A comprehensive, enterprise-grade framework for AI-assisted software development using Claude Code with 6 specialized agents, reusable skills, and 3 mandatory quality gates.
This repository contains a complete system for managing AI-assisted development workflows with strict quality controls, security audits, and production deployment procedures. It combines:
- 6 Specialized Subagents - Each with a specific role in the development pipeline
- 6 Reusable Skills - Training manuals (3,084 lines) that guide each agent's behavior
- 3 Mandatory Gates - Quality checkpoints for design, code, and production
- 4 Test Categories - Positive, Negative, Non-Functional, Regression tests
- OWASP Top 10 - Complete security audit coverage
- Generic Patterns - Works with ANY project and ANY third-party API
- Quick Start
- The 5-Phase Pipeline
- The 3 Mandatory Gates
- Agents & Skills
- Repository Structure
- Key Files
- How to Use This Framework
- Security & Compliance
- Common Workflows
- Troubleshooting
- Clone this repository:
git clone https://github.com/arunenoah/Guide.git
cd Guide- Review the framework:
# Start here
cat README.md
# Then read the quick-start guide
cat SKILLS-QUICK-START.md
# Then understand the pipeline
cat AGENTS-SKILLS-VISUAL-GUIDE.txt
# Then see real examples
cat HOW-TO-USE-AGENTS-WITH-SKILLS.mdWhen you have a business requirement, invoke the tech-lead agent:
/invoke tech-lead "Using tech-lead-gates-skill, design this requirement:
[Your business requirement here]"
The framework will guide you through Gate A → Specification → Implementation → Code Review → Testing → Gate B → Security Audit → Gate C → Production.
PHASE 1: DESIGN (Tech-Lead)
↓
PHASE 2: SPECIFICATION (Tech-Writer)
↓
PHASE 3: IMPLEMENTATION (Senior-Engineer)
↓
PHASE 4: CODE REVIEW (Code-Reviewer)
↓
PHASE 5: TESTING (QA-Tester)
↓
GATE B: DRIFT & TEST AUDIT (Tech-Lead)
↓
SECURITY AUDIT (Security-Reviewer)
↓
GATE C: PRODUCTION (Tech-Lead + SRE)
- Goal: Approve or reject business requirement
- Deliverable:
[feature-name].mddesign document - Gate: Gate A - Design-to-Spec approval
- Goal: Create testable, unambiguous specification
- Deliverable:
[feature-name]-intended-docs.mdwith acceptance criteria, APIs, security requirements - Mandatory: Avoid vague language ("fast" → "< 200ms response time")
- Goal: Write code following Laravel patterns
- Deliverable: Feature branch with code, tests, migrations
- Standards: PHP 8.2+ strict types, UUID keys, dependency injection, 4 test categories
- Goal: Check for critical issues, security vulnerabilities, code quality
- Checklist: 10 critical issues (blocking), 8 high priority, 5 medium priority
- Decision: Approve or request changes
- Goal: Test ALL 4 categories - Positive, Negative, Non-Functional, Regression
- Deliverable: Test results with Playwright evidence
- Mandatory: All 4 categories must pass
- Goal: Verify code matches specification
- Checks: Circular test detection, specification drift, security constraints
- Red Flags: Cut corners, skipped error handling, unauthorized scope changes
- Goal: OWASP Top 10 verification
- Coverage: Authentication, injection prevention, sensitive data, rate limiting, third-party APIs
- Decision: Security approved or issues found
- Goal: Authorize production deployment
- Checks: All tests pass, no errors, performance OK, rollback plan tested
- Dual Sign-Off: Tech-Lead AND SRE must approve
- Post-Deploy: 30-minute monitoring window
When: Tech-writer creates intended-docs.md Who: Tech-Lead Purpose: Ensure spec is testable and unambiguous
REJECT if:
- Requirements are vague ("should be fast" - no number)
- Security not explicitly listed
- Third-party APIs not specified (name, authentication, error handling)
- No acceptance criteria or edge cases documented
APPROVE if: Spec has numbers, security details, and testable criteria
When: Code-reviewer approves + qa-tester finishes tests Who: Tech-Lead Purpose: Spot-check code and detect circular tests
Circular Test Detection: Tests pass because they mirror code flaws exactly
- Example Bad: Test only checks "feature exists" (not "constraint enforced")
- Example Good: Rate limit test makes 6 requests, 5 succeed, 6th fails with 429
REJECT if:
- Code doesn't match intended-docs.md
- Tests are circular (mock the constraint being tested)
