzer + security-engineer + performance-engineer
# Output: Comprehensive project report with actionable insights

# Common variations:
/sc:analyze src/ --focus quality          # Focus on code quality only
/sc:analyze . --scope file --depth shallow  # Quick analysis of specific files
/sc:analyze backend/ --focus security --export html  # Security report for backend

Example 2: Interactive Requirements Discovery

# What it does: Transform a vague idea into concrete requirements
/sc:brainstorm "productivity app for remote teams"

# Expected:
# - Socratic questioning about user needs and pain points
# - Feature prioritization and scope definition
# - Technical feasibility assessment
# - Structured requirements document generation

# Activates: Brainstorming mode + system-architect + requirements-analyst
# Output: Product Requirements Document (PRD) with clear specifications

# Follow-up commands:
/sc:workflow "team collaboration features"  # Generate implementation plan
/sc:design "real-time messaging system"     # Design system architecture

Learning Progression Examples

Beginner Level: Single Commands

# Explain code concepts clearly
/sc:explain "async/await in JavaScript" --level beginner --examples
# Activates: learning-guide + educational focus
# Expected: Step-by-step explanation with practical examples

# Document existing code
/sc:document src/components/ --style user-guide --audience developers
# Activates: technical-writer + documentation generation
# Expected: Comprehensive API documentation with usage examples

# Simple code improvements
/sc:improve utils.py --type readability --preview
# Activates: refactoring-expert + code quality focus
# Expected: Readability improvements with preview before applying

Intermediate Level: Command Combinations

# Complete feature development workflow
/sc:design "payment processing system" && /sc:implement "Stripe integration" && /sc:test --coverage

# Quality assurance workflow  
/sc:analyze --focus quality && /sc:improve --safe-mode && /sc:cleanup --comprehensive

# Debugging workflow
/sc:troubleshoot "slow database queries" && /sc:analyze db/ --focus performance && /sc:improve --type performance

Advanced Level: Session Management

# Long-term project development with session persistence
/sc:load "ecommerce-project" && /sc:save "checkpoint-auth-complete"

# Cross-session context building
/sc:reflect "payment integration completed" && /sc:workflow "shipping system next"

# Multi-agent coordination
/sc:spawn "complete microservices platform" --parallel --monitor

Project Workflow Examples

Complete E-Commerce Platform Development

Phase 1: Discovery & Planning

# Initial project brainstorming
/sc:brainstorm "e-commerce platform for small businesses"
# Expected: Requirements discovery, feature prioritization, technical scope

# Save initial session context
/sc:save "ecommerce-requirements-complete"

# Generate implementation workflow
/sc:workflow "MVP e-commerce with user management, product catalog, and payments"
# Expected: Structured development plan with phases, dependencies, and timelines

# System architecture design
/sc:design "microservices architecture for e-commerce" --type system --format mermaid
# Expected: Service boundaries, data flow diagrams, technology recommendations

Phase 2: Core Implementation

# Load previous session
/sc:load "ecommerce-requirements-complete"

# User management system
/sc:implement "user registration and authentication with JWT"
# Activates: security-engineer + backend-architect + Context7
# Expected: Complete auth system with security best practices

# Product catalog implementation
/sc:implement "product management REST API with search and filtering"
# Activates: backend-architect + database specialist + API design patterns
# Expected: Scalable product API with performance optimization

# Frontend development
/sc:implement "React product catalog with responsive design"
# Activates: frontend-architect + Magic MCP + accessibility compliance
# Expected: Modern React components with accessibility and responsive design

Phase 3: Integration & Testing

# Integration testing
/sc:test --type integration --focus api-frontend
# Activates: quality-engineer + Playwright MCP + integration scenarios
# Expected: Comprehensive integration test suite with API-frontend validation

# Performance optimization
/sc:analyze . --focus performance && /sc:improve --type performance --measure-impact
# Expected: Performance bottleneck identification and optimization with impact measurement

# Security audit
/sc:analyze . --focus security --depth deep --export report
# Expected: Comprehensive security assessment with vulnerability reporting

API Development Project Workflow

Complete REST API with Authentication

# Project initialization and design
/sc:brainstorm "REST API for task management" && /sc:design "RESTful task API" --type api --format openapi

# Core API implementation
/sc:implement "Express.js REST API with CRUD operations for tasks"
# Expected: Complete Express.js API with proper routing, validation, error handling

# Authentication layer
/sc:implement "JWT authentication middleware with rate limiting"
# Expected: Secure authentication with rate limiting and token management

# Database integration
/sc:implement "PostgreSQL integration with connection pooling"
# Expected: Database layer with connection management and query optimization

# API documentation
/sc:document api/ --type api --format swagger --include-examples
# Expected: Comprehensive API documentation with examples and usage guidelines

# Testing and validation
/sc:test --type unit --coverage && /sc:test --type integration --api-validation
# Expected: Complete test suite with unit and integration coverage

Frontend Application Workflow

React Dashboard Development

# Design system planning
/sc:design "admin dashboard component architecture" --type frontend

# Component implementation
/sc:implement "React dashboard with charts and data tables"
# Activates: frontend-architect + Magic MCP + data visualization patterns
# Expected: Modern dashboard with interactive components

# State management
/sc:implement "Redux state management for dashboard data"
# Expected: Proper state management with actions, reducers, and selectors

# Accessibility compliance
/sc:improve src/components/ --focus accessibility --validate-wcag
# Expected: Accessibility improvements with WCAG compliance validation

# Performance optimization
/sc:analyze src/ --focus performance && /sc:improve --type performance --bundle-analysis
# Expected: Bundle optimization and performance improvements

