UNPKG

bc-code-intelligence-mcp

Version:

BC Code Intelligence MCP Server - Complete Specialist Bundle with AI-driven expert consultation, seamless handoffs, and context-preserving workflows

44 lines (36 loc) • 2.08 kB
# Analysis Phase - Quick Reference ## šŸ“š NEED MORE DETAIL? For implementation examples and detailed guidance: `load_methodology analysis-full` ## šŸŽÆ OBJECTIVE Systematic pattern discovery across entire codebase with complete coverage validation. ## ⚔ CORE PROCESS 1. **Workspace Assessment**: Count files, estimate scope, get user approval for large codebases (100+ files) 2. **File Inventory**: Create complete checklist of all files to analyze 3. **Pattern Discovery**: For each procedure: `find_bc_topics domain="all"` → `analyze_code_patterns` 4. **Coverage Tracking**: Mark each file `[ ] filename.al - ANALYZED` only after documentation complete 5. **Dependency Discovery**: After any changes, ask "Does this depend on other files?" - address immediately (Step F) ## 🚨 INVENTORY PRESERVATION RULE - CRITICAL **NEVER OVERWRITE FILE INVENTORY SECTIONS** - Only update checkbox status: - āŒ **FORBIDDEN**: Rewriting/removing file inventory lists - āŒ **FORBIDDEN**: "Cleaning up" or reorganizing inventory sections - āŒ **FORBIDDEN**: Removing "pending" files from lists - āœ… **ALLOWED**: Change `[ ]` to `[x]` for completed files only - āœ… **ALLOWED**: Add new analysis content BELOW inventory sections ## 🚨 BLOCKING CONDITIONS - **Cannot skip any files** in scope - **Cannot claim module complete** until ALL files marked analyzed - **Must document which patterns checked** (not just what found) - **Must validate completeness** before proceeding to performance phase ## šŸ” SUCCESS CRITERIA āœ… Complete file inventory created and validated āœ… Every file has documented analysis with pattern coverage āœ… All anti-patterns identified with specific locations āœ… Related objects examined and documented āœ… Zero files skipped or missed in analysis scope ## šŸ“‹ KEY OUTPUTS - File-by-file analysis documentation - Anti-pattern inventory with locations - Optimization opportunity prioritization - Infrastructure gaps identified (missing SIFT keys, etc.) ## āž”ļø NEXT PHASE Performance optimization with execution validation checkpoints