Skip to main content

AI Agent SDLC Orchestration

This guide defines how AI agents collaborate across the complete software development lifecycle to deliver production-ready software with structured human checkpoints. It connects every role guide, prompt template, and production standard in the AEEF into a single, executable pipeline.

Canonical location note: This is the canonical orchestration model used by the Transformation track, the Production tier reference implementation, and the AEEF CLI wrapper. It lives under /transformation/ because it defines the operating model progression, but it applies through production and operations.

The Problem This Solves

Your AEEF framework has 12 role guides, 16 production standards, 11 role-specific prompts, and a 6-stage operating model — but no single document that answers: "How do all the agents actually work together, end-to-end, from a business idea to running production code?"

This guide is that document.

What You Will Get

DeliverableDescription
Agent Registry11 purpose-built agents mapped to SDLC stages with defined contracts
7-Stage PipelineComplete SDLC from requirements to operations with agent ownership at each stage
Stage GatesPass/fail criteria at every transition with automated and human checkpoints
Trust ModelProgressive automation levels that reduce human review as agents earn trust
Environment PromotionDev to Staging to Production with agent responsibilities at each environment
Orchestration RulesState machine, failure routing, escalation paths, and deadlock resolution
Skill Registry & Multi-Agent Gate PatternsSkill catalog enforcement, skill approval checks, and gate binding in orchestrated agent workflows

The 11-Agent Pipeline

Every agent maps to an existing AEEF role guide and prompt template. No agent exists without a human owner.

┌─────────────────────────────────────────────────────────────────────────────────┐
│ AI AGENT SDLC ORCHESTRATION PIPELINE │
│ │
│ STAGE 1 STAGE 2 STAGE 3 STAGE 4 STAGE 5 │
│ REQUIREMENTS DESIGN IMPLEMENTATION TESTING SECURITY │
│ │
│ ┌───────────┐ ┌───────────┐ ┌───────────┐ ┌───────────┐ ┌───────────┐ │
│ │ product- │ │ architect-│ │ developer-│ │ qa-agent │ │ security- │ │
│ │ agent │─>│ agent │──>│ agent │──>│ │─>│ agent │ │
│ └───────────┘ └───────────┘ └───────────┘ └───────────┘ └───────────┘ │
│ │ │ │ │
│ v v v │
│ ┌───────────┐ ┌───────────┐ ┌───────────┐ │
│ │ scrum- │ │ devmgr- │ │compliance-│ │
│ │ agent │ │ agent │ │ agent │ │
│ └───────────┘ └───────────┘ └───────────┘ │
│ │
│ STAGE 6 STAGE 7 │
│ DEPLOYMENT OPERATIONS │
│ │
│ ┌───────────┐ ┌───────────┐ ┌───────────┐ │
│ │ platform- │───>│ ops- │───>│ executive-│ │
│ │ agent │ │ agent │ │ agent │ │
│ └───────────┘ └───────────┘ └───────────┘ │
│ │ │ │ │
│ │ └────────────────┘ │
│ │ │ │
│ │ FEEDBACK TO │
│ │ STAGE 1 │
│ └─── HUMAN APPROVAL GATE ───┘ │
└─────────────────────────────────────────────────────────────────────────────────┘

Agent Registry

#Agent IDSDLC StageHuman OwnerAEEF Role GuidePrompt TemplateCannot Do
1product-agentRequirementsProduct ManagerPM GuideStory HardeningEdit code, approve architecture
2scrum-agentPlanningScrum MasterSM GuideSprint Capacity & Risk CalibrationOverride capacity, skip risk flags
3architect-agentDesignSolution ArchitectSA GuideArchitecture Conformance & Agent HandoffsApprove its own designs, bypass governance
4developer-agentImplementationSenior DeveloperDev GuideFeature ImplementationMerge to main, disable CI, introduce secrets
5qa-agentTestingQA LeadQA GuideRelease Readiness Risk DecisionApprove its own test changes, skip test categories
6security-agentSecuritySecurity EngineerSecEng GuideSecurity Review & RemediationBypass scan failures, waive critical findings
7compliance-agentComplianceCompliance OfficerCO GuideAudit Evidence RequestGrant waivers without human approval
8platform-agentDeploymentPlatform EngineerPE GuideCI Quality GatesDeploy to production without approval
9devmgr-agentQuality OversightDev ManagerDM GuideQuality, Risk & Enablement PlanOverride security findings, skip audit evidence
10ops-agentOperationsPlatform EngineerPE GuideRollback without incident record
11executive-agentReportingCTO / ExecutiveCTO GuideArchitecture Governance Decision PackMake implementation decisions

