Files
gh-laird-agents-plugins-mod…/commands/modernize.md
2025-11-30 08:36:51 +08:00

26 KiB
Raw Blame History

Modernize Command

Description: Orchestrate a team of specialist agents to upgrade a project to be modern, secure, well-tested, and performant


Project Modernization & Security Protocol

Version: 2.0 Purpose: Coordinate multiple specialist agents to systematically upgrade any software project Team: Migration Coordinator, Security Agent, Architect Agent, Coder Agent, Tester Agent, Documentation Agent Inputs: Optional ASSESSMENT.md and PLAN.md from /modernize-assess and /modernize-plan


Prerequisites Check

Before starting, this command checks for:

# Check for assessment
if [ -f "ASSESSMENT.md" ]; then
    echo "✅ Found ASSESSMENT.md - will use assessment findings"
    USE_ASSESSMENT=true
else
    echo "⚠️  No ASSESSMENT.md - recommend running /modernize-assess first"
    echo "   Continue with basic assessment? (y/n)"
    USE_ASSESSMENT=false
fi

# Check for plan
if [ -f "PLAN.md" ]; then
    echo "✅ Found PLAN.md - will follow existing plan"
    USE_PLAN=true
else
    echo "⚠️  No PLAN.md - will create plan on-the-fly"
    echo "   Recommend running /modernize-plan first for better accuracy"
    USE_PLAN=false
fi

Recommendation Workflow:

  1. Best: Run /modernize-assess/modernize-plan/modernize-project
  2. Good: Run /modernize-plan/modernize-project
  3. Acceptable: Run /modernize-project (will create minimal assessment/plan inline)

Overview

This protocol orchestrates a multi-agent team to modernize and secure your project through a systematic, phased approach. The team works in coordination to ensure:

  • Modern frameworks and dependencies
  • Security vulnerabilities eliminated
  • Comprehensive test coverage (≥95%)
  • Performance optimization
  • Complete documentation
  • Production-ready quality

Core Principle: Systematic, agent-coordinated modernization with quality gates at every stage.


Agent Team Roles

1. Migration Coordinator (Orchestrator)

  • Role: Strategic oversight and coordination
  • Responsibilities: Plan phases, coordinate agents, enforce quality gates, track progress
  • When active: Throughout entire project

2. Security Agent (Blocker)

  • Role: Vulnerability assessment and remediation
  • Responsibilities: Scan CVEs, calculate security score, prioritize fixes
  • When active: Phase 1 (blocks all progress until CRITICAL/HIGH resolved)

3. Architect Agent (Decision Maker)

  • Role: Technology research and architectural decisions
  • Responsibilities: Research alternatives, create ADRs, recommend patterns
  • When active: Phases 1-2 (planning and design)

4. Coder Agent (Implementation)

  • Role: Code migration and modernization
  • Responsibilities: Update frameworks, replace obsolete APIs, fix builds
  • When active: Phases 3-4 (can run multiple in parallel)

5. Tester Agent (Quality Gate)

  • Role: Comprehensive testing and validation
  • Responsibilities: Run all test phases, fix-and-retest cycles, enforce 100% pass rate
  • When active: After every code change (blocks progression)

6. Documentation Agent (Knowledge Management)

  • Role: Documentation creation and maintenance
  • Responsibilities: HISTORY.md, ADRs, migration guides, changelogs
  • When active: Continuous throughout, final comprehensive docs at end

Modernization Phases

Phase 0: Discovery & Assessment (1-2 days)

Active Agents: Migration Coordinator, Security Agent, Architect Agent

Input Handling:

IF ASSESSMENT.md EXISTS:
    ✅ Skip detailed assessment
    ✅ Use existing scores, risks, estimates
    ✅ Focus on validation and updates
    Duration: 0.5-1 day (validation only)
ELSE:
    ⚠️  Run full assessment (as described below)
    Duration: 1-2 days

Activities:

⚠️ CRITICAL: Test Environment Setup MUST Be First Task

  1. Test Environment Setup (MANDATORY FIRST - NEW per Recommendation 1)

    • Why First: Cannot validate anything without working build/test environment
    • Install required SDKs (.NET, Node.js, Python, etc.)
    • Install Docker for integration testing
    • Configure environment variables
    • Verify build succeeds: dotnet build (establish baseline)
    • Verify tests run: dotnet test (establish pass rate baseline)
    • Run vulnerability scan: dotnet list package --vulnerable --include-transitive
    • Document baseline metrics: test count, pass rate, build warnings, CVE count
    • Deliverable: Working environment with verified baseline metrics
    • Duration: 1-2 hours (BLOCKING - nothing else can proceed without this)
  2. Security Baseline (BLOCKING - Now uses verified scan from Task 1)

