BMAD-METHOD/src/core-skills/bmad-discovery-rigor/resources/structured-reasoning.md

4.4 KiB

Structured Reasoning Framework

Loaded when classification is Solve/Structured or higher. Provides a formal reasoning scaffold for problems with unknowns, multiple valid approaches, or cross-domain constraints.

When to Use

  • Tier is Structured or Full Formal
  • User cannot immediately state constraints or invariants
  • Multiple valid approaches exist and must be reasoned through

Reasoning Sequence

Use this sequence to deepen analysis during interview (step 2) and blind-spot sweep (step 3). Each element feeds the next.

1. Axioms

Fundamental truths about the problem domain. Help the user identify these — do not assume they already know them. If the user struggles, offer candidates and ask: "Does this seem true in your domain?"

  • What is always true in this domain?
  • What would an expert take as given?

Check for pairwise contradictions. If found, present the contradiction and resolve before proceeding.

2. State Model

What exists, what changes, what must remain true.

  • Entities: What objects, actors, or concepts exist?
  • Variables: What properties change?
  • Invariants: What must ALWAYS hold? ("What would break if it changed? That's your invariant.")
  • Operations: What actions change the state? What are their preconditions and postconditions?

3. Behavioral Constraints

  • Safety (always): Conditions that must hold at every point — "It is never the case that [bad thing]"
  • Liveness (eventually): Conditions that must eventually be reached — "If [trigger], then eventually [response]"
  • Temporal order: Things that must happen in sequence — "[A] before [B]"

4. Risk Categories

When populating risks, use these categories beyond logical correctness:

Category What to look for
Logical Incorrect reasoning, violated invariants, flawed assumptions
Operational Failure modes, monitoring gaps, rollback limitations, capacity
Economic Cost overruns, over-engineering, insufficient investment
Socio-technical Team capability gaps, ownership problems, Conway's Law
Evolution Brittleness to change, migration risk, dependency risk
Adversarial Security threats, abuse scenarios, supply chain risks
Cognitive Complexity exceeding team capacity, opaque design
Emergent Cascading failures, feedback loops, unintended system-level behavior

5. Verification Strategy

How to prove the solution is correct:

Approach When to use What it establishes
Formal proof Properties can be stated precisely, system bounded Correctness within the model
Statistical / property-based testing Large state space or stochastic behavior Confidence bounds, not guarantees
Simulation / prototyping Real-world behavior hard to predict from spec Empirical evidence of behavior
Monitoring and alerting Production may diverge from test behavior Ongoing operational correctness
Chaos / resilience testing System must tolerate component failures Resilience under real conditions
Threat modeling System faces adversarial input Security posture
Code review and cognitive walkthrough System maintained by humans over time Maintainability and comprehensibility
A/B testing and canary deployment Behavioral impact hard to predict statically Empirical validation at scale

Integration with Discovery Steps

  • Step 2 (Interview): Use axioms, state model, and constraints to formulate deeper questions
  • Step 3 (Blind Spots): Use risk categories to enhance System Reality Category sweep
  • Step 4 (Research): Use verification strategy to structure research goals
  • Step 5 (Handoff): Include axioms, invariants, and constraints in Discovery Context