From bitwarden-product-analyst
Extract complete, unambiguous requirements from specifications. Use when analyzing feature requests, processing enhancement specifications, or identifying missing information. Trigger phrases: "extract requirements", "analyze specification", "identify requirements", "clarify ambiguities". After extracting requirements, use the `work-breakdown` skill.
npx claudepluginhub bitwarden/ai-plugins --plugin bitwarden-product-analystThis skill uses the workspace's default tool permissions.
1. **Extract Requirements** — Identify functional and non-functional requirements from multiple sources
Elicits structured, verifiable requirements from vague requests, GitHub issues, or existing specs using interactive or assumption-based strategies.
Authors, updates, and validates atomic functional and non-functional requirements with traceability matrices, validation packs, and explicit human-in-the-loop approvals. Use for creating or reviewing requirements as source of truth.
Performs requirements analysis: decomposes problems, scans stakeholders, structures and prioritizes needs. Produces 1-requirements.md lifecycle doc before tech-spec. Not for task tickets or solutions.
Share bugs, ideas, or general feedback.
Always consider and document:
See examples/export-functionality.md for a complete worked example.
Organize extracted requirements in structured sections:
## Functional Requirements
1. REQ-F-001: [Specific capability the system must have]
- **Acceptance Criteria**: [Testable condition]
- **Priority**: Critical | High | Medium | Low
## Non-Functional Requirements
- **Performance**: [Response time, throughput, resource usage]
- **Reliability**: [Error handling, edge cases, availability]
- **Compatibility**: [Platform support, backwards compatibility]
- **Usability**: [User experience expectations]
## Security Requirements
- **Data Classification**: [Vault Data | Protected Data | Other]
- **Security Principles**: [P01, P02, P03, P04, P05, P06 as applicable]
- **Threat Considerations**: [What could go wrong?]
## Constraints
- **Technical**: [APIs, platforms, dependencies]
- **Business**: [Timeline, scope, resources]
- **Security**: [Compliance, encryption, authentication]
## Open Questions
1. [Specific question needing stakeholder input]
2. [Ambiguity requiring clarification]
3. [Missing information that blocks complete specification]
## Assumptions
- [Assumption 1: explicit statement of what's assumed]
- [Assumption 2: should be validated with stakeholders]