Skill: modernize-move
Detect and modernize outdated Move V1 syntax, patterns, and APIs to Move V2+. Preserves correctness through tiered transformations with test verification after each tier.
Essential Principles
Five non-negotiable rules for every modernization:
-
Test safety net is mandatory
WHY: Modernization must preserve behavior. No tests = no safety net. If no tests exist, invoke
skill first to create comprehensive tests before making any changes.
-
Analyze before modifying
WHY: The user must see exactly what will change and confirm the scope. Never surprise-edit code. Present the full analysis report and wait for confirmation.
-
Tiered execution order
WHY: Syntax changes (Tier 1) are zero-risk. API migrations (Tier 3) change semantics. Always apply safest changes first so riskier changes build on a clean, verified foundation.
-
Verify after each tier
WHY: If tests break, you know exactly which tier caused it. Revert that tier and investigate before proceeding. Never apply the next tier on a broken baseline.
-
Preserve error code values
WHY: Tests use
#[expected_failure(abort_code = N)]
. Changing numeric values breaks tests silently. When creating named constants, the numeric value MUST match the original literal.
When to Use This Skill
- Upgrading Move V1 contracts to V2 syntax
- Migrating to
- Converting to index notation
- Converting loops with counters to range loops
- Replacing manual vector iteration with stdlib inline functions (, , , etc.) and lambdas
- Replacing magic abort numbers with named constants
- Migrating legacy / to modern /Digital Assets
- Converting to pattern
- Upgrading custom signed integer workarounds to native - types
When NOT to Use This Skill
- Writing new contracts from scratch — use
- Fixing bugs or adding features — modernization is structural, not functional
- Optimizing gas usage — use
- Auditing security — use (run AFTER modernization)
Workflow
Phase 1: Analyze Contract
Entry: User provides a Move contract or project to modernize.
Actions:
- Read all contract source files ( files in )
- Scan for V1 patterns using detection rules from detection-rules.md:
- Grep for Tier 1 patterns (syntax) — highest confidence, most common
- Grep for Tier 2 patterns (visibility, errors, events)
- Grep for Tier 3 patterns (API migrations) — flag for manual review
- Cross-reference coupled patterns (T3-09+T3-10)
- Categorize each finding: line number, rule ID, pattern name, proposed change, tier, confidence
- Build the Analysis Report
Exit: Analysis Report ready for presentation.
Phase 2: Present Analysis (GATE 1)
Entry: Analysis Report complete.
Actions:
- Present the full Analysis Report to the user in this format:
## Modernization Analysis Report
### Summary
- Tier 1 (Syntax): X findings
- Tier 2 (Visibility & Errors): X findings
- Tier 3 (API Migrations): X findings
### Findings
| # | File:Line | Rule | Pattern | Proposed Change | Tier | Confidence |
|---|-----------|------|---------|-----------------|------|------------|
| 1 | src/mod.move:15 | T1-01 | vector::borrow | → index notation | 1 | High |
| ... | ... | ... | ... | ... | ... | ... |
### Tier 3 Warnings (if any)
- T3-03: coin → fungible_asset migration is a major rewrite (X locations)
- Ask the user to choose scope:
- (Tier 1 only) — zero risk, just cleaner syntax
- (Tier 1 + Tier 2) — recommended default, syntax + visibility + error constants
- (all tiers) — includes API migrations, higher risk
- Highlight any Tier 3 items that require major rewrites
- If scope includes Tier 3, ask the user about deployment context:
- Compatible — Upgrading an already-deployed contract. Breaking changes
are excluded even if the scope includes them. Rules marked ⚠ Breaking are skipped.
- Fresh deploy — New deployment or willing to redeploy. All changes
in the selected scope are applied including breaking changes.
Exit: User has confirmed scope (and deployment context if Tier 3 is included). Do NOT proceed until confirmed.
Phase 3: Establish Test Safety Net
Entry: User confirmed scope.
