home / skills / rysweet / amplihack / investigation-workflow

investigation-workflow skill

/src/amplihack/amplifier-bundle/skills/investigation-workflow

npx playbooks add skill rysweet/amplihack --skill investigation-workflow

Review the files below or copy the command above to add this skill to your agents.

Files (1)
SKILL.md
15.4 KB
---
name: investigation-workflow
version: 1.0.0
description: |
  6-phase investigation workflow for understanding existing systems. Auto-activates for research tasks.
  Optimized for exploration and understanding, not implementation. Includes parallel agent deployment
  for efficient deep dives and automatic knowledge capture to prevent repeat investigations.
auto_activates:
  - "investigate how"
  - "explain the architecture"
  - "understand the system"
  - "how does"
  - "why does"
  - "analyze"
  - "research"
  - "explore"
explicit_triggers:
  - /amplihack:investigation-workflow
  - /investigate
confirmation_required: true
skip_confirmation_if_explicit: true
token_budget: 4000
---

# Investigation Workflow Skill

## Purpose

This skill provides a systematic 6-phase workflow for investigating and understanding existing systems, codebases, and architectures. Unlike development workflows optimized for implementation, this workflow is optimized for exploration, understanding, and knowledge capture.

## When to Use This Skill

**Investigation Tasks** (use this workflow):

- "Investigate how the authentication system works"
- "Explain the neo4j memory integration"
- "Understand why CI is failing consistently"
- "Analyze the reflection system architecture"
- "Research what hooks are triggered during session start"

**Development Tasks** (use DEFAULT_WORKFLOW.md instead):

- "Implement OAuth support"
- "Build a new API endpoint"
- "Add feature X"
- "Fix bug Y"

## Core Philosophy

**Exploration First**: Define scope and strategy before diving into code
**Parallel Deep Dives**: Deploy multiple agents simultaneously for efficient information gathering
**Verification Required**: Test understanding through practical application
**Knowledge Capture**: Document findings to prevent repeat investigations

## The 6-Phase Investigation Workflow

### Phase 1: Scope Definition

**Purpose**: Define investigation boundaries and success criteria before any exploration.

**Tasks**:

- **FIRST**: Identify explicit user requirements - What specific questions must be answered?
- **Use** prompt-writer agent to clarify investigation scope
- **Use** ambiguity agent if questions are unclear
- Define what counts as "understanding achieved"
- List specific questions that must be answered
- Set boundaries: What's in scope vs. out of scope
- Estimate investigation depth needed (surface-level vs. deep dive)

**Success Criteria**:

- Clear list of questions to answer
- Defined scope boundaries
- Measurable success criteria (e.g., "can explain system flow", "can diagram architecture")

**Deliverables**:

- Investigation scope document with:
  - Core questions to answer
  - Success criteria
  - Scope boundaries (what's included/excluded)
  - Estimated depth and timeline

### Phase 2: Exploration Strategy

**Purpose**: Plan which agents to deploy and what to investigate, preventing inefficient random exploration.

**Tasks**:

- **Use** architect agent to design exploration strategy
- **Use** patterns agent to check for similar past investigations
- Identify key areas to explore (code paths, configurations, documentation)
- Select specialized agents for parallel deployment in Phase 3
- Create investigation roadmap with priorities
- Identify potential dead ends to avoid
- Plan verification approach (how to test understanding)

**Agent Selection Guidelines**:

- **For code understanding**: analyzer, patterns agents
- **For system architecture**: architect, api-designer agents
- **For performance issues**: optimizer, analyzer agents
- **For security concerns**: security, patterns agents
- **For integration flows**: integration, database agents

**Success Criteria**:

- Clear exploration roadmap
- List of agents to deploy in Phase 3
- Prioritized investigation areas

**Deliverables**:

- Exploration strategy document with:
  - Investigation roadmap
  - Agent deployment plan for Phase 3
  - Priority order for exploration
  - Expected outputs from each exploration

### Phase 3: Parallel Deep Dives

**Purpose**: Deploy multiple exploration agents simultaneously to gather information efficiently.

**CRITICAL**: This phase uses PARALLEL EXECUTION by default.

**Tasks**:

- **Deploy selected agents in PARALLEL** based on Phase 2 strategy
- **Common parallel patterns**:
  - `[analyzer(module1), analyzer(module2), analyzer(module3)]` - Multiple code areas
  - `[analyzer, patterns, security]` - Multiple perspectives on same area
  - `[architect, database, integration]` - System architecture exploration
- Each agent explores their assigned area independently
- Collect findings from all parallel explorations
- Identify connections and dependencies between findings
- Note any unexpected discoveries or anomalies

**Parallel Agent Examples**:

```
Investigation: "How does the reflection system work?"
→ [analyzer(~/.amplihack/.claude/tools/amplihack/hooks/), patterns(reflection), integration(logging)]

Investigation: "Why is CI failing?"
→ [analyzer(ci-config), patterns(ci-failures), integration(github-actions)]

Investigation: "Understand authentication flow"
→ [analyzer(auth-module), security(auth), patterns(auth), integration(external-auth)]
```

