🎯

investigation-workflow

🎯Skill

from rysweet/amplihack

VibeIndex|
What it does

Systematically investigates complex systems through a 6-phase workflow, deploying parallel agents to efficiently explore, understand, and document technical architectures.

investigation-workflow

Installation

Install skill:
npx skills add https://github.com/rysweet/amplihack --skill investigation-workflow
14
Last UpdatedJan 26, 2026

Skill Details

SKILL.md

|

Overview

# Investigation Workflow Skill

Purpose

This skill provides a systematic 6-phase workflow for investigating and understanding existing systems, codebases, and architectures. Unlike development workflows optimized for implementation, this workflow is optimized for exploration, understanding, and knowledge capture.

When to Use This Skill

Investigation Tasks (use this workflow):

  • "Investigate how the authentication system works"
  • "Explain the neo4j memory integration"
  • "Understand why CI is failing consistently"
  • "Analyze the reflection system architecture"
  • "Research what hooks are triggered during session start"

Development Tasks (use DEFAULT_WORKFLOW.md instead):

  • "Implement OAuth support"
  • "Build a new API endpoint"
  • "Add feature X"
  • "Fix bug Y"

Core Philosophy

Exploration First: Define scope and strategy before diving into code

Parallel Deep Dives: Deploy multiple agents simultaneously for efficient information gathering

Verification Required: Test understanding through practical application

Knowledge Capture: Document findings to prevent repeat investigations

The 6-Phase Investigation Workflow

Phase 1: Scope Definition

Purpose: Define investigation boundaries and success criteria before any exploration.

Tasks:

  • FIRST: Identify explicit user requirements - What specific questions must be answered?
  • Use prompt-writer agent to clarify investigation scope
  • Use ambiguity agent if questions are unclear
  • Define what counts as "understanding achieved"
  • List specific questions that must be answered
  • Set boundaries: What's in scope vs. out of scope
  • Estimate investigation depth needed (surface-level vs. deep dive)

Success Criteria:

  • Clear list of questions to answer
  • Defined scope boundaries
  • Measurable success criteria (e.g., "can explain system flow", "can diagram architecture")

Deliverables:

  • Investigation scope document with:

- Core questions to answer

- Success criteria

- Scope boundaries (what's included/excluded)

- Estimated depth and timeline

Phase 2: Exploration Strategy

Purpose: Plan which agents to deploy and what to investigate, preventing inefficient random exploration.

Tasks:

  • Use architect agent to design exploration strategy
  • Use patterns agent to check for similar past investigations
  • Identify key areas to explore (code paths, configurations, documentation)
  • Select specialized agents for parallel deployment in Phase 3
  • Create investigation roadmap with priorities
  • Identify potential dead ends to avoid
  • Plan verification approach (how to test understanding)

Agent Selection Guidelines:

  • For code understanding: analyzer, patterns agents
  • For system architecture: architect, api-designer agents
  • For performance issues: optimizer, analyzer agents
  • For security concerns: security, patterns agents
  • For integration flows: integration, database agents

Success Criteria:

  • Clear exploration roadmap
  • List of agents to deploy in Phase 3
  • Prioritized investigation areas

Deliverables:

  • Exploration strategy document with:

- Investigation roadmap

- Agent deployment plan for Phase 3

- Priority order for exploration

- Expected outputs from each exploration

Phase 3: Parallel Deep Dives

Purpose: Deploy multiple exploration agents simultaneously to gather information efficiently.

CRITICAL: This phase uses PARALLEL EXECUTION by default.

