n-version-workflow
π―Skillfrom rysweet/amplihack
Generates N independent solutions for critical implementations, comparing and selecting the most robust approach through systematic evaluation and diversity of agent perspectives.
Installation
npx skills add https://github.com/rysweet/amplihack --skill n-version-workflowSkill Details
N-version programming for critical implementations - generates N independent solutions and selects the best through comparison
Overview
# N-Version Programming Workflow Skill
Purpose
Execute N-version programming workflow for critical implementations where multiple independent solutions should be generated and compared to select the best approach.
When to Use This Skill
USE FOR:
- Critical security features (authentication, authorization)
- Complex algorithms with multiple valid approaches
- High-risk refactoring of core components
- Architecture decisions with significant long-term impact
- When correctness is paramount over speed
AVOID FOR:
- Simple CRUD operations
- Straightforward bug fixes
- Documentation updates
- Minor UI tweaks
- Time-sensitive quick fixes
Configuration
Core Parameters
N (Number of Versions):
3- Default for standard tasks4-6- Critical features requiring high confidence2- Quick validation of approach
Selection Criteria (priority order):
- Correctness - Meets requirements and passes tests
- Security - No vulnerabilities or anti-patterns
- Simplicity - Ruthless simplicity, minimal complexity
- Philosophy Compliance - Follows project principles
- Performance - Efficiency and resource usage
Agent Diversity Profiles:
conservative- Proven patterns and safetyinnovative- Novel approaches and optimizationsminimalist- Ruthless simplicitypragmatic- Balance trade-offs for practical solutionsperformance-focused- Optimize for speed and efficiency
Execution Process
Step 1: Prepare Common Context
- Use prompt-writer agent to create crystal-clear specification
- Document all requirements explicitly
- Define success criteria measurably
- Prepare identical task specification for all N versions
- Identify evaluation metrics upfront
- CRITICAL: Capture explicit user requirements that CANNOT be optimized away
Output: Single authoritative specification document
Step 2: Generate N Independent Implementations
- Spawn N Claude subprocesses simultaneously
- Each subprocess receives IDENTICAL task specification
- NO context sharing between subprocesses (true independence)
- Each uses different agent diversity profile
- Each produces complete implementation with tests
- Each works in isolated directory (version_1/, version_2/, etc.)
Example for N=3:
- Subprocess 1: Conservative approach (proven patterns, comprehensive error handling)
- Subprocess 2: Pragmatic approach (balance simplicity and robustness)
- Subprocess 3: Minimalist approach (ruthless simplification, minimal dependencies)
Step 3: Collect and Compare Implementations
- Wait for all N implementations to complete
- Use analyzer agent to examine each implementation
- Use tester agent to run tests for each version
- Document results in comparison matrix
Comparison Matrix:
```
| Version | Correctness | Security | Simplicity | Philosophy | Performance | Lines of Code |
|---------|-------------|----------|------------|------------|-------------|---------------|
| v1 | PASS | PASS | 7/10 | 8/10 | 150ms | 180 |
| v2 | PASS | PASS | 9/10 | 9/10 | 180ms | 95 |
| v3 | FAIL | N/A | 10/10 | 7/10 | N/A | 65 |
```
Step 4: Review and Evaluate
- Use reviewer agent for comprehensive comparison
- Use security agent to evaluate security of each version
- Apply selection criteria in priority order
- Eliminate versions that fail correctness tests
- Compare remaining versions on other criteria
- Identify best parts of each implementation
Evaluation Process:
- Filter: Remove versions failing correctness tests
- Security Gate: Eliminate versions with security issues
- Philosophy Check: Score each on simplicity and compliance
- Performance Compare: Measure and compare benchmarks
- Synthesis: Identify if hybrid approach could be superior
Step 5: Select or Synthesize Solution
Decision Tree:
- Is there ONE version that passes all criteria?
- YES β Select it and document why
- NO β Continue to step 2
- Are there 2+ versions tied on top criteria?
- YES β Continue to step 3
- NO β Select highest scoring version
- Do versions have complementary strengths?
- YES β Synthesize hybrid combining best parts
- NO β Select based on weighted criteria priority
Example Synthesis:
```
Selected: Hybrid of v1 and v2
- Core logic from v2 (ruthless simplicity)
- Error handling from v1 (comprehensive coverage)
- Testing approach from v2 (focused, minimal)
- Documentation style from v1 (thorough)
Rationale: v2's minimalist core paired with v1's robust
error handling provides optimal balance of simplicity
and production-readiness.
