BMAD-METHOD/bmad-agent/templates/udtm_analysis_template.md

12 KiB

UDTM Analysis Template

Task Overview

Task: [Brief Description of the Task/Problem] Date: [YYYY-MM-DD] Analyst: [Name/Role] Project: [Project Name] Story/Epic: [Reference ID]

Phase 1: Multi-Angle Analysis

Technical Perspective

Correctness:

  • [Analysis of technical accuracy and implementation correctness]
  • [Verification against specifications and requirements]
  • [Identification of potential technical errors or oversights]

Performance:

  • [Resource usage analysis (CPU, memory, network)]
  • [Scalability considerations and bottlenecks]
  • [Response time and throughput expectations]

Maintainability:

  • [Code readability and organization]
  • [Modularity and extensibility]
  • [Documentation and knowledge transfer requirements]

Security:

  • [Vulnerability assessment]
  • [Data protection and privacy considerations]
  • [Authentication and authorization requirements]

Business Logic Perspective

Requirement Alignment:

  • [Mapping to business requirements and acceptance criteria]
  • [Verification against user stories and use cases]
  • [Identification of requirement gaps or misunderstandings]

User Impact:

  • [User experience considerations]
  • [Accessibility and usability factors]
  • [Impact on different user personas]

Business Value:

  • [ROI and value proposition analysis]
  • [Alignment with business objectives]
  • [Risk vs. benefit assessment]

Integration Perspective

System Compatibility:

  • [Compatibility with existing systems and components]
  • [Dependencies and coupling analysis]
  • [Version compatibility and migration considerations]

API Consistency:

  • [API design consistency with existing patterns]
  • [Contract compatibility and versioning]
  • [Documentation and discoverability]

Data Flow:

  • [Data consistency and integrity]
  • [Transaction boundaries and ACID properties]
  • [Data transformation and validation requirements]

Edge Case Perspective

Boundary Conditions:

  • [Input validation and boundary testing]
  • [Limit conditions and overflow scenarios]
  • [Empty data and null value handling]

Error Scenarios:

  • [Error handling and recovery mechanisms]
  • [Graceful degradation strategies]
  • [User feedback and error reporting]

Resource Limits:

  • [Memory and storage constraints]
  • [Network and timeout limitations]
  • [Concurrent user and load handling]

Security Perspective

Vulnerabilities:

  • [Common security weakness analysis (OWASP Top 10)]
  • [Input sanitization and validation]
  • [SQL injection and XSS prevention]

Attack Vectors:

  • [Potential attack surfaces]
  • [Authentication and session management]
  • [Data exposure and information leakage]

Performance Perspective

Resource Usage:

  • [CPU and memory utilization patterns]
  • [I/O operations and disk usage]
  • [Network bandwidth requirements]

Scalability:

  • [Horizontal and vertical scaling considerations]
  • [Load distribution and balancing]
  • [Caching and optimization strategies]

Phase 2: Assumption Challenge

Identified Assumptions

  1. Assumption: [First identified assumption]

    • Evidence For: [Supporting evidence, facts, or documentation]
    • Evidence Against: [Contradicting evidence or alternative explanations]
    • Risk Level: [High/Medium/Low]
    • Impact if Wrong: [Consequences if assumption proves false]
    • Verification Method: [How to validate this assumption]
  2. Assumption: [Second identified assumption]

    • Evidence For: [Supporting evidence, facts, or documentation]
    • Evidence Against: [Contradicting evidence or alternative explanations]
    • Risk Level: [High/Medium/Low]
    • Impact if Wrong: [Consequences if assumption proves false]
    • Verification Method: [How to validate this assumption]
  3. Assumption: [Third identified assumption]

    • Evidence For: [Supporting evidence, facts, or documentation]
    • Evidence Against: [Contradicting evidence or alternative explanations]
    • Risk Level: [High/Medium/Low]
    • Impact if Wrong: [Consequences if assumption proves false]
    • Verification Method: [How to validate this assumption]

Critical Dependencies

Dependency 1: [First critical dependency]

  • Nature: [Technical/Business/Resource dependency]
  • Risk Assessment: [Impact if dependency fails]
  • Mitigation Strategy: [How to handle dependency failure]

Dependency 2: [Second critical dependency]

  • Nature: [Technical/Business/Resource dependency]
  • Risk Assessment: [Impact if dependency fails]
  • Mitigation Strategy: [How to handle dependency failure]

Assumption Validation Results

  • [Summary of assumption validation efforts]
  • [Assumptions confirmed vs. those requiring further investigation]
  • [High-risk assumptions requiring immediate attention]

Phase 3: Triple Verification

Source 1: Documentation/Specifications

Reference: [Official documentation, specifications, or standards] Findings:

  • [Key information discovered from this source]
  • [Alignment with current understanding]
  • [Any conflicts or gaps identified] Confidence: [1-10 scale confidence in this source] Relevance: [How directly this applies to current task]

Source 2: Existing Codebase

Reference: [Relevant code files, patterns, or existing implementations] Findings:

  • [Patterns and practices discovered in existing code]
  • [Consistency requirements and constraints]
  • [Lessons learned from existing implementations] Confidence: [1-10 scale confidence in this source] Relevance: [How directly this applies to current task]

Source 3: External Validation

Reference: [External tools, testing, expert consultation, or research] Findings:

  • [External validation results or expert opinions]
  • [Tool-based analysis or automated verification]
  • [Industry best practices or standards] Confidence: [1-10 scale confidence in this source] Relevance: [How directly this applies to current task]

