home / skills / julianromli / ai-skills / backend-dev
This skill orchestrates end-to-end backend development from architecture to deployment, delivering secure, scalable APIs and automated DevOps workflows.
npx playbooks add skill julianromli/ai-skills --skill backend-devReview the files below or copy the command above to add this skill to your agents.
---
name: backend-dev
description: Comprehensive backend development workflow that orchestrates expert analysis, architecture design, implementation, and deployment using the integrated toolset. Handles everything from API design and database architecture to security implementation and DevOps automation.
license: Apache 2.0
tools: []
---
# Backend Development Master - Complete Backend Engineering Workflow
## Overview
This skill provides end-to-end backend development services by orchestrating multiple expert systems, advanced development techniques, and specialized tools. It transforms business requirements into production-ready backend systems with comprehensive architecture, security, scalability, and operational excellence.
**Key Capabilities:**
- šļø **Multi-Expert Backend Architecture** - Coordinates backend architects, security engineers, and DevOps specialists
- šÆ **Full-Stack Development** - From API design to database architecture to deployment automation
- š **Production-Ready Implementation** - Security-first, scalable, and maintainable code generation
- š§ **DevOps Integration** - CI/CD pipelines, monitoring, and infrastructure as code
- š **Comprehensive Testing** - Unit, integration, and end-to-end testing strategies
## When to Use This Skill
**Perfect for:**
- New backend system development and API creation
- Legacy system modernization and microservice decomposition
- Database architecture and optimization projects
- Security implementation and compliance requirements
- Performance optimization and scalability planning
- DevOps pipeline and infrastructure automation
**Triggers:**
- "Create a backend API for [application]"
- "Design database architecture for [system]"
- "Build a scalable backend service"
- "Implement security and authentication"
- "Set up CI/CD and deployment pipeline"
## Backend Development Expert Panel
### **Backend Architect** (System Design)
- **Focus**: API design, database architecture, system scalability
- **Techniques**: RESTful services, GraphQL, microservices, data modeling
- **Considerations**: Performance, scalability, maintainability, API contracts
### **Security Engineer** (Secure Development)
- **Focus**: Authentication, authorization, data protection, compliance
- **Techniques**: OWASP compliance, encryption, threat modeling, secure coding
- **Considerations**: Security by design, zero-trust principles, regulatory compliance
### **DevOps Architect** (Operations & Deployment)
- **Focus**: CI/CD, infrastructure automation, monitoring, reliability
- **Techniques**: Container orchestration, IaC, observability, zero-downtime deployment
- **Considerations**: Infrastructure costs, reliability, scaling strategies, monitoring
### **Database Specialist** (Data Architecture)
- **Focus**: Schema design, query optimization, data modeling, migrations
- **Techniques**: Normalization, indexing strategies, caching, data consistency
- **Considerations**: Data integrity, performance, scalability, backup strategies
### **Performance Engineer** (Optimization)
- **Focus**: Performance optimization, bottleneck analysis, caching strategies
- **Techniques**: Profiling, load testing, optimization patterns, scaling solutions
- **Considerations**: Response times, throughput, resource utilization, cost efficiency
## Backend Development Workflow
### Phase 1: Requirements Analysis & Technical Planning
**Use when**: Starting new backend development or modernizing existing systems
**Tools Used:**
```bash
/sc:analyze backend-requirements
BMAD PM Agent: business requirement analysis
Requirements Analyst: technical specification creation
Deep Research Agent: technology stack research
```
**Activities:**
- Analyze business requirements and translate to technical specifications
- Identify scalability, security, and performance requirements
- Evaluate technology stack options and architectural patterns
- Define API contracts and data models
- Plan integration points and external dependencies
### Phase 2: System Architecture & Design
**Use when**: Designing the technical architecture and system components
**Tools Used:**
```bash
/sc:design --type architecture backend-system
/sc:design --type api restful-apis
/sc:design --type database data-model
Backend Architect: comprehensive system design