- drift.md shows "cut corners" or "skipped error handling"
- Security constraints not actually enforced
When: All tests pass + Playwright evidence + 30min staging run Who: Tech-Lead + SRE Purpose: Authorize production deployment
Checks:
- All tests passed in staging
- No new error logs
- Performance baselines met
- Database migrations successful and reversible
- Rollback procedure tested
- Third-party services confirmed working
Auto-Rollback Triggers (execute immediately):
- Error rate > 5% for 5 minutes
- Database response time > 2 seconds
- Third-party service failures blocking feature
- Security incident detected
Agent = Worker (Executes Task)
Skill = Training Manual (Guidance)
When you invoke an agent, it loads its skill and follows that skill's checklist
| Agent | Skill | Role | Deliverable |
|---|---|---|---|
| tech-lead | tech-lead-gates-skill | Design approval, code audit, production auth | Gate A/B/C decisions |
| tech-writer | tech-writer-spec-skill | Create specification | intended-docs.md |
| senior-engineer | senior-engineer-laravel-skill | Implement feature | Code, tests, migrations |
| code-reviewer | code-reviewer-quality-skill | Review code quality | Approved/rejected PR |
| qa-tester | qa-testing-skill | Test all 4 categories | Test results, Playwright evidence |
| security-reviewer | security-audit-skill | OWASP Top 10 audit | Security report |
Purpose: Gate A, B, C checklists and approval decisions
Contains:
- Gate A: Design-to-Spec review checklist
- Gate B: Code audit + circular test detection
- Gate C: Production deployment authorization
- Rollback procedures and auto-rollback triggers
- Red flag checklist for blocking issues
Usage: /invoke tech-lead "Using tech-lead-gates-skill, [task]"
Purpose: Specification writing standards
Contains:
- Anti-pattern language to avoid (vague words)
- Pattern language to use (testable criteria)
- intended-docs.md template structure
- drift.md template for spec deviations
- Security, performance, API, database schema requirements
Usage: /invoke tech-writer "Using tech-writer-spec-skill, create specification for [feature]"
Purpose: Laravel implementation patterns
Contains:
- PHP 8.2+ strict typing, constructor promotion
- Database migrations with UUID primary keys
- Eloquent models with relationships and casts
- Service layer with dependency injection
- Form Request validation
- API Controllers and Resources
- Unit, feature, and integration test patterns
- Code quality checklist with 50+ items
- Exception handling and error responses
- PHPDoc documentation standards
Usage: /invoke senior-engineer "Using senior-engineer-laravel-skill, implement [feature]"
Purpose: Code quality and security checklist
Contains:
- 10 Critical Issues (blocking merge)
- 8 High Priority Issues (should fix)
- 5 Medium Priority suggestions
- SQL injection, N+1 queries, authorization checks
- Security vulnerability detection
- Hardcoded credentials and secrets
- Error handling and logging
- Performance anti-patterns
- File:line specific feedback format
Usage: /invoke code-reviewer "Using code-reviewer-quality-skill, review this PR"
Purpose: 4 mandatory test categories
Contains:
- Positive tests (happy path)
- Negative tests (error cases, edge cases, validation failures)
- Non-functional tests (performance, security, load testing)
- Regression tests (existing features still work)
- Playwright E2E testing patterns
- Mocking and unit test examples
- Bug reporting format with reproduction steps
- Performance benchmarking
- Security testing scenarios
Usage: /invoke qa-tester "Using qa-testing-skill, test [feature] with all 4 categories"
Purpose: OWASP Top 10 security verification
Contains:
- A01: Broken Access Control
- A02: Cryptographic Failures
- A03: Injection
- A04: Insecure Design
- A05: Security Misconfiguration
- A06: Sensitive Data Exposure
- A07: Identification and Authentication Failures
- A08: Software and Data Integrity Failures
- A09: Logging and Monitoring Failures
- A10: SSRF
- Third-party API integration security
- AWS service security (S3, SES, DynamoDB)
- Laravel security configuration
- Webhook signature verification
- Credential management
Usage: /invoke security-reviewer "Using security-audit-skill, audit [feature] for OWASP Top 10"
.