Tasks:

  • Deploy selected agents in PARALLEL based on Phase 2 strategy
  • Common parallel patterns:

- [analyzer(module1), analyzer(module2), analyzer(module3)] - Multiple code areas

- [analyzer, patterns, security] - Multiple perspectives on same area

- [architect, database, integration] - System architecture exploration

  • Each agent explores their assigned area independently
  • Collect findings from all parallel explorations
  • Identify connections and dependencies between findings
  • Note any unexpected discoveries or anomalies

Parallel Agent Examples:

```

Investigation: "How does the reflection system work?"

β†’ [analyzer(~/.amplihack/.claude/tools/amplihack/hooks/), patterns(reflection), integration(logging)]

Investigation: "Why is CI failing?"

β†’ [analyzer(ci-config), patterns(ci-failures), integration(github-actions)]

Investigation: "Understand authentication flow"

β†’ [analyzer(auth-module), security(auth), patterns(auth), integration(external-auth)]

```

Success Criteria:

  • All planned agents deployed and completed
  • Findings from each exploration collected
  • Connections between findings identified

Deliverables:

  • Findings report with:

- Summary from each parallel exploration

- Code paths and flow diagrams

- Architectural insights

- Unexpected discoveries

- Open questions for verification

Phase 4: Verification & Testing

Purpose: Test and validate understanding through practical application.

Tasks:

  • Create hypotheses based on Phase 3 findings
  • Design practical tests to verify understanding:

- Trace specific code paths manually

- Examine logs and outputs

- Test edge cases and assumptions

- Verify configuration effects

  • Run verification tests
  • Document what was tested and results
  • Identify gaps in understanding
  • Refine hypotheses based on test results
  • Repeat verification for any unclear areas

Verification Examples:

```

Understanding: "Authentication uses JWT tokens"

Verification: Trace actual token creation and validation in code

Understanding: "CI fails because of dependency conflict"

Verification: Check CI logs, reproduce locally, verify fix works

Understanding: "Reflection analyzes all user messages"

Verification: Examine reflection logs, trace message processing

```

Success Criteria:

  • All hypotheses tested
  • Understanding verified through practical tests
  • Gaps in understanding identified and filled

Deliverables:

  • Verification report with:

- Tests performed

- Results and observations

- Confirmed understanding

- Remaining gaps or uncertainties

Phase 5: Synthesis

Purpose: Compile findings into coherent explanation that answers original questions.

Tasks:

  • Use reviewer agent to check completeness of findings
  • Use patterns agent to identify reusable patterns discovered
  • Synthesize findings from Phases 3-4 into coherent explanation
  • Create visual artifacts (diagrams, flow charts) if helpful
  • Answer each question from Phase 1 scope definition
  • Identify what worked well vs. what was unexpected
  • Note any assumptions or uncertainties remaining
  • Prepare clear explanation suitable for user

Synthesis Outputs:

  1. Executive Summary: 2-3 sentence answer to main question
  2. Detailed Explanation: Complete explanation with supporting evidence
  3. Visual Aids: Diagrams showing system flow, architecture, etc.
  4. Key Insights: Non-obvious discoveries or patterns
  5. Remaining Unknowns: What's still unclear or uncertain

Success Criteria:

  • All Phase 1 questions answered
  • Explanation is clear and complete
  • Findings supported by evidence from verification
  • Visual aids clarify complex areas

Deliverables:

  • Investigation report with all 5 synthesis outputs
  • Ready for knowledge capture in Phase 6

Phase 6: Knowledge Capture

Purpose: Create durable documentation so this investigation never needs to be repeated.

Tasks:

  • Store discoveries in memory using store_discovery() from amplihack.memory.discoveries
  • Update .claude/context/PATTERNS.md if reusable patterns found
  • Create or update relevant documentation files
  • Add inline code comments for critical understanding
  • Optional: Create GitHub issue for follow-up improvements
  • Optional: Update architecture diagrams if needed
  • Ensure future investigators can find this knowledge easily

Documentation Guidelines:

```markdown

Discovery: [Brief Title]

Context: What was investigated and why

Key Findings:

  • Main insight 1
  • Main insight 2

- Supporting Evidence: Links to code, logs, or verification tests

- Implications: How this affects the project

- Related Patterns: Links to similar patterns in PATTERNS.md

