siesa-agents 2.1.2 → 2.1.3-dev.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (114) hide show
  1. package/README.md +83 -83
  2. package/bin/install.js +400 -400
  3. package/bin/prepare-publish.js +26 -26
  4. package/bin/restore-folders.js +26 -26
  5. package/bmad-core/agent-teams/team-all.yaml +15 -15
  6. package/bmad-core/agent-teams/team-fullstack.yaml +19 -19
  7. package/bmad-core/agent-teams/team-ide-minimal.yaml +11 -11
  8. package/bmad-core/agent-teams/team-no-ui.yaml +14 -14
  9. package/bmad-core/agents/analyst.md +84 -84
  10. package/bmad-core/agents/architect.md +94 -94
  11. package/bmad-core/agents/backend-agent.md +189 -189
  12. package/bmad-core/agents/bmad-master.md +110 -110
  13. package/bmad-core/agents/bmad-orchestrator.md +147 -147
  14. package/bmad-core/agents/dev.md +81 -81
  15. package/bmad-core/agents/frontend-agent.md +168 -168
  16. package/bmad-core/agents/pm.md +84 -84
  17. package/bmad-core/agents/po.md +79 -79
  18. package/bmad-core/agents/qa.md +91 -91
  19. package/bmad-core/agents/sm.md +65 -65
  20. package/bmad-core/agents/ux-expert.md +69 -69
  21. package/bmad-core/checklists/architect-checklist.md +440 -440
  22. package/bmad-core/checklists/backend-checklist.md +142 -142
  23. package/bmad-core/checklists/change-checklist.md +184 -184
  24. package/bmad-core/checklists/frontend-checklist.md +105 -105
  25. package/bmad-core/checklists/pm-checklist.md +372 -372
  26. package/bmad-core/checklists/po-master-checklist.md +434 -434
  27. package/bmad-core/checklists/story-dod-checklist.md +96 -96
  28. package/bmad-core/checklists/story-draft-checklist.md +155 -155
  29. package/bmad-core/core-config.yaml +22 -22
  30. package/bmad-core/data/backend-standards.md +439 -439
  31. package/bmad-core/data/bmad-kb.md +809 -809
  32. package/bmad-core/data/brainstorming-techniques.md +38 -38
  33. package/bmad-core/data/elicitation-methods.md +156 -156
  34. package/bmad-core/data/frontend-standards.md +323 -323
  35. package/bmad-core/data/technical-preferences.md +5 -5
  36. package/bmad-core/data/test-levels-framework.md +148 -148
  37. package/bmad-core/data/test-priorities-matrix.md +174 -174
  38. package/bmad-core/enhanced-ide-development-workflow.md +248 -248
  39. package/bmad-core/install-manifest.yaml +230 -230
  40. package/bmad-core/tasks/advanced-elicitation.md +119 -119
  41. package/bmad-core/tasks/apply-qa-fixes.md +150 -150
  42. package/bmad-core/tasks/brownfield-create-epic.md +162 -162
  43. package/bmad-core/tasks/brownfield-create-story.md +149 -149
  44. package/bmad-core/tasks/correct-course.md +72 -72
  45. package/bmad-core/tasks/create-brownfield-story.md +314 -314
  46. package/bmad-core/tasks/create-component.md +102 -102
  47. package/bmad-core/tasks/create-deep-research-prompt.md +280 -280
  48. package/bmad-core/tasks/create-doc.md +103 -103
  49. package/bmad-core/tasks/create-entity.md +132 -132
  50. package/bmad-core/tasks/create-feature.md +90 -90
  51. package/bmad-core/tasks/create-next-story.md +114 -114
  52. package/bmad-core/tasks/create-service.md +117 -117
  53. package/bmad-core/tasks/create-use-case.md +140 -140
  54. package/bmad-core/tasks/document-project.md +345 -345
  55. package/bmad-core/tasks/execute-checklist.md +88 -88
  56. package/bmad-core/tasks/facilitate-brainstorming-session.md +138 -138
  57. package/bmad-core/tasks/generate-ai-frontend-prompt.md +53 -53
  58. package/bmad-core/tasks/index-docs.md +175 -175
  59. package/bmad-core/tasks/kb-mode-interaction.md +77 -77
  60. package/bmad-core/tasks/nfr-assess.md +345 -345
  61. package/bmad-core/tasks/qa-gate.md +163 -163
  62. package/bmad-core/tasks/review-story.md +316 -316
  63. package/bmad-core/tasks/risk-profile.md +355 -355
  64. package/bmad-core/tasks/scaffold-backend.md +110 -110
  65. package/bmad-core/tasks/scaffold-frontend.md +78 -78
  66. package/bmad-core/tasks/shard-doc.md +187 -187
  67. package/bmad-core/tasks/test-design.md +176 -176
  68. package/bmad-core/tasks/trace-requirements.md +266 -266
  69. package/bmad-core/tasks/validate-next-story.md +136 -136
  70. package/bmad-core/templates/architecture-tmpl.yaml +662 -662
  71. package/bmad-core/templates/brainstorming-output-tmpl.yaml +156 -156
  72. package/bmad-core/templates/brownfield-architecture-tmpl.yaml +477 -477
  73. package/bmad-core/templates/brownfield-prd-tmpl.yaml +281 -281
  74. package/bmad-core/templates/competitor-analysis-tmpl.yaml +307 -307
  75. package/bmad-core/templates/front-end-architecture-tmpl.yaml +258 -258
  76. package/bmad-core/templates/front-end-spec-tmpl.yaml +350 -350
  77. package/bmad-core/templates/fullstack-architecture-tmpl.yaml +824 -824
  78. package/bmad-core/templates/market-research-tmpl.yaml +253 -253
  79. package/bmad-core/templates/prd-tmpl.yaml +203 -203
  80. package/bmad-core/templates/project-brief-tmpl.yaml +222 -222
  81. package/bmad-core/templates/qa-gate-tmpl.yaml +103 -103
  82. package/bmad-core/templates/story-tmpl.yaml +138 -138
  83. package/bmad-core/user-guide.md +530 -530
  84. package/bmad-core/utils/bmad-doc-template.md +327 -327
  85. package/bmad-core/utils/workflow-management.md +71 -71
  86. package/bmad-core/workflows/brownfield-fullstack.yaml +298 -298
  87. package/bmad-core/workflows/brownfield-service.yaml +188 -188
  88. package/bmad-core/workflows/brownfield-ui.yaml +198 -198
  89. package/bmad-core/workflows/greenfield-fullstack.yaml +241 -241
  90. package/bmad-core/workflows/greenfield-service.yaml +207 -207
  91. package/bmad-core/workflows/greenfield-ui.yaml +236 -236
  92. package/bmad-core/working-in-the-brownfield.md +606 -606
  93. package/claude/commands/BMad/agents/backend.md +187 -187
