Claude Code Plugins

Community-maintained marketplace

Feedback

Comprehensive backend development workflow that orchestrates expert analysis, architecture design, implementation, and deployment using the integrated toolset. Handles everything from API design and database architecture to security implementation and DevOps automation.

Install Skill

1Download skill
2Enable skills in Claude

Open claude.ai/settings/capabilities and find the "Skills" section

3Upload to Claude

Click "Upload skill" and select the downloaded ZIP file

Note: Please verify skill by going through its instructions before using it.

SKILL.md

name backend-dev
description Comprehensive backend development workflow that orchestrates expert analysis, architecture design, implementation, and deployment using the integrated toolset. Handles everything from API design and database architecture to security implementation and DevOps automation.
license Apache 2.0
tools

Backend Development Master - Complete Backend Engineering Workflow

Overview

This skill provides end-to-end backend development services by orchestrating multiple expert systems, advanced development techniques, and specialized tools. It transforms business requirements into production-ready backend systems with comprehensive architecture, security, scalability, and operational excellence.

Key Capabilities:

  • 🏗️ Multi-Expert Backend Architecture - Coordinates backend architects, security engineers, and DevOps specialists
  • 🎯 Full-Stack Development - From API design to database architecture to deployment automation
  • 📊 Production-Ready Implementation - Security-first, scalable, and maintainable code generation
  • 🔧 DevOps Integration - CI/CD pipelines, monitoring, and infrastructure as code
  • 📋 Comprehensive Testing - Unit, integration, and end-to-end testing strategies

When to Use This Skill

Perfect for:

  • New backend system development and API creation
  • Legacy system modernization and microservice decomposition
  • Database architecture and optimization projects
  • Security implementation and compliance requirements
  • Performance optimization and scalability planning
  • DevOps pipeline and infrastructure automation

Triggers:

  • "Create a backend API for [application]"
  • "Design database architecture for [system]"
  • "Build a scalable backend service"
  • "Implement security and authentication"
  • "Set up CI/CD and deployment pipeline"

Backend Development Expert Panel

Backend Architect (System Design)

  • Focus: API design, database architecture, system scalability
  • Techniques: RESTful services, GraphQL, microservices, data modeling
  • Considerations: Performance, scalability, maintainability, API contracts

Security Engineer (Secure Development)

  • Focus: Authentication, authorization, data protection, compliance
  • Techniques: OWASP compliance, encryption, threat modeling, secure coding
  • Considerations: Security by design, zero-trust principles, regulatory compliance

DevOps Architect (Operations & Deployment)

  • Focus: CI/CD, infrastructure automation, monitoring, reliability
  • Techniques: Container orchestration, IaC, observability, zero-downtime deployment
  • Considerations: Infrastructure costs, reliability, scaling strategies, monitoring

Database Specialist (Data Architecture)

  • Focus: Schema design, query optimization, data modeling, migrations
  • Techniques: Normalization, indexing strategies, caching, data consistency
  • Considerations: Data integrity, performance, scalability, backup strategies

Performance Engineer (Optimization)

  • Focus: Performance optimization, bottleneck analysis, caching strategies
  • Techniques: Profiling, load testing, optimization patterns, scaling solutions
  • Considerations: Response times, throughput, resource utilization, cost efficiency

Backend Development Workflow

Phase 1: Requirements Analysis & Technical Planning

Use when: Starting new backend development or modernizing existing systems

Tools Used:

/sc:analyze backend-requirements
BMAD PM Agent: business requirement analysis
Requirements Analyst: technical specification creation
Deep Research Agent: technology stack research

Activities:

  • Analyze business requirements and translate to technical specifications
  • Identify scalability, security, and performance requirements
  • Evaluate technology stack options and architectural patterns
  • Define API contracts and data models
  • Plan integration points and external dependencies

Phase 2: System Architecture & Design

Use when: Designing the technical architecture and system components

Tools Used:

/sc:design --type architecture backend-system
/sc:design --type api restful-apis
/sc:design --type database data-model
Backend Architect: comprehensive system design
Security Engineer: security architecture planning

Activities:

  • Design system architecture and component boundaries
  • Create API specifications and data contracts
  • Design database schemas and relationships
  • Plan security architecture and authentication flows
  • Define scalability and performance strategies

Phase 3: Implementation Planning & Technology Selection

Use when: Preparing for actual code implementation

Tools Used:

/sc:design --type component implementation-strategy
Python Expert: technology-specific implementation patterns
DevOps Architect: deployment and infrastructure planning
Performance Engineer: optimization and monitoring setup

Activities:

  • Select appropriate frameworks, libraries, and tools
  • Create implementation roadmap with milestones
  • Plan database migrations and data seeding strategies
  • Design error handling and logging strategies
  • Prepare development environment and tooling setup