**Success Criteria**:

- All planned agents deployed and completed
- Findings from each exploration collected
- Connections between findings identified

**Deliverables**:

- Findings report with:
  - Summary from each parallel exploration
  - Code paths and flow diagrams
  - Architectural insights
  - Unexpected discoveries
  - Open questions for verification

### Phase 4: Verification & Testing

**Purpose**: Test and validate understanding through practical application.

**Tasks**:

- Create hypotheses based on Phase 3 findings
- **Design practical tests** to verify understanding:
  - Trace specific code paths manually
  - Examine logs and outputs
  - Test edge cases and assumptions
  - Verify configuration effects
- Run verification tests
- **Document what was tested and results**
- Identify gaps in understanding
- Refine hypotheses based on test results
- Repeat verification for any unclear areas

**Verification Examples**:

```
Understanding: "Authentication uses JWT tokens"
Verification: Trace actual token creation and validation in code

Understanding: "CI fails because of dependency conflict"
Verification: Check CI logs, reproduce locally, verify fix works

Understanding: "Reflection analyzes all user messages"
Verification: Examine reflection logs, trace message processing
```

**Success Criteria**:

- All hypotheses tested
- Understanding verified through practical tests
- Gaps in understanding identified and filled

**Deliverables**:

- Verification report with:
  - Tests performed
  - Results and observations
  - Confirmed understanding
  - Remaining gaps or uncertainties

### Phase 5: Synthesis

**Purpose**: Compile findings into coherent explanation that answers original questions.

**Tasks**:

- **Use** reviewer agent to check completeness of findings
- **Use** patterns agent to identify reusable patterns discovered
- Synthesize findings from Phases 3-4 into coherent explanation
- Create visual artifacts (diagrams, flow charts) if helpful
- Answer each question from Phase 1 scope definition
- Identify what worked well vs. what was unexpected
- Note any assumptions or uncertainties remaining
- Prepare clear explanation suitable for user

**Synthesis Outputs**:

1. **Executive Summary**: 2-3 sentence answer to main question
2. **Detailed Explanation**: Complete explanation with supporting evidence
3. **Visual Aids**: Diagrams showing system flow, architecture, etc.
4. **Key Insights**: Non-obvious discoveries or patterns
5. **Remaining Unknowns**: What's still unclear or uncertain

**Success Criteria**:

- All Phase 1 questions answered
- Explanation is clear and complete
- Findings supported by evidence from verification
- Visual aids clarify complex areas

**Deliverables**:

- Investigation report with all 5 synthesis outputs
- Ready for knowledge capture in Phase 6

### Phase 6: Knowledge Capture

**Purpose**: Create durable documentation so this investigation never needs to be repeated.

**Tasks**:

- **Store discoveries in memory** using `store_discovery()` from `amplihack.memory.discoveries`
- **Update .claude/context/PATTERNS.md** if reusable patterns found
- Create or update relevant documentation files
- Add inline code comments for critical understanding
- **Optional**: Create GitHub issue for follow-up improvements
- **Optional**: Update architecture diagrams if needed
- Ensure future investigators can find this knowledge easily

**Documentation Guidelines**:

```markdown
## Discovery: [Brief Title]

**Context**: What was investigated and why
**Key Findings**:

- Main insight 1
- Main insight 2
  - **Supporting Evidence**: Links to code, logs, or verification tests
  - **Implications**: How this affects the project
  - **Related Patterns**: Links to similar patterns in PATTERNS.md
```

**Success Criteria**:

- Discoveries stored in memory for future reference
- Relevant documentation files updated
- Knowledge is discoverable by future investigators
- No information loss

**Deliverables**:

- Discoveries stored in memory
- Updated PATTERNS.md (if applicable)
- Updated project documentation
- Optional: GitHub issues for improvements
- Investigation session log in `~/.amplihack/.claude/runtime/logs/`

## Transitioning to Development Workflow

**After investigation completes**, if the task requires implementation (not just understanding), transition to **DEFAULT_WORKFLOW.md**:

1. **Resume at Step 4** (Research and Design) with the knowledge gained from investigation
2. **Or resume at Step 5** (Implement the Solution) if the investigation already provided clear design guidance
3. **Use investigation findings** from memory (via `get_recent_discoveries()`) and session logs to inform design decisions

**Example Hybrid Workflow**:

```
User: "/ultrathink investigate how authentication works, then add OAuth support"

Phase 1: Investigation
→ Run INVESTIGATION_WORKFLOW.md (6 phases)
→ Complete understanding of existing auth system
→ Store findings in memory via discoveries adapter

Phase 2: Development
→ Transition to DEFAULT_WORKFLOW.md
→ Resume at Step 4 (Research and Design)
→ Use investigation insights to design OAuth integration
→ Continue through Step 15 (implementation → testing → PR)
```