  94. package/claude/commands/BMad/agents/frontend.md +150 -150
  95. package/claude/hooks/file-restriction-hook.py +51 -0
  96. package/claude/hooks/track-agent.py +67 -0
  97. package/claude/settings.local.json +37 -1
  98. package/github/b-mad-expert.md +742 -742
  99. package/github/chatmodes/analyst.chatmode.md +89 -89
  100. package/github/chatmodes/architect.chatmode.md +97 -97
  101. package/github/chatmodes/backend.chatmode.md +194 -194
  102. package/github/chatmodes/bmad-master.chatmode.md +115 -115
  103. package/github/chatmodes/bmad-orchestrator.chatmode.md +152 -152
  104. package/github/chatmodes/dev.chatmode.md +86 -86
  105. package/github/chatmodes/frontend.chatmode.md +157 -157
  106. package/github/chatmodes/pm.chatmode.md +89 -89
  107. package/github/chatmodes/po.chatmode.md +84 -84
  108. package/github/chatmodes/qa.chatmode.md +96 -96
  109. package/github/chatmodes/sm.chatmode.md +70 -70
  110. package/github/chatmodes/ux-expert.chatmode.md +74 -74
  111. package/index.js +9 -9
  112. package/package.json +37 -37
  113. package/vscode/mcp.json +11 -11
  114. package/vscode/settings.json +12 -12
@@ -1,440 +1,440 @@
1
- <!-- Powered by BMAD™ Core -->
2
-
3
- # Architect Solution Validation Checklist
4
-
5
- This checklist serves as a comprehensive framework for the Architect to validate the technical design and architecture before development execution. The Architect should systematically work through each item, ensuring the architecture is robust, scalable, secure, and aligned with the product requirements.
6
-
7
- [[LLM: INITIALIZATION INSTRUCTIONS - REQUIRED ARTIFACTS
8
-
9
- Before proceeding with this checklist, ensure you have access to:
10
-
11
- 1. architecture.md - The primary architecture document (check docs/architecture.md)
12
- 2. prd.md - Product Requirements Document for requirements alignment (check docs/prd.md)
13
- 3. frontend-architecture.md or fe-architecture.md - If this is a UI project (check docs/frontend-architecture.md)
14
- 4. Any system diagrams referenced in the architecture
15
- 5. API documentation if available
16
- 6. Technology stack details and version specifications
17
-
18
- IMPORTANT: If any required documents are missing or inaccessible, immediately ask the user for their location or content before proceeding.
19
-
20
- PROJECT TYPE DETECTION:
21
- First, determine the project type by checking:
22
-
23
- - Does the architecture include a frontend/UI component?
24
- - Is there a frontend-architecture.md document?
25
- - Does the PRD mention user interfaces or frontend requirements?
26
-
27
- If this is a backend-only or service-only project:
28
-
29
- - Skip sections marked with [[FRONTEND ONLY]]
30
- - Focus extra attention on API design, service architecture, and integration patterns
31
- - Note in your final report that frontend sections were skipped due to project type
32
-
33
- VALIDATION APPROACH:
34
- For each section, you must:
35
-
36
- 1. Deep Analysis - Don't just check boxes, thoroughly analyze each item against the provided documentation
37
- 2. Evidence-Based - Cite specific sections or quotes from the documents when validating
38
- 3. Critical Thinking - Question assumptions and identify gaps, not just confirm what's present
39
- 4. Risk Assessment - Consider what could go wrong with each architectural decision
40
-
41
- EXECUTION MODE:
42
- Ask the user if they want to work through the checklist:
43
-
44
- - Section by section (interactive mode) - Review each section, present findings, get confirmation before proceeding
45
- - All at once (comprehensive mode) - Complete full analysis and present comprehensive report at end]]
46
-
47
- ## 1. REQUIREMENTS ALIGNMENT
48
-
49
- [[LLM: Before evaluating this section, take a moment to fully understand the product's purpose and goals from the PRD. What is the core problem being solved? Who are the users? What are the critical success factors? Keep these in mind as you validate alignment. For each item, don't just check if it's mentioned - verify that the architecture provides a concrete technical solution.]]
50
-
51
- ### 1.1 Functional Requirements Coverage
52
-
53
- - [ ] Architecture supports all functional requirements in the PRD
54
- - [ ] Technical approaches for all epics and stories are addressed
55
- - [ ] Edge cases and performance scenarios are considered
56
- - [ ] All required integrations are accounted for
57
- - [ ] User journeys are supported by the technical architecture
58
-
59
- ### 1.2 Non-Functional Requirements Alignment
60
-
61
- - [ ] Performance requirements are addressed with specific solutions
62
- - [ ] Scalability considerations are documented with approach
63
- - [ ] Security requirements have corresponding technical controls
64
- - [ ] Reliability and resilience approaches are defined
65
- - [ ] Compliance requirements have technical implementations
66
-
67
- ### 1.3 Technical Constraints Adherence
68
-
69
- - [ ] All technical constraints from PRD are satisfied
70
- - [ ] Platform/language requirements are followed
71
- - [ ] Infrastructure constraints are accommodated
72
- - [ ] Third-party service constraints are addressed
73
- - [ ] Organizational technical standards are followed
74
-
75
- ## 2. ARCHITECTURE FUNDAMENTALS
76
-
77
- [[LLM: Architecture clarity is crucial for successful implementation. As you review this section, visualize the system as if you were explaining it to a new developer. Are there any ambiguities that could lead to misinterpretation? Would an AI agent be able to implement this architecture without confusion? Look for specific diagrams, component definitions, and clear interaction patterns.]]