    • Use vulnerability scan from Task 1 (already executed)
    • Calculate security score (0-100): 100 - (CRITICAL×10 + HIGH×5 + MEDIUM×2 + LOW×0.5)
    • Categorize vulnerabilities (CRITICAL/HIGH/MEDIUM/LOW)
    • Document top 10 CVEs in ASSESSMENT.md
    • BLOCK: Must have scan results before proceeding (scores are verified, not estimated)
  3. Project Analysis

    • If ASSESSMENT.md exists: Load existing inventory
    • If no assessment: Inventory all dependencies and frameworks
    • Identify current versions vs latest stable (using actual package resolution from Task 1 build)
    • Map project structure and architecture
    • Identify technology debt
    • Deliverable: Project assessment (or validate existing)
  4. Technology Assessment

    • Research latest framework versions
    • Identify obsolete APIs and patterns
    • Document breaking changes
    • Create upgrade roadmap
  5. Test Baseline Analysis

    • Use test results from Task 1 (already executed)
    • Capture baseline metrics (pass rate, coverage, performance)
    • Document current test infrastructure
    • Identify test gaps

Outputs:

  • Project assessment report (or use existing ASSESSMENT.md)
  • Security vulnerability report
  • Technology upgrade roadmap
  • Test baseline report
  • Initial HISTORY.md entry

With Existing Assessment:

  • Validate assessment still accurate (dependencies haven't changed)
  • Update if needed (typically minimal)
  • Faster completion (0.5-1 day vs 1-2 days)

Quality Gate (UPDATED per Recommendation 1 & 3):

  • Test environment ready (build succeeds, tests run)
  • Baseline test metrics documented (pass rate, count, coverage)
  • Vulnerability scan completed (verified CVE counts, not estimates)
  • Security score calculated from scan results (≥45 required)
  • All CRITICAL/HIGH vulnerabilities documented
  • Docker/external dependencies ready for integration tests

Phase 1: Security Remediation (2-5 days)

Active Agents: Security Agent (lead), Coder Agent, Tester Agent

Activities:

  1. Fix Critical Vulnerabilities (P0)

    • Update packages with CRITICAL CVEs
    • Fix security misconfigurations
    • Remove deprecated/insecure code
    • Verify fixes with security scans
  2. Fix High-Priority Vulnerabilities (P1)

    • Update packages with HIGH CVEs
    • Apply security patches
    • Implement security best practices
  3. Post-Update Security Validation (BLOCKING - NEW per Recommendation 3)

    • Re-run vulnerability scan: dotnet list package --vulnerable --include-transitive > security-after-phase1.txt
    • Compare before/after: diff security-baseline.txt security-after-phase1.txt
    • Verify CRITICAL/HIGH count decreased (not just assumed)
    • Verify no NEW vulnerabilities introduced by updates
    • Recalculate security score from scan results (must show improvement)
    • Run all tests to ensure no regressions (Tier 1: Unit tests minimum)
    • Update HISTORY.md with verified security improvements

Outputs:

  • Security fixes applied
  • Updated security scan report
  • Test results (must maintain 100% pass rate)
  • HISTORY.md entry for security work

Quality Gate (UPDATED per Recommendation 3):

  • Security scan re-run and results verified (not estimated)
  • Security score ≥45 (calculated from verified scan results)
  • Zero CRITICAL vulnerabilities (verified in scan diff)
  • Zero HIGH vulnerabilities (verified in scan diff, or documented with explicit approval)
  • No NEW vulnerabilities introduced by updates
  • All tests passing (100% - Tier 1 Unit tests minimum)

Phase 2: Architecture & Design (2-3 days)

Active Agents: Architect Agent (lead), Migration Coordinator

Input Handling:

IF PLAN.md EXISTS:
    ✅ Use existing architecture decisions
    ✅ Validate ADRs are current
    ✅ Follow defined strategy
    Duration: 0.5-1 day (validation only)
ELSE:
    ⚠️  Create architecture decisions (as described below)
    Duration: 2-3 days

Activities:

