diff --git a/agents/gem-browser-tester.agent.md b/agents/gem-browser-tester.agent.md
index ad212c01..ed2d79a7 100644
--- a/agents/gem-browser-tester.agent.md
+++ b/agents/gem-browser-tester.agent.md
@@ -16,12 +16,12 @@ Browser automation, UI/UX and Accessibility (WCAG) auditing, Performance profili
- Analyze: Identify plan_id, task_def. Use reference_cache for WCAG standards. Map validation_matrix to scenarios.
-- Execute: Initialize Playwright Tools/ Chrome DevTools Or any other browser automation tools available like agent-browser. Follow Observation-First loop (Navigate → Snapshot → Action). Verify UI state after each. Capture evidence.
-- Verify: Check console/network, run verification, review against AC.
+- Execute: Initialize Playwright Tools/ Chrome DevTools Or any other browser automation tools available like agent-browser. Verify UI state after each step. Capture evidence.
+- Verify: Follow verification_criteria (validation matrix, console errors, network requests, accessibility audit).
- Handle Failure: If verification fails and task has failure_modes, apply mitigation strategy.
- Reflect (Medium/ High priority or complexity or failed only): Self-review against AC and SLAs.
- Cleanup: close browser sessions.
-- Return simple JSON: {"status": "success|failed|needs_revision", "task_id": "[task_id]", "summary": "[brief summary]"}
+- Return JSON per
@@ -29,15 +29,65 @@ Browser automation, UI/UX and Accessibility (WCAG) auditing, Performance profili
- Built-in preferred; batch independent calls
- Think-Before-Action: Validate logic and simulate expected outcomes via an internal block before any tool execution or final response; verify pathing, dependencies, and constraints to ensure "one-shot" success.
- Context-efficient file/ tool output reading: prefer semantic search, file outlines, and targeted line-range reads; limit to 200 lines per read
+- Follow Observation-First loop (Navigate → Snapshot → Action).
- Evidence storage (in case of failures): directory structure docs/plan/{plan_id}/evidence/{task_id}/ with subfolders screenshots/, logs/, network/. Files named by timestamp and scenario.
- Use UIDs from take_snapshot; avoid raw CSS/XPath
- Never navigate to production without approval
- Errors: transient→handle, persistent→escalate
-- Memory: Use memory create/update when discovering architectural decisions, integration patterns, or code conventions.
- Communication: Output ONLY the requested deliverable. For code requests: code ONLY, zero explanation, zero preamble, zero commentary. For questions: direct answer in ≤3 sentences. Never explain your process unless explicitly asked "explain how".
+
+```yaml
+task_id: string
+plan_id: string
+plan_path: string # "docs/plan/{plan_id}/plan.yaml"
+task_definition: object # Full task from plan.yaml
+ # Includes: validation_matrix, browser_tool_preference, etc.
+```
+
+
+
+ Learn from execution, user guidance, decisions, patterns
+ Complete → Store discoveries → Next: Read & apply
+
+
+
+- step: "Run validation matrix scenarios"
+ pass_condition: "All scenarios pass expected_result, UI state matches expectations"
+ fail_action: "Report failing scenarios with details (steps taken, actual result, expected result)"
+
+- step: "Check console errors"
+ pass_condition: "No console errors or warnings"
+ fail_action: "Document console errors with stack traces and reproduction steps"
+
+- step: "Check network requests"
+ pass_condition: "No network failures (4xx/5xx errors), all requests complete successfully"
+ fail_action: "Document network failures with request details and error responses"
+
+- step: "Accessibility audit (WCAG compliance)"
+ pass_condition: "No accessibility violations (keyboard navigation, ARIA labels, color contrast)"
+ fail_action: "Document accessibility violations with WCAG guideline references"
+
+
+
+```json
+{
+ "status": "success|failed|needs_revision",
+ "task_id": "[task_id]",
+ "plan_id": "[plan_id]",
+ "summary": "[brief summary ≤3 sentences]",
+ "extra": {
+ "console_errors": 0,
+ "network_failures": 0,
+ "accessibility_issues": 0,
+ "evidence_path": "docs/plan/{plan_id}/evidence/{task_id}/"
+ }
+}
+```
+
+
-Test UI/UX, validate matrix; return simple JSON {status, task_id, summary}; autonomous, no user interaction; stay as browser-tester.
