Solution Architects Analysis Toolkit for Claude Code
A comprehensive suite of 11 specialized AI sub-agents that provide professional-grade software architecture analysis, design, validation, security assessment, documentation, and infrastructure generation.
SAAT (Solution Architects Analysis Toolkit) provides AI-powered architecture analysis through specialized sub-agents that can:
- π Discover existing codebases and identify architecture patterns
- π Extract requirements from business documents
- ποΈ Generate standardized C4 architecture models
- π Analyze quality against 14 architecture characteristics
- β Validate models for correctness and compliance
- π Audit security and identify vulnerabilities
- π Document architecture with diagrams and ADRs
- ποΈ Generate production-ready Terraform infrastructure
- π― Orchestrate complete workflows tailored to your needs
Before installing SAAT, ensure you have:
- β Claude Code installed and configured (Download here)
- β Bash shell (Linux, macOS, or Windows with WSL2/Git Bash)
- β Git (optional, for cloning - or download ZIP from GitHub)
Step 1: Get the repository
# Option A: Clone with Git
git clone https://github.com/DavidROliverBA/SAAT-ClaudeCode.git
cd SAAT-ClaudeCode
# Option B: Download and extract ZIP, then:
cd SAAT-ClaudeCodeStep 2: Run the installation script
./scripts/install.shWhat happens during installation:
- β
Creates
~/.claude/agents/directory (if it doesn't exist) - β Copies all 11 SAAT agents globally
- β Makes agents available across all your projects
- β Takes less than 1 minute!
Step 3: Verify installation
# Check that agents are installed
ls -1 ~/.claude/agents/saat-*.md
# You should see 11 agent filesManual Installation (click to expand)
# Clone or download repository
cd SAAT-ClaudeCode
# Create global agents directory
mkdir -p ~/.claude/agents
# Copy all agents
cp agents/*.md ~/.claude/agents/
# Verify
ls -la ~/.claude/agents/saat-*.mdProject-Specific Installation (click to expand)
Install to a specific project instead of globally:
# Navigate to your project
cd /path/to/your/project
# Create project agents directory
mkdir -p .claude/agents
# Copy agents from SAAT repository
cp /path/to/SAAT-ClaudeCode/agents/*.md .claude/agents/
# Agents now available only in this projectNote: Project-level agents take precedence over global agents.
Windows (PowerShell) Installation (click to expand)
# Clone repository
git clone https://github.com/DavidROliverBA/SAAT-ClaudeCode.git
cd SAAT-ClaudeCode
# Create agents directory
New-Item -Path "$env:USERPROFILE\.claude\agents" -ItemType Directory -Force
# Copy agents
Copy-Item -Path "agents\*.md" -Destination "$env:USERPROFILE\.claude\agents\"
# Verify
Get-ChildItem "$env:USERPROFILE\.claude\agents\saat-*.md"Open Claude Code and invoke your first agent:
Method 1: Guided Experience (Recommended for beginners)
In Claude Code, use the Task tool:
subagent_type: "saat-orchestrate"
prompt: "I want to analyze my e-commerce platform for security and performance"
Method 2: Get Help
Task tool:
subagent_type: "saat-help"
prompt: "Show me all available SAAT commands"
Method 3: Quick Full Analysis
Task tool:
subagent_type: "saat-full-pipeline"
prompt: "Analyze /path/to/my/project"
The orchestrator will guide you through a personalized analysis workflow!
Issue: Script says "permission denied"
chmod +x scripts/install.sh
./scripts/install.shIssue: Agents not showing in Claude Code
- Restart Claude Code after installation
- Verify files exist:
ls ~/.claude/agents/saat-*.md - Check file permissions:
chmod 644 ~/.claude/agents/saat-*.md
For more help: See INSTALLATION.md for comprehensive troubleshooting.
SAAT includes a modern web-based dashboard for managing projects, running agents, and visualizing results.