⚠️ NEW: Spike-Driven ADR Process for High-Risk Decisions (per Recommendation 2)

  1. Framework Upgrade Planning

    • Research target framework versions
    • Evaluate migration paths
    • For high-risk decisions: Create spike branches (1-2 days)
      • Test Option A on single project
      • Test Option B on single project
      • Document actual compilation errors, API changes, test failures
    • Create evaluation matrix with empirical data from spikes
    • Document breaking changes
    • Create ADRs with status "proposed" first (allow 24-48hr review)
    • Mark ADRs as "accepted" after stakeholder review
  2. Dependency Strategy

    • Identify dependency upgrade order
    • For major version changes: Create spike branches
      • Example: RabbitMQ.Client 5→6 vs 5→7
      • Run tests on each spike, document pass rates
      • Compare actual migration effort (file count, errors)
    • Map dependency conflicts (using spike results)
    • Plan parallel vs sequential updates
    • Create dependency upgrade matrix with verified estimates
  3. Architecture Decisions

    • Obsolete pattern replacements
    • New feature approaches
    • Performance optimization strategies
    • Testing strategy updates
    • All ADRs must include:
      • Evaluation matrix with weighted criteria
      • Spike results (for high-risk decisions)
      • 24-48hr review period before "accepted" status

Outputs:

  • ADRs for all major decisions (MADR 3.0.0 format) - or use existing from PLAN.md
  • Dependency upgrade matrix
  • Migration timeline
  • Risk assessment
  • HISTORY.md entry

With Existing Plan:

  • ADRs already created and approved
  • Migration strategy defined
  • Just validate and proceed
  • Faster completion (0.5-1 day vs 2-3 days)

Quality Gate: All major decisions documented in ADRs, migration plan approved


Phase 3: Framework & Dependency Modernization (5-10 days)

Active Agents: Coder Agent (multiple if parallel), Tester Agent, Migration Coordinator

Input Handling:

IF PLAN.md EXISTS:
    ✅ Use defined module migration order
    ✅ Follow parallel execution strategy
    ✅ Use task breakdown from plan
    More accurate timeline
ELSE:
    ⚠️  Determine migration order on-the-fly
    More conservative timeline

Activities:

  1. Framework Upgrade

    • Update to target framework version
    • Fix compilation errors
    • Update project files
    • Resolve API changes
  2. Dependency Updates

    • Update dependencies in priority order
    • Resolve version conflicts
    • Update package references
    • Fix breaking changes
  3. Continuous Testing (BLOCKING)

    • Run tests after each change
    • Fix-and-retest cycles
    • Maintain 100% pass rate
    • No progression until tests pass

Parallel Execution Strategy:

Migration Coordinator
  ↓
  ├─ Coder Agent #1 (Module A) → Tester Agent validates
  ├─ Coder Agent #2 (Module B) → Tester Agent validates
  └─ Coder Agent #3 (Module C) → Tester Agent validates

Outputs:

  • Updated framework versions
  • Updated dependencies
  • Fixed compilation errors
  • Test results (100% pass rate)
  • HISTORY.md entries for each module

Quality Gate:

  • All projects build successfully
  • 100% test pass rate (MANDATORY)
  • No P0/P1 issues
  • Code coverage ≥80%

Phase 4: API Modernization & Code Quality (3-7 days)

Active Agents: Coder Agent, Tester Agent, Architect Agent

Activities:

  1. Replace Obsolete APIs

    • Identify deprecated API usage
    • Replace with modern equivalents
    • Update code patterns
    • Verify functionality
  2. Code Quality Improvements

    • Apply modern language features
    • Remove code smells
    • Improve error handling
    • Optimize performance hotspots
  3. Test Enhancement

    • Add missing test coverage
    • Update test patterns
    • Add integration tests
    • Performance benchmarks

Outputs:

  • Modernized codebase
  • Improved code quality metrics
  • Enhanced test suite
  • Performance benchmarks
  • HISTORY.md entries

Quality Gate:

  • Zero obsolete API warnings
  • Code coverage ≥85%
  • 100% test pass rate
  • No performance regressions (≤10%)

Phase 5: Performance Optimization (2-4 days)

Active Agents: Coder Agent, Tester Agent, Architect Agent

Activities:

  1. Performance Profiling

    • Run performance benchmarks
    • Identify bottlenecks
    • Compare against baseline
    • Document performance goals
  2. Optimization Implementation