├── README.md ← START HERE
├── SKILLS-QUICK-START.md ← Print-friendly quick reference
├── AGENTS-SKILLS-VISUAL-GUIDE.txt ← ASCII diagrams of pipeline
│
├── claude_agents/ ← 6 AGENT INSTRUCTIONS
│ └── agents/
│ ├── tech-lead.md
│ ├── tech-writer.md
│ ├── senior-engineer.md
│ ├── code-reviewer.md
│ ├── qa-tester.md
│ └── security-reviewer.md
│
├── skills/ ← 6 REUSABLE SKILLS (3,084 lines)
│ ├── tech-lead-gates-skill/
│ │ └── SKILL.md ← Gate A, B, C checklists
│ ├── tech-writer-spec-skill/
│ │ └── SKILL.md ← Specification standards
│ ├── senior-engineer-laravel-skill/
│ │ └── SKILL.md ← Laravel patterns
│ ├── code-reviewer-quality-skill/
│ │ └── SKILL.md ← Code review checklist
│ ├── qa-testing-skill/
│ │ └── SKILL.md ← 4 test categories
│ └── security-audit-skill/
│ └── SKILL.md ← OWASP Top 10
│
├── HOW-TO-USE-AGENTS-WITH-SKILLS.md ← Real-world example (password reset)
├── AGENTS-SKILLS-COMMAND-REFERENCE.md ← Copy-paste commands for each phase
├── SKILLS-INTEGRATION-SUMMARY.md ← What each skill contains with examples
├── TECH-LEAD-GATES-QUICK-REFERENCE.md ← Printable Gate A/B/C card
│
├── SKILLS-UPDATE-GENERIC.md ← Generic patterns (not project-specific)
├── SKILLS-GENERIC-CHECKLIST.md ← Checklist to update skills
├── SKILLS-GENERIC-SUMMARY.txt ← Overview of generic updates
│
├── ARCHITECTURAL-REVIEW-SUMMARY.txt ← 10 critical gaps addressed
├── ARCHITECTURAL-REVIEW-IMPLEMENTATION.md ← How gaps were resolved
│
└── DEVELOPER-COMPLETE-POLICY.html ← Complete policy document
DEVELOPER-COMPLETE-POLICY-CRISP.html ← Concise version (350 lines)
TRAINING-QUIZ-COMPREHENSIVE.html ← 50-question quiz
SECURITY-HARDENED-STRATEGY.html ← Security best practices
ISO27001-SOC2-COMPLIANCE-MAPPING.html ← Compliance mapping
-
README.md (you are here)
- Overview and quick start
- Phase pipeline and gates
- Agent-skill relationship
-
SKILLS-QUICK-START.md
- Print-friendly quick reference
- One-line commands for each phase
- What each skill checks
- Troubleshooting guide
-
AGENTS-SKILLS-VISUAL-GUIDE.txt
- ASCII diagrams of 5-phase pipeline
- Relationship diagram
- Real-world workflow timeline
- Key principles checklist
-
HOW-TO-USE-AGENTS-WITH-SKILLS.md
- Real-world password reset example
- Phase-by-phase walkthrough
- Gate explanations with examples
- Common mistakes to avoid
-
AGENTS-SKILLS-COMMAND-REFERENCE.md
- Copy-paste ready prompts
- Expected outputs for each phase
- Gate signature templates
-
SKILLS-INTEGRATION-SUMMARY.md
- Complete skill details
- Code examples
- Benefits of each skill
- Validation checklist
-
TECH-LEAD-GATES-QUICK-REFERENCE.md
- Printable 1-page card
- Gate A/B/C checklists
- Decision trees
- Emergency rollback procedures
-
SKILLS-UPDATE-GENERIC.md
- Detailed before/after for each skill
- Generic patterns for ANY API
- Cloud service security checklist
- How to apply updates
-
SKILLS-GENERIC-CHECKLIST.md
- Line-by-line update checklist
- Specific examples to replace
- Validation tests
-
SKILLS-GENERIC-SUMMARY.txt
- Quick overview
- Before/after examples
- Benefits after update
- Placeholder mapping
-
ARCHITECTURAL-REVIEW-SUMMARY.txt
- 10 critical gaps identified
- How each gap was addressed
- Circular test examples
-
DEVELOPER-COMPLETE-POLICY.html