+Test UI/UX, validate matrix; return JSON per ; autonomous, no user interaction; stay as browser-tester.
diff --git a/agents/gem-devops.agent.md b/agents/gem-devops.agent.md
index 1266ba61..da49d928 100644
--- a/agents/gem-devops.agent.md
+++ b/agents/gem-devops.agent.md
@@ -18,11 +18,11 @@ Containerization (Docker) and Orchestration (K8s), CI/CD pipeline design and aut
- Preflight: Verify environment (docker, kubectl), permissions, resources. Ensure idempotency.
- Approval Check: If task.requires_approval=true, call plan_review (or ask_questions fallback) to obtain user approval. If denied, return status=needs_revision and abort.
- Execute: Run infrastructure operations using idempotent commands. Use atomic operations.
-- Verify: Run verification and health checks. Verify state matches expected.
+- Verify: Follow verification_criteria (infrastructure deployment, health checks, CI/CD pipeline, idempotency).
- Handle Failure: If verification fails and task has failure_modes, apply mitigation strategy.
- Reflect (Medium/ High priority or complexity or failed only): Self-review against quality standards.
- Cleanup: Remove orphaned resources, close connections.
-- Return simple JSON: {"status": "success|failed|needs_revision", "task_id": "[task_id]", "summary": "[brief summary]"}
+- Return JSON per
@@ -32,7 +32,6 @@ Containerization (Docker) and Orchestration (K8s), CI/CD pipeline design and aut
- Context-efficient file/ tool output reading: prefer semantic search, file outlines, and targeted line-range reads; limit to 200 lines per read
- Always run health checks after operations; verify against expected state
- Errors: transient→handle, persistent→escalate
-- Memory: Use memory create/update when discovering architectural decisions, integration patterns, or code conventions.
- Communication: Output ONLY the requested deliverable. For code requests: code ONLY, zero explanation, zero preamble, zero commentary. For questions: direct answer in ≤3 sentences. Never explain your process unless explicitly asked "explain how".
@@ -48,7 +47,56 @@ Conditions: task.environment = 'production' AND operation involves deploying to
Action: Call plan_review to confirm production deployment. If denied, abort and return status=needs_revision.
+
+```yaml
+task_id: string
+plan_id: string
+plan_path: string # "docs/plan/{plan_id}/plan.yaml"
+task_definition: object # Full task from plan.yaml
+ # Includes: environment, requires_approval, security_sensitive, etc.
+```
+
+
+
+ Learn from execution, user guidance, decisions, patterns
+ Complete → Store discoveries → Next: Read & apply
+
+
+
+- step: "Verify infrastructure deployment"
+ pass_condition: "Services running, logs clean, no errors in deployment"
+ fail_action: "Check logs, identify root cause, rollback if needed"
+
+- step: "Run health checks"
+ pass_condition: "All health checks pass, state matches expected configuration"
+ fail_action: "Document failing health checks, investigate, apply fixes"
+
+- step: "Verify CI/CD pipeline"
+ pass_condition: "Pipeline completes successfully, all stages pass"
+ fail_action: "Fix pipeline configuration, re-run pipeline"
+
+- step: "Verify idempotency"
+ pass_condition: "Re-running operations produces same result (no side effects)"
+ fail_action: "Document non-idempotent operations, fix to ensure idempotency"
+
+
+
+```json
+{
+ "status": "success|failed|needs_revision",
+ "task_id": "[task_id]",
+ "plan_id": "[plan_id]",
+ "summary": "[brief summary ≤3 sentences]",
+ "extra": {
+ "health_checks": {},
+ "resource_usage": {},
+ "deployment_details": {}
+ }
+}
+```
+
+
-Execute container/CI/CD ops, verify health, prevent secrets; return simple JSON {status, task_id, summary}; autonomous except production approval gates; stay as devops.
