52-execute-refactor-150
[52] EXECUTE. Three-stage refactoring workflow: (1) iterative research of refactor/modularization options, (2) plan + risk/edge-case analysis + Scope150 validation, then implement with tests after user confirmation, and (3) apply Scout105 cleanup protocol. Use when asked to refactor, modularize, or restructure code safely.
Best use case
52-execute-refactor-150 is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
[52] EXECUTE. Three-stage refactoring workflow: (1) iterative research of refactor/modularization options, (2) plan + risk/edge-case analysis + Scope150 validation, then implement with tests after user confirmation, and (3) apply Scout105 cleanup protocol. Use when asked to refactor, modularize, or restructure code safely.
Teams using 52-execute-refactor-150 should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/52-execute-refactor-150/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How 52-execute-refactor-150 Compares
| Feature / Agent | 52-execute-refactor-150 | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
[52] EXECUTE. Three-stage refactoring workflow: (1) iterative research of refactor/modularization options, (2) plan + risk/edge-case analysis + Scope150 validation, then implement with tests after user confirmation, and (3) apply Scout105 cleanup protocol. Use when asked to refactor, modularize, or restructure code safely.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
Related Guides
Best AI Skills for Claude
Explore the best AI skills for Claude and Claude Code across coding, research, workflow automation, documentation, and agent operations.
AI Agents for Coding
Browse AI agent skills for coding, debugging, testing, refactoring, code review, and developer workflows across Claude, Cursor, and Codex.
ChatGPT vs Claude for Agent Skills
Compare ChatGPT and Claude for AI agent skills across coding, writing, research, and reusable workflow execution.
SKILL.md Source
# Execute-Refactor 150 Protocol ## Overview Run in three stages: 1. Research refactor options (iterative, no code changes). 2. Plan + confirm + implement with tests and validation. 3. Apply Scout105 cleanup (objective, small, user-approved). ## Stage 1 — Research refactor options (iterative) 1. **Create or reuse the session log** at `.sessions/SESSION_[date]-[name].md`. - If the file does not exist, create it and add the investigation template below. - Keep all research notes inside the session log only (no scattered notes in chat). 2. **Define the core question** (the refactor goal). - Write a single sentence: “We need to refactor X to achieve Y.” - Example: “Refactor SermonCard to reduce duplication and isolate date logic.” 3. **Define scope (Scope150)**. - **Core (100%)**: list files and behaviors you will directly change. - **Boundary (50%)**: list callers, dependent modules, tests, configs, and data flow. - If unsure, add a “to verify” bullet and resolve it during observations. 4. **Perform observations (search/read) in ordered layers**. - **Interface layer**: find entry points (routes, public APIs, UI entry points). - **Domain layer**: identify entities, i18n keys, enums, types. - **Pattern layer**: locate hooks, services, clients, shared utilities. - **Usage layer**: trace imports and call sites. - For each layer, read the minimum number of files that explain the behavior. 5. **Record findings in the log with sources**. - Each fact must include a source (file path + line reference or command). - Separate facts from hypotheses. Do not mix them. 6. **Generate hypotheses and refactor options**. - For each option, note: goal, steps, benefits, risks, and test impact. - Prefer at least 2 options so tradeoffs are explicit. 7. **Decide if more research is needed**. - If user says “research more”, expand scope or inspect new files. - Update the log with new branches and continue Stage 1. 8. **Stop before implementation**. - End Stage 1 with: options summary, remaining unknowns, and a recommended path. ### Investigation log template ``` ## Investigations ### Investigation: <short topic> #### Core question - ... #### Scope - Core (100%): - ... - Boundary (50%): - ... #### Findings - <fact> (source: file path / command) - Subfinding #### Hypotheses - H1: ... - Prediction: ... - Test: ... - Status: pending/confirmed/rejected #### Refactor options - Option A: ... (pros/cons) - Option B: ... (pros/cons) #### Next branches - ... ``` ## Stage 2 — Plan, confirm, implement 1. **Write a refactor plan**. - Break into ordered steps with file-level granularity. - Include expected intermediate states (what should still pass after each step). 2. **List risks and edge cases**. - Identify behavior changes, API contract risks, and hidden coupling. - Explicitly note any breaking-change risk. 3. **Define a validation checklist**. - Tests to run (unit/integration). - Manual checks if needed (UI flows, API calls). - Expected outputs and what would indicate failure. 4. **Perform Scope150 validation planning**. - Core (100%): ensure each planned change has a test or validation step. - Boundary (50%): list all callers/integrations/tests to be checked. 