The 7-Stage Pipeline

Each stage has a defined owner agent, supporting agents, inputs, outputs, and gate criteria. No stage can be skipped. The rigor scales with the work item size per the Operating Model.

Stage 1: Requirements and Planning

Owner: product-agent + scrum-agent

AspectDetails
TriggerBusiness requirement, user story, or technical initiative
product-agent actionsRefine story with acceptance criteria, identify non-functional requirements, assign risk tier (Tier 1-4), classify data sensitivity
scrum-agent actionsEstimate complexity using two-dimensional model (complexity + AI acceleration factor), assess sprint capacity impact, flag impediments
InputsRaw requirement, backlog context, team velocity history, architecture constraints
OutputsHardened user story, risk tier classification, sprint capacity assessment, acceptance criteria
Human checkpointProduct Owner approves scope and risk tier
Standards enforcedPRD-STD-001 (prompt structure), PRD-STD-009 (agent contracts)

Gate 1 criteria:

  • Story has measurable acceptance criteria
  • Risk tier assigned (Tier 1-4)
  • Data classification applied (Public/Internal/Confidential/Restricted)
  • Sprint capacity assessed with confidence range
  • Product Owner sign-off recorded

Stage 2: Architecture and Design

Owner: architect-agent

AspectDetails
TriggerGate 1 passed — approved story with risk tier
architect-agent actionsValidate against reference architecture, check boundary constraints, identify integration points, assess agent handoff compatibility, propose design approach
InputsHardened story, existing architecture documentation, technology constraints, PRD-STD-009 agent contracts
OutputsArchitecture conformance assessment, design proposal, constraint list, integration map
Human checkpointSolution Architect approves for Tier 2+ work; auto-approve for Tier 1 within established patterns
Standards enforcedPRD-STD-007 (quality gates), PRD-STD-009 (agent governance)

Gate 2 criteria:

  • Design conforms to reference architecture
  • No unauthorized boundary crossings
  • Integration points identified and documented
  • Human architect approval for Tier 2+ changes

Stage 3: Implementation

Owner: developer-agent

AspectDetails
TriggerGate 2 passed — approved design with constraints
developer-agent actionsGenerate implementation following language/framework conventions, produce unit tests, create implementation notes, flag assumptions and risks
InputsApproved design, architecture constraints, language-specific prompt template (Python, TypeScript, Go, Java), framework template (Next.js, React, Express, FastAPI, Django, Spring Boot) — see prompt-library/by-language/ and prompt-library/by-framework/
OutputsCode patch, unit tests, implementation notes, AI attribution metadata
Human checkpointDeveloper reviews generated code for logic correctness (required at all trust levels)
Standards enforcedPRD-STD-001 (prompt engineering), PRD-STD-002 (code review), PRD-STD-003 (testing)

Gate 3 criteria:

  • Code compiles and passes lint
  • Unit tests written and passing
  • AI attribution metadata present (AI-Usage, AI-Prompt-Ref, Agent-IDs)
  • Implementation notes document assumptions and risks
  • No Restricted data in prompts or outputs

