Architect Agent
Overview
| Field | Value |
|---|---|
| Agent ID | architect-agent |
| SDLC Stage | Stage 2: Architecture and Design |
| Human Owner | Solution Architect |
| Role Guide | Solution Architect Guide |
| Prompt Template | prompt-library/by-role/solution-architect/architecture-conformance-and-agent-handoffs.md |
| Contract Version | 1.0.0 |
| Status | Active |
What This Agent Does
The architect-agent is the gatekeeper of architectural integrity. It validates that every story conforms to the reference architecture before implementation begins, identifies integration points, and ensures agent handoff compatibility.
Core responsibilities:
- Architecture conformance assessment — Validate the proposed work against the reference architecture and boundary constraints
- Design proposal — Propose the technical approach (patterns, components, integration points) within architecture guidelines
- Boundary enforcement — Ensure no unauthorized boundary crossings (e.g., direct database access from a frontend component)
- Integration mapping — Identify all systems, services, and APIs that the implementation will touch
- Agent handoff compatibility — Verify the design can be implemented within the downstream agent contracts
- Constraint documentation — Explicitly list constraints the
developer-agentmust respect
Agent Contract
agent_id: architect-agent
contract_version: 1.0.0
role_owner: solution-architect
allowed_inputs:
- capacity-assessed-story
- reference-architecture-docs
- technology-constraints
- existing-codebase-structure
- agent-contracts
allowed_outputs:
- architecture-conformance-assessment
- design-proposal
- constraint-list
- integration-map
- risk-assessment
forbidden_actions:
- approve-own-designs # Self-approval violates PRD-STD-009 REQ-009-04
- bypass-governance-gate # Architecture decisions are governance-subject
- write-implementation-code # Implementation belongs to developer-agent
- modify-agent-contracts # Contract changes require human Solution Architect
- override-security-constraints # Security constraints are non-negotiable
required_checks:
- reference-architecture-validated
- boundary-constraints-verified
- integration-points-documented
- no-unauthorized-boundary-crossings
handoff_targets:
- agent: developer-agent
artifact: approved-design-with-constraints
condition: architecture-approved
escalation_path:
approver_role: solution-architect
triggers:
- new-architectural-pattern
- boundary-crossing-required
- technology-stack-change
- tier-2-or-higher-work
System Prompt Blueprint
You are architect-agent for [PROJECT_NAME].
Your role: Validate stories against the reference architecture, propose
design approaches, and document constraints for implementation.
Reference architecture:
[PASTE OR LINK YOUR REFERENCE ARCHITECTURE DOCS]
Contract boundaries:
- You MUST NOT approve your own design proposals
- You MUST NOT write implementation code
- You MUST NOT bypass governance requirements
- You MUST escalate new patterns, boundary crossings, and Tier 2+ work
For every story you receive, produce:
1. Architecture conformance assessment (CONFORMS / REQUIRES_REVIEW / VIOLATES)
2. Design proposal (patterns, components, integration points)
3. Constraint list (what developer-agent must respect)
4. Integration map (systems, services, APIs touched)
5. Risk assessment (architecture-specific risks)
When a story requires new patterns or boundary crossings, escalate to
the human Solution Architect.
Reference: prompt-library/by-role/solution-architect/architecture-conformance-and-agent-handoffs.md
Standards: PRD-STD-007 (Quality Gates), PRD-STD-009 (Agent Governance)
Handoff Specifications
Receives From (Upstream)
| Source | Artifact | Trigger |
|---|---|---|
scrum-agent | Capacity-assessed story with impediment analysis | Sprint fit confirmed |
Sends To (Downstream)
| Target | Artifact | Condition |
|---|---|---|
developer-agent | Approved design with constraints and integration map | Architecture approved (human approval for Tier 2+) |
Gate Responsibilities
This agent owns Gate 2 criteria:
| Criterion | How This Agent Satisfies It |
|---|---|
| Design conforms to reference architecture | Produces conformance assessment |
| No unauthorized boundary crossings | Validates all boundaries explicitly |
| Integration points identified and documented | Produces integration map |
| Human architect approval for Tier 2+ | Escalates to Solution Architect for Tier 2+ |
Trust Level Progression
| Level | Duration | What Changes |
|---|---|---|
| Level 0 | 3 weeks / 20 runs | Human Architect reviews every assessment |
| Level 1 | 8 weeks / 50 runs | Auto-approve Tier 1 within established patterns |
| Level 2 | 16 weeks / 100 runs | Auto-approve Tier 1-2 within known domains |
| Level 3 | Typically not reached | Architecture decisions remain high-impact; human review for Tier 3+ |
Note: This agent has the slowest trust progression because architecture decisions are high-impact and difficult to reverse.
Environment Scope
| Environment | Access | Allowed Actions |
|---|---|---|
| Development | Full | Validate architecture, propose designs, document constraints |
| Staging | Read-only | May review integration test results for conformance |
| Production | None | Does not operate in Production |
Implementation Guide
Step 1: Encode Your Reference Architecture
The architect-agent is only as good as the reference architecture it validates against. You must provide:
- Component boundary definitions
- Approved technology stack
- Integration patterns (REST, gRPC, event-driven, etc.)
- Data flow constraints
- Security boundary rules
Step 2: Build the Conformance Ruleset
Define machine-checkable rules:
conformance_rules:
- rule: "frontend-no-direct-db"
description: "Frontend components must not access database directly"
severity: critical
- rule: "api-gateway-required"
description: "External requests must pass through API gateway"
severity: critical
- rule: "auth-via-identity-service"
description: "Authentication must use the identity service, not custom implementations"
severity: high
Step 3: Configure Context Window
The architect-agent typically needs a large context window to hold:
- Reference architecture documentation
- Existing codebase structure (folder tree, key interfaces)
- Agent contracts for downstream validation
Use a model with ≥100K token context or implement retrieval-augmented generation (RAG) for architecture docs.
Step 4: Wire the Escalation Path
For Tier 2+ work, the orchestrator must:
- Block the pipeline
- Notify the human Solution Architect with the design proposal
- Wait for approval (max 4 hours per escalation SLA)
- Resume pipeline with approval or route to rework
Known Limitations
- Reference architecture must be current — Stale architecture docs produce incorrect conformance assessments. Review quarterly.
- Cannot assess runtime behavior — The agent validates structural design, not performance characteristics. Load testing happens in Staging.
- Limited cross-project visibility — The agent sees one project's architecture. Cross-project integration requires human architect review.
- May not detect subtle pattern violations — Complex boundary violations (e.g., transitive dependencies creating unauthorized coupling) may escape detection.
- Slowest trust progression — Architecture mistakes are expensive. Expect this agent to remain at Level 1-2 for most teams.
Standards Compliance
| Standard | Requirement | Evidence This Agent Produces |
|---|---|---|
| PRD-STD-007 | Quality gate enforcement | Conformance assessment with pass/fail per criterion |
| PRD-STD-009 | Agent contracts and governance | Agent ID, contract, run records |
| PRD-STD-009 REQ-009-08 | Human approval for architecture decisions | Escalation to Solution Architect for Tier 2+ |