DevOps Pipeline Workflow

CI/CD Pipeline Setup

# Infrastructure design
/sc:design "CI/CD pipeline for Node.js microservices" --type infrastructure

# Docker containerization
/sc:implement "Docker containers for microservices deployment"
# Activates: devops-architect + containerization best practices
# Expected: Production-ready Docker setup with multi-stage builds

# GitHub Actions workflow
/sc:implement "GitHub Actions pipeline with testing and deployment"
# Expected: Automated CI/CD pipeline with quality gates

# Monitoring setup
/sc:implement "application monitoring with Prometheus and Grafana"
# Expected: Comprehensive monitoring and alerting system

# Security hardening
/sc:analyze infrastructure/ --focus security && /sc:improve --type security --compliance
# Expected: Security hardening with compliance validation

Best Practice Workflow Patterns

Quality-First Development Pattern:

# Every feature follows this pattern:
/sc:design "feature specification" → /sc:implement "feature code" → /sc:test --comprehensive → /sc:analyze --focus quality → /sc:improve --safe-mode → /sc:document "feature documentation"

Security-Focused Development Pattern:

# Security considerations at every step:
/sc:brainstorm "feature with security focus" → /sc:design --security-first → /sc:implement --security-validation → /sc:analyze --focus security → /sc:test --security-scenarios

Performance-Oriented Development Pattern:

# Performance optimization workflow:
/sc:analyze --focus performance --baseline → /sc:implement "optimized solution" → /sc:test --performance-benchmarks → /sc:improve --type performance --measure-impact

Command Examples by Category

Analysis Examples

Code Quality Analysis:

# Comprehensive codebase analysis
/sc:analyze . --comprehensive --export html
# Activates: quality-engineer + security-engineer + performance-engineer
# Output: Multi-domain analysis report in HTML format
# Use case: Pre-deployment quality review, code review preparation

# Focused security audit
/sc:analyze src/ --focus security --depth deep --include-dependencies
# Activates: security-engineer + vulnerability assessment + dependency analysis
# Output: Security vulnerabilities, compliance issues, dependency risks
# Use case: Security compliance review, penetration testing preparation

# Performance bottleneck identification
/sc:analyze api/ --focus performance --profile --memory-analysis
# Activates: performance-engineer + profiling tools + memory analysis
# Output: Performance hotspots, memory usage patterns, optimization opportunities
# Use case: Performance optimization, scalability planning

# Architecture review
/sc:analyze . --focus architecture --dependencies --coupling-analysis
# Activates: system-architect + dependency analysis + design pattern assessment
# Output: Architecture overview, coupling metrics, design pattern usage
# Use case: Technical debt assessment, refactoring planning

Language-Specific Analysis:

# Python-specific analysis
/sc:analyze **/*.py --focus quality --include-type-hints --pep8-compliance
# Expected: Python code quality with type safety and style compliance

# JavaScript/TypeScript analysis
/sc:analyze src/ --focus quality --include-bundle-analysis --dependencies
# Expected: Frontend code quality with bundle size and dependency analysis

# Multi-language project analysis
/sc:analyze . --focus architecture --cross-language-dependencies
# Expected: Cross-language architecture analysis with interface compatibility

Implementation Examples

Full-Stack Feature Implementation:

# Complete authentication system
/sc:implement "full-stack authentication with React frontend and Node.js backend"
# Activates: frontend-architect + backend-architect + security-engineer + Context7 + Magic
# Expected: Complete auth system with frontend components, backend API, security validation
# Output: React login/register components, JWT middleware, password security, session management

# Real-time chat feature
/sc:implement "real-time chat with WebSocket and message persistence"
# Activates: backend-architect + frontend-architect + database specialist + real-time patterns
# Expected: WebSocket implementation, message storage, real-time UI updates
# Output: Socket.io server, React chat interface, message history API

# Payment processing integration
/sc:implement "Stripe payment integration with subscription management"
# Activates: backend-architect + security-engineer + Context7 (Stripe patterns)
# Expected: Secure payment processing with webhook handling and subscription logic
# Output: Payment API, webhook handlers, subscription management, security compliance

API Development:

# RESTful API with documentation
/sc:implement "REST API for blog management with OpenAPI documentation"
# Activates: backend-architect + technical-writer + API design patterns
# Expected: Complete REST API with proper HTTP methods, status codes, documentation
# Output: Express.js routes, validation middleware, OpenAPI spec, API documentation

# GraphQL API implementation
/sc:implement "GraphQL API with schema-first design and resolvers"
# Activates: backend-architect + Context7 (GraphQL patterns) + type safety
# Expected: GraphQL schema, resolvers, type definitions, query optimization
# Output: GraphQL server, schema definitions, resolver functions, type safety

# Microservices communication
/sc:implement "microservices communication with message queues and service discovery"
# Activates: system-architect + devops-architect + distributed systems patterns
# Expected: Inter-service communication, message queuing, service registration
# Output: RabbitMQ/Redis setup, service discovery, API gateway configuration

Frontend Implementation:

# Modern React application
/sc:implement "React application with TypeScript, state management, and routing"
# Activates: frontend-architect + Magic MCP + TypeScript patterns + Context7
# Expected: Complete React setup with modern patterns and tooling
# Output: TypeScript configuration, Redux/Zustand setup, React Router, component structure

# Responsive design system
/sc:implement "component library with Storybook and accessibility compliance"
# Activates: frontend-architect + Magic MCP + accessibility validation + design systems
# Expected: Reusable component library with documentation and accessibility
# Output: Styled components, Storybook stories, accessibility tests, design tokens

