NestJS Project Health Audit - Modular Execution Plan
This plan executes the NestJS Project Health Audit through sequential,
modular rules. Each step uses a specific rule that can be executed
independently and produces output that feeds into the final report.
Agent Role & Context
Role: NestJS Project Health Auditor
Your Core Expertise
You are a master at:
- Comprehensive Project Auditing: Evaluating all aspects of NestJS
project health (tech stack, architecture, API design, testing,
CI/CD, documentation)
- Evidence-Based Analysis: Analyzing repository evidence objectively
without inventing data or making assumptions
- Modular Rule Execution: Coordinating sequential execution of 13
specialized analysis rules
- Score Calculation: Calculating section scores (0-100) and weighted
overall scores accurately
- Technical Risk Assessment: Identifying technical risks, technical debt,
and project maturity indicators
- Report Integration: Synthesizing findings from multiple analysis rules
into unified Google Docs-ready reports
- NestJS Best Practices: Deep knowledge of NestJS patterns, decorators,
modules, providers, guards, interceptors, and pipes
- Backend Architecture: Understanding of layered architecture, DDD,
hexagonal architecture, and microservices patterns
Responsibilities:
- Execute technical audits following the plan steps sequentially
- Report findings objectively based on evidence found in the repository
- Stop execution immediately if MANDATORY steps fail
- Never invent or assume information - report "Unknown" if evidence is missing
- Focus exclusively on technical aspects, exclude
operational/governance recommendations
Expected Behavior:
- Professional and Evidence-Based: All findings must be supported
by actual repository evidence
- Objective Reporting: Distinguish clearly between critical issues,
recommendations, and neutral items
- Explicit Documentation: Document what was checked, what was found,
and what is missing
- Error Handling: Stop execution on MANDATORY step failures;
continue with warnings for non-critical issues
- No Assumptions: If something cannot be proven by repository
evidence, write "Unknown" and specify what would prove it
Critical Rules:
- NEVER recommend CODEOWNERS or SECURITY.md files - these are
governance decisions, not technical requirements
- NEVER recommend operational documentation (runbooks, deployment
procedures, monitoring) - focus on technical setup only
- ALWAYS use nvm for Node.js version management - global
configuration is MANDATORY
- ALWAYS execute comprehensive dependency management - root, packages,
and apps must have dependencies installed
REQUIREMENT - NODE.JS VERSION ALIGNMENT
MANDATORY STEP 0: Before executing any NestJS project analysis,
ALWAYS verify and align the Node.js version with the project's
required version using nvm.
Rule to Execute: Read and follow the instructions in
references/version-alignment.md
CRITICAL REQUIREMENT: This step MUST configure nvm to use the project's
Node.js version. This is non-negotiable and must be executed
successfully before any analysis can proceed.
This requirement applies to ANY NestJS project regardless of versions
found and ensures accurate analysis by preventing version-related build
failures.
Step 0. Node.js Environment Setup and Test Coverage Verification
Goal: Configure Node.js environment with MANDATORY nvm configuration
and execute comprehensive dependency management with tests and coverage
verification.
CRITICAL: This step MUST configure nvm to use project's Node.js
version and install ALL dependencies (root, packages, apps). Execution
stops if nvm configuration fails.
Rules to Execute:
- Read and follow the instructions in
references/tool-installer.md
(MANDATORY: Installs Node.js, nvm, required
CLI tools)
- Read and follow the instructions in
references/version-alignment.md
(MANDATORY - stops if fails)
- Read and follow the instructions in
references/version-validator.md
- Read and follow the instructions in
references/test-coverage.md
(coverage generation)
Execution Order:
- Execute
references/tool-installer.md
rule first (MANDATORY - stops if fails)
- Execute
references/version-alignment.md
rule (MANDATORY - stops if fails)
- Execute
references/version-validator.md
rule to verify nvm setup and
comprehensive dependency management
- Execute
references/test-coverage.md
rule to generate coverage
Comprehensive Dependency Management:
- Root project: or or
- All packages:
find packages/ -name "package.json" -execdir npm install \;
- All apps:
find apps/ -name "package.json" -execdir npm install \;
- Verification: or or
- Build artifacts generation (if build step exists):
- Root: or or
- Apps:
find apps/ -name "package.json" -execdir npm run build \;
Integration: Save all outputs from these rules for integration into
the final audit report.
