First: stabilize
Remove public artifacts, stop broken automation, confirm backups and document the current system before making structural changes.
The storefront loaded. Customers could browse. Revenue was still coming in. But the system had become a black box: old runtime, undocumented automation, exposed internal artifacts and no clear migration path.
Anonymized case study. Client name, domain, geography, credentials and hosting account are not disclosed.
The client was running a specialized e-commerce store on a legacy CMS stack. The business depended on it: product pages, catalog navigation, order flow, customer communication and integrations all passed through the same system.
From the outside, there was no obvious emergency. The site looked alive, pages loaded, and customers could interact with the catalog. The real problem was operational uncertainty: no current system map, no staging environment, and integrations originally built by someone no longer involved.
The owner did not need a blind rewrite. They needed to know what was safe, what was fragile, what was already broken, and what should happen first.
The audit connected technical symptoms to business risk. The point was not to list scary findings. The point was to show what could interrupt revenue, block modernization or make every future fix more expensive.
The discovery phase did not modify production. After review, the owner approved a focused set of low-risk quick wins.
Legacy systems become dangerous when every problem looks equally urgent. The audit separated immediate risk, staged technical work and long-term modernization.
Remove public artifacts, stop broken automation, confirm backups and document the current system before making structural changes.
Update critical components in a controlled environment. Payment, cart, search and captcha-related modules should not be upgraded blindly on production.
Move runtime and dependencies to supported versions, restore missing business flows and decide which parts should be preserved, refactored or migrated.
The second case goes deeper into a mature e-commerce system: public admin utility, public CMS artifacts, 89 exposed package archives, shared administrator access, runtime mismatch and catalog dictionary drift.
Kintsugi Kode turns old websites, CRMs and backend systems into a map, a risk register and a practical action plan.