78
-
79
- ### 2.1 Architecture Clarity
80
-
81
- - [ ] Architecture is documented with clear diagrams
82
- - [ ] Major components and their responsibilities are defined
83
- - [ ] Component interactions and dependencies are mapped
84
- - [ ] Data flows are clearly illustrated
85
- - [ ] Technology choices for each component are specified
86
-
87
- ### 2.2 Separation of Concerns
88
-
89
- - [ ] Clear boundaries between UI, business logic, and data layers
90
- - [ ] Responsibilities are cleanly divided between components
91
- - [ ] Interfaces between components are well-defined
92
- - [ ] Components adhere to single responsibility principle
93
- - [ ] Cross-cutting concerns (logging, auth, etc.) are properly addressed
94
-
95
- ### 2.3 Design Patterns & Best Practices
96
-
97
- - [ ] Appropriate design patterns are employed
98
- - [ ] Industry best practices are followed
99
- - [ ] Anti-patterns are avoided
100
- - [ ] Consistent architectural style throughout
101
- - [ ] Pattern usage is documented and explained
102
-
103
- ### 2.4 Modularity & Maintainability
104
-
105
- - [ ] System is divided into cohesive, loosely-coupled modules
106
- - [ ] Components can be developed and tested independently
107
- - [ ] Changes can be localized to specific components
108
- - [ ] Code organization promotes discoverability
109
- - [ ] Architecture specifically designed for AI agent implementation
110
-
111
- ## 3. TECHNICAL STACK & DECISIONS
112
-
113
- [[LLM: Technology choices have long-term implications. For each technology decision, consider: Is this the simplest solution that could work? Are we over-engineering? Will this scale? What are the maintenance implications? Are there security vulnerabilities in the chosen versions? Verify that specific versions are defined, not ranges.]]
114
-
115
- ### 3.1 Technology Selection
116
-
117
- - [ ] Selected technologies meet all requirements
118
- - [ ] Technology versions are specifically defined (not ranges)
119
- - [ ] Technology choices are justified with clear rationale
120
- - [ ] Alternatives considered are documented with pros/cons
121
- - [ ] Selected stack components work well together
122
-
123
- ### 3.2 Frontend Architecture [[FRONTEND ONLY]]
124
-
125
- [[LLM: Skip this entire section if this is a backend-only or service-only project. Only evaluate if the project includes a user interface.]]
126
-
127
- - [ ] UI framework and libraries are specifically selected
128
- - [ ] State management approach is defined
129
- - [ ] Component structure and organization is specified
130
- - [ ] Responsive/adaptive design approach is outlined
131
- - [ ] Build and bundling strategy is determined
132
-
133
- ### 3.3 Backend Architecture
134
-
135
- - [ ] API design and standards are defined
136
- - [ ] Service organization and boundaries are clear
137
- - [ ] Authentication and authorization approach is specified
138
- - [ ] Error handling strategy is outlined
139
- - [ ] Backend scaling approach is defined
140
-
141
- ### 3.4 Data Architecture
142
-
143
- - [ ] Data models are fully defined
144
- - [ ] Database technologies are selected with justification
145
- - [ ] Data access patterns are documented
146
- - [ ] Data migration/seeding approach is specified
147
- - [ ] Data backup and recovery strategies are outlined
148
-
149
- ## 4. FRONTEND DESIGN & IMPLEMENTATION [[FRONTEND ONLY]]
150
-
151
- [[LLM: This entire section should be skipped for backend-only projects. Only evaluate if the project includes a user interface. When evaluating, ensure alignment between the main architecture document and the frontend-specific architecture document.]]
152
-
153
- ### 4.1 Frontend Philosophy & Patterns
154
-
155
- - [ ] Framework & Core Libraries align with main architecture document
156
- - [ ] Component Architecture (e.g., Atomic Design) is clearly described
157
- - [ ] State Management Strategy is appropriate for application complexity
158
- - [ ] Data Flow patterns are consistent and clear
159
- - [ ] Styling Approach is defined and tooling specified
160
-
161
- ### 4.2 Frontend Structure & Organization
162
-
163
- - [ ] Directory structure is clearly documented with ASCII diagram
164
- - [ ] Component organization follows stated patterns
165
- - [ ] File naming conventions are explicit
166
- - [ ] Structure supports chosen framework's best practices
167
- - [ ] Clear guidance on where new components should be placed
168
-
169
- ### 4.3 Component Design
170
-
171
- - [ ] Component template/specification format is defined
172
- - [ ] Component props, state, and events are well-documented
173
- - [ ] Shared/foundational components are identified
174
- - [ ] Component reusability patterns are established
175
- - [ ] Accessibility requirements are built into component design
176
-
177
- ### 4.4 Frontend-Backend Integration
178
-
179
- - [ ] API interaction layer is clearly defined
180
- - [ ] HTTP client setup and configuration documented
181
- - [ ] Error handling for API calls is comprehensive
182
- - [ ] Service definitions follow consistent patterns
183
- - [ ] Authentication integration with backend is clear
184
-
185
- ### 4.5 Routing & Navigation
186
-
187
- - [ ] Routing strategy and library are specified
188
- - [ ] Route definitions table is comprehensive
189
- - [ ] Route protection mechanisms are defined
190
- - [ ] Deep linking considerations addressed
191
- - [ ] Navigation patterns are consistent
192
-
193
- ### 4.6 Frontend Performance
194
-
195
- - [ ] Image optimization strategies defined
196
- - [ ] Code splitting approach documented
197
- - [ ] Lazy loading patterns established
198
- - [ ] Re-render optimization techniques specified
199
- - [ ] Performance monitoring approach defined
200
-
201
- ## 5. RESILIENCE & OPERATIONAL READINESS
202
-
203
- [[LLM: Production systems fail in unexpected ways. As you review this section, think about Murphy's Law - what could go wrong? Consider real-world scenarios: What happens during peak load? How does the system behave when a critical service is down? Can the operations team diagnose issues at 3 AM? Look for specific resilience patterns, not just mentions of "error handling".]]
