The challenge for non-technical deal teams is that technical debt is largely invisible without examining the right documentation. Management presentations describe the technology stack in favorable terms. Architecture diagrams show the intended state, not the current state. The actual condition of a technology platform — its age, its maintainability, its distance from industry standard practices — lives in documents that are available in the VDR but rarely prioritized in a compressed diligence review.

These are eight patterns that appear in VDR documentation, what each means for post-close operations, and what a deal team should do when they find one.

The Eight Red Flags

1. Unsupported or End-of-Life Software Versions

Where it appears: Asset inventories, infrastructure lists, deployment documentation

Software vendors publish end-of-life dates for operating systems, databases, and programming language runtimes. After that date, no security patches are released. Running production systems on end-of-life software is not just technical debt — it's an unpatched vulnerability that every security scanner flags immediately.

Business impact: Regulatory penalties in data-sensitive industries; uninsurable under most cyber policies after end-of-life date; forced migration at emergency cost if exploited.

Deal team action: Request full software version inventory. Cross-reference against published end-of-life dates for all production systems. Any production system running unsupported software becomes a remediation line item in the deal model. Reference: endoflife.date tracks EOL dates for 300+ software products.

2. No Automated Testing

Where it appears: CI/CD pipeline documentation, developer tooling specs, engineering team descriptions

Automated testing — unit tests, integration tests, end-to-end tests — is how engineering teams verify that changes to a codebase don't break existing functionality. Without it, every code change carries higher risk of introducing production failures. The absence of automated testing significantly increases the cost of maintaining and evolving the platform post-close.

Business impact: Higher defect rates post-integration; slower development velocity; increased cost to add features that were part of the acquisition rationale.

Deal team action: Ask for the CI/CD pipeline documentation and test coverage reports. The absence of both is more informative than the presence of one. Factor additional engineering investment into post-close operating model if test coverage is below 60% for core systems.

3. Monolithic Architecture in a Scaling Business

Where it appears: System architecture diagrams, engineering team org charts, deployment documentation

A monolithic application — all functionality in a single deployable unit — is a reasonable architecture at small scale. As a business grows, it becomes a constraint on development speed and reliability. Deploying a change to one feature requires redeploying the entire system. One component's failure can cascade. Scaling one function requires scaling the whole.

Business impact: If the acquisition rationale includes scaling the business, a monolith constrains the path to scale. The cost to modernize is a 12–24 month engineering project with material ongoing staffing requirements.

Deal team action: Request architecture overview. If the description is a single system with shared database and single deployment artifact for core functionality, it's a monolith. Evaluate against the scaling requirements in the acquisition thesis.

4. High Engineer Turnover in Core Systems

Where it appears: Engineering org charts, HR data, system ownership documentation

Technical debt is compounded by knowledge loss. When the engineers who built a system leave, the institutional knowledge of why it was built the way it was — the constraints, the workarounds, the undocumented dependencies — leaves with them. High turnover in engineering teams responsible for core systems is a red flag that's distinct from the technical state of the systems themselves.

Business impact: Integration risk increases significantly when the team that knows the system is no longer present. Post-close engineering velocity is lower. Incident response is slower.

Deal team action: Request engineering organization historical data — tenure distribution, recent departures, roles of departed engineers. Cross-reference with system ownership documentation to identify knowledge concentration and gaps.

5. Inadequate or Missing Documentation

Where it appears: Document inventory, architecture documentation, API specifications

A technology platform that lacks documentation for its core systems — architecture, APIs, data models, operational procedures — is a platform that can only be operated by the people who built it. When those people leave, or when the acquirer's team needs to understand and modify the systems, the absence of documentation becomes an immediate operational liability.

Business impact: Higher onboarding cost for new engineers; slower integration; elevated risk of operational incidents from changes made without full understanding of system behavior.

Deal team action: Request the technical documentation library as a standard IRL item. Assess completeness and currency — documentation that's three years out of date for a system that's been actively developed is as problematic as no documentation.

6. Software Licensing Debt

Where it appears: IT asset registers, software procurement records, vendor contracts

Software licensing compliance is not universally enforced, but it is auditable. A company using enterprise software beyond its licensed scope — whether through user count overages, deployment environment violations, or open-source license non-compliance — carries licensing liability that transfers with the acquisition. The acquirer's own vendor relationships may prompt audits post-close.

Business impact: Retroactive licensing costs in vendor audits; open-source license violations (particularly GPL) can require disclosure of proprietary source code or injunctions against distribution.

Deal team action: Request software license inventory and procurement records. Specifically ask for open-source component inventory — many companies are not aware of the license terms of the open-source packages their product depends on. Reference: Linux Foundation open-source compliance guidance.

7. Vendor Lock-in Without Exit Clauses

Where it appears: Vendor contracts, infrastructure cost breakdown, architecture documentation

Heavy dependency on a single cloud provider, infrastructure vendor, or software platform — without negotiated exit clauses or portability provisions — creates pricing and operational leverage for the vendor that typically increases post-acquisition. Acquisition is often the trigger for vendor renegotiation, and not always in the acquirer's favor.

Business impact: Infrastructure cost increases post-close; migration cost if the acquirer's infrastructure standards conflict with the target's; operational disruption if vendor terms change.

Deal team action: Review major vendor contracts for termination provisions, pricing change notice periods, and data portability clauses. Assess switching cost for primary infrastructure dependencies.

8. Security Certificate and Credential Management Gaps

Where it appears: Security policy documentation, infrastructure specifications, SSL/TLS certificate inventory

Expired SSL certificates, shared credentials across systems, and the absence of a secrets management solution are operational risks that produce immediate incidents — website downtime from expired certificates, credential-based breaches from shared access — and signal broader security hygiene problems. These are discoverable from documentation and system specification review before close.

Business impact: Production downtime from expired certificates (increasingly common in companies that don't automate renewal); breach risk from shared credentials; compliance failures in regulated environments.

Deal team action: Request certificate inventory and renewal procedures. Ask specifically whether credentials are stored in a secrets management system (HashiCorp Vault, AWS Secrets Manager, etc.) or managed manually. The answer tells you a lot about security culture. Reference: OWASP Top 10 lists credential management among the top web application security risks.

Translating Red Flags Into Deal Model Inputs

Each of these patterns has a remediation cost that can be estimated. Not precisely — but within a range that's useful for deal model purposes. That range should appear as a line item in the post-close investment plan, not as a qualitative risk footnote.

The pattern we see in deals that go well post-close: diligence identified and priced the technical debt; the deal model included a remediation budget in the 100-day plan; integration engineering knew exactly what to address first. The pattern in deals that go badly: technical debt was noted qualitatively and discounted; post-close engineering discovered the scope was larger than estimated; integration timeline extended; synergy targets missed.

Technical debt that is priced is manageable. Technical debt that is discovered post-close is a surprise — and surprises in M&A integration are expensive. See our case studies for examples of both.

← What Investment Committee–Ready Means ← All Perspectives