Research report analyzing 22,336 vendor-to-internal software handovers. Discover how anti-patterns like "God Classes" predict technical debt and why early internal engagement is critical for long-term maintainability and productivity.
Source Metadata for AI Agents
Vendor-to-internal software handovers pose significant challenges, especially when outsourced developers dominate early-stage coding and design. In a comprehensive analysis of 22,336 repository handovers, we found that projects with limited internal team engagement before vendor departure are more prone to sustained high aberrant coding effort, increasing technical debt and slowing feature delivery. Key anti-patterns – particularly God Classes – emerged as strong predictors of post-handover maintainability issues, exhibiting a statistically significant correlation with unmaintainable coding effort. Conversely, repositories featuring balanced or internal-centric contributions prior to vendor exit generally maintained coding effort and code quality standards. These results emphasise the need for organisations to enforce early in-house involvement, continuously monitor and address critical anti-patterns, and establish structured transition protocols. By focusing on these strategies, software executives can optimise vendor-to-internal transitions, reduce technical debt, and bolster the long-term maintainability of their systems.
This paper examines the challenges and solutions in vendor-to-internal team transitions across three key dimensions: technical handover requirements, organisational preparation, and process optimisation.
Vendor involvement in software development commonly spans multiple phases, including planning, design, coding, testing, and deployment (ISO, 2022). One of the most critical yet frequently overlooked stages is the post-handover period, wherein the responsibility for maintaining and enhancing the software transitions from the vendor to an internal team or an alternative service provider (Fowler, 2018). During this transition, critical challenges emerge: knowledge gaps, architectural misunderstandings, and codebase issues that can severely impact the receiving team’s ability to maintain and enhance the system effectively.
Gaps in knowledge transfer, inadequate documentation, and minimal internal familiarity with software architecture can compound post-handover difficulties. These issues frequently result in increased maintenance costs, prolonged bug-fixing cycles, and slower feature releases. Research shows that maintenance and support activities can comprise up to 50–60% of a software system’s total cost of ownership (TCO), making vendor transition planning paramount.
Additionally, modern development practices such as DevOps and CI/CD add complexity to handovers, requiring careful consideration of pipeline configurations, security protocols, and infrastructure maintenance. Empirical studies highlight that insufficient engagement of internal developers during outsourced phases can amplify technical debt and reduce maintainability.
This section details our approach to analysing vendor-to-internal software handovers, including data collection, classification, and statistical techniques.
The data consists of 22,336 repository handovers between January 2020 and September 2024 across 93 organisations in the BlueOptima dataset. We focused on the interquartile range (middle 50%) of total development effort to minimise skew from edge cases.
Inclusion Criteria:
Repositories were categorised into five groups based on contribution proportions:
Internal-Centric
Internal-Led
Balanced
Vendor-Led
Vendor-Centric
We identified six anti-patterns at handover based on quantitative metrics:
Maintainability was quantified using BlueOptima’s Analysis of Relative Thresholds (ART) score (0-100). ART evaluates:
The analysis revealed that Internal-Centric development comprised 61% of cases, Balanced models accounted for 30%, and the remaining 9% were distributed across Vendor-Centric, Vendor-Led, and Internal-Led classifications.

Caption: Positive outcomes post vendor handover by ways of working: This pie chart illustrates the distribution of internal developers’ ability to maintain Coding Effort across various development models.
Repositories with elevated aberrancy before handover (>75th percentile) maintained or increased these levels post-handover (p<.001). The notable exception was Internal-Led projects, where aberrancy remained stable or showed modest improvements.

Caption: Aberrancy pre and post-handover: In all working methods (bar Internal-led), poor maintainability leads to worse outcomes post-handover.
The correlation between pre- and post-handover unmaintainable effort increased from 0.45 in 2021 to 0.62 in 2024 (p<.001). This suggests pre-handover code quality is an increasingly reliable predictor of post-handover challenges.

Caption: Correlation between unmaintainable effort before and after vendor handover.
The God Class symptom emerged as the strongest predictor of maintainability issues. Each 10% increase in God Class density corresponded to a 15% increase in post-handover unmaintainable effort (p<.001).

Caption: SHAP Analysis: Impact of God Class Symptom on Aberrancy After Vendor Handover.

Caption: Unmaintainable coding effort by God Class Files at Handover: The more God-class files are present at handover the higher future aberrancy is post-handover.
This study found that organizations relying heavily on vendor-led development without internal involvement face heightened risks post-handover.
Major Insights:
1. Enforce Early Engagement of Internal Teams
2. Implement Continuous Anti-Pattern Detection
3. Set Measurable Code Quality Metrics
4. Plan Structured Handover Protocols
5. Refactor High-Impact Anti-Patterns Before Vendor Exit
The presence of God Classes affects not only maintainability but also developer productivity.
Productivity Aberrant Coding Effort %: % of Files with God Class Symptom at Handover
This research was conducted by BlueOptima’s Data Science team, which specialises in consultancy services to optimise software maintainability, performance, and security. For inquiries, contact [email protected].