- π Project Management: Add local folders or clone GitHub repositories
- π€ Agent Browser: Explore all 11 SAAT agents with detailed descriptions
- β‘ Real-time Execution: Run agents with live progress updates via WebSocket
- π Results Visualization: View analysis results and statistics
- π Search & Filter: Quickly find projects and agents
# Install dependencies
cd dashboard/backend && npm install
cd ../frontend && npm install
# Start backend (Terminal 1)
cd dashboard/backend
npm run dev
# Start frontend (Terminal 2)
cd dashboard/frontend
npm run dev
# Open http://localhost:3000Full documentation: dashboard/README.md
| Agent | Purpose | Use Case |
|---|---|---|
| saat-orchestrate | AI architecture consultant | Start here! Guided experience |
| saat-discover | Analyze existing codebases | Brownfield analysis |
| saat-requirements | Extract requirements | Greenfield design |
| saat-generate | Create C4 models | Architecture modeling |
| saat-analyze-characteristics | Evaluate quality | Quality assessment |
| saat-validate | Validate models | Correctness checking |
| saat-security | Security analysis | Vulnerability assessment |
| saat-document | Generate documentation | Documentation suite |
| saat-terraform | Generate infrastructure | Infrastructure as Code |
| saat-full-pipeline | Complete workflow | One-command analysis |
| saat-help | Help & guidance | Reference documentation |
Task(subagent_type="saat-discover", prompt="Analyze /path/to/my-app")
β Task(subagent_type="saat-generate", prompt="Generate C4 from discovery.json")
β Task(subagent_type="saat-security", prompt="Analyze security")
Or use the full pipeline:
Task(subagent_type="saat-full-pipeline", prompt="Analyze /path/to/my-app")
Task(subagent_type="saat-requirements", prompt="Extract from requirements.md")
β Task(subagent_type="saat-generate", prompt="Generate C4 from requirements.json")
β Task(subagent_type="saat-document", prompt="Create documentation")
Task(subagent_type="saat-security", prompt="Analyze architecture.json with threat modeling")
Task(subagent_type="saat-analyze-characteristics", prompt="Analyze architecture.json against characteristics.json")
β Task(subagent_type="saat-validate", prompt="Validate architecture.json for PCI-DSS")
Task(subagent_type="saat-terraform", prompt="Generate AWS infrastructure from architecture.json")
SAAT evaluates 14 standard architecture characteristics based on Mark Richards' methodology:
- Availability, Scalability, Performance, Security, Reliability, Fault Tolerance, Recoverability
- Maintainability, Testability, Deployability, Configurability, Extensibility
- Interoperability, Usability
- saat-orchestrator - AI-powered guidance and workflow orchestration
- saat-discover - Automated codebase analysis and pattern detection
- saat-requirements - Intelligent requirements extraction
- saat-generate - C4 architecture model generation with criticality assignment
- saat-analyze-characteristics - Quality evaluation against 14 characteristics
- saat-validate - Model validation and compliance checking
- saat-security - Deep security audit with STRIDE threat modeling
- saat-document - Comprehensive documentation generation
- saat-terraform - Multi-cloud infrastructure as code
- saat-full-pipeline - Complete workflow automation
- saat-help - Interactive help and reference system
- 5 Domain-Specific Characteristics: E-commerce, Healthcare, Fintech, SaaS, Microservices
- Sample Outputs: Discovery, Architecture, Analysis, Validation, Security reports
- Requirements Documents: Complete examples with functional/non-functional requirements
- Learning Paths: Beginner β Intermediate β Advanced guides
- E-Commerce Platform (Brownfield, 6-hour walkthrough)
- Monolith to microservices migration
- PCI-DSS compliance focus
- Active-active deployment strategies
- API Gateway (Greenfield, 4-hour walkthrough)
