c4-model
C4 Model: Design-to-Code Sync Hub
The C4 model is a hierarchical approach to describing software architecture. This skill set focuses on Design-to-Code Sync: ensuring your diagrams reflect actual code reality and your code follows intended design.
🎯 Stakeholder Mapping
| Level | Name | Audience | Focus |
|---|---|---|---|
| L1 | System Context | Executives, PMs, Users, Devs | Business value, User Journeys, Scope |
| L2 | Container | Architects, Developers, Ops | Tech Stack, Deployable units, API boundaries |
| L3 | Component | Developers, Architects | Internal logic, Layering, Code structure |
| L4 | Code | Developers | Implementation details, ERDs, Class diagrams |
🚫 Architectural Anti-Patterns (The "Don'ts")
- The "Spaghetti" Diagram: Drawing more than 20 elements in one diagram. Solution: Break into multiple views.
- Tech Leakage in L1: Mentioning "React" or "PostgreSQL" in System Context. Solution: Focus on the "What", not "How".
- Missing Descriptions: Boxes with only names. Solution: Every box needs a one-sentence responsibility description.
- Ambiguous Arrows: Labels like "Uses", "Sends", "Connects". Solution: Use action verbs like "Authenticates user via", "Publishes order event to".
More from kinhluan/skills
ddd-tactical
Tactical Domain-Driven Design (DDD) with Scoring Rubric. Use this skill when designing internal domain models or performing architectural reviews to ensure domain logic is isolated and rich.
7scheduling-algorithms
Job scheduling algorithms for parallel and distributed systems
7ddd-core
Professional Strategic Domain-Driven Design (DDD) Hub. Use this skill for Event Storming, identifying Subdomains, defining Bounded Contexts, and mapping Domain Models to the heart of your architecture.
6c4-level3-component
Specialized in Component diagrams (Level 3) with folder structure mapping. Use this skill when the user needs to zoom into a single container to identify internal components, their responsibilities, and how they map to actual code folders (src/services, internal/).
6security-analysis
Security vulnerability analysis and auditing procedures
6docker-containerization
Docker containerization best practices and patterns
6