204
-
205
- ### 5.1 Error Handling & Resilience
206
-
207
- - [ ] Error handling strategy is comprehensive
208
- - [ ] Retry policies are defined where appropriate
209
- - [ ] Circuit breakers or fallbacks are specified for critical services
210
- - [ ] Graceful degradation approaches are defined
211
- - [ ] System can recover from partial failures
212
-
213
- ### 5.2 Monitoring & Observability
214
-
215
- - [ ] Logging strategy is defined
216
- - [ ] Monitoring approach is specified
217
- - [ ] Key metrics for system health are identified
218
- - [ ] Alerting thresholds and strategies are outlined
219
- - [ ] Debugging and troubleshooting capabilities are built in
220
-
221
- ### 5.3 Performance & Scaling
222
-
223
- - [ ] Performance bottlenecks are identified and addressed
224
- - [ ] Caching strategy is defined where appropriate
225
- - [ ] Load balancing approach is specified
226
- - [ ] Horizontal and vertical scaling strategies are outlined
227
- - [ ] Resource sizing recommendations are provided
228
-
229
- ### 5.4 Deployment & DevOps
230
-
231
- - [ ] Deployment strategy is defined
232
- - [ ] CI/CD pipeline approach is outlined
233
- - [ ] Environment strategy (dev, staging, prod) is specified
234
- - [ ] Infrastructure as Code approach is defined
235
- - [ ] Rollback and recovery procedures are outlined
236
-
237
- ## 6. SECURITY & COMPLIANCE
238
-
239
- [[LLM: Security is not optional. Review this section with a hacker's mindset - how could someone exploit this system? Also consider compliance: Are there industry-specific regulations that apply? GDPR? HIPAA? PCI? Ensure the architecture addresses these proactively. Look for specific security controls, not just general statements.]]
240
-
241
- ### 6.1 Authentication & Authorization
242
-
243
- - [ ] Authentication mechanism is clearly defined
244
- - [ ] Authorization model is specified
245
- - [ ] Role-based access control is outlined if required
246
- - [ ] Session management approach is defined
247
- - [ ] Credential management is addressed
248
-
249
- ### 6.2 Data Security
250
-
251
- - [ ] Data encryption approach (at rest and in transit) is specified
252
- - [ ] Sensitive data handling procedures are defined
253
- - [ ] Data retention and purging policies are outlined
254
- - [ ] Backup encryption is addressed if required
255
- - [ ] Data access audit trails are specified if required
256
-
257
- ### 6.3 API & Service Security
258
-
259
- - [ ] API security controls are defined
260
- - [ ] Rate limiting and throttling approaches are specified
261
- - [ ] Input validation strategy is outlined
262
- - [ ] CSRF/XSS prevention measures are addressed
263
- - [ ] Secure communication protocols are specified
264
-
265
- ### 6.4 Infrastructure Security
266
-
267
- - [ ] Network security design is outlined
268
- - [ ] Firewall and security group configurations are specified
269
- - [ ] Service isolation approach is defined
270
- - [ ] Least privilege principle is applied
271
- - [ ] Security monitoring strategy is outlined
272
-
273
- ## 7. IMPLEMENTATION GUIDANCE
274
-
275
- [[LLM: Clear implementation guidance prevents costly mistakes. As you review this section, imagine you're a developer starting on day one. Do they have everything they need to be productive? Are coding standards clear enough to maintain consistency across the team? Look for specific examples and patterns.]]
276
-
277
- ### 7.1 Coding Standards & Practices
278
-
279
- - [ ] Coding standards are defined
280
- - [ ] Documentation requirements are specified
281
- - [ ] Testing expectations are outlined
282
- - [ ] Code organization principles are defined
283
- - [ ] Naming conventions are specified
284
-
285
- ### 7.2 Testing Strategy
286
-
287
- - [ ] Unit testing approach is defined
288
- - [ ] Integration testing strategy is outlined
289
- - [ ] E2E testing approach is specified
290
- - [ ] Performance testing requirements are outlined
291
- - [ ] Security testing approach is defined
292
-
293
- ### 7.3 Frontend Testing [[FRONTEND ONLY]]
294
-
295
- [[LLM: Skip this subsection for backend-only projects.]]
296
-
297
- - [ ] Component testing scope and tools defined
298
- - [ ] UI integration testing approach specified
299
- - [ ] Visual regression testing considered
300
- - [ ] Accessibility testing tools identified
301
- - [ ] Frontend-specific test data management addressed
302
-
303
- ### 7.4 Development Environment
304
-
305
- - [ ] Local development environment setup is documented
306
- - [ ] Required tools and configurations are specified
307
- - [ ] Development workflows are outlined
308
- - [ ] Source control practices are defined
309
- - [ ] Dependency management approach is specified
310
-
311
- ### 7.5 Technical Documentation
312
-
313
- - [ ] API documentation standards are defined
314
- - [ ] Architecture documentation requirements are specified
315
- - [ ] Code documentation expectations are outlined
316
- - [ ] System diagrams and visualizations are included
317
- - [ ] Decision records for key choices are included
318
-
319
- ## 8. DEPENDENCY & INTEGRATION MANAGEMENT
320
-
321
- [[LLM: Dependencies are often the source of production issues. For each dependency, consider: What happens if it's unavailable? Is there a newer version with security patches? Are we locked into a vendor? What's our contingency plan? Verify specific versions and fallback strategies.]]
322
-
323
- ### 8.1 External Dependencies
324
-
325
- - [ ] All external dependencies are identified
326
- - [ ] Versioning strategy for dependencies is defined
327
- - [ ] Fallback approaches for critical dependencies are specified
328
- - [ ] Licensing implications are addressed
329
- - [ ] Update and patching strategy is outlined
330
-
331
- ### 8.2 Internal Dependencies
332
-
333
- - [ ] Component dependencies are clearly mapped
334
- - [ ] Build order dependencies are addressed
335
- - [ ] Shared services and utilities are identified
336
- - [ ] Circular dependencies are eliminated
337
- - [ ] Versioning strategy for internal components is defined
338
-
339
- ### 8.3 Third-Party Integrations
340
-
341
- - [ ] All third-party integrations are identified
342
- - [ ] Integration approaches are defined
343
- - [ ] Authentication with third parties is addressed
344
- - [ ] Error handling for integration failures is specified
345
- - [ ] Rate limits and quotas are considered
346
-
347
- ## 9. AI AGENT IMPLEMENTATION SUITABILITY
348
-
349
- [[LLM: This architecture may be implemented by AI agents. Review with extreme clarity in mind. Are patterns consistent? Is complexity minimized? Would an AI agent make incorrect assumptions? Remember: explicit is better than implicit. Look for clear file structures, naming conventions, and implementation patterns.]]
