Loading...
Loading...
Microscopic deconstruction and exhaustive analysis of code, systems, documents, or concepts. Breaks subjects into atomic components, examines every facet, and produces encyclopedic reports. Use when deep understanding is needed before making changes, analyzing unfamiliar codebases, or producing thorough technical documentation. Triggers on "심층 분석", "deep dive", "분석해줘", "해부", "deconstruct", "뜯어봐", "thoroughly analyze", "코드 분석".
npx skill4agent add whynowlab/stack-skills deep-dive-analyzer
- Loti Codex Engine: 5-part academic structure (Thesis → Multi-Vector → Terminology → Causal → Conclusion)
- Ailey Microscopic Analyst mode: atomic deconstruction of structure
- Neutral-Persona: Micro-Analytic Expansion Engine (encyclopedic depth)
- Hybrid Analysis Mode: full-structure analytical deconstruction
## Code Analysis: [file/module]
### Overview
- **Purpose:** [what this code does]
- **Complexity:** [LOC, cyclomatic complexity estimate, dependency count]
- **Key Dependencies:** [critical imports and their roles]
### Architecture Map
### Component Breakdown
#### [Component 1]
- **Responsibility:** [SRP description]
- **Input:** [what it receives]
- **Output:** [what it produces]
- **Internal Logic:** [step-by-step breakdown]
- **Edge Cases:** [identified boundary conditions]
- **Concerns:** [potential issues]
### Data Flow
[Input] → [Transform 1] → [Transform 2] → [Output]
### Findings
| ID | Category | Severity | Description | Location |
|----|----------|----------|-------------|----------|
| 1 | [type] | [level] | [detail] | [file:line] |
### Recommendations
[Prioritized list of improvements]## System Analysis: [system name]
### Architecture Overview
[High-level description + ASCII diagram]
### Component Registry
| Component | Type | Responsibility | Dependencies | Health |
|-----------|------|---------------|--------------|--------|
### Data Flow Analysis
[How data moves through the system, including edge cases]
### Failure Mode Analysis
| Failure Scenario | Impact | Current Mitigation | Gap |
|-----------------|--------|-------------------|-----|
### Scalability Assessment
[Current limits, bottlenecks, scaling strategy]
### Security Surface
[Attack vectors, authentication flow, data protection]## Concept Analysis: [topic]
### 1. Thesis
[Core definition and why it matters — 2-3 paragraphs]
### 2. Multi-Vector Analysis
#### Perspective A: [Technical]
[Analysis from technical standpoint]
#### Perspective B: [Practical]
[Analysis from practitioner standpoint]
#### Perspective C: [Historical/Ecosystem]
[Analysis from evolution standpoint]
### 3. Terminology Map
| Term | Definition | Relationship |
|------|-----------|--------------|
### 4. Causal Chain
[Predecessor] → [This concept] → [What it enables]
↓
[Side effects / Trade-offs]
### 5. Synthesis
[Integrated understanding + practical takeaways]creativity-sampleradversarial-reviewcross-verified-researchadversarial-review