kin/agents/specialists.yaml

191 lines
5.7 KiB
YAML
Raw Normal View History

# Kin specialist pool — roles available for pipeline construction.
# PM selects from this pool based on task type.
specialists:
pm:
name: "Project Manager"
model: sonnet
tools: [Read, Grep, Glob]
description: "Decomposes tasks, selects specialists, builds pipelines"
permissions: read_only
context_rules:
decisions: all
modules: all
architect:
name: "Software Architect"
model: sonnet
tools: [Read, Grep, Glob]
description: "Designs solutions, reviews structure, writes specs"
permissions: read_only
context_rules:
decisions: all
modules: all
debugger:
name: "Debugger"
model: sonnet
tools: [Read, Grep, Glob, Bash]
description: "Finds root causes, reads logs, traces execution"
permissions: read_bash
working_dir: project
context_rules:
decisions: [gotcha, workaround]
frontend_dev:
name: "Frontend Developer"
model: sonnet
tools: [Read, Write, Edit, Bash, Glob, Grep]
description: "Implements UI: Vue, CSS, components, composables"
permissions: full
working_dir: project
context_rules:
decisions: [gotcha, workaround, convention]
backend_dev:
name: "Backend Developer"
model: sonnet
tools: [Read, Write, Edit, Bash, Glob, Grep]
description: "Implements API, services, database, business logic"
permissions: full
working_dir: project
context_rules:
decisions: [gotcha, workaround, convention]
tester:
name: "Tester"
model: sonnet
tools: [Read, Write, Bash, Glob, Grep]
description: "Writes and runs tests, verifies fixes"
permissions: full
working_dir: project
context_rules:
decisions: []
reviewer:
name: "Code Reviewer"
model: sonnet
tools: [Read, Grep, Glob]
description: "Reviews code for quality, conventions, bugs"
permissions: read_only
context_rules:
decisions: [convention]
security:
name: "Security Engineer"
model: sonnet
tools: [Read, Grep, Glob, Bash]
description: "OWASP audit, auth checks, secrets scan, vulnerability analysis"
permissions: read_bash
working_dir: project
context_rules:
decisions_category: security
sysadmin:
name: "Sysadmin"
model: sonnet
tools: [Bash, Read]
description: "SSH-based server scanner: maps running services, open ports, configs, versions via remote commands"
permissions: read_bash
context_rules:
decisions: all
modules: all
tech_researcher:
name: "Tech Researcher"
model: sonnet
tools: [Read, Grep, Glob, WebFetch, Bash]
description: "Studies external APIs (docs, endpoints, limits, quirks), compares with codebase, produces structured review"
permissions: read_only
context_rules:
decisions: [gotcha, workaround]
output_schema:
status: "done | partial | blocked"
api_overview: string
endpoints: "array of { method, path, description, params, response_schema }"
rate_limits: "{ requests_per_minute, requests_per_day, notes }"
auth_method: string
data_schemas: "array of { name, fields }"
limitations: "array of strings"
gotchas: "array of strings"
codebase_diff: "array of { file, line_hint, issue, suggestion }"
notes: string
constitution:
name: "Constitution Agent"
model: sonnet
tools: [Read, Grep, Glob]
description: "Defines project principles, constraints, and non-negotiables. First step in spec-driven workflow."
permissions: read_only
context_rules:
decisions: all
output_schema:
principles: "array of strings"
constraints: "array of strings"
goals: "array of strings"
spec:
name: "Spec Agent"
model: sonnet
tools: [Read, Grep, Glob]
description: "Creates detailed feature specification from constitution output. Second step in spec-driven workflow."
permissions: read_only
context_rules:
decisions: all
output_schema:
overview: string
features: "array of { name, description, acceptance_criteria }"
data_model: "array of { entity, fields }"
api_contracts: "array of { method, path, body, response }"
acceptance_criteria: string
task_decomposer:
name: "Task Decomposer"
model: sonnet
tools: [Read, Grep, Glob]
description: "Decomposes architect output into concrete implementation tasks. Creates child tasks in DB."
permissions: read_only
context_rules:
decisions: all
modules: all
output_schema:
tasks: "array of { title, brief, priority, category, acceptance_criteria }"
# Route templates — PM uses these to build pipelines
routes:
debug:
steps: [debugger, tester, frontend_dev, tester]
description: "Find bug → verify → fix → verify fix"
feature:
steps: [architect, frontend_dev, tester, reviewer]
description: "Design → implement → test → review"
refactor:
steps: [architect, frontend_dev, tester, reviewer]
description: "Plan refactor → implement → test → review"
hotfix:
steps: [debugger, frontend_dev, tester]
description: "Find → fix → verify (fast track)"
security_audit:
steps: [security, architect]
description: "Audit → remediation plan"
api_research:
steps: [tech_researcher, architect]
description: "Study external API → integration plan"
infra_scan:
steps: [sysadmin, reviewer]
description: "SSH scan server → map services/ports/configs → review findings"
infra_debug:
steps: [sysadmin, debugger, reviewer]
description: "SSH diagnose → find root cause → verify fix plan"
spec_driven:
steps: [constitution, spec, architect, task_decomposer]
description: "Constitution → spec → implementation plan → decompose into tasks"