350
-
351
- ### 9.1 Modularity for AI Agents
352
-
353
- - [ ] Components are sized appropriately for AI agent implementation
354
- - [ ] Dependencies between components are minimized
355
- - [ ] Clear interfaces between components are defined
356
- - [ ] Components have singular, well-defined responsibilities
357
- - [ ] File and code organization optimized for AI agent understanding
358
-
359
- ### 9.2 Clarity & Predictability
360
-
361
- - [ ] Patterns are consistent and predictable
362
- - [ ] Complex logic is broken down into simpler steps
363
- - [ ] Architecture avoids overly clever or obscure approaches
364
- - [ ] Examples are provided for unfamiliar patterns
365
- - [ ] Component responsibilities are explicit and clear
366
-
367
- ### 9.3 Implementation Guidance
368
-
369
- - [ ] Detailed implementation guidance is provided
370
- - [ ] Code structure templates are defined
371
- - [ ] Specific implementation patterns are documented
372
- - [ ] Common pitfalls are identified with solutions
373
- - [ ] References to similar implementations are provided when helpful
374
-
375
- ### 9.4 Error Prevention & Handling
376
-
377
- - [ ] Design reduces opportunities for implementation errors
378
- - [ ] Validation and error checking approaches are defined
379
- - [ ] Self-healing mechanisms are incorporated where possible
380
- - [ ] Testing patterns are clearly defined
381
- - [ ] Debugging guidance is provided
382
-
383
- ## 10. ACCESSIBILITY IMPLEMENTATION [[FRONTEND ONLY]]
384
-
385
- [[LLM: Skip this section for backend-only projects. Accessibility is a core requirement for any user interface.]]
386
-
387
- ### 10.1 Accessibility Standards
388
-
389
- - [ ] Semantic HTML usage is emphasized
390
- - [ ] ARIA implementation guidelines provided
391
- - [ ] Keyboard navigation requirements defined
392
- - [ ] Focus management approach specified
393
- - [ ] Screen reader compatibility addressed
394
-
395
- ### 10.2 Accessibility Testing
396
-
397
- - [ ] Accessibility testing tools identified
398
- - [ ] Testing process integrated into workflow
399
- - [ ] Compliance targets (WCAG level) specified
400
- - [ ] Manual testing procedures defined
401
- - [ ] Automated testing approach outlined
402
-
403
- [[LLM: FINAL VALIDATION REPORT GENERATION
404
-
405
- Now that you've completed the checklist, generate a comprehensive validation report that includes:
406
-
407
- 1. Executive Summary
408
- - Overall architecture readiness (High/Medium/Low)
409
- - Critical risks identified
410
- - Key strengths of the architecture
411
- - Project type (Full-stack/Frontend/Backend) and sections evaluated
412
-
413
- 2. Section Analysis
414
- - Pass rate for each major section (percentage of items passed)
415
- - Most concerning failures or gaps
416
- - Sections requiring immediate attention
417
- - Note any sections skipped due to project type
418
-
419
- 3. Risk Assessment
420
- - Top 5 risks by severity
421
- - Mitigation recommendations for each
422
- - Timeline impact of addressing issues
423
-
424
- 4. Recommendations
425
- - Must-fix items before development
426
- - Should-fix items for better quality
427
- - Nice-to-have improvements
428
-
429
- 5. AI Implementation Readiness
430
- - Specific concerns for AI agent implementation
431
- - Areas needing additional clarification
432
- - Complexity hotspots to address
433
-
434
- 6. Frontend-Specific Assessment (if applicable)
435
- - Frontend architecture completeness
436
- - Alignment between main and frontend architecture docs
437
- - UI/UX specification coverage
438
- - Component design clarity
439
-
440
- After presenting the report, ask the user if they would like detailed analysis of any specific section, especially those with warnings or failures.]]
1
+ <!-- Powered by BMAD™ Core -->
2
+
3
+ # Architect Solution Validation Checklist
4
+
5
+ This checklist serves as a comprehensive framework for the Architect to validate the technical design and architecture before development execution. The Architect should systematically work through each item, ensuring the architecture is robust, scalable, secure, and aligned with the product requirements.
6
+
7
+ [[LLM: INITIALIZATION INSTRUCTIONS - REQUIRED ARTIFACTS
8
+
9
+ Before proceeding with this checklist, ensure you have access to:
10
+
11
+ 1. architecture.md - The primary architecture document (check docs/architecture.md)
12
+ 2. prd.md - Product Requirements Document for requirements alignment (check docs/prd.md)
13
+ 3. frontend-architecture.md or fe-architecture.md - If this is a UI project (check docs/frontend-architecture.md)
14
+ 4. Any system diagrams referenced in the architecture
15
+ 5. API documentation if available
16
+ 6. Technology stack details and version specifications
17
+
18
+ IMPORTANT: If any required documents are missing or inaccessible, immediately ask the user for their location or content before proceeding.
19
+
20
+ PROJECT TYPE DETECTION:
21
+ First, determine the project type by checking:
22
+
23
+ - Does the architecture include a frontend/UI component?
24
+ - Is there a frontend-architecture.md document?
25
+ - Does the PRD mention user interfaces or frontend requirements?
26
+
27
+ If this is a backend-only or service-only project:
28
+
29
+ - Skip sections marked with [[FRONTEND ONLY]]
30
+ - Focus extra attention on API design, service architecture, and integration patterns
31
+ - Note in your final report that frontend sections were skipped due to project type
32
+
33
+ VALIDATION APPROACH:
34
+ For each section, you must:
35
+
36
+ 1. Deep Analysis - Don't just check boxes, thoroughly analyze each item against the provided documentation
37
+ 2. Evidence-Based - Cite specific sections or quotes from the documents when validating
38
+ 3. Critical Thinking - Question assumptions and identify gaps, not just confirm what's present
39
+ 4. Risk Assessment - Consider what could go wrong with each architectural decision
40
+
41
+ EXECUTION MODE:
42
+ Ask the user if they want to work through the checklist:
43
+
44
+ - Section by section (interactive mode) - Review each section, present findings, get confirmation before proceeding
45
+ - All at once (comprehensive mode) - Complete full analysis and present comprehensive report at end]]
46
+
47
+ ## 1. REQUIREMENTS ALIGNMENT
48
+
49
+ [[LLM: Before evaluating this section, take a moment to fully understand the product's purpose and goals from the PRD. What is the core problem being solved? Who are the users? What are the critical success factors? Keep these in mind as you validate alignment. For each item, don't just check if it's mentioned - verify that the architecture provides a concrete technical solution.]]