Stage 4: Testing and Quality Assurance

Owner: qa-agent + devmgr-agent

AspectDetails
TriggerGate 3 passed — code with passing unit tests
qa-agent actionsGenerate risk-based test matrix, execute integration/E2E tests, validate acceptance criteria coverage, identify regression risk, produce release readiness recommendation (PASS/CONDITIONAL/FAIL)
devmgr-agent actionsAssess quality metrics against team baselines, flag trend deviations, validate evidence completeness
InputsCode patch, unit test results, acceptance criteria, defect history, risk-based test matrix template (see prompt-library/by-use-case/test-generation/risk-based-test-matrix.md)
OutputsTest results, coverage report, regression analysis, release readiness decision, quality metrics assessment
Human checkpointQA Lead reviews CONDITIONAL or FAIL decisions; PASS auto-proceeds at Trust Level 3+
Standards enforcedPRD-STD-003 (testing), PRD-STD-007 (quality gates)

Gate 4 criteria:

  • All acceptance criteria have corresponding tests
  • Test coverage meets minimum threshold (per project config)
  • No critical or high-severity test failures
  • Regression analysis completed
  • Release readiness recommendation issued

Stage 5: Security and Compliance

Owner: security-agent + compliance-agent

AspectDetails
TriggerGate 4 passed — tested code with release readiness recommendation
security-agent actionsRun SAST/DAST/SCA scans, threat model AI-specific attack surfaces, classify findings by severity, produce merge-blocking decision
compliance-agent actionsVerify audit trail completeness, check license compliance, validate data classification adherence, collect governance evidence
InputsCode patch, test results, dependency manifest, secure coding review template (see prompt-library/templates/system-prompts/secure-coding-review.md), dependency risk check template (see prompt-library/by-use-case/dependency-compliance/dependency-risk-check.md)
OutputsSecurity scan results, threat model, finding classifications, compliance evidence pack, merge decision
Human checkpointSecurity Engineer reviews critical/high findings; Compliance Officer reviews Tier 3+ governance evidence
Standards enforcedPRD-STD-004 (security), PRD-STD-008 (dependencies), PRD-STD-005 (documentation)

Gate 5 criteria:

  • SAST scan completed with no unresolved critical findings
  • Dependency scan passed (no known critical CVEs, license compliant)
  • Threat model reviewed for AI-specific attack surfaces
  • Audit trail complete (agent run records, handoff artifacts)
  • Compliance evidence pack assembled
  • Human security sign-off for critical/high findings

Stage 6: Deployment and Release

Owner: platform-agent

AspectDetails
TriggerGate 5 passed — security-cleared, compliance-approved code
platform-agent actionsValidate CI/CD pipeline compatibility, prepare deployment manifest, configure canary/feature flags, activate monitoring, execute deployment
InputsApproved code, deployment configuration, monitoring thresholds, rollback plan
OutputsDeployment manifest, canary configuration, monitoring dashboard, health check results
Human checkpointMandatory human approval before production deployment (all trust levels)
Standards enforcedPRD-STD-007 (quality gates), PRD-STD-009 (agent governance)

Gate 6 criteria:

  • All prior gates (1-5) passed and evidence recorded
  • Deployment plan reviewed
  • Rollback procedure documented and tested
  • Canary/feature flag configuration verified
  • Monitoring and alerting active
  • Human deployment approval recorded

Stage 7: Operations, Monitoring, and Feedback

Owner: ops-agent + executive-agent

AspectDetails
TriggerDeployment complete — code running in production
ops-agent actionsMonitor health metrics, detect anomalies, trigger alerts, generate incident triage data, propose rollback if thresholds breached
executive-agent actionsAggregate delivery metrics, produce board-ready summaries, calculate ROI impact, flag strategic risks
InputsProduction metrics, error rates, performance data, business KPIs
OutputsHealth reports, incident triage data, rollback recommendations, executive dashboard, feedback for Stage 1
Human checkpointPlatform Engineer approves rollback decisions; CTO reviews executive reports
Standards enforcedPRD-STD-006 (technical debt tracking), PRD-STD-007 (quality gates)

Gate 7 criteria (feedback loop):