# Progressive Web App
/sc:implement "PWA with offline capabilities and push notifications"
# Activates: frontend-architect + PWA patterns + service worker implementation
# Expected: Service worker setup, offline functionality, notification system
# Output: PWA manifest, service worker, offline storage, notification handlers

Quality Examples

Testing Implementation:

# Comprehensive test suite
/sc:test --type all --coverage --report
# Activates: quality-engineer + Playwright MCP + test automation
# Expected: Unit, integration, and E2E tests with coverage reporting
# Output: Jest unit tests, Cypress E2E tests, coverage reports, quality metrics

# Performance testing
/sc:test --type performance --load-testing --benchmark
# Activates: performance-engineer + load testing tools + benchmarking
# Expected: Load testing scenarios with performance benchmarks
# Output: Load test results, performance metrics, bottleneck identification

# Security testing
/sc:test --type security --penetration --vulnerability-scan
# Activates: security-engineer + security testing tools + vulnerability assessment
# Expected: Security test scenarios with vulnerability scanning
# Output: Security test results, vulnerability reports, compliance validation

# Accessibility testing
/sc:test --type accessibility --wcag-compliance --screen-reader
# Activates: quality-engineer + accessibility validation + compliance testing
# Expected: Accessibility test scenarios with WCAG compliance validation
# Output: Accessibility reports, compliance status, remediation suggestions

Code Quality Improvement:

# Systematic code improvement
/sc:improve src/ --type comprehensive --safe-mode --backup
# Activates: refactoring-expert + quality-engineer + safety validation
# Expected: Code quality improvements with safety guarantees
# Output: Refactored code, improvement reports, backup creation

# Performance optimization
/sc:improve api/ --type performance --measure-impact --before-after
# Activates: performance-engineer + benchmarking + impact measurement
# Expected: Performance improvements with measurable impact
# Output: Optimized code, performance comparisons, impact analysis

# Security hardening
/sc:improve . --type security --compliance-check --vulnerability-fix
# Activates: security-engineer + compliance validation + vulnerability remediation
# Expected: Security improvements with compliance validation
# Output: Hardened code, security reports, compliance status

Troubleshooting Examples

Systematic Problem Diagnosis:

# API performance issues
/sc:troubleshoot "API response time increased from 200ms to 2 seconds"
# Activates: root-cause-analyst + performance-engineer + Sequential reasoning
# Expected: Systematic diagnosis with hypothesis testing and root cause identification
# Output: Problem analysis, root cause, solution ranking, implementation plan

# Database connection problems
/sc:troubleshoot "database connection pool exhausted under load"
# Activates: root-cause-analyst + database specialist + performance analysis
# Expected: Connection pool analysis, load testing, configuration recommendations
# Output: Database diagnostics, configuration fixes, scaling recommendations

# Frontend rendering issues
/sc:troubleshoot "React components causing memory leaks and slow rendering"
# Activates: root-cause-analyst + frontend-architect + performance analysis
# Expected: Memory leak detection, rendering optimization, component analysis
# Output: Memory analysis, component fixes, performance improvements

Build and Deployment Issues:

# Build pipeline failures
/sc:troubleshoot "CI/CD pipeline failing at Docker build stage"
# Activates: root-cause-analyst + devops-architect + build system analysis
# Expected: Build process analysis, dependency resolution, configuration fixes
# Output: Build diagnostics, Dockerfile fixes, pipeline optimization

# Production deployment problems
/sc:troubleshoot "application crashes after deployment with 502 errors"
# Activates: root-cause-analyst + devops-architect + system diagnostics
# Expected: Production environment analysis, log analysis, system configuration
# Output: Deployment diagnostics, configuration fixes, monitoring setup

# Performance degradation after deployment
/sc:troubleshoot "application performance degraded 300% after latest deployment"
# Activates: root-cause-analyst + performance-engineer + deployment analysis
# Expected: Performance regression analysis, code comparison, optimization plan
# Output: Performance analysis, regression identification, rollback/fix plan

Agent Examples

Multi-Agent Collaboration Patterns

Full-Stack Development Team:

# E-commerce platform requiring multiple specialists
/sc:implement "secure e-commerce platform with payment processing and admin dashboard"

# Automatic agent activation:
# - frontend-architect: Dashboard UI components and user interface
# - backend-architect: API design, database schema, server logic  
# - security-engineer: Payment security, authentication, data protection
# - devops-architect: Deployment, scaling, monitoring setup
# - quality-engineer: Testing strategy, validation, compliance

# Expected coordination:
# 1. security-engineer establishes security requirements and patterns
# 2. backend-architect designs API with security validation
# 3. frontend-architect creates UI components with security compliance
# 4. devops-architect plans secure deployment and monitoring
# 5. quality-engineer validates all security and functionality requirements

Performance Optimization Team:

# Complex performance problem requiring systematic analysis
/sc:troubleshoot "microservices platform experiencing latency spikes under load"

# Automatic agent activation:
# - root-cause-analyst: Systematic problem investigation and hypothesis testing
# - performance-engineer: Performance profiling, bottleneck identification
# - system-architect: Architecture analysis, service communication patterns
# - devops-architect: Infrastructure analysis, scaling recommendations

# Coordination workflow:
# 1. root-cause-analyst leads systematic investigation methodology
# 2. performance-engineer provides technical performance analysis
# 3. system-architect evaluates architectural bottlenecks
# 4. devops-architect recommends infrastructure optimizations

Learning and Documentation Team:

# Complex technical documentation requiring multiple perspectives
/sc:document "microservices architecture guide" --audience mixed --comprehensive