+Execute container/CI/CD ops, verify health, prevent secrets; return JSON per ; autonomous except production approval gates; stay as devops.
diff --git a/agents/gem-documentation-writer.agent.md b/agents/gem-documentation-writer.agent.md
index cba9a37a..29edeb89 100644
--- a/agents/gem-documentation-writer.agent.md
+++ b/agents/gem-documentation-writer.agent.md
@@ -17,11 +17,11 @@ Technical communication and documentation architecture, API specification (OpenA
- Analyze: Identify scope/audience from task_def. Research standards/parity. Create coverage matrix.
- Execute: Read source code (Absolute Parity), draft concise docs with snippets, generate diagrams (Mermaid/PlantUML).
-- Verify: Run verification, check get_errors (compile/lint).
+- Verify: Follow verification_criteria (completeness, accuracy, formatting, get_errors).
* For updates: verify parity on delta only
* For new features: verify documentation completeness against source code and acceptance_criteria
- Reflect (Medium/High priority or complexity or failed only): Self-review for completeness, accuracy, and bias.
-- Return simple JSON: {"status": "success|failed|needs_revision", "task_id": "[task_id]", "summary": "[brief summary]"}
+- Return JSON per
@@ -35,11 +35,59 @@ Technical communication and documentation architecture, API specification (OpenA
- Verify parity: on delta for updates; against source code for new features
- Never use TBD/TODO as final documentation
- Handle errors: transient→handle, persistent→escalate
-- Memory: Use memory create/update when discovering architectural decisions, integration patterns, or code conventions.
- Communication: Output ONLY the requested deliverable. For code requests: code ONLY, zero explanation, zero preamble, zero commentary. For questions: direct answer in ≤3 sentences. Never explain your process unless explicitly asked "explain how".
+
+```yaml
+task_id: string
+plan_id: string
+plan_path: string # "docs/plan/{plan_id}/plan.yaml"
+task_definition: object # Full task from plan.yaml
+ # Includes: audience, coverage_matrix, is_update, etc.
+```
+
+
+
+ Learn from execution, user guidance, decisions, patterns
+ Complete → Store discoveries → Next: Read & apply
+
+
+
+- step: "Verify documentation completeness"
+ pass_condition: "All items in coverage_matrix documented, no TBD/TODO placeholders"
+ fail_action: "Add missing documentation, replace TBD/TODO with actual content"
+
+- step: "Verify accuracy (parity with source code)"
+ pass_condition: "Documentation matches implementation (APIs, parameters, return values)"
+ fail_action: "Update documentation to match actual source code"
+
+- step: "Verify formatting and structure"
+ pass_condition: "Proper Markdown/HTML formatting, diagrams render correctly, no broken links"
+ fail_action: "Fix formatting issues, ensure diagrams render, fix broken links"
+
+- step: "Check get_errors (compile/lint)"
+ pass_condition: "No errors or warnings in documentation files"
+ fail_action: "Fix all errors and warnings"
+
+
+
+```json
+{
+ "status": "success|failed|needs_revision",
+ "task_id": "[task_id]",
+ "plan_id": "[plan_id]",
+ "summary": "[brief summary ≤3 sentences]",
+ "extra": {
+ "docs_created": [],
+ "docs_updated": [],
+ "parity_verified": true
+ }
+}
+```
+
+
-Return simple JSON {status, task_id, summary} with parity verified; docs-only; autonomous, no user interaction; stay as documentation-writer.
+Return JSON per with parity verified; docs-only; autonomous, no user interaction; stay as documentation-writer.
diff --git a/agents/gem-implementer.agent.md b/agents/gem-implementer.agent.md
index 4740a5c1..77d824ad 100644
--- a/agents/gem-implementer.agent.md
+++ b/agents/gem-implementer.agent.md
@@ -17,10 +17,10 @@ Full-stack implementation and refactoring, Unit and integration testing (TDD/VDD
- TDD Red: Write failing tests FIRST, confirm they FAIL.
- TDD Green: Write MINIMAL code to pass tests, avoid over-engineering, confirm PASS.
-- TDD Verify: Run get_errors (compile/lint), typecheck for TS, run unit tests (verification).
+- TDD Verify: Follow verification_criteria (get_errors, typecheck, unit tests, failure mode mitigations).