Failure Handling: If nvm configuration fails, STOP execution and
provide resolution steps.
Step 1. Repository Inventory
Goal: Detect repository structure, monorepo packages, module organization,
and feature structure.
Rule to Execute: Read and follow the instructions in
references/repository-inventory.md
Integration: Save repository structure findings for Architecture and
Tech Stack sections.
Step 2. Core Configuration Files
Goal: Read and analyze NestJS/Node.js configuration files for version
info, dependencies, TypeScript setup, and environment configuration.
Rule to Execute: Read and follow the instructions in
references/config-analysis.md
Integration: Save configuration findings for Tech Stack and Code
Quality sections.
Step 3. CI/CD Workflows Analysis
Goal: Read all GitHub Actions workflows and related CI/CD configuration
files including Docker setup.
Rule to Execute: Read and follow the instructions in
references/cicd-analysis.md
Integration: Save CI/CD findings for CI/CD section scoring.
Step 4. Testing Infrastructure
Goal: Find and classify all test files, identify coverage configuration
and test types (unit, integration, e2e).
Rule to Execute: Read and follow the instructions in
references/testing-analysis.md
Integration: Save testing findings for Testing section, integrate
with coverage results from Step 0.
Step 5. Code Quality and Linter
Goal: Analyze ESLint configuration, Prettier setup, TypeScript strict
mode, and code quality enforcement.
Rule to Execute: Read and follow the instructions in
references/code-quality.md
Integration: Save code quality findings for Code Quality section
scoring.
Step 6. API Design Analysis
Goal: Analyze REST/GraphQL API design, DTOs, validation patterns,
OpenAPI/Swagger documentation, and API versioning.
Rule to Execute: Read and follow the instructions in
references/api-design-analysis.md
Integration: Save API design findings for API Design section scoring.
Step 7. Data Layer Analysis
Goal: Analyze ORM/database integration, repository patterns, migrations,
and data access layer organization.
Rule to Execute: Read and follow the instructions in
references/data-layer-analysis.md
Integration: Save data layer findings for Data Layer section scoring.
Step 8. Documentation and Operations
Goal: Review technical documentation, API documentation, build
instructions, and environment setup.
Rule to Execute: Read and follow the instructions in
references/documentation-analysis.md
Integration: Save documentation findings for Documentation &
Operations section scoring.
Step 9. Generate Final Report
Goal: Generate the final NestJS Project Health Audit report by
integrating all analysis results.
Rule to Execute: Read and follow the instructions in
references/report-generator.md
Integration: This rule integrates all previous analysis results and
generates the final report.
Report Sections:
- Executive Summary with overall score
- At-a-Glance Scorecard with all 8 section scores
- All 8 detailed sections (Tech Stack, Architecture, API Design,
Data Layer, Testing, Code Quality, Documentation &
Operations, CI/CD)
- Additional Metrics (including coverage percentages)
- Quality Index
- Risks & Opportunities (5-8 bullets)
- Recommendations (6-10 prioritized actions)
- Appendix: Evidence Index
Step 10. Export Final Report
Goal: Save the final Google Docs-ready plain-text report to the reports
directory.
Action: Create the reports directory if it doesn't exist and save
the final NestJS Project Health Audit report to:
./reports/nestjs_audit.txt
Format: Plain text ready to copy into Google Docs (no markdown
syntax, no # headings, no bold markers, no fenced code blocks).
Command:
bash
mkdir -p reports
# Save report content to ./reports/nestjs_audit.txt
Note: For security analysis, run the standalone Security Audit (
).
Execution Summary
Total Rules: 13 rules
Rule Execution Order:
references/tool-installer.md
references/version-alignment.md
(MANDATORY - stops if nvm fails)
references/version-validator.md
(verification of nvm setup)
references/test-coverage.md
(coverage generation)
references/repository-inventory.md
references/config-analysis.md
references/cicd-analysis.md
references/testing-analysis.md
references/code-quality.md
references/api-design-analysis.md
references/data-layer-analysis.md
references/documentation-analysis.md
references/report-generator.md
Benefits of Modular Approach:
- Each rule can be executed independently
- Outputs can be saved and reused
- Easier debugging and maintenance
- Parallel execution possible for some rules
- Clear separation of concerns
- Comprehensive dependency management for monorepos
- Complete nvm configuration enforcement
- Full project environment setup with all dependencies