5. **Ask for user confirmation before editing**. - Provide plan, risks, and validation checklist. - Do not edit until the user approves. 6. **Implement the refactor**. - Follow the plan in order. - Keep changes minimal and reversible. 7. **Add or update tests**. - Cover changed logic and any new boundaries. - Avoid brittle tests; prefer behavior-based assertions. 8. **Run validation**. - Execute all tests from the checklist. - Record results and fix failures before moving to Stage 3. ## Stage 3 — Scout105 cleanup protocol Apply only **objective** cleanup after a Key Point (phase complete). Do not add features. ### Trigger (Key Point) - Apply only after a milestone where the user would see complete value. - Do not run per-file; run once per phase. ### Allowed cleanup categories (objective only) - **Unused code**: unused imports/vars/fields (provable by grep/IDE). - **Typos**: spelling errors in comments/strings (spellcheckable). - **Formatting inconsistencies**: breaks the file’s own pattern. - **Dead code**: commented debug lines or unreachable code. - **Obviously wrong logic**: provably incorrect (duplicate checks, impossible types). ### Constraints - Only in files already touched by the primary task. - Remove garbage only; no new features or refactors. - Each cleanup must take ≤ 30 seconds to verify + fix. - Total cleanup time ≤ 5% of primary task time. - Must be objectively measurable; if not measurable, skip. - Require user approval before executing cleanup. ### Scout105 report (present to user) ``` ✅ Key Point complete: <brief summary> Scout105 opportunities: - <file>: <item> (category, evidence) - <file>: <item> (category, evidence) Run Scout105 cleanup? [Yes / Skip / Selective] ``` ### Execution - If approved, apply all selected cleanups in batch. - Run tests/build to validate no regression. - If failures occur, revert or investigate causality before proceeding. ## Output expectations - Stage 1: Provide refactor options + log path + remaining branches + recommended path. - Stage 2: Provide plan, risks, validation checklist, and request confirmation. - Stage 3: Provide Scout105 report, decision, and validation result.
Related Skills
Refactor-Monolith
Skill para decomposição segura de arquivos monolíticos. Análise estrutural profunda, mapeamento exaustivo de dependências, extração incremental com zero quebra de lógica. Exige entendimento completo do negócio antes de qualquer ação.
50-execute-gated-150
[50] EXECUTE. Execute plans step-by-step with confirmation gates. Each step requires user approval before proceeding. Includes change management lifecycle (Pre-Change → During → Post-Change → Rollback). Use when implementing approved plans, deploying changes, or any multi-step execution requiring control and reversibility.
execute
Execute tasks with velocity and quality. Use when ready to implement after clarity and prioritization are complete. This is the fourth system in the 5-system framework.
51-execute-quality-150
[51] EXECUTE. Commitment to maximum quality work with 150% coverage. Use when you need the highest quality output for critical tasks, complex problems, important decisions, or when standard work isn't enough. Triggers on "maximum quality", "150% mode", "full quality", "critical task", or when you explicitly want AI to work at its best.
modal-deployment
Run Python code in the cloud with serverless containers, GPUs, and autoscaling using Modal. This skill enables agents to generate code for deploying ML models, running batch jobs, serving APIs, and scaling compute-intensive workloads.
grail-miner
This skill assists in setting up, managing, and optimizing Grail miners on Bittensor Subnet 81, handling tasks like environment configuration, R2 storage, model checkpoint management, and performance tuning.
astro
This skill provides essential Astro framework patterns, focusing on server-side rendering (SSR), static site generation (SSG), middleware, and TypeScript best practices. It helps AI agents implement secure authentication, manage API routes, and debug rendering behaviors within Astro projects.
ontopo
An AI agent skill to search for Israeli restaurants, check table availability, view menus, and retrieve booking links via the Ontopo platform, acting as an unofficial interface to its data.
tech-blog
Generates comprehensive technical blog posts, offering detailed explanations of system internals, architecture, and implementation, either through source code analysis or document-driven research.
thor-skills
An entry point and router for AI agents to manage various THOR-related cybersecurity tasks, including running scans, analyzing logs, troubleshooting, and maintenance.
ux
This AI agent skill provides comprehensive guidance for creating professional and insightful User Experience (UX) designs, covering user research, information architecture, interaction design, visual guidance, and usability evaluation. It aims to produce actionable, user-centered solutions that avoid generic AI aesthetics.
vly-money
Generate crypto payment links for supported tokens and networks, manage access to X402 payment-protected content, and provide direct access to the vly.money wallet interface.