Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
NestJS best practices and architecture patterns for building production-ready applications. This skill should be used when writing, reviewing, or refactoring...
NestJS best practices and architecture patterns for building production-ready applications. This skill should be used when writing, reviewing, or refactoring...
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
Comprehensive best practices guide for NestJS applications. Contains 40 rules across 10 categories, prioritized by impact to guide automated refactoring and code generation.
Reference these guidelines when: Writing new NestJS modules, controllers, or services Implementing authentication and authorization Reviewing code for architecture and security issues Refactoring existing NestJS codebases Optimizing performance or database queries Building microservices architectures
PriorityCategoryImpactPrefix1ArchitectureCRITICALarch-2Dependency InjectionCRITICALdi-3Error HandlingHIGHerror-4SecurityHIGHsecurity-5PerformanceHIGHperf-6TestingMEDIUM-HIGHtest-7Database & ORMMEDIUM-HIGHdb-8API DesignMEDIUMapi-9MicroservicesMEDIUMmicro-10DevOps & DeploymentLOW-MEDIUMdevops-
arch-avoid-circular-deps - Avoid circular module dependencies arch-feature-modules - Organize by feature, not technical layer arch-module-sharing - Proper module exports/imports, avoid duplicate providers arch-single-responsibility - Focused services over "god services" arch-use-repository-pattern - Abstract database logic for testability arch-use-events - Event-driven architecture for decoupling
di-avoid-service-locator - Avoid service locator anti-pattern di-interface-segregation - Interface Segregation Principle (ISP) di-liskov-substitution - Liskov Substitution Principle (LSP) di-prefer-constructor-injection - Constructor over property injection di-scope-awareness - Understand singleton/request/transient scopes di-use-interfaces-tokens - Use injection tokens for interfaces
error-use-exception-filters - Centralized exception handling error-throw-http-exceptions - Use NestJS HTTP exceptions error-handle-async-errors - Handle async errors properly
security-auth-jwt - Secure JWT authentication security-validate-all-input - Validate with class-validator security-use-guards - Authentication and authorization guards security-sanitize-output - Prevent XSS attacks security-rate-limiting - Implement rate limiting
perf-async-hooks - Proper async lifecycle hooks perf-use-caching - Implement caching strategies perf-optimize-database - Optimize database queries perf-lazy-loading - Lazy load modules for faster startup
test-use-testing-module - Use NestJS testing utilities test-e2e-supertest - E2E testing with Supertest test-mock-external-services - Mock external dependencies
db-use-transactions - Transaction management db-avoid-n-plus-one - Avoid N+1 query problems db-use-migrations - Use migrations for schema changes
api-use-dto-serialization - DTO and response serialization api-use-interceptors - Cross-cutting concerns api-versioning - API versioning strategies api-use-pipes - Input transformation with pipes
micro-use-patterns - Message and event patterns micro-use-health-checks - Health checks for orchestration micro-use-queues - Background job processing
devops-use-config-module - Environment configuration devops-use-logging - Structured logging devops-graceful-shutdown - Zero-downtime deployments
Read individual rule files for detailed explanations and code examples: rules/arch-avoid-circular-deps.md rules/security-validate-all-input.md rules/_sections.md Each rule file contains: Brief explanation of why it matters Incorrect code example with explanation Correct code example with explanation Additional context and references
For the complete guide with all rules expanded: AGENTS.md
Agent frameworks, memory systems, reasoning layers, and model-native orchestration.
Largest current source with strong distribution and engagement signals.