    • Optimize critical paths
    • Implement caching strategies
    • Improve database queries
    • Reduce memory allocations
  3. Validation

    • Re-run benchmarks
    • Verify improvements
    • Ensure no regressions
    • Document performance gains

Outputs:

  • Performance optimization report
  • Benchmark comparisons
  • Performance ADRs (if architectural changes)
  • HISTORY.md entry

Quality Gate:

  • Performance improvement ≥10% OR documented as optimal
  • No performance regressions
  • All tests passing

Phase 6: Comprehensive Documentation (2-3 days)

Active Agents: Documentation Agent (lead), Migration Coordinator

Activities:

  1. CHANGELOG Creation

    • Document all breaking changes
    • List new features
    • Security fixes
    • Performance improvements
    • Migration notes
  2. Migration Guide

    • Step-by-step upgrade instructions
    • Breaking change details
    • Code examples (before/after)
    • Troubleshooting guide
    • FAQ section
  3. Final Documentation

    • Update README
    • API documentation
    • Architecture documentation
    • Deployment guides
    • Release notes

Outputs:

  • CHANGELOG.md (Keep a Changelog format)
  • MIGRATION-GUIDE.md (800+ lines, comprehensive)
  • Updated README.md
  • ADR summary
  • Release notes
  • Final HISTORY.md entry

Quality Gate: All documentation complete, reviewed, and accurate


Phase 7: Final Validation & Release (1-2 days)

Active Agents: Tester Agent (lead), Security Agent, Migration Coordinator

Activities:

  1. Complete Test Suite

    • Run all test phases
    • Unit tests (100% pass rate)
    • Integration tests (100% pass rate)
    • Component tests (100% pass rate)
    • Performance tests (baseline validation)
    • E2E tests (100% pass rate)
  2. Final Security Scan

    • Run comprehensive CVE scan
    • Verify security score ≥45
    • Document any remaining LOW/MEDIUM issues
    • Get security approval
  3. Release Preparation

    • Tag release version
    • Generate release notes
    • Create deployment checklist
    • Backup current production

Outputs:

  • Final test report
  • Final security report
  • Release notes
  • Deployment checklist
  • Production readiness assessment

Quality Gate (GO/NO-GO Decision):

  • Security score ≥45
  • Zero CRITICAL/HIGH vulnerabilities
  • 100% test pass rate (all test types)
  • Code coverage ≥85%
  • Zero P0/P1 issues
  • All documentation complete
  • Performance validated

Using This Protocol

Starting the Modernization

Option 1: Full Team Orchestration

User: /modernize-project
User: I have a .NET 6 project I need to upgrade to .NET 9, modernize dependencies, fix security issues, and improve test coverage.

Claude: I'll coordinate a team of specialist agents to modernize your project. Let me start with Phase 0: Discovery & Assessment...

[Migration Coordinator activates]
Phase 0: Discovery & Assessment
- Analyzing project structure...
- Running security scan...
- Creating upgrade roadmap...

[Security Agent activates]
Security Baseline:
- Current score: 23/100
- CRITICAL: 3 vulnerabilities
- HIGH: 12 vulnerabilities
⚠️ BLOCKING: Must fix CRITICAL/HIGH before proceeding

[Architect Agent activates]
Technology Assessment:
- Current: .NET 6.0
- Target: .NET 9.0
- Breaking changes identified: 47
- ADR needed for: [list of decisions]

...

Option 2: Phase-by-Phase

User: /modernize-project
User: Start with Phase 0 only - just assess my project

Claude: Running Phase 0: Discovery & Assessment...
[Detailed assessment output]

Option 3: Specific Agent Focus

User: /modernize-project
User: Focus on security remediation only (Phase 1)

Claude: [Security Agent + Coder Agent + Tester Agent activate]

Monitoring Progress

The Migration Coordinator maintains a progress dashboard:

## Modernization Progress

### Overall Status: Phase 3 - Framework Modernization (60% complete)

| Phase | Status | Duration | Quality Gate |
|-------|--------|----------|--------------|
| 0. Discovery | ✅ Complete | 1.5 days | ✅ Passed |
| 1. Security | ✅ Complete | 3 days | ✅ Score: 52/100 |
| 2. Architecture | ✅ Complete | 2 days | ✅ ADRs: 5 |
| 3. Framework | 🔄 In Progress | 4/7 days | ⏳ Pending |
| 4. API Modernization | ⏳ Pending | - | - |
| 5. Performance | ⏳ Pending | - | - |
| 6. Documentation | ⏳ Pending | - | - |
| 7. Final Validation | ⏳ Pending | - | - |

