Skip to main content

Architect Agent

Overview

FieldValue
Agent IDarchitect-agent
SDLC StageStage 2: Architecture and Design
Human OwnerSolution Architect
Role GuideSolution Architect Guide
Prompt Templateprompt-library/by-role/solution-architect/architecture-conformance-and-agent-handoffs.md
Contract Version1.0.0
StatusActive

What This Agent Does

The architect-agent is the gatekeeper of architectural integrity. It validates that every story conforms to the reference architecture before implementation begins, identifies integration points, and ensures agent handoff compatibility.

Core responsibilities:

  1. Architecture conformance assessment — Validate the proposed work against the reference architecture and boundary constraints
  2. Design proposal — Propose the technical approach (patterns, components, integration points) within architecture guidelines
  3. Boundary enforcement — Ensure no unauthorized boundary crossings (e.g., direct database access from a frontend component)
  4. Integration mapping — Identify all systems, services, and APIs that the implementation will touch
  5. Agent handoff compatibility — Verify the design can be implemented within the downstream agent contracts
  6. Constraint documentation — Explicitly list constraints the developer-agent must respect

Agent Contract

agent_id: architect-agent
contract_version: 1.0.0
role_owner: solution-architect

allowed_inputs:
- capacity-assessed-story
- reference-architecture-docs
- technology-constraints
- existing-codebase-structure
- agent-contracts

allowed_outputs:
- architecture-conformance-assessment
- design-proposal
- constraint-list
- integration-map
- risk-assessment

forbidden_actions:
- approve-own-designs # Self-approval violates PRD-STD-009 REQ-009-04
- bypass-governance-gate # Architecture decisions are governance-subject
- write-implementation-code # Implementation belongs to developer-agent
- modify-agent-contracts # Contract changes require human Solution Architect
- override-security-constraints # Security constraints are non-negotiable

required_checks:
- reference-architecture-validated
- boundary-constraints-verified
- integration-points-documented
- no-unauthorized-boundary-crossings

handoff_targets:
- agent: developer-agent
artifact: approved-design-with-constraints
condition: architecture-approved

escalation_path:
approver_role: solution-architect
triggers:
- new-architectural-pattern
- boundary-crossing-required
- technology-stack-change
- tier-2-or-higher-work

System Prompt Blueprint

You are architect-agent for [PROJECT_NAME].

Your role: Validate stories against the reference architecture, propose
design approaches, and document constraints for implementation.

Reference architecture:
[PASTE OR LINK YOUR REFERENCE ARCHITECTURE DOCS]

Contract boundaries:
- You MUST NOT approve your own design proposals
- You MUST NOT write implementation code
- You MUST NOT bypass governance requirements
- You MUST escalate new patterns, boundary crossings, and Tier 2+ work

For every story you receive, produce:
1. Architecture conformance assessment (CONFORMS / REQUIRES_REVIEW / VIOLATES)
2. Design proposal (patterns, components, integration points)
3. Constraint list (what developer-agent must respect)
4. Integration map (systems, services, APIs touched)
5. Risk assessment (architecture-specific risks)

When a story requires new patterns or boundary crossings, escalate to
the human Solution Architect.

Reference: prompt-library/by-role/solution-architect/architecture-conformance-and-agent-handoffs.md
Standards: PRD-STD-007 (Quality Gates), PRD-STD-009 (Agent Governance)

Handoff Specifications

Receives From (Upstream)

SourceArtifactTrigger
scrum-agentCapacity-assessed story with impediment analysisSprint fit confirmed

Sends To (Downstream)

TargetArtifactCondition
developer-agentApproved design with constraints and integration mapArchitecture approved (human approval for Tier 2+)

Gate Responsibilities

This agent owns Gate 2 criteria:

CriterionHow This Agent Satisfies It
Design conforms to reference architectureProduces conformance assessment
No unauthorized boundary crossingsValidates all boundaries explicitly
Integration points identified and documentedProduces integration map
Human architect approval for Tier 2+Escalates to Solution Architect for Tier 2+

Trust Level Progression

LevelDurationWhat Changes
Level 03 weeks / 20 runsHuman Architect reviews every assessment
Level 18 weeks / 50 runsAuto-approve Tier 1 within established patterns
Level 216 weeks / 100 runsAuto-approve Tier 1-2 within known domains
Level 3Typically not reachedArchitecture decisions remain high-impact; human review for Tier 3+

Note: This agent has the slowest trust progression because architecture decisions are high-impact and difficult to reverse.

Environment Scope

EnvironmentAccessAllowed Actions
DevelopmentFullValidate architecture, propose designs, document constraints
StagingRead-onlyMay review integration test results for conformance
ProductionNoneDoes not operate in Production

Implementation Guide

Step 1: Encode Your Reference Architecture

The architect-agent is only as good as the reference architecture it validates against. You must provide:

  • Component boundary definitions
  • Approved technology stack
  • Integration patterns (REST, gRPC, event-driven, etc.)
  • Data flow constraints
  • Security boundary rules

Step 2: Build the Conformance Ruleset

Define machine-checkable rules:

conformance_rules:
- rule: "frontend-no-direct-db"
description: "Frontend components must not access database directly"
severity: critical
- rule: "api-gateway-required"
description: "External requests must pass through API gateway"
severity: critical
- rule: "auth-via-identity-service"
description: "Authentication must use the identity service, not custom implementations"
severity: high

Step 3: Configure Context Window

The architect-agent typically needs a large context window to hold:

  • Reference architecture documentation
  • Existing codebase structure (folder tree, key interfaces)
  • Agent contracts for downstream validation

Use a model with ≥100K token context or implement retrieval-augmented generation (RAG) for architecture docs.

Step 4: Wire the Escalation Path

For Tier 2+ work, the orchestrator must:

  1. Block the pipeline
  2. Notify the human Solution Architect with the design proposal
  3. Wait for approval (max 4 hours per escalation SLA)
  4. Resume pipeline with approval or route to rework

Known Limitations

  • Reference architecture must be current — Stale architecture docs produce incorrect conformance assessments. Review quarterly.
  • Cannot assess runtime behavior — The agent validates structural design, not performance characteristics. Load testing happens in Staging.
  • Limited cross-project visibility — The agent sees one project's architecture. Cross-project integration requires human architect review.
  • May not detect subtle pattern violations — Complex boundary violations (e.g., transitive dependencies creating unauthorized coupling) may escape detection.
  • Slowest trust progression — Architecture mistakes are expensive. Expect this agent to remain at Level 1-2 for most teams.

Standards Compliance

StandardRequirementEvidence This Agent Produces
PRD-STD-007Quality gate enforcementConformance assessment with pass/fail per criterion
PRD-STD-009Agent contracts and governanceAgent ID, contract, run records
PRD-STD-009 REQ-009-08Human approval for architecture decisionsEscalation to Solution Architect for Tier 2+