128 lines
3.7 KiB
YAML
128 lines
3.7 KiB
YAML
# Kin specialist pool — roles available for pipeline construction.
|
|
# PM selects from this pool based on task type.
|
|
|
|
specialists:
|
|
pm:
|
|
name: "Project Manager"
|
|
model: sonnet
|
|
tools: [Read, Grep, Glob]
|
|
description: "Decomposes tasks, selects specialists, builds pipelines"
|
|
permissions: read_only
|
|
context_rules:
|
|
decisions: all
|
|
modules: all
|
|
|
|
architect:
|
|
name: "Software Architect"
|
|
model: sonnet
|
|
tools: [Read, Grep, Glob]
|
|
description: "Designs solutions, reviews structure, writes specs"
|
|
permissions: read_only
|
|
context_rules:
|
|
decisions: all
|
|
modules: all
|
|
|
|
debugger:
|
|
name: "Debugger"
|
|
model: sonnet
|
|
tools: [Read, Grep, Glob, Bash]
|
|
description: "Finds root causes, reads logs, traces execution"
|
|
permissions: read_bash
|
|
working_dir: project
|
|
context_rules:
|
|
decisions: [gotcha, workaround]
|
|
|
|
frontend_dev:
|
|
name: "Frontend Developer"
|
|
model: sonnet
|
|
tools: [Read, Write, Edit, Bash, Glob, Grep]
|
|
description: "Implements UI: Vue, CSS, components, composables"
|
|
permissions: full
|
|
working_dir: project
|
|
context_rules:
|
|
decisions: [gotcha, workaround, convention]
|
|
|
|
backend_dev:
|
|
name: "Backend Developer"
|
|
model: sonnet
|
|
tools: [Read, Write, Edit, Bash, Glob, Grep]
|
|
description: "Implements API, services, database, business logic"
|
|
permissions: full
|
|
working_dir: project
|
|
context_rules:
|
|
decisions: [gotcha, workaround, convention]
|
|
|
|
tester:
|
|
name: "Tester"
|
|
model: sonnet
|
|
tools: [Read, Write, Bash, Glob, Grep]
|
|
description: "Writes and runs tests, verifies fixes"
|
|
permissions: full
|
|
working_dir: project
|
|
context_rules:
|
|
decisions: []
|
|
|
|
reviewer:
|
|
name: "Code Reviewer"
|
|
model: sonnet
|
|
tools: [Read, Grep, Glob]
|
|
description: "Reviews code for quality, conventions, bugs"
|
|
permissions: read_only
|
|
context_rules:
|
|
decisions: [convention]
|
|
|
|
security:
|
|
name: "Security Engineer"
|
|
model: sonnet
|
|
tools: [Read, Grep, Glob, Bash]
|
|
description: "OWASP audit, auth checks, secrets scan, vulnerability analysis"
|
|
permissions: read_bash
|
|
working_dir: project
|
|
context_rules:
|
|
decisions_category: security
|
|
|
|
tech_researcher:
|
|
name: "Tech Researcher"
|
|
model: sonnet
|
|
tools: [Read, Grep, Glob, WebFetch, Bash]
|
|
description: "Studies external APIs (docs, endpoints, limits, quirks), compares with codebase, produces structured review"
|
|
permissions: read_only
|
|
context_rules:
|
|
decisions: [gotcha, workaround]
|
|
output_schema:
|
|
status: "done | partial | blocked"
|
|
api_overview: string
|
|
endpoints: "array of { method, path, description, params, response_schema }"
|
|
rate_limits: "{ requests_per_minute, requests_per_day, notes }"
|
|
auth_method: string
|
|
data_schemas: "array of { name, fields }"
|
|
limitations: "array of strings"
|
|
gotchas: "array of strings"
|
|
codebase_diff: "array of { file, line_hint, issue, suggestion }"
|
|
notes: string
|
|
|
|
# Route templates — PM uses these to build pipelines
|
|
routes:
|
|
debug:
|
|
steps: [debugger, tester, frontend_dev, tester]
|
|
description: "Find bug → verify → fix → verify fix"
|
|
|
|
feature:
|
|
steps: [architect, frontend_dev, tester, reviewer]
|
|
description: "Design → implement → test → review"
|
|
|
|
refactor:
|
|
steps: [architect, frontend_dev, tester, reviewer]
|
|
description: "Plan refactor → implement → test → review"
|
|
|
|
hotfix:
|
|
steps: [debugger, frontend_dev, tester]
|
|
description: "Find → fix → verify (fast track)"
|
|
|
|
security_audit:
|
|
steps: [security, architect]
|
|
description: "Audit → remediation plan"
|
|
|
|
api_research:
|
|
steps: [tech_researcher, architect]
|
|
description: "Study external API → integration plan"
|