with one click
scan-project-structure
// [Documentation] Use when scanning service architecture, ports, directory layout, tech stack, and module registry.
// [Documentation] Use when scanning service architecture, ports, directory layout, tech stack, and module registry.
[HINT] Download the complete skill directory including SKILL.md and all related files
| name | scan-project-structure |
| description | [Documentation] Use when scanning service architecture, ports, directory layout, tech stack, and module registry. |
Codex compatibility note:
- Invoke repository skills with
$skill-namein Codex; this mirrored copy rewrites legacy Claude/skill-namereferences.- Prefer the
plan-hardskill for planning guidance in this Codex mirror.- Task tracker mandate: BEFORE executing any workflow or skill step, create/update task tracking for all steps and keep it synchronized as progress changes.
- User-question prompts mean to ask the user directly in Codex.
- Ignore Claude-specific mode-switch instructions when they appear.
- Strict execution contract: when a user explicitly invokes a skill, execute that skill protocol as written.
- Subagent authorization: when a skill is user-invoked or AI-detected and its protocol requires subagents, that skill activation authorizes use of the required
spawn_agentsubagent(s) for that task.- Do not skip, reorder, or merge protocol steps unless the user explicitly approves the deviation first.
- For workflow skills, execute each listed child-skill step explicitly and report step-by-step evidence.
- If a required step/tool cannot run in this environment, stop and ask the user before adapting.
Codex does not receive Claude hook-based doc injection. When coding, planning, debugging, testing, or reviewing, open project docs explicitly using this routing.
Always read:
docs/project-config.json (project-specific paths, commands, modules, and workflow/test settings)docs/project-reference/docs-index-reference.md (routes to the full docs/project-reference/* catalog)docs/project-reference/lessons.md (always-on guardrails and anti-patterns)Situation-based docs:
backend-patterns-reference.md, domain-entities-reference.md, project-structure-reference.mdfrontend-patterns-reference.md, scss-styling-guide.md, design-system/README.mdfeature-docs-reference.mdintegration-test-reference.mde2e-test-reference.mdcode-review-rules.md plus domain docs above based on changed filesDo not read all docs blindly. Start from docs-index-reference.md, then open only relevant files for the task.
Goal: Scan project codebase → populate docs/project-reference/project-structure-reference.md with accurate service architecture, API ports, directory structure, tech stack, and module codes.
Workflow:
Key Rules:
[BLOCKING] Before any other step, run in parallel:
Read docs/project-reference/project-structure-reference.md
Detect architecture type:
| Signal | Architecture | Sub-Agent Focus |
|---|---|---|
Multiple src/Services/ directories, each with own Dockerfile | Microservices | Enumerate ALL services; map each to port + Dockerfile |
Single src/ with one Program.cs / Startup.cs | Monolith | Single service deep-scan; module/feature breakdown |
| Single git repo, multiple deployable apps | Monorepo (non-microservices) | App boundaries; shared library mapping |
Nx workspace / multiple project.json | Nx monorepo | Library graph; app/lib/buildable distinction |
| Multiple repos detected (git submodules) | Polyrepo | Per-repo breakdown; cross-repo contracts |
| Signal | Orchestration | What to Document |
|---|---|---|
src/Aspire/ directory | .NET Aspire | Aspire project name, dashboard URL, resource names |
docker-compose*.yml | Docker Compose | Service definitions, port mappings, volume mounts |
k8s/ or charts/ | Kubernetes / Helm | Deployment targets, ingress config |
| No orchestration files | Direct run | Launch commands per service |
docs/project-config.json modules[] if available — use as expected service catalog.Evidence gate: Confidence <60% on architecture type → report uncertainty, DO NOT proceed with architecture-specific scan assumptions.
Create task tracking entries for each sub-agent and each verification step. Do not start Phase 2 without tasks created.
Launch 3 general-purpose sub-agents in parallel. Each MUST:
file:line for every port number and Dockerfile pathAll findings → plans/reports/scan-project-structure-{YYMMDD}-{HHMM}-report.md
Think (Completeness dimension): How many services exist? Is there a service in the codebase with no Dockerfile (worker? library? shared?)? Which services expose HTTP APIs vs are background workers?
Think (Port accuracy dimension): Where are ports defined — launchSettings.json, appsettings*.json, docker-compose.yml, Program.cs? Some services may have port in multiple places that must agree.
Think (Pattern dimension): Is there a consistent folder structure per service (e.g., Service/, Domain/, Application/, Infrastructure/)? What deviates from the pattern?