**When to Transition**:

- Investigation reveals implementation is needed
- User explicitly requested both investigation + development
- Follow-up work identified during knowledge capture

## Efficiency Targets

**Target Efficiency**: This workflow targets a 30-40% reduction in message count compared to ad-hoc investigation.

| Ad-Hoc Approach         | Investigation Workflow    |
| ----------------------- | ------------------------- |
| 70-90 messages          | 40-60 messages            |
| Frequent backtracking   | Planned exploration       |
| Redundant investigation | Parallel deep dives       |
| Unclear scope           | Explicit scope definition |
| Lost knowledge          | Documented insights       |

**Efficiency Gains Come From**:

1. **Scope Definition** prevents scope creep and wandering
2. **Exploration Strategy** prevents random unproductive exploration
3. **Parallel Deep Dives** maximize information gathering speed
4. **Verification Phase** catches misunderstandings early
5. **Synthesis** ensures all questions answered
6. **Knowledge Capture** prevents repeat investigations

## Comparison to DEFAULT_WORKFLOW.md

### Similarities (Structural Consistency)

Both workflows share core principles:

- Explicit phases with clear deliverables
- Agent-driven execution at each phase
- Quality gates preventing premature progression
- Knowledge capture and documentation
- TodoWrite tracking for progress management

### Differences (Investigation vs. Development)

| Aspect             | Investigation Workflow     | DEFAULT_WORKFLOW.md      |
| ------------------ | -------------------------- | ------------------------ |
| **Goal**           | Understanding              | Implementation           |
| **Phases**         | 6 phases                   | Multi-step workflow      |
| **Execution**      | Exploration-first          | Implementation-first     |
| **Parallel Focus** | Phase 3 (Deep Dives)       | Various steps            |
| **Testing**        | Understanding verification | Code validation          |
| **Deliverable**    | Documentation              | Working code             |
| **Git Usage**      | Optional                   | Required (branches, PRs) |

### Phase Mapping (For User Familiarity)

| Investigation Phase           | DEFAULT_WORKFLOW Equivalent        | Purpose                              |
| ----------------------------- | ---------------------------------- | ------------------------------------ |
| Phase 1: Scope Definition     | Step 1: Requirements Clarification | Define what success looks like       |
| Phase 2: Exploration Strategy | Step 4: Research and Design        | Plan the approach                    |
| Phase 3: Parallel Deep Dives  | Step 5: Implementation             | Execute the plan (explore vs. build) |
| Phase 4: Verification         | Steps 7-8: Testing                 | Validate results                     |
| Phase 5: Synthesis            | Step 11: Review                    | Ensure quality and completeness      |
| Phase 6: Knowledge Capture    | Step 15: Cleanup                   | Make results durable                 |

## Integration with UltraThink

**UltraThink Workflow Detection**: When `/ultrathink` is invoked, it automatically detects investigation tasks using keywords and suggests this workflow.

**Automatic Workflow Suggestion**:

```
User: "/ultrathink investigate how authentication works"

UltraThink: Detected investigation task. Using INVESTIGATION_WORKFLOW.md
→ Reading workflow from .claude/workflow/INVESTIGATION_WORKFLOW.md
→ Following 6-phase investigation workflow
→ Starting Phase 1: Scope Definition
```

## Customization

To customize this workflow:

1. Edit `~/.amplihack/.claude/workflow/INVESTIGATION_WORKFLOW.md` to modify, add, or remove phases
2. Adjust agent deployment strategies for your needs
3. Add project-specific investigation patterns
4. Update efficiency targets based on your metrics

Changes take effect immediately for future investigations.

## Success Metrics

Track these metrics to validate workflow effectiveness:

- **Message Count**: Target 30-40% reduction vs. ad-hoc (to be validated)
- **Investigation Time**: Track time to completion
- **Knowledge Reuse**: How often memory retrieval prevents repeat work
- **Completeness**: Percentage of investigations with full documentation
- **User Satisfaction**: Clear understanding achieved

## Key Principles

- **Scope first, explore second** - Define boundaries before diving in
- **Parallel exploration is key** - Deploy multiple agents simultaneously in Phase 3
- **Verify understanding** - Test your hypotheses in Phase 4
- **Capture knowledge** - Always store discoveries in memory in Phase 6
- **This workflow optimizes for understanding, not implementation**

When in doubt about investigation vs. development:

- **Investigation**: "I need to understand X"
- **Development**: "I need to build/fix/implement X"

## Related Resources

- **Source Workflow**: `~/.amplihack/.claude/workflow/INVESTIGATION_WORKFLOW.md` (complete 436-line specification)
- **Knowledge Extraction**: Use knowledge-extractor skill after investigations to capture learnings
- **Agent Catalog**: `~/.amplihack/.claude/agents/CATALOG.md` for all available agents
- **Pattern Library**: `~/.amplihack/.claude/context/PATTERNS.md` for reusable investigation patterns