bc-code-intelligence-mcp
Version:
BC Code Intelligence MCP Server - Complete Specialist Bundle with AI-driven expert consultation, seamless handoffs, and context-preserving workflows
44 lines (36 loc) ⢠2.08 kB
Markdown
# Analysis Phase - Quick Reference
## š NEED MORE DETAIL?
For implementation examples and detailed guidance: `load_methodology analysis-full`
## šÆ OBJECTIVE
Systematic pattern discovery across entire codebase with complete coverage validation.
## ā” CORE PROCESS
1. **Workspace Assessment**: Count files, estimate scope, get user approval for large codebases (100+ files)
2. **File Inventory**: Create complete checklist of all files to analyze
3. **Pattern Discovery**: For each procedure: `find_bc_topics domain="all"` ā `analyze_code_patterns`
4. **Coverage Tracking**: Mark each file `[ ] filename.al - ANALYZED` only after documentation complete
5. **Dependency Discovery**: After any changes, ask "Does this depend on other files?" - address immediately (Step F)
## šØ INVENTORY PRESERVATION RULE - CRITICAL
**NEVER OVERWRITE FILE INVENTORY SECTIONS** - Only update checkbox status:
- ā **FORBIDDEN**: Rewriting/removing file inventory lists
- ā **FORBIDDEN**: "Cleaning up" or reorganizing inventory sections
- ā **FORBIDDEN**: Removing "pending" files from lists
- ā
**ALLOWED**: Change `[ ]` to `[x]` for completed files only
- ā
**ALLOWED**: Add new analysis content BELOW inventory sections
## šØ BLOCKING CONDITIONS
- **Cannot skip any files** in scope
- **Cannot claim module complete** until ALL files marked analyzed
- **Must document which patterns checked** (not just what found)
- **Must validate completeness** before proceeding to performance phase
## š SUCCESS CRITERIA
ā
Complete file inventory created and validated
ā
Every file has documented analysis with pattern coverage
ā
All anti-patterns identified with specific locations
ā
Related objects examined and documented
ā
Zero files skipped or missed in analysis scope
## š KEY OUTPUTS
- File-by-file analysis documentation
- Anti-pattern inventory with locations
- Optimization opportunity prioritization
- Infrastructure gaps identified (missing SIFT keys, etc.)
## ā”ļø NEXT PHASE
Performance optimization with execution validation checkpoints