# Automatic agent activation:
# - technical-writer: Documentation structure, clarity, audience targeting
# - system-architect: Technical accuracy, architectural patterns
# - learning-guide: Educational progression, concept explanation
# - quality-engineer: Completeness validation, example verification

# Collaboration pattern:
# 1. learning-guide establishes educational flow and skill progression
# 2. system-architect provides technical accuracy and depth
# 3. technical-writer ensures clarity and audience appropriateness
# 4. quality-engineer validates completeness and example accuracy

Agent Specialization Examples

Security-Focused Development:

# Security agent leading with other agents supporting
/sc:implement "OAuth 2.0 authentication with PKCE and security best practices"

# Primary: security-engineer
# - Threat modeling and security requirement specification
# - Security pattern selection and implementation guidance
# - Vulnerability assessment and compliance validation

# Supporting: backend-architect
# - Technical implementation of security patterns
# - Database security and session management
# - API security and rate limiting implementation

# Integration: Context7 MCP
# - Official OAuth 2.0 documentation and patterns
# - Security library recommendations and usage examples

Performance-Centric Development:

# Performance engineer leading optimization effort
/sc:improve api/ --focus performance --measure-impact

# Primary: performance-engineer
# - Performance profiling and bottleneck identification
# - Optimization strategy development and implementation
# - Performance impact measurement and validation

# Supporting: backend-architect
# - Code-level optimization implementation
# - Database query optimization and caching strategies
# - Architecture modifications for performance

# Supporting: devops-architect
# - Infrastructure performance optimization
# - Scaling strategies and resource allocation
# - Monitoring and alerting for performance metrics

Mode Examples

Brainstorming Mode Scenarios

Interactive Requirements Discovery:

# Vague project idea triggering brainstorming mode
/sc:brainstorm "something for team productivity"

# Mode activation: Brainstorming mode automatically detected
# Behavioral changes:
# - Socratic questioning approach
# - Non-presumptive dialogue style
# - Collaborative exploration focus
# - Requirements elicitation techniques

# Expected interaction flow:
# 1. "What specific productivity challenges does your team face?"
# 2. "Who are the primary users and what are their daily workflows?"
# 3. "What solutions have you tried before and what worked/didn't work?"
# 4. "What would success look like for this productivity solution?"
# 5. Generated structured requirements document

Creative Problem Solving:

# Uncertainty keywords triggering exploration mode
/sc:brainstorm "maybe we could improve our deployment process somehow"

# Mode characteristics:
# - Exploration-focused questioning
# - Alternative solution generation
# - Feasibility assessment for multiple approaches
# - Creative thinking and innovative solutions

# Typical progression:
# DevOps exploration → Current process analysis → Pain point identification → 
# Solution brainstorming → Feasibility assessment → Implementation roadmap

Task Management Mode Scenarios

Complex Multi-Step Projects:

# Large scope triggering task management mode
/sc:implement "complete microservices platform with authentication, API gateway, service mesh, and monitoring"

# Mode activation: >3 steps, multiple domains, complex dependencies
# Behavioral changes:
# - Hierarchical task breakdown (Plan → Phase → Task → Todo)
# - Progress tracking with TodoWrite integration
# - Session persistence and checkpointing
# - Cross-session context maintenance

# Task hierarchy creation:
# Plan: Complete microservices platform
# ├─ Phase 1: Core infrastructure (auth, API gateway)
# ├─ Phase 2: Service mesh and communication
# ├─ Phase 3: Monitoring and observability
# └─ Phase 4: Integration testing and deployment

Long-Term Project Development:

# Multi-session project requiring persistent memory
/sc:load "ecommerce-platform" && /sc:task "implement shopping cart functionality"

# Mode characteristics:
# - Session context restoration and building
# - Memory-driven decision making
# - Progressive feature development
# - Cross-session learning and adaptation

# Memory integration:
# - Previous decisions and architectural choices
# - Component relationships and dependencies
# - Quality standards and testing approaches
# - Performance requirements and constraints

Orchestration Mode Scenarios

High-Complexity Coordination:

# Complex task requiring multiple tools and parallel execution
/sc:spawn "full-stack application with React frontend, Node.js API, PostgreSQL database, Redis caching, Docker deployment, and comprehensive testing"

# Mode activation: Complexity score >0.8, multiple domains, parallel opportunities
# Behavioral changes:
# - Intelligent tool selection and coordination
# - Parallel task execution where possible
# - Resource optimization and efficiency focus
# - Multi-agent workflow orchestration

# Orchestration pattern:
# Parallel Track 1: Frontend development (frontend-architect + Magic MCP)
# Parallel Track 2: Backend development (backend-architect + Context7)
# Parallel Track 3: Database design (database specialist)
# Integration Phase: System integration and testing
# Deployment Phase: DevOps implementation

Token Efficiency Mode Scenarios

Large-Scale Analysis with Resource Constraints:

# Context usage >75% triggering efficiency mode
/sc:analyze large-codebase/ --comprehensive --uc

# Mode activation: --uc flag or resource pressure detected
# Behavioral changes:
# - Symbol-enhanced communication (30-50% token reduction)
# - Compressed clarity with ≥95% information preservation
# - Structured output with bullet points and tables
# - Essential information focus

# Example compressed output:
# ⚡ perf analysis: 
# ├─ API slow ∵ O(n²) algo auth.js:45
# ├─ DB bottleneck → indexing needed users table
# └─ 🧠 memory leak: React components not cleanup

Session Examples

Session Lifecycle Management

Project Initialization and Context Building:

# Starting new project with context establishment
/sc:load new-project/ --initialize
# Expected: Project structure analysis, initial context creation, session establishment