Security Engineer: security architecture planning
```
**Activities:**
- Design system architecture and component boundaries
- Create API specifications and data contracts
- Design database schemas and relationships
- Plan security architecture and authentication flows
- Define scalability and performance strategies
### Phase 3: Implementation Planning & Technology Selection
**Use when**: Preparing for actual code implementation
**Tools Used:**
```bash
/sc:design --type component implementation-strategy
Python Expert: technology-specific implementation patterns
DevOps Architect: deployment and infrastructure planning
Performance Engineer: optimization and monitoring setup
```
**Activities:**
- Select appropriate frameworks, libraries, and tools
- Create implementation roadmap with milestones
- Plan database migrations and data seeding strategies
- Design error handling and logging strategies
- Prepare development environment and tooling setup
### Phase 4: Secure & Scalable Implementation
**Use when**: Writing production-ready backend code
**Tools Used:**
```bash
/sc:implement backend-service
Python Expert: production-quality code implementation
Security Engineer: secure coding practices and vulnerability prevention
Database Specialist: optimized database interactions
Performance Engineer: efficient algorithms and caching strategies
```
**Activities:**
- Implement core business logic and API endpoints
- Create secure authentication and authorization systems
- Optimize database queries and implement caching strategies
- Implement comprehensive error handling and logging
- Write unit and integration tests with high coverage
### Phase 5: Testing & Quality Assurance
**Use when**: Ensuring system reliability and security
**Tools Used:**
```bash
/sc:test backend-comprehensive
Quality Engineer: testing strategy implementation
Security Engineer: security testing and vulnerability scanning
Performance Engineer: load testing and performance validation
Playwright MCP: end-to-end API testing
```
**Activities:**
- Implement comprehensive test suites (unit, integration, E2E)
- Conduct security testing and vulnerability assessments
- Perform load testing and performance benchmarking
- Validate API contracts and data integrity
- Test error scenarios and recovery mechanisms
### Phase 6: DevOps & Deployment
**Use when**: Preparing for production deployment
**Tools Used:**
```bash
/sc:implement production-deployment
DevOps Architect: CI/CD pipeline and infrastructure setup
Security Engineer: production security hardening
Monitoring Setup: observability and alerting systems
```
**Activities:**
- Set up CI/CD pipelines with automated testing and deployment
- Implement infrastructure as code and containerization
- Configure monitoring, logging, and alerting systems
- Create deployment strategies and rollback procedures
- Document operations procedures and runbooks
## Integration Patterns
### **SuperClaude Command Integration**
| Command | Use Case | Output |
|---------|---------|--------|
| `/sc:design --type architecture` | System architecture | Technical architecture specifications |
| `/sc:design --type api` | API design | RESTful/GraphQL API specifications |
| `/sc:design --type database` | Database design | Optimized schema and data models |
| `/sc:implement backend` | Code implementation | Production-ready backend services |
| `/sc:test backend` | Testing strategy | Comprehensive testing plans |
| `/sc:build deploy` | Deployment setup | CI/CD and infrastructure automation |
### **BMAD Method Integration**
| Technique | Role | Capabilities |
|----------|------|------------|
| **Greenfield Service Workflow** | New project development | Complete backend service development |
| **Brownfield Integration** | Legacy modernization | Safe system evolution and integration |
| **Security-First Development** | Secure implementation | Built-in security practices and validation |
| **Performance Optimization** | Scalability planning | Bottleneck identification and optimization |
### **MCP Server Integration**
| Server | Expertise | Use Case |
|--------|----------|---------|
| **Sequential** | Complex reasoning | Architecture analysis and problem-solving |
| **Context7** | Technical patterns | Framework best practices and implementation guides |
| **Playwright** | API testing | End-to-end API validation and testing |
| **Serena** | Project memory | Large codebase navigation and context management |
## Usage Examples
### Example 1: New REST API Development
```
User: "Create a backend API for an e-commerce platform with user management, product catalog, and order processing"