```

Success Criteria:

  • Discoveries stored in memory for future reference
  • Relevant documentation files updated
  • Knowledge is discoverable by future investigators
  • No information loss

Deliverables:

  • Discoveries stored in memory
  • Updated PATTERNS.md (if applicable)
  • Updated project documentation
  • Optional: GitHub issues for improvements
  • Investigation session log in ~/.amplihack/.claude/runtime/logs/

Transitioning to Development Workflow

After investigation completes, if the task requires implementation (not just understanding), transition to DEFAULT_WORKFLOW.md:

  1. Resume at Step 4 (Research and Design) with the knowledge gained from investigation
  2. Or resume at Step 5 (Implement the Solution) if the investigation already provided clear design guidance
  3. Use investigation findings from memory (via get_recent_discoveries()) and session logs to inform design decisions

Example Hybrid Workflow:

```

User: "/ultrathink investigate how authentication works, then add OAuth support"

Phase 1: Investigation

β†’ Run INVESTIGATION_WORKFLOW.md (6 phases)

β†’ Complete understanding of existing auth system

β†’ Store findings in memory via discoveries adapter

Phase 2: Development

β†’ Transition to DEFAULT_WORKFLOW.md

β†’ Resume at Step 4 (Research and Design)

β†’ Use investigation insights to design OAuth integration

β†’ Continue through Step 15 (implementation β†’ testing β†’ PR)

```

When to Transition:

  • Investigation reveals implementation is needed
  • User explicitly requested both investigation + development
  • Follow-up work identified during knowledge capture

Efficiency Targets

Target Efficiency: This workflow targets a 30-40% reduction in message count compared to ad-hoc investigation.

| Ad-Hoc Approach | Investigation Workflow |

| ----------------------- | ------------------------- |

| 70-90 messages | 40-60 messages |

| Frequent backtracking | Planned exploration |

| Redundant investigation | Parallel deep dives |

| Unclear scope | Explicit scope definition |

| Lost knowledge | Documented insights |

Efficiency Gains Come From:

  1. Scope Definition prevents scope creep and wandering
  2. Exploration Strategy prevents random unproductive exploration
  3. Parallel Deep Dives maximize information gathering speed
  4. Verification Phase catches misunderstandings early
  5. Synthesis ensures all questions answered
  6. Knowledge Capture prevents repeat investigations

Comparison to DEFAULT_WORKFLOW.md

Similarities (Structural Consistency)

Both workflows share core principles:

  • Explicit phases with clear deliverables
  • Agent-driven execution at each phase
  • Quality gates preventing premature progression
  • Knowledge capture and documentation
  • TodoWrite tracking for progress management

Differences (Investigation vs. Development)

| Aspect | Investigation Workflow | DEFAULT_WORKFLOW.md |

| ------------------ | -------------------------- | ------------------------ |

| Goal | Understanding | Implementation |

| Phases | 6 phases | Multi-step workflow |

| Execution | Exploration-first | Implementation-first |

| Parallel Focus | Phase 3 (Deep Dives) | Various steps |

| Testing | Understanding verification | Code validation |

| Deliverable | Documentation | Working code |

| Git Usage | Optional | Required (branches, PRs) |

Phase Mapping (For User Familiarity)

| Investigation Phase | DEFAULT_WORKFLOW Equivalent | Purpose |

| ----------------------------- | ---------------------------------- | ------------------------------------ |

| Phase 1: Scope Definition | Step 1: Requirements Clarification | Define what success looks like |

| Phase 2: Exploration Strategy | Step 4: Research and Design | Plan the approach |

| Phase 3: Parallel Deep Dives | Step 5: Implementation | Execute the plan (explore vs. build) |

| Phase 4: Verification | Steps 7-8: Testing | Validate results |

| Phase 5: Synthesis | Step 11: Review | Ensure quality and completeness |

| Phase 6: Knowledge Capture | Step 15: Cleanup | Make results durable |

Integration with UltraThink

UltraThink Workflow Detection: When /ultrathink is invoked, it automatically detects investigation tasks using keywords and suggests this workflow.