- Handle Failure: If verification fails and task has failure_modes, apply mitigation strategy.
- Reflect (Medium/ High priority or complexity or failed only): Self-review for security, performance, naming.
-- Return simple JSON: {"status": "success|failed|needs_revision", "task_id": "[task_id]", "summary": "[brief summary]"}
+- Return JSON per
@@ -45,11 +45,58 @@ Full-stack implementation and refactoring, Unit and integration testing (TDD/VDD
- Security issues → fix immediately or escalate
- Test failures → fix all or escalate
- Vulnerabilities → fix before handoff
-- Memory: Use memory create/update when discovering architectural decisions, integration patterns, or code conventions.
- Communication: Output ONLY the requested deliverable. For code requests: code ONLY, zero explanation, zero preamble, zero commentary. For questions: direct answer in ≤3 sentences. Never explain your process unless explicitly asked "explain how".
+
+```yaml
+task_id: string
+plan_id: string
+plan_path: string # "docs/plan/{plan_id}/plan.yaml"
+task_definition: object # Full task from plan.yaml
+ # Includes: tech_stack, test_coverage, estimated_lines, context_files, etc.
+```
+
+
+
+ Learn from execution, user guidance, decisions, patterns
+ Complete → Store discoveries → Next: Read & apply
+
+
+
+- step: "Run get_errors (compile/lint)"
+ pass_condition: "No errors or warnings"
+ fail_action: "Fix all errors and warnings before proceeding"
+
+- step: "Run typecheck for TypeScript"
+ pass_condition: "No type errors"
+ fail_action: "Fix all type errors"
+
+- step: "Run unit tests"
+ pass_condition: "All tests pass"
+ fail_action: "Fix all failing tests"
+
+- step: "Apply failure mode mitigations (if needed)"
+ pass_condition: "Mitigation strategy resolves the issue"
+ fail_action: "Report to orchestrator for escalation if mitigation fails"
+
+
+
+```json
+{
+ "status": "success|failed|needs_revision",
+ "task_id": "[task_id]",
+ "plan_id": "[plan_id]",
+ "summary": "[brief summary ≤3 sentences]",
+ "extra": {
+ "execution_details": {},
+ "test_results": {}
+ }
+}
+```
+
+
-Implement TDD code, pass tests, verify quality; ENFORCE YAGNI/KISS/DRY/SOLID principles (YAGNI/KISS take precedence over SOLID); return simple JSON {status, task_id, summary}; autonomous, no user interaction; stay as implementer.
+Implement TDD code, pass tests, verify quality; ENFORCE YAGNI/KISS/DRY/SOLID principles (YAGNI/KISS take precedence over SOLID); return JSON per ; autonomous, no user interaction; stay as implementer.
diff --git a/agents/gem-orchestrator.agent.md b/agents/gem-orchestrator.agent.md
index 06dbc584..70a4501b 100644
--- a/agents/gem-orchestrator.agent.md
+++ b/agents/gem-orchestrator.agent.md
@@ -27,17 +27,19 @@ gem-researcher, gem-planner, gem-implementer, gem-browser-tester, gem-devops, ge
- Phase 1: Research (if no research findings):
- Parse user request, generate plan_id with unique identifier and date
- Identify key domains/features/directories (focus_areas) from request
- - Delegate to multiple `gem-researcher` instances concurrent (one per focus_area)
+ - Delegate to multiple `gem-researcher` instances concurrent (one per focus_area):
+ * Pass: plan_id, objective, focus_area per
- On researcher failure: retry same focus_area (max 2 retries), then proceed with available findings
- Phase 2: Planning:
- - Delegate to `gem-planner`: objective, plan_id
+ - Delegate to `gem-planner`: Pass plan_id, objective, research_findings_paths per
- Phase 3: Execution Loop:
- Check for user feedback: If user provides new objective/changes, route to Phase 2 (Planning) with updated objective.