- 12 comprehensive sections
- Security hardening strategy
- Development workflow
- Code review checklist
-
TRAINING-QUIZ-COMPREHENSIVE.html
- 50-question interactive quiz
- 85% passing requirement
- Covers critical policies
You have a feature to build: "Add password reset functionality"
/invoke tech-lead "Using tech-lead-gates-skill, design this requirement:
Users should be able to reset their password via email.
They click 'forgot password', enter email, receive reset link,
click link, enter new password."
→ Deliverable: Design document with specification → Gate A: Tech-Lead approves design
/invoke tech-writer "Using tech-writer-spec-skill, create intended-docs.md
for password reset feature from this design:
[paste design document]
Include:
- Testable acceptance criteria (AC1, AC2, AC3)
- API endpoints with validation
- Security requirements (CSRF, password strength, rate limiting)
- Performance targets with numbers
- Database schema
- Third-party services if needed
- Error handling scenarios"
→ Deliverable: intended-docs.md with specification → Your Review: Verify spec is clear and testable
/invoke senior-engineer "Using senior-engineer-laravel-skill, implement
password reset feature following this specification:
[paste intended-docs.md]
This should include:
- Database migrations with UUID keys
- Models, services, controllers
- Form request validation
- Unit, feature, integration tests
- Error handling and logging"
→ Deliverable: Feature branch with complete code → Auto-Invokes: Code-Reviewer
/invoke code-reviewer "Using code-reviewer-quality-skill, review this PR:
[paste code]
Check for:
- 10 critical issues (blocking)
- 8 high priority issues
- 5 medium priority suggestions
- Security vulnerabilities
- Code quality"
→ Deliverable: Review with feedback → Decision: Approve or request changes
/invoke qa-tester "Using qa-testing-skill, test password reset feature
with ALL 4 test categories:
1. Positive tests (happy path - user resets password successfully)
2. Negative tests (invalid email, expired link, weak password, CSRF)
3. Non-functional tests (performance < 200ms, load test 100 concurrent)
4. Regression tests (existing auth still works)
Include Playwright E2E tests and evidence."
→ Deliverable: Test results with Playwright screenshots → All 4 Categories: Must pass
/invoke tech-lead "Using tech-lead-gates-skill, conduct Gate B audit:
1. Read actual code (not test reports)
2. Spot-check for circular tests
3. Review drift.md (any spec deviations?)
4. Verify security constraints actually enforced
Approve or request fixes."
→ Gate B: Tech-Lead approves implementation
/invoke security-reviewer "Using security-audit-skill, audit password reset
for OWASP Top 10:
[paste code]
Check:
- Authentication and authorization
- Injection prevention
- Sensitive data protection
- Rate limiting on password reset endpoint
- CSRF token verification
- Hardcoded credentials"
→ Deliverable: Security audit report → Decision: Approved or issues found
/invoke tech-lead "Using tech-lead-gates-skill, authorize Gate C deployment:
1. All tests passed in staging
2. No new errors
3. Performance OK
4. Rollback tested
5. Monitoring alerts configured
Dual sign-off required (Tech-Lead + SRE)."
