src/bmm-skills/4-implementation/bmad-checkpoint-preview/step-03-detail-pass.md
Display: Orientation → Walkthrough → [Detail Pass] → Testing
Scan the diff for changes touching risk-sensitive patterns. Look for 2–5 spots where a mistake would have the highest blast radius — not the most complex code, but the code where being wrong costs the most.
Risk categories to detect:
[auth] — authentication, authorization, session, token, permission, access control[public API] — new/changed endpoints, exports, public methods, interface contracts[schema] — database migrations, schema changes, data model modifications, serialization[billing] — payment, pricing, subscription, metering, usage tracking[infra] — deployment, CI/CD, environment variables, config files, infrastructure[security] — input validation, sanitization, crypto, secrets, CORS, CSP[config] — feature flags, environment-dependent behavior, defaults[other] — anything risk-sensitive that doesn't fit the above (e.g., concurrency, data privacy, backwards compatibility). Use a descriptive tag.Sequence spots so the highest blast radius comes first (how much breaks if this is wrong), not by diff order or file order. If more than 5 spots qualify, show the top 5 and note: "N additional spots omitted — ask if you want the full list."
If the change has no spots matching these patterns, state: "No high-risk spots found in this change — the diff speaks for itself." Do not force findings.
Check whether the spec has a ## Spec Change Log section with entries (populated by adversarial review loops).
Output as a single message:
Orientation → Walkthrough → [Detail Pass] → Testing
For each spot, one line:
- `path:line` — [tag] reason-phrase
Example:
- `src/auth/middleware.ts:42` — [auth] New token validation bypasses rate limiter
- `migrations/003_add_index.sql:7` — [schema] Index on high-write table, check lock behavior
- `api/routes/billing.ts:118` — [billing] Metering calculation changed, verify idempotency
### Machine Hardening
- Finding summary — what was flagged, what was decided
- ...
End the message with:
---
You've seen the design and the risk landscape. From here:
- **"dig into [area]"** — I'll deep-dive that specific area with correctness focus
- **"next"** — I'll suggest how to observe the behavior
If at any point the human signals they want to make a decision about this {change_type} (e.g., "let's ship it", "this needs a rethink", "I'm done reviewing", or anything suggesting they're ready to decide), confirm their intent:
./step-05-wrapup.md./step-05-wrapup.mdWhen the human says "dig into [area]" (e.g., "dig into the auth changes", "dig into the schema migration"):
path:line + what you found + why it matters.The human can trigger multiple targeted re-reviews. Each time, present new findings and the closing menu only.
Read fully and follow ./step-04-testing.md