```
Step 6: Implement Selected Solution
- Use builder agent to implement final version
- If single version selected: Use it directly
- If synthesis: Implement hybrid combining best parts
- Preserve all explicit user requirements from Step 1
- Run full test suite
- Document selection rationale in code comments
Documentation Template:
```python
"""
N-Version Implementation Selection
Generated Versions: 3
Selection: Hybrid of v1 (conservative) and v2 (pragmatic)
Rationale:
- v1 had superior error handling and edge case coverage
- v2 had cleaner architecture and better testability
- v3 failed correctness tests (edge case handling)
This implementation combines v2's core logic with v1's
defensive programming approach for production robustness.
Selection Criteria Applied:
- Correctness: v1=PASS, v2=PASS, v3=FAIL
- Security: All passed
- Simplicity: v2 ranked highest
- Philosophy: v1 and v2 tied
- Performance: Negligible difference
```
Step 7: Document Learnings
- Create analysis document:
n_version_analysis.md - Document all N implementations generated
- Explain selection rationale in detail
- Capture insights from rejected versions
- Store patterns learned in memory using
store_discovery()fromamplihack.memory.discoveries - Include comparison matrix for future reference
Trade-Offs
Cost: N times the compute resources and time
Benefit: Significantly reduced risk of critical errors
Best For: Features where bugs are expensive (security, data integrity)
Examples
Example 1: Authentication System
Task: Implement JWT-based authentication
Configuration: N=4 (critical security feature)
Profiles: conservative, security-focused, pragmatic, minimalist
Result:
- v1 (conservative): Most comprehensive but over-engineered
- v2 (security-focused): Excellent security but complex
- v3 (pragmatic): Good balance, missing edge cases
- v4 (minimalist): Too simple, security gaps
Selection: Hybrid of v2 and v3
- Security implementation from v2
- API design and simplicity from v3
Rationale: Security cannot be compromised, but v3's cleaner API design improved usability without sacrificing security.
Example 2: Data Processing Pipeline
Task: Process large CSV files efficiently
Configuration: N=3 (performance-critical)
Profiles: pragmatic, performance-focused, minimalist
Result:
- v1 (pragmatic): Pandas-based, familiar but slow
- v2 (performance-focused): Custom streaming, 10x faster
- v3 (minimalist): Python CSV module, simple but slow
Selection: v2 (performance-focused)
Rationale: Performance requirements justified complexity. v2's streaming approach met throughput requirements while v1 and v3 could not scale.
Philosophy Alignment
This workflow enforces:
- Reduced Risk: Multiple implementations catch errors single approach might miss
- Exploration: Different approaches reveal design trade-offs
- Evidence-Based Selection: Systematic comparison vs. gut feeling
- Learning: Rejected versions still provide valuable insights
- Parallel Execution: N implementations run simultaneously for efficiency
Integration with Default Workflow
This workflow replaces Steps 4-5 (Research/Design and Implementation) of the DEFAULT_WORKFLOW when enabled. All other steps (requirements, testing, CI/CD) remain the same.
More from this repository10
computer-scientist-analyst skill from rysweet/amplihack
Analyzes technical systems and problems using engineering frameworks to provide insights on feasibility, performance, optimization, and design trade-offs.
Generates high-quality, discoverable software documentation following the Eight Rules and Diataxis framework, ensuring clear, runnable examples and proper doc structure.
Evaluates complex scenarios through indigenous knowledge systems, centering holistic, relational thinking and long-term sustainability across environmental, governance, and cultural domains.
Proactively monitors, extracts, and selectively rehydrates context to optimize token usage and preserve essential conversation details.
Enables multi-agent consensus voting with domain-weighted expertise for critical security and system decisions requiring structured validation.
Drafts professional, contextually-appropriate emails by transforming bullet points or conversation summaries into polished communications with customizable tone and style.
Expertly delegates coding tasks by creating comprehensive context packages, analyzing requirements, and generating clear instructions for agents.
Analyzes historical events through rigorous source criticism, comparative methods, and temporal frameworks to uncover patterns, precedents, and long-term trends.
Extracts, stores, and injects cross-session learnings using simple keyword matching to enhance problem-solving efficiency.