50
+
51
+ ### 1.1 Functional Requirements Coverage
52
+
53
+ - [ ] Architecture supports all functional requirements in the PRD
54
+ - [ ] Technical approaches for all epics and stories are addressed
55
+ - [ ] Edge cases and performance scenarios are considered
56
+ - [ ] All required integrations are accounted for
57
+ - [ ] User journeys are supported by the technical architecture
58
+
59
+ ### 1.2 Non-Functional Requirements Alignment
60
+
61
+ - [ ] Performance requirements are addressed with specific solutions
62
+ - [ ] Scalability considerations are documented with approach
63
+ - [ ] Security requirements have corresponding technical controls
64
+ - [ ] Reliability and resilience approaches are defined
65
+ - [ ] Compliance requirements have technical implementations
66
+
67
+ ### 1.3 Technical Constraints Adherence
68
+
69
+ - [ ] All technical constraints from PRD are satisfied
70
+ - [ ] Platform/language requirements are followed
71
+ - [ ] Infrastructure constraints are accommodated
72
+ - [ ] Third-party service constraints are addressed
73
+ - [ ] Organizational technical standards are followed
74
+
75
+ ## 2. ARCHITECTURE FUNDAMENTALS
76
+
77
+ [[LLM: Architecture clarity is crucial for successful implementation. As you review this section, visualize the system as if you were explaining it to a new developer. Are there any ambiguities that could lead to misinterpretation? Would an AI agent be able to implement this architecture without confusion? Look for specific diagrams, component definitions, and clear interaction patterns.]]
78
+
79
+ ### 2.1 Architecture Clarity
80
+
81
+ - [ ] Architecture is documented with clear diagrams
82
+ - [ ] Major components and their responsibilities are defined
83
+ - [ ] Component interactions and dependencies are mapped
84
+ - [ ] Data flows are clearly illustrated
85
+ - [ ] Technology choices for each component are specified
86
+
87
+ ### 2.2 Separation of Concerns
88
+
89
+ - [ ] Clear boundaries between UI, business logic, and data layers
90
+ - [ ] Responsibilities are cleanly divided between components
91
+ - [ ] Interfaces between components are well-defined
92
+ - [ ] Components adhere to single responsibility principle
93
+ - [ ] Cross-cutting concerns (logging, auth, etc.) are properly addressed
94
+
95
+ ### 2.3 Design Patterns & Best Practices
96
+
97
+ - [ ] Appropriate design patterns are employed
98
+ - [ ] Industry best practices are followed
99
+ - [ ] Anti-patterns are avoided
100
+ - [ ] Consistent architectural style throughout
101
+ - [ ] Pattern usage is documented and explained
102
+
103
+ ### 2.4 Modularity & Maintainability
104
+
105
+ - [ ] System is divided into cohesive, loosely-coupled modules
106
+ - [ ] Components can be developed and tested independently
107
+ - [ ] Changes can be localized to specific components
108
+ - [ ] Code organization promotes discoverability
109
+ - [ ] Architecture specifically designed for AI agent implementation
110
+
111
+ ## 3. TECHNICAL STACK & DECISIONS
112
+
113
+ [[LLM: Technology choices have long-term implications. For each technology decision, consider: Is this the simplest solution that could work? Are we over-engineering? Will this scale? What are the maintenance implications? Are there security vulnerabilities in the chosen versions? Verify that specific versions are defined, not ranges.]]
114
+
115
+ ### 3.1 Technology Selection
116
+
117
+ - [ ] Selected technologies meet all requirements
118
+ - [ ] Technology versions are specifically defined (not ranges)
119
+ - [ ] Technology choices are justified with clear rationale
120
+ - [ ] Alternatives considered are documented with pros/cons
121
+ - [ ] Selected stack components work well together
122
+
123
+ ### 3.2 Frontend Architecture [[FRONTEND ONLY]]
124
+
125
+ [[LLM: Skip this entire section if this is a backend-only or service-only project. Only evaluate if the project includes a user interface.]]
126
+
127
+ - [ ] UI framework and libraries are specifically selected
128
+ - [ ] State management approach is defined
129
+ - [ ] Component structure and organization is specified
130
+ - [ ] Responsive/adaptive design approach is outlined
131
+ - [ ] Build and bundling strategy is determined
132
+
133
+ ### 3.3 Backend Architecture
134
+
135
+ - [ ] API design and standards are defined
136
+ - [ ] Service organization and boundaries are clear
137
+ - [ ] Authentication and authorization approach is specified
138
+ - [ ] Error handling strategy is outlined
139
+ - [ ] Backend scaling approach is defined
140
+
141
+ ### 3.4 Data Architecture
142
+
143
+ - [ ] Data models are fully defined
144
+ - [ ] Database technologies are selected with justification
145
+ - [ ] Data access patterns are documented
146
+ - [ ] Data migration/seeding approach is specified
147
+ - [ ] Data backup and recovery strategies are outlined
148
+
149
+ ## 4. FRONTEND DESIGN & IMPLEMENTATION [[FRONTEND ONLY]]
150
+
151
+ [[LLM: This entire section should be skipped for backend-only projects. Only evaluate if the project includes a user interface. When evaluating, ensure alignment between the main architecture document and the frontend-specific architecture document.]]
