9.2 KiB
Context Validation Task
Purpose
Ensure context security, quality, and compliance across all BMAD agents. This task provides comprehensive validation of context content, access controls, and quality assurance to maintain system integrity and performance standards.
Validation Categories
Security Validation
- Input sanitization and content safety
- Access control and permission verification
- Sensitive information detection and protection
- Malicious content identification and blocking
Quality Validation
- Content accuracy and relevance assessment
- Information freshness and currency validation
- Context completeness and coherence verification
- Performance impact evaluation
Compliance Validation
- BMad Method compliance verification
- Agent-specific requirement adherence
- Configuration standard conformance
- Documentation and markup validation
Procedure
1. Security Validation
Input Sanitization LLM: Examine all context content for potential security risks, malicious inputs, or inappropriate content
Security Checks
- Scan for injection attempts (SQL, script, command injection)
- Detect potentially malicious URLs or file references
- Identify suspicious patterns or attack vectors
- Validate file path references and access permissions
Sensitive Information Detection
- Scan for personally identifiable information (PII)
- Detect API keys, passwords, or authentication tokens
- Identify confidential business information
- Flag proprietary or sensitive technical data
Content Safety Assessment
- Evaluate content appropriateness and professionalism
- Check for harmful, offensive, or inappropriate material
- Verify compliance with organizational content policies
- Ensure context maintains professional standards
Security Risk Classification
Risk Level Assessment:
- 🟢 LOW: Safe content, no security concerns identified
- 🟡 MEDIUM: Minor concerns, warnings issued, content flagged
- 🔴 HIGH: Security risk detected, content blocked or sanitized
- ⚫ CRITICAL: Severe security threat, immediate intervention required
2. Quality Validation
Content Accuracy Assessment LLM: Evaluate the accuracy and reliability of context information against known standards and requirements
Accuracy Checks
- Verify factual information against authoritative sources
- Cross-reference technical specifications and requirements
- Validate code examples and implementation details
- Confirm business logic and process accuracy
Relevance Analysis
- Assess content relevance to current tasks and objectives
- Evaluate information currency and freshness
- Identify outdated or stale context elements
- Score content utility for target agent types
Completeness Verification
- Check for missing critical information
- Verify all required context elements are present
- Identify gaps in information or broken references
- Ensure context supports successful task completion
Coherence Validation
- Verify logical flow and consistency of information
- Check for contradictory or conflicting content
- Ensure context relationships remain intact
- Validate cross-references and dependencies
Quality Scoring Matrix
Quality Dimensions (0-10 scale):
- Accuracy: {{accuracy_score}}/10
- Relevance: {{relevance_score}}/10
- Completeness: {{completeness_score}}/10
- Coherence: {{coherence_score}}/10
- Freshness: {{freshness_score}}/10
Overall Quality Score: {{overall_quality_score}}/10
3. BMad Method Compliance Validation
Agent Type Compliance
- Verify context adheres to agent-specific requirements
- Check token limits and compression ratios
- Validate dependency constraints and limitations
- Ensure agent capability alignment
Dev Agent Compliance (Lean Requirements):
- Token count ≤ 2000 tokens
- Code relevance ≥ 95%
- Non-essential context minimized
- Technical focus maintained
Planning Agent Compliance (Rich Context):
- Token count ≤ 8000 tokens
- Strategic context preserved
- Cross-functional information maintained
- Stakeholder context included
Template and Markup Compliance
- Verify proper
{{placeholder}}usage - Validate
[[LLM:]]instruction formatting - Check markdown structure and formatting
- Ensure template pattern adherence
File and Structure Compliance
- Validate file size limits (<50KB)
- Check dynamic loading compatibility
- Verify dependency declarations
- Ensure modular organization
4. Performance Impact Validation
Resource Usage Assessment
- Estimate memory consumption impact
- Calculate processing time requirements
- Evaluate loading performance implications
- Assess scalability and efficiency