Phase 4: Secure & Scalable Implementation

Use when: Writing production-ready backend code

Tools Used:

/sc:implement backend-service
Python Expert: production-quality code implementation
Security Engineer: secure coding practices and vulnerability prevention
Database Specialist: optimized database interactions
Performance Engineer: efficient algorithms and caching strategies

Activities:

  • Implement core business logic and API endpoints
  • Create secure authentication and authorization systems
  • Optimize database queries and implement caching strategies
  • Implement comprehensive error handling and logging
  • Write unit and integration tests with high coverage

Phase 5: Testing & Quality Assurance

Use when: Ensuring system reliability and security

Tools Used:

/sc:test backend-comprehensive
Quality Engineer: testing strategy implementation
Security Engineer: security testing and vulnerability scanning
Performance Engineer: load testing and performance validation
Playwright MCP: end-to-end API testing

Activities:

  • Implement comprehensive test suites (unit, integration, E2E)
  • Conduct security testing and vulnerability assessments
  • Perform load testing and performance benchmarking
  • Validate API contracts and data integrity
  • Test error scenarios and recovery mechanisms

Phase 6: DevOps & Deployment

Use when: Preparing for production deployment

Tools Used:

/sc:implement production-deployment
DevOps Architect: CI/CD pipeline and infrastructure setup
Security Engineer: production security hardening
Monitoring Setup: observability and alerting systems

Activities:

  • Set up CI/CD pipelines with automated testing and deployment
  • Implement infrastructure as code and containerization
  • Configure monitoring, logging, and alerting systems
  • Create deployment strategies and rollback procedures
  • Document operations procedures and runbooks

Integration Patterns

SuperClaude Command Integration

Command Use Case Output
/sc:design --type architecture System architecture Technical architecture specifications
/sc:design --type api API design RESTful/GraphQL API specifications
/sc:design --type database Database design Optimized schema and data models
/sc:implement backend Code implementation Production-ready backend services
/sc:test backend Testing strategy Comprehensive testing plans
/sc:build deploy Deployment setup CI/CD and infrastructure automation

BMAD Method Integration

Technique Role Capabilities
Greenfield Service Workflow New project development Complete backend service development
Brownfield Integration Legacy modernization Safe system evolution and integration
Security-First Development Secure implementation Built-in security practices and validation
Performance Optimization Scalability planning Bottleneck identification and optimization

MCP Server Integration

Server Expertise Use Case
Sequential Complex reasoning Architecture analysis and problem-solving
Context7 Technical patterns Framework best practices and implementation guides
Playwright API testing End-to-end API validation and testing
Serena Project memory Large codebase navigation and context management

Usage Examples

Example 1: New REST API Development

User: "Create a backend API for an e-commerce platform with user management, product catalog, and order processing"

Workflow:
1. Phase 1: Analyze e-commerce requirements and technical constraints
2. Phase 2: Design microservices architecture with API contracts
3. Phase 3: Plan implementation with Node.js/Express and PostgreSQL
4. Phase 4: Implement secure APIs with JWT authentication
5. Phase 5: Test with comprehensive test suites and load testing
6. Phase 6: Deploy with Docker, Kubernetes, and CI/CD pipeline

Output: Production-ready e-commerce backend with 99.9% uptime target

Example 2: Database Architecture Optimization

User: "Optimize our database architecture for better performance and scalability"

Workflow:
1. Phase 1: Analyze current database performance and bottlenecks
2. Phase 2: Design optimized schema with proper indexing
3. Phase 3: Plan migration strategy with zero downtime
4. Phase 4: Implement caching layer and query optimization
5. Phase 5: Performance test and validate improvements
6. Phase 6: Deploy with monitoring and alerting

Output: 60% performance improvement with horizontal scaling capability

Example 3: Security Implementation

User: "Implement comprehensive security for our financial services backend"

Workflow:
1. Phase 1: Analyze security requirements and compliance needs (SOC2, PCI-DSS)
2. Phase 2: Design zero-trust security architecture
3. Phase 3: Plan secure implementation with encryption and audit logging
4. Phase 4: Implement security controls and monitoring
5. Phase 5: Conduct security testing and vulnerability assessment
6. Phase 6: Deploy with security monitoring and incident response

Output: Fully compliant financial services backend with comprehensive security

Quality Assurance Mechanisms

Multi-Expert Validation

  • Cross-Domain Review: Backend architect, security, and DevOps perspectives
  • Security Validation: Comprehensive vulnerability scanning and compliance checking
  • Performance Testing: Load testing, stress testing, and optimization validation
  • Production Readiness: Complete deployment and operational validation

Automated Quality Checks

  • Code Quality: Linting, formatting, and complexity analysis
  • Security Scanning: Automated vulnerability detection and dependency checking
  • Performance Monitoring: Response time, throughput, and resource utilization tracking
  • Test Coverage: Unit, integration, and end-to-end test coverage validation