152
+
153
+ ### 4.1 Frontend Philosophy & Patterns
154
+
155
+ - [ ] Framework & Core Libraries align with main architecture document
156
+ - [ ] Component Architecture (e.g., Atomic Design) is clearly described
157
+ - [ ] State Management Strategy is appropriate for application complexity
158
+ - [ ] Data Flow patterns are consistent and clear
159
+ - [ ] Styling Approach is defined and tooling specified
160
+
161
+ ### 4.2 Frontend Structure & Organization
162
+
163
+ - [ ] Directory structure is clearly documented with ASCII diagram
164
+ - [ ] Component organization follows stated patterns
165
+ - [ ] File naming conventions are explicit
166
+ - [ ] Structure supports chosen framework's best practices
167
+ - [ ] Clear guidance on where new components should be placed
168
+
169
+ ### 4.3 Component Design
170
+
171
+ - [ ] Component template/specification format is defined
172
+ - [ ] Component props, state, and events are well-documented
173
+ - [ ] Shared/foundational components are identified
174
+ - [ ] Component reusability patterns are established
175
+ - [ ] Accessibility requirements are built into component design
176
+
177
+ ### 4.4 Frontend-Backend Integration
178
+
179
+ - [ ] API interaction layer is clearly defined
180
+ - [ ] HTTP client setup and configuration documented
181
+ - [ ] Error handling for API calls is comprehensive
182
+ - [ ] Service definitions follow consistent patterns
183
+ - [ ] Authentication integration with backend is clear
184
+
185
+ ### 4.5 Routing & Navigation
186
+
187
+ - [ ] Routing strategy and library are specified
188
+ - [ ] Route definitions table is comprehensive
189
+ - [ ] Route protection mechanisms are defined
190
+ - [ ] Deep linking considerations addressed
191
+ - [ ] Navigation patterns are consistent
192
+
193
+ ### 4.6 Frontend Performance
194
+
195
+ - [ ] Image optimization strategies defined
196
+ - [ ] Code splitting approach documented
197
+ - [ ] Lazy loading patterns established
198
+ - [ ] Re-render optimization techniques specified
199
+ - [ ] Performance monitoring approach defined
200
+
201
+ ## 5. RESILIENCE & OPERATIONAL READINESS
202
+
203
+ [[LLM: Production systems fail in unexpected ways. As you review this section, think about Murphy's Law - what could go wrong? Consider real-world scenarios: What happens during peak load? How does the system behave when a critical service is down? Can the operations team diagnose issues at 3 AM? Look for specific resilience patterns, not just mentions of "error handling".]]
204
+
205
+ ### 5.1 Error Handling & Resilience
206
+
207
+ - [ ] Error handling strategy is comprehensive
208
+ - [ ] Retry policies are defined where appropriate
209
+ - [ ] Circuit breakers or fallbacks are specified for critical services
210
+ - [ ] Graceful degradation approaches are defined
211
+ - [ ] System can recover from partial failures
212
+
213
+ ### 5.2 Monitoring & Observability
214
+
215
+ - [ ] Logging strategy is defined
216
+ - [ ] Monitoring approach is specified
217
+ - [ ] Key metrics for system health are identified
218
+ - [ ] Alerting thresholds and strategies are outlined
219
+ - [ ] Debugging and troubleshooting capabilities are built in
220
+
221
+ ### 5.3 Performance & Scaling
222
+
223
+ - [ ] Performance bottlenecks are identified and addressed
224
+ - [ ] Caching strategy is defined where appropriate
225
+ - [ ] Load balancing approach is specified
226
+ - [ ] Horizontal and vertical scaling strategies are outlined
227
+ - [ ] Resource sizing recommendations are provided
228
+
229
+ ### 5.4 Deployment & DevOps
230
+
231
+ - [ ] Deployment strategy is defined
232
+ - [ ] CI/CD pipeline approach is outlined
233
+ - [ ] Environment strategy (dev, staging, prod) is specified
234
+ - [ ] Infrastructure as Code approach is defined
235
+ - [ ] Rollback and recovery procedures are outlined
236
+
237
+ ## 6. SECURITY & COMPLIANCE
238
+
239
+ [[LLM: Security is not optional. Review this section with a hacker's mindset - how could someone exploit this system? Also consider compliance: Are there industry-specific regulations that apply? GDPR? HIPAA? PCI? Ensure the architecture addresses these proactively. Look for specific security controls, not just general statements.]]
240
+
241
+ ### 6.1 Authentication & Authorization
242
+
243
+ - [ ] Authentication mechanism is clearly defined
244
+ - [ ] Authorization model is specified
245
+ - [ ] Role-based access control is outlined if required
246
+ - [ ] Session management approach is defined
247
+ - [ ] Credential management is addressed
248
+
249
+ ### 6.2 Data Security
250
+
251
+ - [ ] Data encryption approach (at rest and in transit) is specified
252
+ - [ ] Sensitive data handling procedures are defined
253
+ - [ ] Data retention and purging policies are outlined
254
+ - [ ] Backup encryption is addressed if required
255
+ - [ ] Data access audit trails are specified if required
256
+
257
+ ### 6.3 API & Service Security
258
+
259
+ - [ ] API security controls are defined
260
+ - [ ] Rate limiting and throttling approaches are specified
261
+ - [ ] Input validation strategy is outlined
262
+ - [ ] CSRF/XSS prevention measures are addressed
263
+ - [ ] Secure communication protocols are specified
264
+
265
+ ### 6.4 Infrastructure Security
266
+
267
+ - [ ] Network security design is outlined
268
+ - [ ] Firewall and security group configurations are specified
269
+ - [ ] Service isolation approach is defined
270
+ - [ ] Least privilege principle is applied
271
+ - [ ] Security monitoring strategy is outlined
272
+
273
+ ## 7. IMPLEMENTATION GUIDANCE
274
+
275
+ [[LLM: Clear implementation guidance prevents costly mistakes. As you review this section, imagine you're a developer starting on day one. Do they have everything they need to be productive? Are coding standards clear enough to maintain consistency across the team? Look for specific examples and patterns.]]
276
+
277
+ ### 7.1 Coding Standards & Practices
278
+
279
+ - [ ] Coding standards are defined
280
+ - [ ] Documentation requirements are specified
281
+ - [ ] Testing expectations are outlined
282
+ - [ ] Code organization principles are defined
283
+ - [ ] Naming conventions are specified
284
+
285
+ ### 7.2 Testing Strategy
286
+
287
+ - [ ] Unit testing approach is defined
288
+ - [ ] Integration testing strategy is outlined
289
+ - [ ] E2E testing approach is specified
290
+ - [ ] Performance testing requirements are outlined
291
+ - [ ] Security testing approach is defined
292
+
293
+ ### 7.3 Frontend Testing [[FRONTEND ONLY]]
294
+
295
+ [[LLM: Skip this subsection for backend-only projects.]]