Performance Metrics
Performance Impact Analysis:
- Memory Usage: {{estimated_memory_mb}} MB
- Load Time: {{estimated_load_time_ms}} ms
- Processing Speed: {{processing_speed_rating}}/10
- Scalability Impact: {{scalability_impact_rating}}/10
Optimization Recommendations LLM: Based on performance analysis, suggest specific optimizations to improve context efficiency
5. Access Control and Permissions
Permission Verification
- Validate user access rights to context information
- Check agent authorization for specific content types
- Verify cross-agent sharing permissions
- Ensure appropriate content visibility
Access Control Matrix
Access Control Validation:
- User Permissions: {{user_access_level}}
- Agent Authorization: {{agent_access_rights}}
- Content Classification: {{content_sensitivity_level}}
- Sharing Restrictions: {{sharing_limitations}}
Audit Trail Requirements
- Log all context access and modifications
- Track validation decisions and outcomes
- Record security incidents and responses
- Maintain compliance audit information
6. Validation Execution and Reporting
Validation Workflow
- Execute security validation checks
- Perform quality assessment analysis
- Verify BMad Method compliance
- Assess performance impact
- Validate access controls
- Generate validation report
Error Handling and Remediation
- Identify validation failures and issues
- Propose remediation strategies
- Execute automated fixes where possible
- Escalate critical issues requiring intervention
Output Format
Validation Report
# Context Validation Report
## Validation Summary
**Validation Date:** {{validation_timestamp}}
**Context Source:** {{context_source}}
**Agent Type:** {{target_agent_type}}
**Overall Status:** {{validation_status}}
## Security Validation Results
**Security Risk Level:** {{security_risk_level}}
**Threats Detected:** {{security_threats_count}}
**Sensitive Data Found:** {{sensitive_data_findings}}
**Remediation Actions:** {{security_remediation_actions}}
## Quality Assessment Results
**Overall Quality Score:** {{overall_quality_score}}/10
**Accuracy:** {{accuracy_score}}/10
**Relevance:** {{relevance_score}}/10
**Completeness:** {{completeness_score}}/10
**Coherence:** {{coherence_score}}/10
**Freshness:** {{freshness_score}}/10
## Compliance Validation Results
**BMad Method Compliance:** {{bmad_compliance_status}}
**Agent Type Compliance:** {{agent_compliance_status}}
**Token Count:** {{token_count}}/{{token_limit}}
**File Size:** {{file_size}}/50KB
**Template Compliance:** {{template_compliance_status}}
## Performance Impact Assessment
**Memory Usage:** {{memory_usage_mb}} MB
**Load Time:** {{load_time_ms}} ms
**Processing Speed:** {{processing_speed_rating}}/10
**Optimization Score:** {{optimization_score}}/10
## Access Control Verification
**Permission Level:** {{permission_level}}
**Access Restrictions:** {{access_restrictions}}
**Audit Compliance:** {{audit_compliance_status}}
## Recommendations
{{validation_recommendations}}
## Action Items
{{required_action_items}}
Validation Decision Matrix
## Validation Decision: {{validation_decision}}
✅ **APPROVED** - Context meets all validation criteria
⚠️ **APPROVED WITH CONDITIONS** - Minor issues identified, conditions specified
❌ **REJECTED** - Critical issues require resolution before approval
🔄 **REQUIRES REVALIDATION** - Changes made, revalidation needed
**Justification:** {{validation_justification}}
**Conditions/Requirements:** {{validation_conditions}}
**Next Steps:** {{next_validation_steps}}
Error Handling
Critical Validation Failures
- Block context usage until issues resolved
- Alert system administrators of security risks
- Log all critical failures for analysis
- Initiate incident response procedures
Warning-Level Issues
- Allow context usage with monitoring
- Flag issues for future remediation
- Track warning trends and patterns
- Schedule regular review and cleanup
Validation Process Failures
- Retry validation with alternative methods
- Escalate to human review when automated validation fails
- Document process improvements needed
- Maintain system reliability and availability
Dependencies
- context-compression utility
- context-filtering utility
Configuration
Uses settings from core-config.yaml context_engineering section:
- Security validation thresholds and policies
- Quality standards and acceptance criteria
- Compliance requirements and standards
- Performance limits and optimization targets
- Access control rules and permissions
- Audit logging requirements and retention policies