# Kin specialist pool — roles available for pipeline construction. # PM selects from this pool based on task type. specialists: pm: name: "Project Manager" model: sonnet tools: [Read, Grep, Glob] description: "Decomposes tasks, selects specialists, builds pipelines" permissions: read_only context_rules: decisions: all modules: all architect: name: "Software Architect" model: sonnet tools: [Read, Grep, Glob] description: "Designs solutions, reviews structure, writes specs" permissions: read_only context_rules: decisions: all modules: all debugger: name: "Debugger" model: sonnet tools: [Read, Grep, Glob, Bash] description: "Finds root causes, reads logs, traces execution" permissions: read_bash working_dir: project context_rules: decisions: [gotcha, workaround] frontend_dev: name: "Frontend Developer" model: sonnet tools: [Read, Write, Edit, Bash, Glob, Grep] description: "Implements UI: Vue, CSS, components, composables" permissions: full working_dir: project context_rules: decisions: [gotcha, workaround, convention] backend_dev: name: "Backend Developer" model: sonnet tools: [Read, Write, Edit, Bash, Glob, Grep] description: "Implements API, services, database, business logic" permissions: full working_dir: project context_rules: decisions: [gotcha, workaround, convention] tester: name: "Tester" model: sonnet tools: [Read, Write, Bash, Glob, Grep] description: "Writes and runs tests, verifies fixes" permissions: full working_dir: project context_rules: decisions: [] reviewer: name: "Code Reviewer" model: sonnet tools: [Read, Grep, Glob] description: "Reviews code for quality, conventions, bugs" permissions: read_only context_rules: decisions: [convention] security: name: "Security Engineer" model: sonnet tools: [Read, Grep, Glob, Bash] description: "OWASP audit, auth checks, secrets scan, vulnerability analysis" permissions: read_bash working_dir: project context_rules: decisions_category: security sysadmin: name: "Sysadmin" model: sonnet tools: [Bash, Read] description: "SSH-based server scanner: maps running services, open ports, configs, versions via remote commands" permissions: read_bash context_rules: decisions: all modules: all tech_researcher: name: "Tech Researcher" model: sonnet tools: [Read, Grep, Glob, WebFetch, Bash] description: "Studies external APIs (docs, endpoints, limits, quirks), compares with codebase, produces structured review" permissions: read_only context_rules: decisions: [gotcha, workaround] output_schema: status: "done | partial | blocked" api_overview: string endpoints: "array of { method, path, description, params, response_schema }" rate_limits: "{ requests_per_minute, requests_per_day, notes }" auth_method: string data_schemas: "array of { name, fields }" limitations: "array of strings" gotchas: "array of strings" codebase_diff: "array of { file, line_hint, issue, suggestion }" notes: string # Route templates — PM uses these to build pipelines routes: debug: steps: [debugger, tester, frontend_dev, tester] description: "Find bug → verify → fix → verify fix" feature: steps: [architect, frontend_dev, tester, reviewer] description: "Design → implement → test → review" refactor: steps: [architect, frontend_dev, tester, reviewer] description: "Plan refactor → implement → test → review" hotfix: steps: [debugger, frontend_dev, tester] description: "Find → fix → verify (fast track)" security_audit: steps: [security, architect] description: "Audit → remediation plan" api_research: steps: [tech_researcher, architect] description: "Study external API → integration plan" infra_scan: steps: [sysadmin, reviewer] description: "SSH scan server → map services/ports/configs → review findings" infra_debug: steps: [sysadmin, debugger, reviewer] description: "SSH diagnose → find root cause → verify fix plan"