125 lines
4.3 KiB
Markdown
125 lines
4.3 KiB
Markdown
# Ultra-Deep Thinking Mode (UDTM) Task
|
|
|
|
## Purpose
|
|
Execute rigorous, multi-angle analysis and verification protocol to ensure highest quality decision-making across all BMAD personas. This generic UDTM provides a comprehensive framework for deep analytical thinking.
|
|
|
|
## Integration with Memory System
|
|
- **What patterns to search for**: Similar analytical contexts, successful decision patterns, common pitfalls in similar analyses
|
|
- **What outcomes to track**: Decision quality metrics, time-to-insight, assumption validation accuracy
|
|
- **What learnings to capture**: Effective analysis patterns, common blind spots, successful verification strategies
|
|
|
|
## UDTM Protocol Adaptation
|
|
**Standard 90-minute protocol adaptable to persona-specific needs**
|
|
|
|
### Phase 1: Multi-Angle Analysis (35 minutes)
|
|
- [ ] **Primary Domain Perspective**: Core expertise area analysis
|
|
- [ ] **Cross-Domain Integration**: How this connects to other system aspects
|
|
- [ ] **Stakeholder Impact**: Effects on all involved parties
|
|
- [ ] **System-Wide Implications**: Broader system effects
|
|
- [ ] **Risk and Opportunity**: Potential failures and optimization chances
|
|
- [ ] **Alternative Approaches**: Other viable solutions
|
|
|
|
### Phase 2: Assumption Challenge (15 minutes)
|
|
1. **List ALL assumptions** - explicit and implicit
|
|
2. **Systematic challenge** - attempt to disprove each
|
|
3. **Evidence gathering** - document proof for/against
|
|
4. **Dependency mapping** - identify assumption chains
|
|
5. **Confidence scoring** - rate each assumption's validity
|
|
|
|
### Phase 3: Triple Verification (25 minutes)
|
|
- [ ] **Primary Source**: Direct evidence from authoritative sources
|
|
- [ ] **Pattern Analysis**: Historical patterns and precedents
|
|
- [ ] **External Validation**: Independent verification methods
|
|
- [ ] **Cross-Reference**: Ensure all sources align
|
|
- [ ] **Confidence Assessment**: Overall verification strength
|
|
|
|
### Phase 4: Weakness Hunting (15 minutes)
|
|
- [ ] What are the blind spots in this analysis?
|
|
- [ ] What biases might be affecting judgment?
|
|
- [ ] What edge cases haven't been considered?
|
|
- [ ] What cascade failures could occur?
|
|
- [ ] What assumptions are most fragile?
|
|
|
|
## Quality Gates
|
|
### Pre-Analysis Gate
|
|
- [ ] Context fully understood
|
|
- [ ] All relevant information gathered
|
|
- [ ] Memory patterns reviewed
|
|
- [ ] Success criteria defined
|
|
|
|
### Analysis Quality Gate
|
|
- [ ] All perspectives thoroughly explored
|
|
- [ ] Assumptions explicitly documented
|
|
- [ ] Evidence comprehensively gathered
|
|
- [ ] Alternatives seriously considered
|
|
|
|
### Completion Gate
|
|
- [ ] Confidence level >95%
|
|
- [ ] All weaknesses addressed
|
|
- [ ] Verification completed
|
|
- [ ] Documentation comprehensive
|
|
|
|
## Success Criteria
|
|
- All protocol phases completed with documentation
|
|
- Multi-angle analysis covers minimum 6 perspectives
|
|
- Assumption validation rate >90%
|
|
- Triple verification achieved
|
|
- Weakness hunting yields actionable insights
|
|
- Overall confidence >95%
|
|
|
|
## Memory Integration
|
|
```python
|
|
# Pre-UDTM memory search
|
|
memory_queries = [
|
|
f"UDTM analysis {current_context} successful patterns",
|
|
f"common pitfalls {analysis_type} {domain}",
|
|
f"assumption failures {similar_context}",
|
|
f"verification strategies {problem_type}"
|
|
]
|
|
|
|
# Post-UDTM memory creation
|
|
analysis_memory = {
|
|
"type": "udtm_analysis",
|
|
"context": current_context,
|
|
"perspectives_explored": perspectives_list,
|
|
"assumptions_validated": validation_results,
|
|
"weaknesses_identified": weakness_list,
|
|
"outcome": analysis_outcome,
|
|
"confidence": confidence_score,
|
|
"reusable_insights": key_learnings
|
|
}
|
|
```
|
|
|
|
## Output Template
|
|
```markdown
|
|
# UDTM Analysis: {Topic}
|
|
**Date**: {timestamp}
|
|
**Analyst**: {persona}
|
|
**Confidence**: {percentage}%
|
|
|
|
## Multi-Angle Analysis
|
|
### Perspective 1: {Name}
|
|
{Detailed analysis}
|
|
|
|
### Perspective 2: {Name}
|
|
{Detailed analysis}
|
|
|
|
[Continue for all perspectives]
|
|
|
|
## Assumption Validation
|
|
| Assumption | Evidence For | Evidence Against | Confidence |
|
|
|------------|--------------|------------------|------------|
|
|
| {assumption} | {evidence} | {counter} | {score}% |
|
|
|
|
## Triple Verification Results
|
|
- **Primary Source**: {findings}
|
|
- **Pattern Analysis**: {findings}
|
|
- **External Validation**: {findings}
|
|
|
|
## Identified Weaknesses
|
|
1. {weakness}: {mitigation strategy}
|
|
2. {weakness}: {mitigation strategy}
|
|
|
|
## Final Recommendation
|
|
{Comprehensive recommendation with confidence level}
|
|
``` |