### Current Phase Details
- **Active Agents**: Coder #1, Coder #2, Tester
- **Module A**: ✅ Complete (.NET 9 migration done)
- **Module B**: 🔄 In Progress (fixing build errors)
- **Module C**: ⏳ Queued
- **Test Pass Rate**: 96.2% (6 failures, P2 severity)

Quality Gates (Blocking Criteria)

Security Gates (BLOCKING)

  • BLOCK: Security score <45
  • BLOCK: Any CRITICAL vulnerabilities unresolved
  • BLOCK: Any HIGH vulnerabilities unresolved (unless explicitly approved)

Testing Gates (BLOCKING)

  • BLOCK: Test pass rate <100% (production releases)
  • BLOCK: Code coverage <80%
  • BLOCK: Any P0 or P1 test failures
  • BLOCK: Performance regression >10%

Build Gates (BLOCKING)

  • BLOCK: Any compilation errors
  • BLOCK: Any dependency conflicts
  • BLOCK: Build warnings in critical code paths

Documentation Gates (BLOCKING)

  • BLOCK: Missing CHANGELOG
  • BLOCK: Missing migration guide
  • BLOCK: Undocumented breaking changes

Agent Coordination Patterns

Sequential Pipeline (Default)

Migration Coordinator
  ↓
Security Agent (Phase 1) → GATE → Must pass before Phase 2
  ↓
Architect Agent (Phase 2) → GATE → ADRs must be complete
  ↓
Coder Agent (Phase 3) → Tester Agent → GATE → 100% pass rate
  ↓
Coder Agent (Phase 4) → Tester Agent → GATE → 100% pass rate
  ↓
Documentation Agent (Phase 6)
  ↓
Tester + Security (Phase 7) → FINAL GATE → GO/NO-GO

Parallel Execution (Faster)

Migration Coordinator
  ↓
Security Agent (Phase 1) → GATE
  ↓
Architect Agent (Phase 2) → GATE
  ↓
  ├─ Coder #1 (Module A) → Tester → ✅
  ├─ Coder #2 (Module B) → Tester → ✅
  └─ Coder #3 (Module C) → Tester → ✅
  ↓
Documentation Agent → Final Validation

Fix-and-Retest Cycle

Coder Agent makes changes
  ↓
Tester Agent runs tests
  ↓ (failures found)
Tester Agent documents failures (P0/P1/P2/P3)
  ↓
Coder Agent fixes issues
  ↓
Tester Agent re-runs tests
  ↓
[Repeat until 100% pass rate achieved]

Logging Protocol

MANDATORY: All agents must log to HISTORY.md using ./scripts/append-to-history.sh

When to Log:

  • After completing each phase
  • After fixing security vulnerabilities
  • After making architectural decisions
  • After completing migrations
  • After test validation
  • After documentation updates

Example Entry:

## 2025-10-25 14:30 - Phase 1: Security Remediation Complete

**Agent**: Security Agent + Coder Agent
**Phase**: 1 - Security Remediation

### What Changed
- Fixed 3 CRITICAL vulnerabilities (CVE-2024-1234, CVE-2024-5678, CVE-2024-9012)
- Fixed 12 HIGH vulnerabilities
- Updated 15 dependencies to latest secure versions
- Improved security score from 23/100 → 52/100

### Why Changed
- CRITICAL vulnerabilities blocked progression (Phase 0 quality gate)
- Required to achieve minimum security score ≥45
- Multiple packages had known exploits in production

### Impact
- Security score: 23/100 → 52/100 (+29 points)
- CRITICAL vulnerabilities: 3 → 0 (✅ resolved)
- HIGH vulnerabilities: 12 → 0 (✅ resolved)
- MEDIUM vulnerabilities: 8 → 5 (-3)
- Dependencies updated: 15 packages
- Test pass rate: 100% (no regressions introduced)

### Outcome
**Quality Gate PASSED** - Ready for Phase 2: Architecture & Design
- Security score ≥45: ✅ (52/100)
- Zero CRITICAL: ✅
- Zero HIGH: ✅
- Tests passing: ✅ (100%)

**Next Phase**: Phase 2 - Architecture & Design (2-3 days estimated)

Success Criteria

Project Modernization Complete When:

