What this artefact is
A comprehensive analysis of the legacy application source code, extracting everything a developer needs to understand the system’s architecture, business logic, integrations, and data model.
How it’s produced
The application analysis is produced by the application-developer agent, which reads the entire application codebase — every source file, configuration file, and project file — to build a complete technical picture of the system.
What it contains
The application analysis has nine mandatory sections:
1. Application Overview
High-level summary covering:
- Purpose of the application
- Technology stack (language, framework, runtime)
- Solution structure (projects, layers, key folders)
- Dependencies (NuGet packages, third-party libraries)
- Configuration (connection strings, app settings, feature flags)
2. User Roles and Access Control
- Roles table listing each role and its permissions
- Authentication mechanism (e.g. Windows Authentication, forms-based)
- Authorisation approach (role-based, claims-based, custom)
3. Features and Capabilities
Named subsections per feature, describing what the feature does from a technical perspective and which source files implement it.
4. Workflows and Behaviours
Named subsections per workflow, documenting the sequence of operations the application performs for key business processes.
5. Business Rules and Validation
A numbered table (BR-xxx format) of business rules extracted from the code, each with:
- Description of the rule
- Where it is enforced (source file and method)
- Criticality (high, medium, low)
6. Domain Model
Entity subsections with:
- Property tables (name, type, constraints)
- Enumerations and their values
- Relationships between entities
7. Integration Points
Documentation of all external touchpoints:
- Web services and APIs consumed or exposed
- File I/O (imports, exports, file shares)
- Email notifications
- External systems and their connection details
8. Reports
Each report documented with:
- Type (e.g. Crystal Reports, SSRS, custom)
- Purpose
- Data sources
- Parameters
- Output format
9. Cross-Reference: Application to Database
Mapping between application concepts and database structures:
- Data access patterns (ORM, stored procedures, inline SQL)
- Entity-to-table mapping
- Stored procedure calls and where they are invoked from
Quality criteria
- All source files read and accounted for
- Business rules numbered and assigned criticality
- Domain model entities match the codebase
- Integration points documented with connection details
- Cross-reference section links application concepts to database structures
Example
The following snippet shows a technology stack summary for a fictional sample tracking system.
Technology Stack
- Language: VB.NET
- Framework: ASP.NET Web Forms (.NET Framework 4.0)
- Database: SQL Server with stored procedure-based data access
- Architecture: Three-tier with business logic library and web presentation layer
- Authentication: Windows Authentication via the agency’s Active Directory
- Key dependencies: Crystal Reports 13.0, Microsoft Enterprise Library 5.0
Business Rules (excerpt)
| Rule | Description | Source | Criticality |
|---|---|---|---|
| BR-001 | Reference number must be unique across all submissions | SubmissionService.vb line 142 |
High |
| BR-002 | Date received cannot be a future date | SubmissionValidator.vb line 58 |
High |
| BR-003 | A submission must contain at least one sample before it can be finalised | SubmissionService.vb line 210 |
High |
| BR-004 | Only users with the Supervisor role can delete a submission | SubmissionController.vb line 87 |
Medium |