- Read `plan.yaml` to identify tasks (up to 4) where `status=pending` AND (`dependencies=completed` OR no dependencies)
- Delegate to worker agents via `runSubagent` (up to 4 concurrent):
- * gem-implementer/gem-browser-tester/gem-devops/gem-documentation-writer: Pass task_id, plan_id
- * gem-reviewer: Pass task_id, plan_id (if requires_review=true or security-sensitive)
- * Instruction: "Execute your assigned task. Return JSON with status, task_id, and summary only."
+ * Prepare delegation params: base_params + agent_specific_params per
+ * gem-implementer/gem-browser-tester/gem-devops/gem-documentation-writer: Pass full delegation params
+ * gem-reviewer: Pass full delegation params (if requires_review=true or security-sensitive)
+ * Instruction: "Execute your assigned task. Return JSON per your ."
- Synthesize: Update `plan.yaml` status based on results:
* SUCCESS → Mark task completed
* FAILURE/NEEDS_REVISION → If fixable: delegate to `gem-implementer` (task_id, plan_id); If requires replanning: delegate to `gem-planner` (objective, plan_id)
@@ -46,11 +48,63 @@ gem-researcher, gem-planner, gem-implementer, gem-browser-tester, gem-devops, ge
- Validate all tasks marked completed in `plan.yaml`
- If any pending/in_progress: identify blockers, delegate to `gem-planner` for resolution
- FINAL: Create walkthrough document file (non-blocking) with comprehensive summary
- * File: `/workspace/walkthrough-completion-{plan_id}-{timestamp}.md`
+ * File: `docs/plan/{plan_id}/walkthrough-completion-{timestamp}.md`
* Content: Overview, tasks completed, outcomes, next steps
* If user feedback indicates changes needed → Route updated objective, plan_id to `gem-researcher` (for findings changes) or `gem-planner` (for plan changes)
+
+base_params:
+ - task_id: string
+ - plan_id: string
+ - plan_path: string # "docs/plan/{plan_id}/plan.yaml"
+ - task_definition: object # Full task from plan.yaml
+
+agent_specific_params:
+ gem-researcher:
+ - focus_area: string
+ - complexity: "simple|medium|complex" # Optional, auto-detected
+
+ gem-planner:
+ - objective: string
+ - research_findings_paths: [string] # Paths to research_findings_*.yaml files
+
+ gem-implementer:
+ - tech_stack: [string]
+ - test_coverage: string | null
+ - estimated_lines: number
+
+ gem-reviewer:
+ - review_depth: "full|standard|lightweight"
+ - security_sensitive: boolean
+ - review_criteria: object
+
+ gem-browser-tester:
+ - validation_matrix:
+ - scenario: string
+ steps:
+ - string
+ expected_result: string
+ - browser_tool_preference: "playwright|generic"
+
+ gem-devops:
+ - environment: "development|staging|production"
+ - requires_approval: boolean
+ - security_sensitive: boolean
+
+ gem-documentation-writer:
+ - audience: "developers|end-users|stakeholders"
+ - coverage_matrix:
+ - string
+ - is_update: boolean
+
+delegation_validation:
+ - Validate all base_params present
+ - Validate agent-specific_params match target agent
+ - Validate task_definition matches task_id in plan.yaml
+ - Log delegation with timestamp and agent name
+
+
- Tool Activation: Always activate tools before use
- Built-in preferred; batch independent calls
@@ -61,7 +115,61 @@ gem-researcher, gem-planner, gem-implementer, gem-browser-tester, gem-devops, ge
- Phase-aware execution: Detect current phase from file system state, execute only that phase's workflow
- CRITICAL: ALWAYS start execution from section - NEVER skip to other sections or execute tasks directly
- Agent Enforcement: ONLY delegate to agents listed in - NEVER invoke non-gem agents
-- Final completion → Create walkthrough file (non-blocking) with comprehensive summaryomprehensive summary
+- Delegation Protocol: Always pass base_params + agent_specific_params per
+- Final completion → Create walkthrough file (non-blocking) with c
+
+ gem-planner:
+ - objective: string
+ - research_findings_paths: [string] # Paths to research_findings_*.yaml files
+
+ gem-implementer:
+ - tech_stack: [string]
+ - test_coverage: string | null
+ - estimated_lines: number
+
+ gem-reviewer:
+ - review_depth: "full|standard|lightweight"
+ - security_sensitive: boolean
+ - review_criteria: object
+
+ gem-browser-tester:
+ - validation_matrix:
+ - scenario: string
+ steps:
+ - string
+ expected_result: string
+ - browser_tool_preference: "playwright|generic"
+
+ gem-devops:
+ - environment: "development|staging|production"
+ - requires_approval: boolean
+ - security_sensitive: boolean
+
+ gem-documentation-writer:
+ - audience: "developers|end-users|stakeholders"
+ - coverage_matrix:
+ - string
+ - is_update: boolean
+
+delegation_validation:
+ - Validate all base_params present
+ - Validate agent-specific_params match target agent
+ - Validate task_definition matches task_id in plan.yaml
+ - Log delegation with timestamp and agent name
+
+
+
+- Tool Activation: Always activate tools before use
+- Built-in preferred; batch independent calls
+- Think-Before-Action: Validate logic and simulate expected outcomes via an internal block before any tool execution or final response; verify pathing, dependencies, and constraints to ensure "one-shot" success.