Security

  • Security score ≥45
  • Zero CRITICAL vulnerabilities
  • Zero HIGH vulnerabilities
  • All dependencies up-to-date

Quality

  • 100% test pass rate (all test types)
  • Code coverage ≥85%
  • Zero P0/P1 issues
  • Performance validated (no regressions >10%)

Modernization

  • Latest stable framework version
  • All dependencies current
  • Zero obsolete API warnings
  • Modern code patterns applied

Documentation

  • Complete CHANGELOG
  • Comprehensive migration guide
  • All ADRs documented
  • Updated README and docs
  • HISTORY.md fully populated

Estimated Timeline

Note: Time estimates are based on typical human execution times and may vary significantly based on project complexity, team experience, and AI assistance capabilities.

Phase Duration Can Parallelize
0. Discovery & Assessment 1-2 days No
1. Security Remediation 2-5 days Partial (by vulnerability)
2. Architecture & Design 2-3 days No
3. Framework Modernization 5-10 days Yes (by module)
4. API Modernization 3-7 days Yes (by area)
5. Performance Optimization 2-4 days Partial
6. Documentation 2-3 days Partial (by doc type)
7. Final Validation 1-2 days No

Total: 18-36 days (depends on project size and parallelization)

Small Project (<10k LOC): ~18-22 days Medium Project (10k-50k LOC): ~25-30 days Large Project (>50k LOC): ~30-36 days


Example Usage Scenarios

Scenario 1: .NET Framework to .NET 9

User: /modernize-project
User: Upgrade my .NET Framework 4.8 project to .NET 9, fix all security issues, and ensure 95%+ test coverage

Claude: I'll coordinate the modernization team:

Phase 0: Discovery & Assessment
- Current: .NET Framework 4.8
- Target: .NET 9.0
- Security Score: 18/100 ⚠️
- Test Coverage: 42% ⚠️

[Detailed execution across all 7 phases]

Scenario 2: Node.js Upgrade + Security

User: /modernize-project
User: My Node.js 14 app needs to go to Node.js 22, fix CVEs, and add proper testing

Claude: Modernization Plan:
- Phase 0: Assess Node.js 14 → 22 migration path
- Phase 1: Fix 47 vulnerabilities (Security Agent priority)
- Phase 2: Plan ESM migration, update patterns (Architect)
- Phase 3-4: Upgrade dependencies, modernize code (Coder)
- Phase 5: Performance validation
- Phase 6-7: Documentation and final validation

Scenario 3: Python 2 to Python 3

User: /modernize-project
User: Legacy Python 2.7 codebase → Python 3.12, modernize dependencies, add type hints

Claude: This is a major migration requiring all agents:
[Systematic execution with extra focus on syntax changes, dependency compatibility]

Troubleshooting

Quality Gate Failures

Security Gate Failed

❌ Security score: 38/100 (required ≥45)
→ Action: Security Agent + Coder Agent continue Phase 1
→ Cannot proceed to Phase 2 until resolved

Testing Gate Failed

❌ Test pass rate: 87% (required 100%)
→ Action: Tester Agent documents failures
→ Coder Agent fixes issues
→ Re-run fix-and-retest cycle

Performance Gate Failed

❌ Performance regression: -23% (threshold -10%)
→ Action: Roll back change
→ Architect Agent reviews approach
→ Coder Agent implements optimized solution

Best Practices

  1. Always start with Phase 0 - Never skip discovery
  2. Don't skip quality gates - They prevent production issues
  3. Fix security first - Security blocks everything else
  4. Test continuously - Don't batch testing until the end
  5. Document as you go - Incremental documentation saves time
  6. Use parallel execution - When dependencies allow it
  7. Log everything to HISTORY.md - Complete audit trail
  8. Create ADRs for major decisions - Future maintainers will thank you

Anti-Patterns to Avoid

Skipping security phase - "We'll fix it later" Accepting <100% test pass rates - "Good enough for now" Batching all changes - "One big PR at the end" Skipping documentation - "We'll document after release" Ignoring quality gates - "We're on a deadline" Solo agent execution - "Just the Coder Agent is fine" No progress tracking - "Trust the process"


Document Owner: Migration Coordinator Protocol Version: 1.0 Last Updated: 2025-10-25 Applicability: Universal - All software projects requiring modernization

Remember: Systematic agent coordination = Production-ready modernization