BMAD-METHOD/bmad-core/tasks/context-validation.md

9.2 KiB

Context Validation Task

Purpose

Ensure context security, quality, and compliance across all BMAD agents. This task provides comprehensive validation of context content, access controls, and quality assurance to maintain system integrity and performance standards.

Validation Categories

Security Validation

  • Input sanitization and content safety
  • Access control and permission verification
  • Sensitive information detection and protection
  • Malicious content identification and blocking

Quality Validation

  • Content accuracy and relevance assessment
  • Information freshness and currency validation
  • Context completeness and coherence verification
  • Performance impact evaluation

Compliance Validation

  • BMad Method compliance verification
  • Agent-specific requirement adherence
  • Configuration standard conformance
  • Documentation and markup validation

Procedure

1. Security Validation

Input Sanitization LLM: Examine all context content for potential security risks, malicious inputs, or inappropriate content

Security Checks

  • Scan for injection attempts (SQL, script, command injection)
  • Detect potentially malicious URLs or file references
  • Identify suspicious patterns or attack vectors
  • Validate file path references and access permissions

Sensitive Information Detection

  • Scan for personally identifiable information (PII)
  • Detect API keys, passwords, or authentication tokens
  • Identify confidential business information
  • Flag proprietary or sensitive technical data

Content Safety Assessment

  • Evaluate content appropriateness and professionalism
  • Check for harmful, offensive, or inappropriate material
  • Verify compliance with organizational content policies
  • Ensure context maintains professional standards

Security Risk Classification

Risk Level Assessment:
- 🟢 LOW: Safe content, no security concerns identified
- 🟡 MEDIUM: Minor concerns, warnings issued, content flagged
- 🔴 HIGH: Security risk detected, content blocked or sanitized
- ⚫ CRITICAL: Severe security threat, immediate intervention required

2. Quality Validation

Content Accuracy Assessment LLM: Evaluate the accuracy and reliability of context information against known standards and requirements

Accuracy Checks

  • Verify factual information against authoritative sources
  • Cross-reference technical specifications and requirements
  • Validate code examples and implementation details
  • Confirm business logic and process accuracy

Relevance Analysis

  • Assess content relevance to current tasks and objectives
  • Evaluate information currency and freshness
  • Identify outdated or stale context elements
  • Score content utility for target agent types

Completeness Verification

  • Check for missing critical information
  • Verify all required context elements are present
  • Identify gaps in information or broken references
  • Ensure context supports successful task completion

Coherence Validation

  • Verify logical flow and consistency of information
  • Check for contradictory or conflicting content
  • Ensure context relationships remain intact
  • Validate cross-references and dependencies

Quality Scoring Matrix

Quality Dimensions (0-10 scale):
- Accuracy: {{accuracy_score}}/10
- Relevance: {{relevance_score}}/10
- Completeness: {{completeness_score}}/10
- Coherence: {{coherence_score}}/10
- Freshness: {{freshness_score}}/10

Overall Quality Score: {{overall_quality_score}}/10

3. BMad Method Compliance Validation

Agent Type Compliance

  • Verify context adheres to agent-specific requirements
  • Check token limits and compression ratios
  • Validate dependency constraints and limitations
  • Ensure agent capability alignment

Dev Agent Compliance (Lean Requirements):

  • Token count ≤ 2000 tokens
  • Code relevance ≥ 95%
  • Non-essential context minimized
  • Technical focus maintained

Planning Agent Compliance (Rich Context):

  • Token count ≤ 8000 tokens
  • Strategic context preserved
  • Cross-functional information maintained
  • Stakeholder context included

Template and Markup Compliance

  • Verify proper {{placeholder}} usage
  • Validate [[LLM:]] instruction formatting
  • Check markdown structure and formatting
  • Ensure template pattern adherence

File and Structure Compliance

  • Validate file size limits (<50KB)
  • Check dynamic loading compatibility
  • Verify dependency declarations
  • Ensure modular organization

4. Performance Impact Validation

Resource Usage Assessment

  • Estimate memory consumption impact
  • Calculate processing time requirements
  • Evaluate loading performance implications
  • Assess scalability and efficiency

Performance Metrics

Performance Impact Analysis:
- Memory Usage: {{estimated_memory_mb}} MB
- Load Time: {{estimated_load_time_ms}} ms
- Processing Speed: {{processing_speed_rating}}/10
- Scalability Impact: {{scalability_impact_rating}}/10