Automatic Workflow Suggestion:

```

User: "/ultrathink investigate how authentication works"

UltraThink: Detected investigation task. Using INVESTIGATION_WORKFLOW.md

β†’ Reading workflow from .claude/workflow/INVESTIGATION_WORKFLOW.md

β†’ Following 6-phase investigation workflow

β†’ Starting Phase 1: Scope Definition

```

Customization

To customize this workflow:

  1. Edit ~/.amplihack/.claude/workflow/INVESTIGATION_WORKFLOW.md to modify, add, or remove phases
  2. Adjust agent deployment strategies for your needs
  3. Add project-specific investigation patterns
  4. Update efficiency targets based on your metrics

Changes take effect immediately for future investigations.

Success Metrics

Track these metrics to validate workflow effectiveness:

  • Message Count: Target 30-40% reduction vs. ad-hoc (to be validated)
  • Investigation Time: Track time to completion
  • Knowledge Reuse: How often memory retrieval prevents repeat work
  • Completeness: Percentage of investigations with full documentation
  • User Satisfaction: Clear understanding achieved

Key Principles

  • Scope first, explore second - Define boundaries before diving in
  • Parallel exploration is key - Deploy multiple agents simultaneously in Phase 3
  • Verify understanding - Test your hypotheses in Phase 4
  • Capture knowledge - Always store discoveries in memory in Phase 6
  • This workflow optimizes for understanding, not implementation

When in doubt about investigation vs. development:

  • Investigation: "I need to understand X"
  • Development: "I need to build/fix/implement X"

Related Resources

  • Source Workflow: ~/.amplihack/.claude/workflow/INVESTIGATION_WORKFLOW.md (complete 436-line specification)
  • Knowledge Extraction: Use knowledge-extractor skill after investigations to capture learnings
  • Agent Catalog: ~/.amplihack/.claude/agents/CATALOG.md for all available agents
  • Pattern Library: ~/.amplihack/.claude/context/PATTERNS.md for reusable investigation patterns

More from this repository10

🎯
computer-scientist-analyst🎯Skill

computer-scientist-analyst skill from rysweet/amplihack

🎯
indigenous-leader-analyst🎯Skill

Evaluates complex scenarios through indigenous knowledge systems, centering holistic, relational thinking and long-term sustainability across environmental, governance, and cultural domains.

🎯
documentation-writing🎯Skill

Generates high-quality, discoverable software documentation following the Eight Rules and Diataxis framework, ensuring clear, runnable examples and proper doc structure.

🎯
n-version-workflow🎯Skill

Generates N independent solutions for critical implementations, comparing and selecting the most robust approach through systematic evaluation and diversity of agent perspectives.

🎯
context-management🎯Skill

Proactively monitors, extracts, and selectively rehydrates context to optimize token usage and preserve essential conversation details.

🎯
consensus-voting🎯Skill

Enables multi-agent consensus voting with domain-weighted expertise for critical security and system decisions requiring structured validation.

🎯
email-drafter🎯Skill

Drafts professional, contextually-appropriate emails by transforming bullet points or conversation summaries into polished communications with customizable tone and style.

🎯
work-delegator🎯Skill

Expertly delegates coding tasks by creating comprehensive context packages, analyzing requirements, and generating clear instructions for agents.

🎯
historian-analyst🎯Skill

Analyzes historical events through rigorous source criticism, comparative methods, and temporal frameworks to uncover patterns, precedents, and long-term trends.

🎯
engineer-analyst🎯Skill

Analyzes technical systems and problems using engineering frameworks to provide insights on feasibility, performance, optimization, and design trade-offs.