# Building project context through analysis
/sc:analyze . --comprehensive && /sc:save "initial-analysis-complete"
# Expected: Complete project understanding saved for future sessions

# Resuming work with context restoration
/sc:load "initial-analysis-complete" && /sc:reflect
# Expected: Context restoration, progress assessment, next steps identification

Long-Term Development Sessions:

# Phase-based development with checkpointing
/sc:load "ecommerce-project" 

# Authentication phase
/sc:implement "JWT authentication system" && /sc:save "auth-phase-complete"

# Product catalog phase  
/sc:load "auth-phase-complete" && /sc:implement "product catalog API" && /sc:save "catalog-phase-complete"

# Payment integration phase
/sc:load "catalog-phase-complete" && /sc:implement "Stripe payment integration" && /sc:save "payment-phase-complete"

# Each phase builds on previous context while maintaining session continuity

Cross-Session Learning and Adaptation:

# Session with decision tracking and learning
/sc:load "microservices-project" && /sc:reflect "previous payment integration decisions"

# Expected behavior:
# - Recall previous architectural decisions about payment processing
# - Apply learned patterns to new payment features
# - Suggest improvements based on previous implementation experience
# - Maintain consistency with established patterns and standards

Session Memory Patterns

Decision Memory and Consistency:

# Architectural decision recording
/sc:design "authentication system" && /sc:save "auth-architecture-decided"

# Later consistency checking
/sc:load "auth-architecture-decided" && /sc:implement "user registration endpoint"
# Expected: Implementation consistent with previously decided architecture patterns

Progress Tracking and Continuity:

# Multi-day development with progress tracking
Day 1: /sc:implement "user management" && /sc:save "day1-user-mgmt"
Day 2: /sc:load "day1-user-mgmt" && /sc:implement "product catalog" && /sc:save "day2-catalog" 
Day 3: /sc:load "day2-catalog" && /sc:implement "shopping cart" && /sc:save "day3-cart"

# Each day builds on previous work with full context awareness

Flag Examples

Performance and Efficiency Flags

Resource Optimization:

# Ultra-compressed mode for large operations
/sc:analyze massive-codebase/ --uc --scope project
# Activates: Token efficiency mode, symbol communication, 30-50% token reduction
# Expected: Compressed but complete analysis with symbol-enhanced communication

# Concurrency control for parallel operations
/sc:implement "microservices suite" --concurrency 3 --parallel
# Expected: Maximum 3 concurrent operations, intelligent parallel execution

# Focus area limitation for targeted analysis
/sc:analyze . --focus security --scope module
# Expected: Security-focused analysis limited to module scope for efficiency

Analysis Depth Control:

# Standard analysis with moderate depth
/sc:analyze src/ --think
# Activates: Sequential MCP for structured analysis (~4K tokens)
# Expected: Comprehensive but focused analysis with clear structure

# Deep analysis for complex problems
/sc:analyze architecture/ --think-hard --focus architecture
# Activates: Sequential + Context7 for deep analysis (~10K tokens)
# Expected: Detailed architectural analysis with pattern recognition

# Maximum depth for critical system analysis
/sc:analyze . --ultrathink --all-mcp
# Activates: All MCP servers, maximum analysis depth (~32K tokens)
# Expected: Comprehensive system analysis with all available intelligence

Tool Integration Flags

MCP Server Coordination:

# Documentation-focused development
/sc:implement "React component library" --c7 --magic
# Activates: Context7 for official patterns + Magic for UI generation
# Expected: React components following official patterns with modern UI

# Complex analysis requiring multiple reasoning approaches
/sc:troubleshoot "distributed system performance" --seq --c7 --serena
# Activates: Sequential reasoning + Context7 docs + Serena memory
# Expected: Systematic analysis with official patterns and session memory

# Comprehensive development with all capabilities
/sc:implement "enterprise application" --all-mcp
# Activates: All MCP servers for maximum capability
# Expected: Full-featured implementation with all available intelligence

Safety and Validation Flags:

# Safe development with comprehensive validation
/sc:improve legacy-code/ --safe-mode --validate --backup
# Activates: Maximum safety, validation gates, automatic backups
# Expected: Risk-assessed improvements with rollback capability

# Production-ready development with quality gates
/sc:implement "payment processing" --validate --safe-mode --test-required
# Activates: Pre-execution validation, safety checks, mandatory testing
# Expected: Production-ready implementation with comprehensive validation

# Development with risk assessment
/sc:spawn "system redesign" --validate --iterations 3 --safe-mode
# Activates: Risk assessment, iterative improvement, conservative execution
# Expected: Systematic redesign with risk mitigation and iterative validation

Real-World Scenarios

Scenario 1: Startup MVP Development

Context: Early-stage startup needs to build and deploy an MVP for a social media platform within 6 weeks.