Workflow:
1. Phase 1: Analyze e-commerce requirements and technical constraints
2. Phase 2: Design microservices architecture with API contracts
3. Phase 3: Plan implementation with Node.js/Express and PostgreSQL
4. Phase 4: Implement secure APIs with JWT authentication
5. Phase 5: Test with comprehensive test suites and load testing
6. Phase 6: Deploy with Docker, Kubernetes, and CI/CD pipeline
Output: Production-ready e-commerce backend with 99.9% uptime target
```
### Example 2: Database Architecture Optimization
```
User: "Optimize our database architecture for better performance and scalability"
Workflow:
1. Phase 1: Analyze current database performance and bottlenecks
2. Phase 2: Design optimized schema with proper indexing
3. Phase 3: Plan migration strategy with zero downtime
4. Phase 4: Implement caching layer and query optimization
5. Phase 5: Performance test and validate improvements
6. Phase 6: Deploy with monitoring and alerting
Output: 60% performance improvement with horizontal scaling capability
```
### Example 3: Security Implementation
```
User: "Implement comprehensive security for our financial services backend"
Workflow:
1. Phase 1: Analyze security requirements and compliance needs (SOC2, PCI-DSS)
2. Phase 2: Design zero-trust security architecture
3. Phase 3: Plan secure implementation with encryption and audit logging
4. Phase 4: Implement security controls and monitoring
5. Phase 5: Conduct security testing and vulnerability assessment
6. Phase 6: Deploy with security monitoring and incident response
Output: Fully compliant financial services backend with comprehensive security
```
## Quality Assurance Mechanisms
### **Multi-Expert Validation**
- **Cross-Domain Review**: Backend architect, security, and DevOps perspectives
- **Security Validation**: Comprehensive vulnerability scanning and compliance checking
- **Performance Testing**: Load testing, stress testing, and optimization validation
- **Production Readiness**: Complete deployment and operational validation
### **Automated Quality Checks**
- **Code Quality**: Linting, formatting, and complexity analysis
- **Security Scanning**: Automated vulnerability detection and dependency checking
- **Performance Monitoring**: Response time, throughput, and resource utilization tracking
- **Test Coverage**: Unit, integration, and end-to-end test coverage validation
### **Continuous Improvement**
- **Performance Monitoring**: Real-time performance tracking and alerting
- **Security Monitoring**: Continuous vulnerability scanning and threat detection
- **Feedback Integration**: User feedback and performance data analysis
- **Pattern Learning**: Successful patterns recognition and reuse
## Output Deliverables
### Primary Deliverable: Complete Backend System
```
backend-system/
āāā api/
ā āāā controllers/ # API endpoint implementations
ā āāā middleware/ # Authentication, validation, error handling
ā āāā routes/ # API routing and endpoint definitions
ā āāā documentation/ # API documentation and contracts
āāā services/
ā āāā business/ # Business logic and domain services
ā āāā data/ # Data access and database services
ā āāā external/ # Third-party service integrations
ā āāā security/ # Security services and utilities
āāā database/
ā āāā migrations/ # Database schema migrations
ā āāā seeds/ # Initial data setup
ā āāā models/ # Data models and relationships
ā āāā queries/ # Optimized database queries
āāā tests/
ā āāā unit/ # Unit tests for individual components
ā āāā integration/ # Integration tests for service interactions
ā āāā e2e/ # End-to-end API tests
ā āāā performance/ # Load and stress tests
āāā infrastructure/
ā āāā docker/ # Container configurations
ā āāā kubernetes/ # K8s deployment manifests
ā āāā ci-cd/ # CI/CD pipeline configurations
ā āāā monitoring/ # Logging, metrics, and alerting
āāā documentation/
ā āāā architecture.md # System architecture documentation
ā āāā api-specs.md # API specifications and contracts
ā āāā deployment.md # Deployment procedures and runbooks
ā āāā security.md # Security procedures and compliance
āāā config/
āāā development/ # Development environment configurations
āāā staging/ # Staging environment configurations
āāā production/ # Production environment configurations
```
### Supporting Artifacts
- **Architecture Documentation**: Detailed system design and technical specifications
- **API Documentation**: Comprehensive API contracts and usage examples
- **Security Documentation**: Security procedures, compliance reports, and audit trails
- **Performance Reports**: Benchmarking results and optimization recommendations