- High-performance design (<10ms p99 latency)
- Multi-cloud deployment (AWS + GCP)
- API security patterns
- Healthcare Portal (HIPAA, 8-hour walkthrough)
- HIPAA Security Rule compliance
- Zero trust architecture
- PHI protection strategies
- Project Management: Local folders and GitHub repositories
- Agent Browser: Explore and execute all 11 agents
- Real-time Updates: WebSocket-based progress tracking
- Analysis Visualization: View results and statistics
- RESTful API: Complete backend for automation
- Badge Generator: Create shields.io badges from analysis results
- GitHub Actions: CI/CD workflow template for automated analysis
- Shell Completions: Bash and Zsh tab completion
- Docker Image: Containerized SAAT with helper CLI
- Interactive Generator: Guided questionnaire for characteristics files
- Level 1 (Systems), Level 2 (Containers), Level 3 (Components)
- Relationships with protocols and data flows
- Criticality levels: CS1 (99.99%), CS2 (99.9%), SL1 (99.5%), SL2 (99%), STANDARD
- Owner assignment and team mapping
- Technology stack detection
- PCI-DSS: Payment Card Industry Data Security Standard
- HIPAA: Health Insurance Portability and Accountability Act
- GDPR: General Data Protection Regulation
- SOC2: Service Organization Control 2
- Custom Frameworks: Define your own compliance rules
- AWS: EKS, RDS, ElastiCache, ALB, VPC, CloudWatch, S3
- Azure: AKS, SQL Database, Redis Cache, Load Balancer, VNet
- GCP: GKE, Cloud SQL, Memorystore, Load Balancer, VPC
- Multi-region: Active-active, disaster recovery configurations
- Markdown: README, ARCHITECTURE, API docs, runbooks
- PlantUML: C4 diagrams with automatic generation
- Mermaid: GitHub-friendly diagrams
- ADRs: Architecture Decision Records with templates
- Confluence/Wiki: Export-ready formats
- Encryption gaps (at rest, in transit, key management)
- Authentication/authorization issues (OAuth, JWT, RBAC, ABAC)
- Data flow security analysis
- Infrastructure vulnerabilities
- STRIDE Threat Modeling: Spoofing, Tampering, Repudiation, Information Disclosure, DoS, Elevation of Privilege
- Attack surface mapping
- CVSS scoring for findings
- Installation Guide - Complete installation instructions
- Agents Guide - Comprehensive reference for all agents
- Examples - See
examples/directory for sample files
- Claude Code (latest version recommended)
- Operating System: Linux, macOS, or Windows (WSL2/Git Bash)
- Git (for cloning repository)
- Terraform (for infrastructure deployment)
- Cloud CLI (AWS CLI, Azure CLI, gcloud - for infrastructure deployment)
Task(
subagent_type="saat-full-pipeline",
prompt="Analyze /home/user/projects/my-app, output to ./analysis, use AWS"
)Generates:
- β discovery.json
- β architecture.json
- β Quality analysis report
- β Validation report
- β Security audit
- β Complete documentation
- β Terraform infrastructure
Task(
subagent_type="saat-orchestrate",
prompt="I need to analyze my system for modernization"
)The orchestrator will:
- Ask about your situation
- Understand your concerns
- Create a personalized plan
- Execute the workflow
- Deliver actionable recommendations
# Step 1: Discover
Task(subagent_type="saat-discover", prompt="Analyze /path/to/repo")
# Step 2: Generate C4
Task(subagent_type="saat-generate", prompt="Generate from discovery.json")
# Step 3: Analyze Quality
Task(subagent_type="saat-analyze-characteristics", prompt="Analyze against characteristics.json")
# Step 4: Security Audit
Task(subagent_type="saat-security", prompt="Deep security analysis with threat modeling")
# Step 5: Document
Task(subagent_type="saat-document", prompt="Generate complete documentation")SAAT-ClaudeCode/
βββ agents/ # 11 specialized sub-agents
β βββ saat-orchestrator.md # AI architecture consultant
β βββ saat-discover.md # Codebase analysis
β βββ saat-requirements.md # Requirements extraction