Optimization Recommendations LLM: Based on performance analysis, suggest specific optimizations to improve context efficiency

5. Access Control and Permissions

Permission Verification

  • Validate user access rights to context information
  • Check agent authorization for specific content types
  • Verify cross-agent sharing permissions
  • Ensure appropriate content visibility

Access Control Matrix

Access Control Validation:
- User Permissions: {{user_access_level}}
- Agent Authorization: {{agent_access_rights}}
- Content Classification: {{content_sensitivity_level}}
- Sharing Restrictions: {{sharing_limitations}}

Audit Trail Requirements

  • Log all context access and modifications
  • Track validation decisions and outcomes
  • Record security incidents and responses
  • Maintain compliance audit information

6. Validation Execution and Reporting

Validation Workflow

  1. Execute security validation checks
  2. Perform quality assessment analysis
  3. Verify BMad Method compliance
  4. Assess performance impact
  5. Validate access controls
  6. Generate validation report

Error Handling and Remediation

  • Identify validation failures and issues
  • Propose remediation strategies
  • Execute automated fixes where possible
  • Escalate critical issues requiring intervention

Output Format

Validation Report

# Context Validation Report

## Validation Summary
**Validation Date:** {{validation_timestamp}}
**Context Source:** {{context_source}}
**Agent Type:** {{target_agent_type}}
**Overall Status:** {{validation_status}}

## Security Validation Results
**Security Risk Level:** {{security_risk_level}}
**Threats Detected:** {{security_threats_count}}
**Sensitive Data Found:** {{sensitive_data_findings}}
**Remediation Actions:** {{security_remediation_actions}}

## Quality Assessment Results
**Overall Quality Score:** {{overall_quality_score}}/10
**Accuracy:** {{accuracy_score}}/10
**Relevance:** {{relevance_score}}/10
**Completeness:** {{completeness_score}}/10
**Coherence:** {{coherence_score}}/10
**Freshness:** {{freshness_score}}/10

## Compliance Validation Results
**BMad Method Compliance:** {{bmad_compliance_status}}
**Agent Type Compliance:** {{agent_compliance_status}}
**Token Count:** {{token_count}}/{{token_limit}}
**File Size:** {{file_size}}/50KB
**Template Compliance:** {{template_compliance_status}}

## Performance Impact Assessment
**Memory Usage:** {{memory_usage_mb}} MB
**Load Time:** {{load_time_ms}} ms
**Processing Speed:** {{processing_speed_rating}}/10
**Optimization Score:** {{optimization_score}}/10

## Access Control Verification
**Permission Level:** {{permission_level}}
**Access Restrictions:** {{access_restrictions}}
**Audit Compliance:** {{audit_compliance_status}}

## Recommendations
{{validation_recommendations}}

## Action Items
{{required_action_items}}

Validation Decision Matrix

## Validation Decision: {{validation_decision}}

✅ **APPROVED** - Context meets all validation criteria
⚠️ **APPROVED WITH CONDITIONS** - Minor issues identified, conditions specified
❌ **REJECTED** - Critical issues require resolution before approval
🔄 **REQUIRES REVALIDATION** - Changes made, revalidation needed

**Justification:** {{validation_justification}}
**Conditions/Requirements:** {{validation_conditions}}
**Next Steps:** {{next_validation_steps}}

Error Handling

Critical Validation Failures

  • Block context usage until issues resolved
  • Alert system administrators of security risks
  • Log all critical failures for analysis
  • Initiate incident response procedures

Warning-Level Issues

  • Allow context usage with monitoring
  • Flag issues for future remediation
  • Track warning trends and patterns
  • Schedule regular review and cleanup

Validation Process Failures

  • Retry validation with alternative methods
  • Escalate to human review when automated validation fails
  • Document process improvements needed
  • Maintain system reliability and availability

Dependencies

  • context-compression utility
  • context-filtering utility

Configuration

Uses settings from core-config.yaml context_engineering section:

  • Security validation thresholds and policies
  • Quality standards and acceptance criteria
  • Compliance requirements and standards
  • Performance limits and optimization targets
  • Access control rules and permissions
  • Audit logging requirements and retention policies