- **Deployment Guides**: Step-by-step deployment and operational procedures
## Advanced Features
### **Intelligent Technology Selection**
- Automatically recommends appropriate technology stacks based on requirements
- Considers team expertise, scalability needs, and maintenance requirements
- Optimizes for cost, performance, and development efficiency
- Supports multiple programming languages and frameworks
### **Security-First Development**
- Built-in security practices and vulnerability prevention
- Automated security scanning and compliance checking
- Comprehensive authentication and authorization patterns
- Integration with security monitoring and threat detection
### **Performance Optimization**
- Proactive performance monitoring and bottleneck identification
- Automated optimization suggestions and implementation
- Load testing and capacity planning tools
- Real-time performance tracking and alerting
### **DevOps Automation**
- Complete CI/CD pipeline setup with automated testing and deployment
- Infrastructure as code with version control and reproducibility
- Container orchestration and microservice deployment
- Comprehensive monitoring, logging, and alerting systems
## Troubleshooting
### Common Backend Development Challenges
- **Scalability Issues**: Use microservices architecture and horizontal scaling patterns
- **Security Vulnerabilities**: Apply security-first development and comprehensive testing
- **Performance Bottlenecks**: Implement caching strategies and database optimization
- **Database Complexity**: Use proper normalization, indexing, and query optimization
### Deployment and Operations Issues
- **Deployment Failures**: Use blue-green deployments and automated rollback
- **Monitoring Gaps**: Implement comprehensive observability and alerting
- **Integration Problems**: Design clear APIs and implement proper error handling
- **Security Incidents**: Implement incident response procedures and security monitoring
## Best Practices
### **For System Design**
- Design for scalability and maintainability from the start
- Use microservices architecture for complex systems
- Implement proper separation of concerns and modularity
- Design for failure with circuit breakers and graceful degradation
### **For Security Implementation**
- Implement security by design, not as an afterthought
- Use zero-trust principles and defense-in-depth strategies
- Regularly update dependencies and conduct security audits
- Implement comprehensive logging and monitoring for security events
### **For Performance Optimization**
- Profile before optimizing to identify real bottlenecks
- Implement appropriate caching strategies at multiple levels
- Use database indexing and query optimization techniques
- Monitor performance metrics and set up alerting
### **For DevOps and Deployment**
- Automate everything that can be automated
- Use infrastructure as code for reproducible deployments
- Implement comprehensive monitoring and observability
- Plan for failure with backup and disaster recovery procedures
---
This backend development skill transforms the complex process of backend system creation into a guided, expert-supported workflow that leverages the full power of your integrated development toolset. It ensures that backend systems are secure, scalable, maintainable, and production-ready from day one.This skill provides an end-to-end backend development workflow that converts business requirements into production-ready backend systems. It coordinates architecture, security, database design, implementation, testing, and DevOps to deliver scalable, secure, and maintainable services. The workflow produces code, deployment pipelines, and operational runbooks for reliable production delivery.
The skill orchestrates specialized expert roles (backend architect, security engineer, DevOps, database specialist, performance engineer) and automated tools to move from requirements to deployment. It performs requirements analysis, designs system and API contracts, selects technologies, implements secure code and database schemas, runs comprehensive tests, and automates CI/CD and monitoring. Outputs include code structure, infrastructure-as-code, test suites, and operational documentation.
What deliverables will I receive?
You get a complete backend repository layout, API specs, database migrations, tests, CI/CD configs, infrastructure-as-code, monitoring setup, and operational runbooks.
Can this workflow target a specific tech stack?
Yes. The workflow recommends and implements stacks based on constraints and team skills (Python frameworks, PostgreSQL, Node.js options, container orchestration, etc.).