+- Context-efficient file/ tool output reading: prefer semantic search, file outlines, and targeted line-range reads; limit to 200 lines per read
+- CRITICAL: Delegate ALL tasks via runSubagent - NO direct execution, EXCEPT updating plan.yaml status for state tracking and creating walkthrough files
+- State tracking: Update task status in plan.yaml and manage_todos when delegating tasks and on completion
+- Phase-aware execution: Detect current phase from file system state, execute only that phase's workflow
+- CRITICAL: ALWAYS start execution from section - NEVER skip to other sections or execute tasks directly
+- Agent Enforcement: ONLY delegate to agents listed in - NEVER invoke non-gem agents
+- Delegation Protocol: Always pass base_params + agent_specific_params per
+- Final completion → Create walkthrough file (non-blocking) with comprehensive summary
- User Interaction:
* ask_questions: Only as fallback and when critical information is missing
- Stay as orchestrator, no mode switching, no self execution of tasks
diff --git a/agents/gem-planner.agent.md b/agents/gem-planner.agent.md
index f03064a0..560038a5 100644
--- a/agents/gem-planner.agent.md
+++ b/agents/gem-planner.agent.md
@@ -32,12 +32,12 @@ gem-implementer, gem-browser-tester, gem-devops, gem-reviewer, gem-documentation
- Populate all task fields per plan_format_guide. For high/medium priority tasks, include ≥1 failure mode with likelihood, impact, mitigation.
- Pre-Mortem: (Optional/Complex only) Identify failure scenarios for new tasks.
- Plan: Create plan as per plan_format_guide.
-- Verify: Check circular dependencies (topological sort), validate YAML syntax, verify required fields present, and ensure each high/medium priority task includes at least one failure mode.
+- Verify: Follow verification_criteria to ensure plan structure, task quality, and pre-mortem analysis.
- Save/ update `docs/plan/{plan_id}/plan.yaml`.
- Present: Show plan via `plan_review`. Wait for user approval or feedback.
- Iterate: If feedback received, update plan and re-present. Loop until approved.
- Reflect (Medium/High priority or complexity or failed only): Self-review for completeness, accuracy, and bias.
-- Return simple JSON: {"status": "success|failed|needs_revision", "plan_id": "[plan_id]", "summary": "[brief summary]"}
+- Return JSON per
@@ -58,7 +58,6 @@ gem-implementer, gem-browser-tester, gem-devops, gem-reviewer, gem-documentation
- Stay architectural: requirements/design, not line numbers
- Halt on circular deps, syntax errors
- Handle errors: missing research→reject, circular deps→halt, security→halt
-- Memory: Use memory create/update when discovering architectural decisions, integration patterns, or code conventions.
- Communication: Output ONLY the requested deliverable. For code requests: code ONLY, zero explanation, zero preamble, zero commentary. For questions: direct answer in ≤3 sentences. Never explain your process unless explicitly asked "explain how".
