stakeholder-interview

Internal stakeholder interview workflow for capturing constraints, decision authority, and policy requirements. Use when delivery is blocked by unresolved business, engineering, legal, security, or operations decisions; do not use for end-user behavior research.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "stakeholder-interview" with this command: npx skills add kentoshimizu/sw-agent-skills/kentoshimizu-sw-agent-skills-stakeholder-interview

Stakeholder Interview

Overview

Use this skill to extract authoritative decisions from internal stakeholders and convert them into traceable engineering constraints.

Scope Boundaries

  • Requirements or architecture choices are blocked by missing policy or ownership decisions.
  • Teams disagree about constraints and need documented decision authority.
  • Cross-functional alignment is required before implementation commitments.

Templates And Assets

  • Interview note template:
    • assets/stakeholder-interview-template.md
  • Decision conflict log:
    • assets/decision-conflict-log-template.md

Inputs To Gather

  • Decision questions and why each question is blocking progress.
  • Stakeholder map with authority boundaries and fallback approvers.
  • Existing assumptions, unresolved conflicts, and time constraints.

Deliverables

  • Interview records with source, date, authority level, and explicit decision statement.
  • Constraint catalog (policy, compliance, operational, budget, timeline).
  • Conflict log with owner, escalation route, and required resolution date.

Workflow

  1. Define interview goals as decision questions, not open brainstorming topics.
  2. Prioritize stakeholders by decision authority and delivery criticality.
  3. Conduct structured interviews and separate facts from preferences.
  4. Confirm decisions in writing with explicit scope and expiry assumptions.
  5. Record conflicts and escalate unresolved items with options and impacts.
  6. Publish an auditable summary that downstream requirement skills can consume.

Quality Standard

  • Every key claim has a named source and explicit authority level.
  • Ambiguous statements are converted into verifiable constraints.
  • Conflicts are visible with an assigned owner and deadline.
  • Outputs are specific enough to drive requirement and implementation decisions.

Failure Conditions

  • Stop when no stakeholder with decision authority is available.
  • Stop when interview outputs mix assumptions and approved policy.
  • Escalate when blocking conflicts remain unresolved past agreed deadlines.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

security-authentication

No summary provided by upstream source.

Repository SourceNeeds Review
Security

security-secure-coding

No summary provided by upstream source.

Repository SourceNeeds Review
Security

security-threat-modeling

No summary provided by upstream source.

Repository SourceNeeds Review
Security

code-review-security

No summary provided by upstream source.

Repository SourceNeeds Review