Continuous Improvement

  • Performance Monitoring: Real-time performance tracking and alerting
  • Security Monitoring: Continuous vulnerability scanning and threat detection
  • Feedback Integration: User feedback and performance data analysis
  • Pattern Learning: Successful patterns recognition and reuse

Output Deliverables

Primary Deliverable: Complete Backend System

backend-system/
├── api/
│   ├── controllers/              # API endpoint implementations
│   ├── middleware/               # Authentication, validation, error handling
│   ├── routes/                   # API routing and endpoint definitions
│   └── documentation/            # API documentation and contracts
├── services/
│   ├── business/                 # Business logic and domain services
│   ├── data/                     # Data access and database services
│   ├── external/                 # Third-party service integrations
│   └── security/                 # Security services and utilities
├── database/
│   ├── migrations/               # Database schema migrations
│   ├── seeds/                    # Initial data setup
│   ├── models/                   # Data models and relationships
│   └── queries/                  # Optimized database queries
├── tests/
│   ├── unit/                     # Unit tests for individual components
│   ├── integration/              # Integration tests for service interactions
│   ├── e2e/                      # End-to-end API tests
│   └── performance/              # Load and stress tests
├── infrastructure/
│   ├── docker/                   # Container configurations
│   ├── kubernetes/               # K8s deployment manifests
│   ├── ci-cd/                    # CI/CD pipeline configurations
│   └── monitoring/               # Logging, metrics, and alerting
├── documentation/
│   ├── architecture.md           # System architecture documentation
│   ├── api-specs.md              # API specifications and contracts
│   ├── deployment.md             # Deployment procedures and runbooks
│   └── security.md               # Security procedures and compliance
└── config/
    ├── development/              # Development environment configurations
    ├── staging/                  # Staging environment configurations
    └── production/               # Production environment configurations

Supporting Artifacts

  • Architecture Documentation: Detailed system design and technical specifications
  • API Documentation: Comprehensive API contracts and usage examples
  • Security Documentation: Security procedures, compliance reports, and audit trails
  • Performance Reports: Benchmarking results and optimization recommendations
  • Deployment Guides: Step-by-step deployment and operational procedures

Advanced Features

Intelligent Technology Selection

  • Automatically recommends appropriate technology stacks based on requirements
  • Considers team expertise, scalability needs, and maintenance requirements
  • Optimizes for cost, performance, and development efficiency
  • Supports multiple programming languages and frameworks

Security-First Development

  • Built-in security practices and vulnerability prevention
  • Automated security scanning and compliance checking
  • Comprehensive authentication and authorization patterns
  • Integration with security monitoring and threat detection

Performance Optimization

  • Proactive performance monitoring and bottleneck identification
  • Automated optimization suggestions and implementation
  • Load testing and capacity planning tools
  • Real-time performance tracking and alerting

DevOps Automation

  • Complete CI/CD pipeline setup with automated testing and deployment
  • Infrastructure as code with version control and reproducibility
  • Container orchestration and microservice deployment
  • Comprehensive monitoring, logging, and alerting systems

Troubleshooting

Common Backend Development Challenges

  • Scalability Issues: Use microservices architecture and horizontal scaling patterns
  • Security Vulnerabilities: Apply security-first development and comprehensive testing
  • Performance Bottlenecks: Implement caching strategies and database optimization
  • Database Complexity: Use proper normalization, indexing, and query optimization

Deployment and Operations Issues

  • Deployment Failures: Use blue-green deployments and automated rollback
  • Monitoring Gaps: Implement comprehensive observability and alerting
  • Integration Problems: Design clear APIs and implement proper error handling
  • Security Incidents: Implement incident response procedures and security monitoring

Best Practices

For System Design

  • Design for scalability and maintainability from the start
  • Use microservices architecture for complex systems
  • Implement proper separation of concerns and modularity
  • Design for failure with circuit breakers and graceful degradation

For Security Implementation

  • Implement security by design, not as an afterthought
  • Use zero-trust principles and defense-in-depth strategies
  • Regularly update dependencies and conduct security audits
  • Implement comprehensive logging and monitoring for security events

For Performance Optimization

  • Profile before optimizing to identify real bottlenecks
  • Implement appropriate caching strategies at multiple levels
  • Use database indexing and query optimization techniques
  • Monitor performance metrics and set up alerting

For DevOps and Deployment

  • Automate everything that can be automated
  • Use infrastructure as code for reproducible deployments
  • Implement comprehensive monitoring and observability
  • Plan for failure with backup and disaster recovery procedures

This backend development skill transforms the complex process of backend system creation into a guided, expert-supported workflow that leverages the full power of your integrated development toolset. It ensures that backend systems are secure, scalable, maintainable, and production-ready from day one.