Skip to content

Skills Mode

Karajan offers two modes of operation:

ModeBest forRequires
SkillsSingle AI agent, simpler setupOnly Claude Code
OrchestratorMulti-agent pipeline, full controlMCP server + agent CLIs

Skills mode installs Karajan roles as slash commands in Claude Code. Each command is a self-contained prompt with built-in guardrails — security checks, TDD enforcement, destructive operation detection, and diff verification.

Terminal window
kj init

During setup, you’ll be asked: “Install Karajan skills as slash commands?”. Say yes, and the skills are copied to .claude/commands/ in your project.

You can also install them manually:

Terminal window
cp node_modules/karajan-code/templates/skills/*.md .claude/commands/

Executes all steps sequentially: discover → code → review → test → security → sonar → commit.

/kj-run Implement user authentication with JWT tokens

Implements a task following TDD methodology with automatic quality checks:

  • Tests first, then implementation
  • Security check (no hardcoded secrets, no injection vectors)
  • Destructive operation check (no rm -rf, DROP TABLE, etc.)
  • Performance check (no sync I/O in handlers, no document.write)
  • Diff verification (git diff confirms only intended changes)
/kj-code Add pagination to the user list endpoint

Reviews the current diff against quality standards. Auto-flags blocking issues:

  • Hardcoded credentials or secrets
  • Entire files overwritten instead of targeted edits
  • Missing tests for changed source files
  • SQL injection, XSS, command injection patterns
/kj-review Check changes in the auth module

Evaluates test coverage and quality for changed files:

  • Verifies every changed source file has corresponding tests
  • Runs the test suite and reports results
  • Checks for empty tests, always-passing tests, skipped tests
/kj-test Audit test coverage for recent changes

OWASP-focused security scan on the diff:

  • Critical: hardcoded secrets, SQL/command injection, path traversal
  • High: XSS, missing auth, SSRF, insecure deserialization
  • Medium: missing input validation, verbose error messages, missing CSRF
  • Low: missing security headers, known dependency vulnerabilities
/kj-security Scan auth changes for vulnerabilities

Analyzes a task for missing information before coding begins:

  • Missing requirements or acceptance criteria
  • Implicit assumptions that need confirmation
  • Ambiguities with multiple interpretations
  • Contradictions in the specification
/kj-discover Review the requirements for the new billing module

Proposes architecture before implementation:

  • Architecture type and layer responsibilities
  • API contracts and data model changes
  • Tradeoffs with alternatives considered
  • Clarification questions for stakeholders
/kj-architect Design the event-driven notification system

Runs SonarQube scan (if available) or manual static analysis:

  • Cognitive complexity, duplicated code, unused imports
  • Empty catch blocks, nested ternaries
  • Quality gate status and issue breakdown
/kj-sonar Run quality analysis on current changes
FeatureSkillsOrchestrator
Setupkj init → slash commandsMCP server registration
AgentsHost AI onlyMultiple (Claude, Codex, Gemini, Aider, OpenCode)
GuardrailsIn the promptIn code (deterministic guards)
SonarQubeManual or if Docker runningIntegrated quality gate
Session managementNoneFull (pause, resume, budget)
Cost trackingNoneEstimated per-session
Best forQuick tasks, single developerComplex tasks, CI/CD pipelines

Both modes can coexist — use skills for quick tasks and the orchestrator for complex multi-agent work.