home / skills / makfly / superpowers-symfony / cqrs-and-handlers
This skill helps you architect Symfony CQRS and handlers with safe checkpoints, incremental changes, and auditable decision logs.
npx playbooks add skill makfly/superpowers-symfony --skill cqrs-and-handlersReview the files below or copy the command above to add this skill to your agents.
---
name: symfony:cqrs-and-handlers
allowed-tools:
- Read
- Glob
- Grep
description: Apply production-grade Symfony architecture and execution workflows with controlled scope and clear checkpoints. Use for cqrs and handlers tasks.
---
# Cqrs And Handlers (Symfony)
## Use when
- Refining architecture/workflows/context handling in Symfony projects.
- Planning and executing medium/complex changes safely.
## Default workflow
1. Establish current boundaries, constraints, and coupling points.
2. Propose smallest coherent architectural adjustment.
2. Execute in checkpoints with validation at each stage.
2. Summarize tradeoffs and follow-up backlog.
## Guardrails
- Use existing project patterns by default.
- Avoid broad refactors without explicit need.
- Keep decision log clear and auditable.
## Progressive disclosure
- Use this file for execution posture and risk controls.
- Open references when deep implementation details are needed.
## Output contract
- Architecture/workflow changes.
- Checkpoint validation outcomes.
- Residual risks and next steps.
## References
- `reference.md`
- `docs/complexity-tiers.md`
This skill applies production-grade Symfony architecture and controlled execution workflows focused on CQRS and handler design. It helps refine boundaries, introduce minimal safe changes, and run work in validated checkpoints to reduce risk. The goal is clear, auditable decisions and a lightweight follow-up backlog for further improvements.
I inspect current boundaries, coupling points, and existing project patterns to avoid unnecessary wide refactors. I propose the smallest coherent architectural adjustment, then execute the change in discrete checkpoints with validation at each stage. Each checkpoint produces a validation outcome, a short decision record, and noted residual risks with recommended next steps.
How large should a checkpoint be?
Make checkpoints small enough to validate behavior and roll back if needed; a single handler change or one caller migration is a good target.
What testing is required at each checkpoint?
Unit tests for the changed units, integration tests for end-to-end flows touched, and smoke checks on staging are minimum requirements.