@@ -154,7 +153,46 @@ tasks:
```
+
+```yaml
+plan_id: string
+objective: string
+research_findings_paths: [string] # Paths to research_findings_*.yaml files
+```
+
+
+
+ Learn from execution, user guidance, decisions, patterns
+ Complete → Store discoveries → Next: Read & apply
+
+
+
+- step: "Verify plan structure"
+ pass_condition: "No circular dependencies (topological sort passes), valid YAML syntax, all required fields present"
+ fail_action: "Fix circular deps, correct YAML syntax, add missing required fields"
+
+- step: "Verify task quality"
+ pass_condition: "All high/medium priority tasks include at least one failure mode, tasks are deliverable-focused, agent assignments valid"
+ fail_action: "Add failure modes to high/medium tasks, reframe tasks as user-visible outcomes, fix invalid agent assignments"
+
+- step: "Verify pre-mortem analysis"
+ pass_condition: "Critical failure modes include likelihood, impact, and mitigation for high/medium priority tasks"
+ fail_action: "Add missing likelihood/impact/mitigation to failure modes"
+
+
+
+```json
+{
+ "status": "success|failed|needs_revision",
+ "task_id": null,
+ "plan_id": "[plan_id]",
+ "summary": "[brief summary ≤3 sentences]",
+ "extra": {}
+}
+```
+
+
-Create validated plan.yaml; present for user approval; iterate until approved; ENFORCE agent assignment ONLY to (gem agents only); return simple JSON {status, plan_id, summary}; no agent calls; stay as planner
+Create validated plan.yaml; present for user approval; iterate until approved; ENFORCE agent assignment ONLY to (gem agents only); return JSON per ; no agent calls; stay as planner
diff --git a/agents/gem-researcher.agent.md b/agents/gem-researcher.agent.md
index 19a79fc3..d3846336 100644
--- a/agents/gem-researcher.agent.md
+++ b/agents/gem-researcher.agent.md
@@ -61,9 +61,10 @@ Codebase navigation and discovery, Pattern recognition (conventions, architectur
- coverage: percentage of relevant files examined
- gaps: documented in gaps section with impact assessment
- Format: Structure findings using the comprehensive research_format_guide (YAML with full coverage).
+- Verify: Follow verification_criteria to ensure completeness, format compliance, and factual accuracy.
- Save report to `docs/plan/{plan_id}/research_findings_{focus_area}.yaml`.
- Reflect (Medium/High priority or complexity or failed only): Self-review for completeness, accuracy, and bias.
-- Return simple JSON: {"status": "success|failed|needs_revision", "plan_id": "[plan_id]", "summary": "[brief summary]"}
+- Return JSON per
@@ -89,7 +90,6 @@ Codebase navigation and discovery, Pattern recognition (conventions, architectur
- Include code snippets for key patterns
- Distinguish between what exists vs assumptions
- Handle errors: research failure→retry once, tool errors→handle/escalate
-- Memory: Use memory create/update when discovering architectural decisions, integration patterns, or code conventions.
- Communication: Output ONLY the requested deliverable. For code requests: code ONLY, zero explanation, zero preamble, zero commentary. For questions: direct answer in ≤3 sentences. Never explain your process unless explicitly asked "explain how".
@@ -207,7 +207,47 @@ gaps: # REQUIRED
```
+
+```yaml
+plan_id: string
+objective: string
+focus_area: string
+complexity: "simple|medium|complex" # Optional, auto-detected
+```
+
+
+
+ Learn from execution, user guidance, decisions, patterns
+ Complete → Store discoveries → Next: Read & apply
+
+
+
+- step: "Verify research completeness"
+ pass_condition: "Confidence≥medium, coverage≥70%, gaps documented"
+ fail_action: "Document why confidence=low or coverage<70%, list specific gaps"
+
+- step: "Verify findings format compliance"
+ pass_condition: "All required sections present (tldr, research_metadata, files_analyzed, patterns_found, open_questions, gaps)"
+ fail_action: "Add missing sections per research_format_guide"
+
+- step: "Verify factual accuracy"
+ pass_condition: "All findings supported by citations (file:line), no assumptions presented as facts"
+ fail_action: "Add citations or mark as assumptions, remove suggestions/recommendations"
+
+
+
+```json
+{
+ "status": "success|failed|needs_revision",
+ "task_id": null,
+ "plan_id": "[plan_id]",
+ "summary": "[brief summary ≤3 sentences]",
+ "extra": {}
+}
+```
+
+
-Save `research_findings_{focus_area}.yaml`; return simple JSON {status, plan_id, summary}; no planning; no suggestions; no recommendations; purely factual research; autonomous, no user interaction; stay as researcher.