Complete Workflow:

# Week 1: Discovery and Architecture
/sc:brainstorm "social media platform for creators" --strategy systematic
# Expected: Requirements discovery, user personas, feature prioritization

/sc:design "social media platform architecture" --type system --scalable
# Expected: Microservices architecture, technology stack, deployment strategy

/sc:workflow "MVP social platform" --strategy agile --timeline 6weeks
# Expected: Sprint planning, development phases, milestone definitions

/sc:save "mvp-planning-complete"

# Week 2-3: Core Implementation
/sc:load "mvp-planning-complete"

/sc:implement "user authentication and profiles with social login"
# Activates: security-engineer + backend-architect + frontend-architect + Context7
# Expected: OAuth integration, user profiles, secure authentication

/sc:implement "content posting and feed with real-time updates"
# Activates: backend-architect + frontend-architect + real-time patterns
# Expected: Content management, real-time feed, WebSocket implementation

/sc:test --type integration --coverage && /sc:save "core-features-complete"

# Week 4-5: Advanced Features and Polish
/sc:load "core-features-complete"

/sc:implement "content recommendation algorithm and social interactions"
# Expected: Recommendation engine, likes/comments, user engagement features

/sc:improve . --focus performance --mobile-optimization
# Expected: Mobile-responsive design, performance optimization

/sc:analyze . --focus security --deployment-ready
# Expected: Security audit, production readiness assessment

# Week 6: Deployment and Launch
/sc:implement "production deployment with monitoring and analytics"
# Activates: devops-architect + monitoring setup + analytics integration
# Expected: Production deployment, monitoring dashboards, user analytics

/sc:test --type e2e --production-simulation
# Expected: End-to-end testing in production-like environment

/sc:document . --type user-guide --launch-ready
# Expected: User documentation, API docs, deployment guides

Scenario 2: Legacy System Modernization

Context: Enterprise company needs to modernize a 10-year-old monolithic application to microservices architecture.

Comprehensive Modernization Workflow:

# Phase 1: Legacy System Analysis
/sc:load legacy-system/ --comprehensive-analysis

/sc:analyze . --focus architecture --legacy-assessment --technical-debt
# Activates: system-architect + refactoring-expert + technical debt analysis
# Expected: Legacy architecture analysis, technical debt assessment, modernization roadmap

/sc:troubleshoot "performance bottlenecks and scalability issues"
# Expected: Performance analysis, scalability constraints, optimization opportunities

/sc:save "legacy-analysis-complete"

# Phase 2: Modernization Strategy
/sc:load "legacy-analysis-complete"

/sc:design "microservices architecture migration strategy" --type system --enterprise
# Activates: system-architect + enterprise patterns + migration strategies
# Expected: Service decomposition plan, data migration strategy, API design

/sc:workflow "legacy to microservices migration" --strategy enterprise --risk-management
# Expected: Phased migration plan, risk mitigation, rollback strategies

/sc:save "modernization-strategy-complete"

# Phase 3: Incremental Migration
/sc:load "modernization-strategy-complete"

# Extract first microservice
/sc:implement "user management microservice extraction" --legacy-integration
# Expected: User service extraction, API compatibility, data synchronization

/sc:test --type integration --legacy-compatibility
# Expected: Integration testing with legacy system, compatibility validation

# Extract second microservice
/sc:implement "payment processing microservice" --security-focus --legacy-data-migration
# Expected: Payment service extraction, secure data migration, transaction integrity

# Continue incremental extraction
/sc:implement "product catalog microservice" --data-consistency --api-versioning
# Expected: Catalog service, data consistency, API versioning strategy

/sc:save "microservices-phase1-complete"

# Phase 4: Infrastructure Modernization
/sc:load "microservices-phase1-complete"

/sc:implement "containerization and orchestration with Kubernetes"
# Activates: devops-architect + containerization + orchestration patterns
# Expected: Docker containers, Kubernetes deployment, service mesh

/sc:implement "CI/CD pipeline for microservices" --enterprise-grade
# Expected: Automated pipeline, quality gates, deployment automation

/sc:implement "monitoring and observability stack"
# Expected: Distributed tracing, metrics collection, log aggregation

# Phase 5: Performance and Security
/sc:analyze microservices/ --focus performance --distributed-systems
# Expected: Performance analysis, distributed system optimization

/sc:analyze . --focus security --enterprise-compliance
# Expected: Security audit, compliance validation, vulnerability assessment

/sc:improve . --type performance --distributed-optimization
# Expected: Performance optimization for distributed architecture

/sc:test --type performance --load-testing --enterprise-scale
# Expected: Load testing, scalability validation, performance benchmarks

Scenario 3: Open Source Project Contribution

Context: Contributing a major feature to a popular open source project with strict quality standards.

Open Source Contribution Workflow:

# Understanding the Project
/sc:load open-source-project/ --contributor-onboarding

/sc:analyze . --focus architecture --contributing-guidelines
# Expected: Architecture understanding, contribution guidelines, code standards

/sc:explain "project architecture and patterns" --contributor-perspective
# Expected: Architecture explanation, pattern documentation, contribution guidance

# Feature Planning
/sc:brainstorm "new feature proposal" --community-focused --open-source
# Expected: Community-oriented feature planning, RFC preparation

/sc:design "feature implementation" --open-source-standards --backward-compatible
# Expected: Feature design following project standards, compatibility considerations

# Implementation with Quality Focus
/sc:implement "feature implementation" --open-source-quality --comprehensive-testing
# Activates: All quality agents + comprehensive validation + community standards
# Expected: High-quality implementation with thorough testing

/sc:test --type comprehensive --coverage-100 --edge-cases
# Expected: Complete test coverage, edge case handling, quality validation

/sc:document feature/ --type contributor --community-guidelines
# Expected: Comprehensive documentation following community standards

# Community Integration
/sc:analyze . --focus compatibility --breaking-changes --community-impact
# Expected: Compatibility analysis, impact assessment, community considerations

/sc:improve . --type maintainability --long-term-support
# Expected: Maintainability improvements, long-term support considerations

/sc:test --type integration --ecosystem-compatibility
# Expected: Ecosystem integration testing, compatibility validation

Advanced Examples

Expert-Level Multi-Tool Coordination

Complex System Performance Optimization:

# Advanced performance optimization requiring all capabilities
/sc:analyze distributed-system/ --ultrathink --all-mcp --focus performance

