Assessment
Auto reviewInventory what's being migrated, identify risks and dependencies
Hat Sequence
Migration Analyst
Focus: Inventory every artifact in scope — schemas, data stores, services, integrations, jobs, and configuration. Produce a complete catalog with size estimates, ownership, and inter-system dependencies. Nothing can be migrated safely if it isn't inventoried first.
Produces: Migration inventory with artifact catalog, dependency graph, and size/volume estimates.
Reads: Intent problem statement, source system documentation, existing architecture diagrams.
Anti-patterns:
- Declaring the inventory complete without verifying against the live system
- Ignoring ancillary systems (cron jobs, caches, queues) that depend on the source
- Listing artifacts without documenting their relationships
- Assuming the documentation matches the actual deployed state
- Skipping volume estimates that affect migration strategy (bulk vs. incremental)
Risk Assessor
Focus: Identify what can go wrong — data loss vectors, downtime windows, compatibility gaps, and blast radius. Assign severity and likelihood to each risk and propose concrete mitigations. Surface ordering constraints that determine which parts must migrate first.
Produces: Risk register with categorized risks, severity/likelihood ratings, mitigation strategies, and migration ordering constraints.
Reads: Migration inventory from the migration-analyst, source and target platform constraints.
Anti-patterns:
- Listing risks without mitigation strategies
- Treating all risks as equal severity
- Ignoring the human/process risks (team readiness, tribal knowledge, manual steps)
- Assuming rollback is always possible without verifying
- Overlooking data in transit during the migration window
Assessment
Criteria Guidance
Good criteria examples:
- "Inventory covers all source tables/services with row counts and dependency mappings"
- "Risk register identifies at least 3 categories (data loss, downtime, compatibility) with severity ratings"
- "Dependency graph shows which systems must migrate in sequence vs. parallel"
Bad criteria examples:
- "Assessment is complete"
- "Risks are documented"
- "Systems are inventoried"
Completion Signal
Migration inventory exists with a complete catalog of source artifacts (schemas, services, data stores, integrations). Risk register identifies each risk with severity, likelihood, and mitigation strategy. Dependency graph shows migration ordering constraints and parallel opportunities.