→ Gate C: Tech-Lead + SRE authorize production
- Deploy to production
- Monitor for 30 minutes
- Auto-rollback if error rate > 5%
This framework implements:
- OWASP Top 10 - Complete checklist in security-audit-skill
- Secure Coding - Input validation, output encoding, authorization checks
- Credential Management - Environment variables, never hardcoded
- Third-Party APIs - Authentication, webhook signature verification, error handling
- Circular Test Detection - Prevents false positives in security tests
- ISO 27001 - Security control mapping available
- SOC 2 - Audit trail and logging standards
- GDPR - Sensitive data protection and retention
- Zero-Trust - Never trust external services by default
- Never commit secrets - Use environment variables
- Never skip tests - All 4 categories required
- Never bypass gates - Gate A, B, C are mandatory
- Never assume safety - Verify constraints are enforced, not just "code exists"
- Read requirement
/invoke tech-lead→ Design/invoke tech-writer→ Specification/invoke senior-engineer→ Implementation- Continue through gates to production
- Create fix in separate branch
- Minimal
/invoke code-reviewerreview - Comprehensive
/invoke qa-testertesting /invoke tech-leadGate C approval- Deploy with monitoring
/invoke code-reviewer→ Quality checklist- Check for critical issues
- Request changes or approve
- Pass to QA testing phase
- Read API documentation
- Review current implementation
- Update code following senior-engineer-laravel-skill patterns
- Update tests for new API behavior
/invoke security-reviewer→ Verify auth, rate limits, error handling- Gate C approval before production
- Requirement is too vague
- Security not explicitly listed
- Third-party API not specified (name, endpoints, auth method)
- Add numbers to performance requirements ("fast" → "< 200ms")
- Revise and resubmit
- Critical issue found (blocking merge)
- Ask code-reviewer for specific feedback
- Address issues in new commit
- Request re-review
- Run individual test categories
- Check error messages
- Verify test setup (mocks, fixtures)
qa-testing-skillhas troubleshooting section
- Code doesn't match specification
- Tests are circular (mock the constraint)
- Security not actually enforced
- Revise in staging and resubmit
- Auto-rollback: > 5% error rate for 5 min
- Manual rollback: Run
scripts/rollback.sh - Post-rollback: Investigate root cause in staging
- Re-deploy: Fix and get Gate C re-approval
- Skills are generic patterns
- Replace
[FeatureName],[Third-Party API]with your values - Adapt Laravel patterns to your framework (Node, Python, Go, etc.)
- See
SKILLS-UPDATE-GENERIC.mdfor mapping
cat SKILLS-QUICK-START.md
cat AGENTS-SKILLS-VISUAL-GUIDE.txtcat HOW-TO-USE-AGENTS-WITH-SKILLS.mdcat SKILLS-INTEGRATION-SUMMARY.mdcat skills/tech-lead-gates-skill/SKILL.mdIdentify a business requirement and invoke tech-lead with Gate A checklist
Take your feature through all 5 phases and 3 gates to production
Internal use only. Proprietary framework for enterprise-grade AI-assisted development.
For questions about using this framework:
- Check SKILLS-QUICK-START.md for quick reference
- Read HOW-TO-USE-AGENTS-WITH-SKILLS.md for detailed explanations
- Review relevant skill in skills/ directory
- Check TROUBLESHOOTING section above
This framework enables enterprise-grade software development with:
✅ 6 specialized agents ensuring quality at each phase ✅ 6 reusable skills (3,084 lines) guiding correct behavior ✅ 3 mandatory gates preventing defects from reaching production ✅ 4 test categories ensuring comprehensive coverage ✅ OWASP Top 10 security verification ✅ Generic patterns working with ANY project and ANY API ✅ Circular test detection preventing false security claims ✅ Clear rollback procedures and auto-rollback triggers
Start with a business requirement. Follow the 5-phase pipeline. Execute the 3 gates. Ship with confidence.
Happy shipping! 🚀