**/*.csproj and **/Dockerfile to find all services — reconcile against project-config.json moduleslaunchSettings.json and appsettings*.json for each service to extract ports[ApiController], MapControllers, app.MapGet to classify API vs worker vs libraryProgram.cs, Startup.cs) and identify service typeThink (App inventory dimension): How many frontend apps exist? Which are active (have dev-start commands) vs legacy vs deprecated?
Think (Port/config dimension): Where is the dev server port defined — angular.json serve config, vite.config.ts, next.config.js, proxy config? Read the actual config — do not infer.
Think (Dependency dimension): Which apps consume which shared libraries? Is there a design system library? A domain library? What's the dependency graph direction?
**/angular.json, **/nx.json, **/vite.config.*, **/next.config.* (exclude node_modules)serve configurations for dev server portsmain.ts, index.tsx, App.vue)package.json (exact versions, not ranges)Think (Infrastructure dimension): What external services must be running for the app to function? Which are optional? What are the default credentials (from docker-compose or defaults)?
Think (CI/CD dimension): What pipeline system is used? What are the build/test/deploy stages? What environments exist?
Think (Version accuracy dimension): Framework/library versions must come from actual config files — not assumed from project type.
docker-compose*.yml — extract infrastructure service definitions, port mappings, credentials.github/workflows/*.yml, azure-pipelines.yml, Jenkinsfile) — extract stagespackage.json, *.csproj)Read full report. Apply fresh-eyes protocol:
Round 1 (main agent): Build section drafts from report findings.
Round 2 (fresh sub-agent, zero memory):
launchSettings.json or docker-compose.yml entries? (Grep verify)| Section | Content |
|---|---|
| Architecture Overview | Architecture type, orchestration approach, deployment model |
| Service Architecture | Table: Service Name, Type (API/Worker/App), Port, Dockerfile path |
| Infrastructure Ports | Table: Service (DB/MQ/Cache), Port, Credentials (from docker-compose) |
| Frontend Apps | Table: App name, Framework, Dev port, Build command |
| Tech Stack | Table: Category (Backend/Frontend/Infra), Technology, Version |
| Module Codes | Table: Module code abbreviation, Full name, Service path |
| Key Directories | Top 2-3 levels of src/ with one-line purpose per top-level dir |
<!-- Last scanned: YYYY-MM-DD --> at top[IMPORTANT] Use task tracking to break ALL work into small tasks BEFORE starting — including tasks per file read. Prevents context loss from long files. Simple tasks: ask user whether to skip.
Prerequisites: MUST ATTENTION READ before executing:
Critical Thinking Mindset — Every claim needs traced proof, confidence >80% to act. Anti-hallucination: Never present guess as fact — cite sources, admit uncertainty, self-check output, cross-reference independently. Certainty without evidence = root of all hallucination.
Scan & Update Reference Doc — Surgical updates only, NEVER full rewrite.
- Read existing doc first — understand structure and manual annotations
- Detect mode: Placeholder (headings only) → Init. Has content → Sync.
- Scan codebase (grep/glob) for current state
- Diff findings vs doc — identify stale sections only
- Update ONLY diverged sections. Preserve manual annotations.
- Update metadata (date, version) in frontmatter/header
- NEVER rewrite entire doc. NEVER remove sections without evidence obsolete.
Output Quality — Token efficiency without sacrificing quality.
- No inventories/counts — stale instantly
- No directory trees — use 1-line path conventions
- No TOCs — AI reads linearly
- One example per pattern — only if non-obvious
- Lead with answer, not reasoning
- Sacrifice grammar for concision in reports
- Unresolved questions at end
AI Mistake Prevention — Failure modes to avoid:
Verify AI-generated content against actual code. AI hallucinates service names, ports, and file paths. Grep/Glob to confirm before documenting. Trace full dependency chain after edits. Always trace full chain. Surface ambiguity before coding. NEVER pick silently. NEVER hardcode port numbers without config file evidence. Read
launchSettings.jsonordocker-compose.yml— never infer from memory.
IMPORTANT MUST ATTENTION read existing doc first, scan codebase, diff, surgical update only. Never rewrite entire doc.
IMPORTANT MUST ATTENTION output quality: no counts/trees/TOCs, 1 example per pattern, lead with answer.
MUST ATTENTION apply critical thinking — every claim needs traced proof, confidence >80% to act. Anti-hallucination: never present guess as fact.