296
+
297
+ - [ ] Component testing scope and tools defined
298
+ - [ ] UI integration testing approach specified
299
+ - [ ] Visual regression testing considered
300
+ - [ ] Accessibility testing tools identified
301
+ - [ ] Frontend-specific test data management addressed
302
+
303
+ ### 7.4 Development Environment
304
+
305
+ - [ ] Local development environment setup is documented
306
+ - [ ] Required tools and configurations are specified
307
+ - [ ] Development workflows are outlined
308
+ - [ ] Source control practices are defined
309
+ - [ ] Dependency management approach is specified
310
+
311
+ ### 7.5 Technical Documentation
312
+
313
+ - [ ] API documentation standards are defined
314
+ - [ ] Architecture documentation requirements are specified
315
+ - [ ] Code documentation expectations are outlined
316
+ - [ ] System diagrams and visualizations are included
317
+ - [ ] Decision records for key choices are included
318
+
319
+ ## 8. DEPENDENCY & INTEGRATION MANAGEMENT
320
+
321
+ [[LLM: Dependencies are often the source of production issues. For each dependency, consider: What happens if it's unavailable? Is there a newer version with security patches? Are we locked into a vendor? What's our contingency plan? Verify specific versions and fallback strategies.]]
322
+
323
+ ### 8.1 External Dependencies
324
+
325
+ - [ ] All external dependencies are identified
326
+ - [ ] Versioning strategy for dependencies is defined
327
+ - [ ] Fallback approaches for critical dependencies are specified
328
+ - [ ] Licensing implications are addressed
329
+ - [ ] Update and patching strategy is outlined
330
+
331
+ ### 8.2 Internal Dependencies
332
+
333
+ - [ ] Component dependencies are clearly mapped
334
+ - [ ] Build order dependencies are addressed
335
+ - [ ] Shared services and utilities are identified
336
+ - [ ] Circular dependencies are eliminated
337
+ - [ ] Versioning strategy for internal components is defined
338
+
339
+ ### 8.3 Third-Party Integrations
340
+
341
+ - [ ] All third-party integrations are identified
342
+ - [ ] Integration approaches are defined
343
+ - [ ] Authentication with third parties is addressed
344
+ - [ ] Error handling for integration failures is specified
345
+ - [ ] Rate limits and quotas are considered
346
+
347
+ ## 9. AI AGENT IMPLEMENTATION SUITABILITY
348
+
349
+ [[LLM: This architecture may be implemented by AI agents. Review with extreme clarity in mind. Are patterns consistent? Is complexity minimized? Would an AI agent make incorrect assumptions? Remember: explicit is better than implicit. Look for clear file structures, naming conventions, and implementation patterns.]]
350
+
351
+ ### 9.1 Modularity for AI Agents
352
+
353
+ - [ ] Components are sized appropriately for AI agent implementation
354
+ - [ ] Dependencies between components are minimized
355
+ - [ ] Clear interfaces between components are defined
356
+ - [ ] Components have singular, well-defined responsibilities
357
+ - [ ] File and code organization optimized for AI agent understanding
358
+
359
+ ### 9.2 Clarity & Predictability
360
+
361
+ - [ ] Patterns are consistent and predictable
362
+ - [ ] Complex logic is broken down into simpler steps
363
+ - [ ] Architecture avoids overly clever or obscure approaches
364
+ - [ ] Examples are provided for unfamiliar patterns
365
+ - [ ] Component responsibilities are explicit and clear
366
+
367
+ ### 9.3 Implementation Guidance
368
+
369
+ - [ ] Detailed implementation guidance is provided
370
+ - [ ] Code structure templates are defined
371
+ - [ ] Specific implementation patterns are documented
372
+ - [ ] Common pitfalls are identified with solutions
373
+ - [ ] References to similar implementations are provided when helpful
374
+
375
+ ### 9.4 Error Prevention & Handling
376
+
377
+ - [ ] Design reduces opportunities for implementation errors
378
+ - [ ] Validation and error checking approaches are defined
379
+ - [ ] Self-healing mechanisms are incorporated where possible
380
+ - [ ] Testing patterns are clearly defined
381
+ - [ ] Debugging guidance is provided
382
+
383
+ ## 10. ACCESSIBILITY IMPLEMENTATION [[FRONTEND ONLY]]
384
+
385
+ [[LLM: Skip this section for backend-only projects. Accessibility is a core requirement for any user interface.]]
386
+
387
+ ### 10.1 Accessibility Standards
388
+
389
+ - [ ] Semantic HTML usage is emphasized
390
+ - [ ] ARIA implementation guidelines provided
391
+ - [ ] Keyboard navigation requirements defined
392
+ - [ ] Focus management approach specified
393
+ - [ ] Screen reader compatibility addressed
394
+
395
+ ### 10.2 Accessibility Testing
396
+
397
+ - [ ] Accessibility testing tools identified
398
+ - [ ] Testing process integrated into workflow
399
+ - [ ] Compliance targets (WCAG level) specified
400
+ - [ ] Manual testing procedures defined
401
+ - [ ] Automated testing approach outlined
402
+
403
+ [[LLM: FINAL VALIDATION REPORT GENERATION
404
+
405
+ Now that you've completed the checklist, generate a comprehensive validation report that includes:
406
+
407
+ 1. Executive Summary
408
+ - Overall architecture readiness (High/Medium/Low)
409
+ - Critical risks identified
410
+ - Key strengths of the architecture
411
+ - Project type (Full-stack/Frontend/Backend) and sections evaluated
412
+
413
+ 2. Section Analysis
414
+ - Pass rate for each major section (percentage of items passed)
415
+ - Most concerning failures or gaps
416
+ - Sections requiring immediate attention
417
+ - Note any sections skipped due to project type
418
+
419
+ 3. Risk Assessment
420
+ - Top 5 risks by severity
421
+ - Mitigation recommendations for each
422
+ - Timeline impact of addressing issues
423
+
424
+ 4. Recommendations
425
+ - Must-fix items before development
426
+ - Should-fix items for better quality
427
+ - Nice-to-have improvements
428
+
429
+ 5. AI Implementation Readiness
430
+ - Specific concerns for AI agent implementation
431
+ - Areas needing additional clarification
432
+ - Complexity hotspots to address
433
+
434
+ 6. Frontend-Specific Assessment (if applicable)
435
+ - Frontend architecture completeness
436
+ - Alignment between main and frontend architecture docs
437
+ - UI/UX specification coverage
438
+ - Component design clarity
439
+
440
+ After presenting the report, ask the user if they would like detailed analysis of any specific section, especially those with warnings or failures.]]