Cross-Reference Analysis

Alignment: [All sources agree / Partial agreement / Significant conflicts] Conflicts Identified:

  • [Specific areas where sources disagree]
  • [Impact of these conflicts on implementation approach]
  • [Additional investigation required]

Resolution Strategy:

  • [How conflicts will be resolved]
  • [Additional sources or validation needed]
  • [Decision-making process for ambiguous areas]

Phase 4: Weakness Hunting

Potential Failure Points

  1. Failure Mode: [First identified potential failure]

    • Probability: [High/Medium/Low - likelihood of occurrence]
    • Impact: [High/Medium/Low - severity if it occurs]
    • Detection: [How this failure would be discovered]
    • Mitigation: [Preventive measures and contingency plans]
  2. Failure Mode: [Second identified potential failure]

    • Probability: [High/Medium/Low - likelihood of occurrence]
    • Impact: [High/Medium/Low - severity if it occurs]
    • Detection: [How this failure would be discovered]
    • Mitigation: [Preventive measures and contingency plans]
  3. Failure Mode: [Third identified potential failure]

    • Probability: [High/Medium/Low - likelihood of occurrence]
    • Impact: [High/Medium/Low - severity if it occurs]
    • Detection: [How this failure would be discovered]
    • Mitigation: [Preventive measures and contingency plans]

Edge Cases and Boundary Conditions

Edge Case 1: [First edge case scenario]

  • Scenario: [Detailed description of the edge case]
  • Handling Strategy: [How this will be addressed]
  • Testing Approach: [How to verify proper handling]

Edge Case 2: [Second edge case scenario]

  • Scenario: [Detailed description of the edge case]
  • Handling Strategy: [How this will be addressed]
  • Testing Approach: [How to verify proper handling]

Integration Risks

Integration Risk 1: [First integration concern]

  • Risk Description: [Detailed description of the integration risk]
  • Probability: [Likelihood of this risk materializing]
  • Impact: [Consequences if the risk occurs]
  • Mitigation: [Steps to prevent or handle this risk]

Integration Risk 2: [Second integration concern]

  • Risk Description: [Detailed description of the integration risk]
  • Probability: [Likelihood of this risk materializing]
  • Impact: [Consequences if the risk occurs]
  • Mitigation: [Steps to prevent or handle this risk]

What Could We Be Missing?

  • [Systematic review of potential blind spots]
  • [Areas where expertise might be lacking]
  • [External factors that could impact the solution]
  • [Hidden complexity or requirements]

Phase 5: Final Reflection

Complete Re-examination

Initial Approach: [Original approach and reasoning] Alternative Approaches Considered:

  • [Alternative 1]: [Description and trade-offs]
  • [Alternative 2]: [Description and trade-offs]
  • [Alternative 3]: [Description and trade-offs]

Final Recommendation: [Chosen approach with justification]

  • Rationale: [Why this approach is superior]
  • Trade-offs Accepted: [What we're giving up for this choice]
  • Risk Acceptance: [Risks we're willing to accept]

Confidence Assessment

Overall Confidence: [1-10] (Must be >9.5 to proceed) Reasoning:

  • [Detailed explanation of confidence level]
  • [Factors contributing to confidence]
  • [Factors detracting from confidence]

Confidence Breakdown:

  • Technical Feasibility: [1-10]
  • Requirements Understanding: [1-10]
  • Risk Assessment: [1-10]
  • Implementation Approach: [1-10]
  • Integration Complexity: [1-10]

Remaining Uncertainties

Uncertainty 1: [First remaining uncertainty]

  • Nature: [What exactly is uncertain]
  • Impact: [How this uncertainty affects the project]
  • Resolution Plan: [How to address this uncertainty]
  • Timeline: [When this needs to be resolved]

Uncertainty 2: [Second remaining uncertainty]

  • Nature: [What exactly is uncertain]
  • Impact: [How this uncertainty affects the project]
  • Resolution Plan: [How to address this uncertainty]
  • Timeline: [When this needs to be resolved]

Quality Gate Confirmation

  • Technical Feasibility Confirmed: Solution is technically achievable
  • Requirements Alignment Verified: Solution meets all requirements
  • Risk Mitigation Planned: All major risks have mitigation strategies
  • Integration Strategy Defined: Clear plan for system integration
  • Testing Strategy Established: Comprehensive testing approach defined
  • Success Criteria Clarified: Clear definition of successful completion

Final Decision and Next Steps

Proceed Decision

Proceed: [ ] Yes / [ ] No / [ ] Conditional Reasoning:

  • [Clear justification for the decision]
  • [Key factors influencing the decision]
  • [Any conditions that must be met]

Implementation Strategy

Approach: [High-level implementation strategy] Phase 1: [First phase activities and deliverables] Phase 2: [Second phase activities and deliverables] Phase 3: [Third phase activities and deliverables]

Risk Monitoring

Key Risks to Monitor:

  • [Risk 1]: [Monitoring approach and triggers]
  • [Risk 2]: [Monitoring approach and triggers]
  • [Risk 3]: [Monitoring approach and triggers]

Success Metrics

Primary Metrics: [How success will be measured] Secondary Metrics: [Additional indicators of success] Monitoring Frequency: [How often metrics will be reviewed]

Next Immediate Actions

  1. [First immediate action required]
  2. [Second immediate action required]
  3. [Third immediate action required]

Analysis Sign-off

Analyst: [Name] - [Date] Reviewer: [Name] - [Date] Approved: [ ] Yes / [ ] No Final Confidence: [1-10] Ready to Proceed: [ ] Yes / [ ] No