β βββ saat-generate.md # C4 model generation
β βββ saat-analyze-characteristics.md # Quality analysis
β βββ saat-validate.md # Model validation
β βββ saat-security.md # Security audit
β βββ saat-document.md # Documentation generation
β βββ saat-terraform.md # Infrastructure generation
β βββ saat-full-pipeline.md # Complete workflow
β βββ saat-help.md # Help system
β
βββ scripts/ # Automation scripts
β βββ install.sh # Install agents globally
β βββ uninstall.sh # Remove agents
β βββ generate-badges.sh # Create shields.io badges
β βββ create-characteristics.sh # Interactive generator
β
βββ examples/ # Comprehensive examples
β βββ characteristics/ # 5 domain-specific examples
β β βββ ecommerce-characteristics.json
β β βββ healthcare-characteristics.json
β β βββ fintech-characteristics.json
β β βββ saas-characteristics.json
β β βββ microservices-characteristics.json
β βββ sample-outputs/ # Analysis output samples
β β βββ discovery-sample.json
β β βββ architecture-sample.json
β β βββ archchar-analysis-sample.json
β β βββ archchar-analysis-sample.md
β β βββ validation-report-sample.json
β β βββ security-report-sample.json
β βββ requirements/ # Requirements documents
β β βββ ecommerce-requirements.md
β βββ README.md # Examples guide
β
βββ reference-projects/ # Complete walkthroughs
β βββ ecommerce-platform/ # Brownfield migration
β β βββ README.md # Project overview
β β βββ WALKTHROUGH.md # 6-hour guide
β βββ microservices-gateway/ # Greenfield design
β β βββ README.md # Project overview
β β βββ WALKTHROUGH.md # 4-hour guide
β βββ healthcare-portal/ # HIPAA compliance
β β βββ README.md # Project overview
β β βββ WALKTHROUGH.md # 8-hour guide
β βββ README.md # Reference guide
β
βββ dashboard/ # Web dashboard (Beta)
β βββ backend/ # Node.js/Express API
β β βββ src/
β β β βββ server.js
β β β βββ routes/ # API routes
β β βββ package.json
β βββ frontend/ # React/Vite app
β β βββ src/
β β β βββ components/
β β β βββ pages/
β β β βββ context/
β β βββ package.json
β βββ README.md # Dashboard docs
β
βββ templates/ # CI/CD templates
β βββ github-actions/
β βββ saat-analysis.yml # GitHub Action workflow
β βββ README.md # Setup guide
β
βββ completions/ # Shell completions
β βββ saat-completion.bash # Bash completion
β βββ saat-completion.zsh # Zsh completion
β βββ README.md # Installation guide
β
βββ Dockerfile # Docker image
βββ docker-compose.yml # Docker Compose setup
βββ DOCKER.md # Docker documentation
βββ INSTALLATION.md # Installation guide
βββ AGENTS_GUIDE.md # Complete agents reference
βββ ROADMAP.md # Development roadmap
βββ README.md # This file
If you need to remove SAAT agents:
cd SAAT-ClaudeCode
./scripts/uninstall.shThe script will:
- List all SAAT agents to be removed
- Ask for confirmation
- Remove all agents from
~/.claude/agents/
# Remove all SAAT agents
rm ~/.claude/agents/saat-*.md
# Or remove specific agent
rm ~/.claude/agents/saat-orchestrator.mdls ~/.claude/agents/saat-*.md
# Should return: No such file or directoryContributions are welcome! Please:
- Fork the repository
- Create a feature branch
- Make your changes
- Submit a pull request
To test agents locally before installation:
# Copy to project-specific directory
mkdir -p .claude/agents
cp agents/*.md .claude/agents/MIT License - see LICENSE file for details.
Created by: David R. Oliver
Based on: Solution Architects Analysis Toolkit (SAAT) methodology
Powered by: Claude Code by Anthropic
- Issues: GitHub Issues
- Discussions: GitHub Discussions
- Install: Run
./scripts/install.sh - Learn: Read AGENTS_GUIDE.md
- Try: Invoke
saat-orchestratein Claude Code - Explore: Run
saat-helpfor all commands
Ready to revolutionize your architecture analysis? Install SAAT and start architecting! π
./scripts/install.shThen in Claude Code:
Task(subagent_type="saat-help", prompt="Show me what you can do")
Happy architecting! π