MUST ATTENTION apply AI mistake prevention — holistic-first debugging, fix at responsible layer, surface ambiguity before coding, re-read files after compaction.
IMPORTANT MUST ATTENTION break work into small task tracking tasks BEFORE starting
IMPORTANT MUST ATTENTION detect architecture type in Phase 0 — sub-agent focus depends on it
IMPORTANT MUST ATTENTION cite file:line for every port number and path — NEVER infer from memory
IMPORTANT MUST ATTENTION sub-agents write findings incrementally after each service — NEVER batch at end
IMPORTANT MUST ATTENTION verify ALL Dockerfile paths — spot-check of 3 is insufficient
IMPORTANT MUST ATTENTION when Round 1 finds issues, Round 2 fresh-eyes after fixing validates ports and paths. Clean Round 1 ENDS the scan.
Anti-Rationalization:
| Evasion | Rebuttal |
|---|---|
| "Architecture type obvious from directory names" | Verify from actual project files — names are not evidence |
| "Port numbers are standard (5000, 8080, etc.)" | Read config files — NEVER infer ports from framework conventions |
| "Checked 3 Dockerfile paths, that's enough" | Glob-verify ALL paths — partial verification hides missing services |
| "Framework versions obvious from project type" | Read package.json/.csproj for exact versions — never assume |
| "Skip Round 2 even when Round 1 found issues" | Clean Round 1 ends the scan. When issues exist, fresh-eyes mandatory after fixing — port numbers and paths are the most hallucination-prone data. |
| "project-config.json not needed if repo looks clear" | Config file provides expected service catalog — use it to detect missing services |
[TASK-PLANNING] Before acting, analyze task scope and break into small todo tasks and sub-tasks using task tracking.
Source: .claude/hooks/lib/prompt-injections.cjs + .claude/.ck.json
$workflow-start <workflowId> for standard; sequence custom steps manually[CRITICAL] Hard-won project debugging/architecture rules. MUST ATTENTION apply BEFORE forming hypothesis or writing code.
Goal: Prevent recurrence of known failure patterns — debugging, architecture, naming, AI orchestration, environment.
Top Rules (apply always):
ExecuteInjectScopedAsync for parallel async + repo/UoW — NEVER ExecuteUowTaskwhere python/where py) — NEVER assume python/python3 resolvesExecuteInjectScopedAsync, NEVER ExecuteUowTask. ExecuteUowTask creates new UoW but reuses outer DI scope (same DbContext) — parallel iterations sharing non-thread-safe DbContext silently corrupt data. ExecuteInjectScopedAsync creates new UoW + new DI scope (fresh repo per iteration).AccountUserEntityEventBusMessage = Accounts owns). Core services (Accounts, Communication) are leaders. Feature services (Growth, Talents) sending to core MUST use {CoreServiceName}...RequestBusMessage — never define own event for core to consume.HrManagerOrHrOrPayrollHrOperationsPolicy names set members, not what it guards. Add role → rename = broken abstraction. Rule: names express DOES/GUARDS, not CONTAINS. Test: adding/removing member forces rename? YES = content-driven = bad → rename to purpose (e.g., HrOperationsAccessPolicy). Nuance: "Or" fine in behavioral idioms (FirstOrDefault, SuccessOrThrow) — expresses HAPPENS, not membership.python/python3 resolves — verify alias first. Python may not be in bash PATH under those names. Check: where python / where py. Prefer py (Windows Python Launcher) for one-liners, node if JS alternative exists.Test-specific lessons →
docs/project-reference/integration-test-reference.mdLessons Learned section. Production-code anti-patterns →docs/project-reference/backend-patterns-reference.mdAnti-Patterns section. Generic debugging/refactoring reminders → System Lessons in.claude/hooks/lib/prompt-injections.cjs.
ExecuteInjectScopedAsync, NEVER ExecuteUowTask (shared DbContext = silent data corruption){CoreServiceName}...RequestBusMessagepython/python3 resolves — run where python/where py first, use py launcher or nodeBreak work into small tasks (task tracking) before starting. Add final task: "Analyze AI mistakes & lessons learned".
Extract lessons — ROOT CAUSE ONLY, not symptom fixes:
$learn.$code-review/$code-simplifier/$security/$lint catch this?" — Yes → improve review skill instead.$learn.
[TASK-PLANNING] [MANDATORY] BEFORE executing any workflow or skill step, create/update task tracking for all planned steps, then keep it synchronized as each step starts/completes.