# Activates comprehensive analysis:
# - Sequential MCP: Multi-step reasoning for complex performance analysis
# - Context7 MCP: Performance patterns and optimization documentation
# - Serena MCP: Project memory and historical performance data
# - Morphllm MCP: Code transformation for optimization patterns
# - Playwright MCP: Performance testing and validation
# - Magic MCP: UI performance optimization (if applicable)

# Expected comprehensive output:
# 1. Systematic performance analysis with bottleneck identification
# 2. Official optimization patterns and best practices
# 3. Historical performance trends and regression analysis
# 4. Automated code optimizations where applicable
# 5. Performance testing scenarios and validation
# 6. UI performance improvements if frontend components exist

/sc:improve . --type performance --measure-impact --all-mcp --validate
# Expected: Coordinated optimization across all system layers with impact measurement

Enterprise-Scale Security Audit:

# Comprehensive security analysis with all available intelligence
/sc:analyze enterprise-app/ --focus security --ultrathink --all-mcp --enterprise-compliance

# Multi-layer security analysis:
# - Sequential: Systematic threat modeling and security analysis
# - Context7: Official security patterns and compliance requirements
# - Serena: Historical security decisions and architectural context
# - Playwright: Security testing scenarios and vulnerability validation
# - Quality gates: Compliance validation and security standards verification

# Expected deliverables:
# 1. Comprehensive threat model with attack vector analysis
# 2. Compliance assessment against industry standards (SOC 2, GDPR, HIPAA)
# 3. Vulnerability assessment with priority ranking
# 4. Automated security testing scenarios
# 5. Security improvement roadmap with implementation priorities
# 6. Executive summary with risk assessment and business impact

Advanced Orchestration Patterns

Parallel Development Coordination:

# Complex project requiring parallel development streams
/sc:spawn "enterprise platform development" --parallel --concurrency 5 --orchestrate

# Intelligent parallel coordination:
# Stream 1: Frontend development (frontend-architect + Magic MCP)
# Stream 2: Backend API development (backend-architect + Context7)
# Stream 3: Database design and optimization (database specialist + performance-engineer)
# Stream 4: DevOps and infrastructure (devops-architect + monitoring setup)
# Stream 5: Security implementation (security-engineer + compliance validation)

# Orchestration intelligence:
# - Dependency awareness: Backend API completion before frontend integration
# - Resource optimization: Parallel execution where possible, sequential where required
# - Quality gates: Continuous validation across all development streams
# - Progress synchronization: Coordinated milestones and integration points
# - Risk management: Early identification of blockers and dependency conflicts

Adaptive Learning and Optimization:

# Advanced session management with learning and adaptation
/sc:load "long-term-project" --adaptive-learning --pattern-recognition

# Advanced session capabilities:
# - Pattern recognition across development sessions
# - Adaptive strategy improvement based on project history
# - Intelligent tool selection based on project characteristics
# - Quality prediction and proactive issue prevention
# - Performance optimization based on historical bottlenecks

/sc:reflect "development patterns and optimization opportunities" --learning-analysis

# Expected analysis:
# 1. Development pattern analysis and efficiency opportunities
# 2. Tool usage optimization recommendations
# 3. Quality improvement strategies based on project history
# 4. Performance optimization priorities based on usage patterns
# 5. Process improvement recommendations for future development

Expert Optimization Strategies

Context-Aware Resource Management:

# Advanced resource optimization with intelligent adaptation
/sc:implement "high-complexity feature" --adaptive-resources --smart-optimization

# Adaptive behavior:
# - Dynamic tool selection based on real-time complexity assessment
# - Resource allocation optimization based on system constraints
# - Quality requirement adaptation based on feature criticality
# - Performance target adjustment based on usage patterns
# - Risk tolerance calibration based on project phase and requirements

Predictive Quality Management:

# Advanced quality management with predictive capabilities
/sc:analyze . --quality-prediction --risk-assessment --preventive-optimization

# Predictive capabilities:
# - Quality degradation prediction based on code changes
# - Performance regression risk assessment
# - Security vulnerability prediction based on code patterns
# - Maintenance burden forecasting
# - Technical debt accumulation modeling

# Expected outputs:
# 1. Quality trend analysis with degradation predictions
# 2. Proactive optimization recommendations
# 3. Risk mitigation strategies for predicted issues
# 4. Long-term maintainability roadmap
# 5. Investment priorities for technical debt management

Copy-Paste Examples

Immediate Use Commands

Quick Project Setup:

# New React project with best practices
/sc:implement "React TypeScript project with routing, state management, and testing setup"

# New Node.js API with authentication
/sc:implement "Express.js REST API with JWT authentication and PostgreSQL integration"

# Python FastAPI with async support
/sc:implement "FastAPI application with async PostgreSQL and authentication middleware"

# Next.js full-stack application
/sc:implement "Next.js 14 application with App Router, TypeScript, and Tailwind CSS"

Common Development Tasks:

# Code quality improvement
/sc:analyze . --focus quality && /sc:improve --safe-mode && /sc:test --coverage

# Security audit and fixes
/sc:analyze . --focus security --depth deep && /sc:improve --type security

# Performance optimization workflow
/sc:analyze . --focus performance && /sc:improve --type performance --measure-impact

# Documentation generation
/sc:document . --type comprehensive --include-examples --audience developers

Quick Troubleshooting:

# API performance issues
/sc:troubleshoot "API response time slow" && /sc:analyze api/ --focus performance

# Build failures
/sc:troubleshoot "build failing with dependency errors" && /sc:cleanup --dependencies

# Database connection issues
/sc:troubleshoot "database connection timeout" && /sc:analyze db/ --focus configuration

# Frontend rendering problems
/sc:troubleshoot "React components not rendering correctly" && /sc:analyze src/components/ --focus debugging