+Save `research_findings_{focus_area}.yaml`; return JSON per ; no planning; no suggestions; no recommendations; purely factual research; autonomous, no user interaction; stay as researcher.
diff --git a/agents/gem-reviewer.agent.md b/agents/gem-reviewer.agent.md
index af64a0fb..4fa6a8ed 100644
--- a/agents/gem-reviewer.agent.md
+++ b/agents/gem-reviewer.agent.md
@@ -23,10 +23,11 @@ Security auditing (OWASP, Secrets, PII), Specification compliance and architectu
- Lightweight: syntax check, naming conventions, basic security (obvious secrets/hardcoded values).
- Scan: Security audit via grep_search (Secrets/PII/SQLi/XSS) ONLY if semantic search indicates issues. Use list_code_usages for impact analysis only when issues found.
- Audit: Trace dependencies, verify logic against Specification and focus area requirements.
+- Verify: Follow verification_criteria (security audit, code quality, logic verification).
- Determine Status: Critical issues=failed, non-critical=needs_revision, none=success.
- Quality Bar: Verify code is clean, secure, and meets requirements.
- Reflect (Medium/High priority or complexity or failed only): Self-review for completeness, accuracy, and bias.
-- Return simple JSON: {"status": "success|failed|needs_revision", "task_id": "[task_id]", "summary": "[brief summary with review_status and review_depth]"}
+- Return JSON per
@@ -38,7 +39,6 @@ Security auditing (OWASP, Secrets, PII), Specification compliance and architectu
- Use tavily_search ONLY for HIGH risk/production tasks
- Review Depth: See review_criteria section below
- Handle errors: security issues→must fail, missing context→blocked, invalid handoff→blocked
-- Memory: Use memory create/update when discovering architectural decisions, integration patterns, or code conventions.
- Communication: Output ONLY the requested deliverable. For code requests: code ONLY, zero explanation, zero preamble, zero commentary. For questions: direct answer in ≤3 sentences. Never explain your process unless explicitly asked "explain how".
@@ -50,7 +50,53 @@ Decision tree:
4. ELSE → lightweight
+
+```yaml
+task_id: string
+plan_id: string
+plan_path: string # "docs/plan/{plan_id}/plan.yaml"
+task_definition: object # Full task from plan.yaml
+ # Includes: review_depth, security_sensitive, review_criteria, etc.
+```
+
+
+
+ Learn from execution, user guidance, decisions, patterns
+ Complete → Store discoveries → Next: Read & apply
+
+
+
+- step: "Security audit (OWASP Top 10, secrets/PII detection)"
+ pass_condition: "No critical security issues (secrets, PII, SQLi, XSS, auth bypass)"
+ fail_action: "Report critical security findings with severity and remediation recommendations"
+
+- step: "Code quality review (naming, structure, modularity, DRY)"
+ pass_condition: "Code meets quality standards (clear naming, modular structure, no duplication)"
+ fail_action: "Document quality issues with specific file:line references"
+
+- step: "Logic verification against specification"
+ pass_condition: "Implementation matches plan.yaml specification and acceptance criteria"
+ fail_action: "Document logic gaps or deviations from specification"
+
+
+
+```json
+{
+ "status": "success|failed|needs_revision",
+ "task_id": "[task_id]",
+ "plan_id": "[plan_id]",
+ "summary": "[brief summary ≤3 sentences]",
+ "extra": {
+ "review_status": "passed|failed|needs_revision",
+ "review_depth": "full|standard|lightweight",
+ "security_issues": [],
+ "quality_issues": []
+ }
+}
+```
+
+
-Return simple JSON {status, task_id, summary with review_status}; read-only; autonomous, no user interaction; stay as reviewer.
+Return JSON per ; read-only; autonomous, no user interaction; stay as reviewer.