Actions:
- Search for existing tests:
- modules within source files
- files
- directory
- If no tests found: stop and invoke skill to create comprehensive tests first, then return here
- Run to establish a passing baseline
- Record baseline: number of tests, all passing status
Exit: All tests pass. Baseline recorded. If tests fail pre-modernization, stop and address test failures first — do not modernize on a broken test suite.
Phase 4: Apply Transformations (with Feedback Loops)
Entry: Test baseline established.
Actions — apply in tier order:
Tier 1 (if scope includes it — always):
- Apply all Tier 1 syntax changes per transformation-guide.md
- Run
- If tests fail → revert all Tier 1 changes, investigate which specific change caused failure, fix and retry
Tier 2 (if scope is or ):
4. Apply all Tier 2 changes per transformation guide
5. Run
6. If tests fail → revert all Tier 2 changes, investigate and fix
Tier 3 (if scope is only):
7. Apply Tier 3 changes ONE AT A TIME (not all at once)
- If deployment context is : skip any rule marked ⚠ Breaking. Add to the skipped list with reason "breaking change, excluded in compatible mode."
- If deployment context is : apply all rules in scope normally.
- Run after EACH individual Tier 3 change
- If tests fail → revert that specific change, note it as skipped, proceed to next Tier 3 item
Exit: All approved changes applied, all tests passing.
Phase 5: Final Verification
Entry: All transformations applied.
Actions:
- Run
aptos move test --coverage
- Verify test coverage is >= baseline (should be same or better)
- Generate Modernization Summary Report:
## Modernization Summary
### Changes Applied
- Tier 1: X changes (syntax)
- Tier 2: X changes (visibility & errors)
- Tier 3: X changes (API migrations)
### Changes Skipped
- [List any skipped items with reasons]
### Test Results
- Tests: X passing (baseline: Y)
- Coverage: X% (baseline: Y%)
### Files Modified
- [List of modified files]
Exit: Report presented to user.
Modernization Scope Quick Reference
| Scope | Tiers | Risk | When to Use |
|---|
| Tier 1 | Zero | Just clean up syntax, no semantic changes |
| Tier 1+2 | Low | Default. Syntax + visibility + error constants |
| Tier 1+2+3 | Medium-High | Full migration including API changes |
Tier Quick Reference
| Tier | What Changes | Risk | Examples |
|---|
| 1 — Syntax | Code reads differently, compiles identically | Zero | → , → , while (i < n) { ... i += 1 }
→ |
| 2 — Visibility & Errors | Same semantics, cleaner declarations | Low | → , magic numbers → constants |
| 3 — API Migrations | Different APIs, same intended behavior. Most are breaking changes. | Medium-High | → , → , → , manual loops → stdlib // with lambdas |
See detection-rules.md for the complete rule catalog (22 rules across 3 tiers).
Rationalizations to Reject
| Rationalization | Why It's Wrong |
|---|
| "Tests pass so the modernization is correct" | Tests verify behavior, not code quality. Review changes manually too. |
| "This contract is simple, skip the analysis" | Simple contracts can have subtle patterns. Always analyze first. |
| "Let's do all tiers at once to save time" | If tests break, you can't isolate which change caused it. Always tier. |
| "The receiver-style call looks right" | Must verify the target function declares . False positives are common. |
| "Error constants can have new names and values" | Existing tests depend on exact numeric values. Preserve them. |
| "No tests exist, but the changes are safe" | Without tests there is no safety net. Generate tests first. |
| "Tier 3 changes are optional, skip the test run" | Every change needs verification. Tier 3 is highest risk — test MORE, not less. |
Success Criteria
Reference Index
| File | Content |
|---|
| detection-rules.md | Complete V1 pattern detection catalog (22 rules across 3 tiers) |
| transformation-guide.md | Before/after code, safety checks, edge cases per rule |
| MOVE_V2_SYNTAX.md | Full V2 syntax reference |
| OBJECTS.md | Modern object model patterns |
| ADVANCED_TYPES.md | Enums, signed integers, phantom types |