Ready-to-Execute Workflows

Full-Stack Development (Copy & Paste):

# Complete e-commerce development workflow
/sc:brainstorm "e-commerce platform for small business" && /sc:save "ecommerce-requirements"
/sc:load "ecommerce-requirements" && /sc:design "e-commerce architecture" --type system
/sc:implement "user authentication with social login" && /sc:test --type integration
/sc:implement "product catalog with search and filtering" && /sc:test --type unit
/sc:implement "shopping cart and checkout with Stripe" && /sc:test --type e2e
/sc:implement "admin dashboard with analytics" && /sc:test --comprehensive
/sc:implement "production deployment with monitoring" && /sc:save "ecommerce-complete"

API Development (Copy & Paste):

# Complete REST API development
/sc:design "blog management API" --type api --format openapi
/sc:implement "Express.js blog API with CRUD operations" && /sc:test --type unit
/sc:implement "JWT authentication middleware" && /sc:test --type security
/sc:implement "PostgreSQL integration with migrations" && /sc:test --type integration
/sc:document api/ --type api --format swagger && /sc:test --type e2e
/sc:implement "rate limiting and security middleware" && /sc:analyze . --focus security

Mobile App Development (Copy & Paste):

# React Native app development workflow
/sc:brainstorm "fitness tracking mobile app" && /sc:design "mobile app architecture"
/sc:implement "React Native app with navigation and state management"
/sc:implement "user authentication and profile management"
/sc:implement "fitness tracking features with device integration"
/sc:implement "social features and progress sharing"
/sc:test --type mobile --comprehensive && /sc:improve --focus performance

Common Problem Solutions (Copy & Paste)

Performance Issues:

# Web application performance optimization
/sc:analyze . --focus performance --comprehensive
/sc:improve frontend/ --type performance --bundle-optimization
/sc:improve backend/ --type performance --database-optimization
/sc:test --type performance --load-testing
/sc:implement "caching strategy with Redis" && /sc:test --performance-impact

Security Hardening:

# Complete security hardening workflow
/sc:analyze . --focus security --depth deep --compliance
/sc:implement "security headers and CORS configuration"
/sc:implement "input validation and sanitization middleware"
/sc:implement "rate limiting and DDoS protection"
/sc:test --type security --penetration-testing
/sc:document security/ --type security-guide --compliance-ready

Code Quality Improvement:

# Code quality enhancement workflow
/sc:analyze . --focus quality --comprehensive
/sc:cleanup --dead-code --organize-imports --format-code
/sc:improve . --type maintainability --refactor-patterns
/sc:test --type unit --coverage-target-90
/sc:document . --type inline --docstring-coverage

Development Environment Setup (Copy & Paste)

Frontend Development Environment:

# Complete frontend setup with best practices
/sc:implement "Vite React TypeScript project with ESLint, Prettier, and Tailwind"
/sc:implement "component library setup with Storybook"
/sc:implement "testing setup with Vitest and React Testing Library"
/sc:implement "CI/CD pipeline for frontend deployment"
/sc:document frontend/ --type developer-guide --setup-instructions

Backend Development Environment:

# Complete backend setup with monitoring
/sc:implement "Node.js TypeScript project with Express and Prisma"
/sc:implement "Docker containerization with multi-stage builds"
/sc:implement "PostgreSQL setup with migrations and seeding"
/sc:implement "monitoring setup with Prometheus and Grafana"
/sc:implement "logging and error tracking with Winston and Sentry"

DevOps Pipeline Setup:

# Complete CI/CD pipeline setup
/sc:implement "GitHub Actions workflow with testing and deployment"
/sc:implement "Docker multi-stage builds for production optimization"
/sc:implement "Kubernetes deployment with ingress and monitoring"
/sc:implement "Infrastructure as Code with Terraform"
/sc:implement "monitoring and alerting with DataDog/New Relic"

Learning Progression Roadmap

🌱 Beginner Level (Week 1-2)

Essential Foundation:

First Steps Practice:

Success Criteria:

  • Can install and configure SuperClaude successfully
  • Comfortable with 5-10 core commands
  • Can complete simple workflows independently

🌿 Intermediate Level (Week 3-6)

Enhanced Capabilities:

Practical Application:

Success Criteria:

  • Understands agent coordination and mode selection
  • Can optimize workflows with appropriate flags
  • Comfortable with complex multi-step projects

🌲 Advanced Level (Month 2+)

Expert Coordination:

Mastery Development:

Success Criteria:

  • Can coordinate complex multi-tool workflows
  • Masters session management for long-term projects
  • Develops optimization strategies for specific domains

🔧 Expert Level (Month 3+)

Framework Development:

Community Leadership:

  • Contribute to framework development and documentation
  • Help community members with complex scenarios
  • Develop new patterns and share advanced techniques

Success Criteria:

  • Contributes to SuperClaude framework development
  • Mentors other users and solves complex problems
  • Innovates new usage patterns and optimizations

Quick Reference by Use Case

Web Development:

Mobile Development:

DevOps & Infrastructure:

Data & Analytics:

Support Resources

Community Support:

Advanced Learning:

Development Resources:


Your Learning Journey:

Start with the Quick Examples, progress through real-world scenarios, and eventually master advanced coordination patterns. SuperClaude grows with you - from simple commands to sophisticated development orchestration.

Remember: Every expert was once a beginner. Focus on practical application, experiment with different approaches, and don't hesitate to ask the community for help when needed.