  • Post-deployment health check passed (15min, 1hr, 24hr windows)
  • No critical incidents within monitoring window
  • Business metrics tracking against success criteria
  • Lessons learned captured and fed back to Stage 1

Stage Gate Matrix

Summary of all gates, who decides, and what happens on failure:

GateDecision MakerAuto-Pass ConditionFailure RoutingMax Resolution Time
Gate 1 (Requirements)Product OwnerNever — always requires humanBack to product-agent for refinement1 business day
Gate 2 (Design)Architect (human) for Tier 2+Tier 1 within established patternsBack to architect-agent with feedback2 business days
Gate 3 (Implementation)Automated CI + Developer reviewLint + tests pass + attribution presentBack to developer-agent with failure detailsSame sprint
Gate 4 (Testing)QA Lead for CONDITIONAL/FAILPASS at Trust Level 3+Back to developer-agent (code fix) or qa-agent (test gap)Same sprint
Gate 5 (Security)Security Engineer for critical/highNo critical/high findings + clean dependency scanBack to developer-agent (remediation)Per vulnerability SLAs
Gate 6 (Deployment)Human approver (always)Never — always requires humanBack to platform-agent (config fix) or prior stage1 business day
Gate 7 (Operations)Platform EngineerHealth checks pass within all windowsRollback + incident triagePer incident severity

The Handoff Protocol

Every agent-to-agent transition uses the same structured handoff artifact. This is mandatory per PRD-STD-009 REQ-009-06.

handoff:
id: "HO-{source-agent}-{target-agent}-{timestamp}"
source_agent: "{agent-id}"
target_agent: "{agent-id}"
stage_from: "{stage number}"
stage_to: "{stage number}"
artifacts:
- type: "{artifact type}"
path: "{file or URL reference}"
hash: "{SHA-256}"
summary: "{one-paragraph description of what was done}"
assumptions:
- "{assumption 1}"
- "{assumption 2}"
risks:
- severity: "{critical|high|medium|low}"
description: "{risk description}"
decision_request: "{what the target agent/human needs to decide}"
metadata:
prompt_ref: "{prompt template used}"
model_version: "{AI model version}"
run_duration: "{seconds}"
iteration_count: "{number of agent loops}"

Complete Handoff Chain

product-agent ──[HO-01]──> scrum-agent ──[HO-02]──> architect-agent

[HO-03]

v
developer-agent

┌──────[HO-04]──────┐
│ │
v v
qa-agent security-agent
│ │
[HO-05] [HO-06]
│ │
v v
devmgr-agent compliance-agent
│ │
└────────┬───────────┘

[HO-07]

v
platform-agent

┌── HUMAN GATE ──┐
│ │
v v
APPROVED REJECTED
│ (routes back)
v
ops-agent ──[HO-08]──> executive-agent

[HO-09: FEEDBACK]

v
product-agent (next cycle)

Minimum Human Review Points

The pipeline is designed to minimize human review while maintaining safety. These are the non-negotiable human checkpoints:

CheckpointWhoWhyCan It Be Automated?
Requirements approvalProduct OwnerBusiness intent must be human-ownedNever
Architecture approval (Tier 2+)Solution ArchitectArchitecture decisions are irreversible at scaleOnly for Tier 1 within established patterns
Code logic reviewDeveloperAI hallucinations in business logic are undetectable by scansReducible with trust model (see below)
Critical security findingsSecurity EngineerFalse negatives in security have outsized impactNever for critical/high severity
Production deploymentRelease approverProduction is the last line of defenseNever

Everything else is automatable. The Trust Model defines how to progressively automate the remaining checkpoints.


How This Connects to Your Existing Framework

Existing AEEF AssetHow This Guide Uses It
Operating Model LifecycleStages 1-7 map to the 6-stage operating model with expanded agent ownership
12 Role GuidesEach agent's behavior is defined by its corresponding role guide
11 Role Prompts (prompt-library/by-role/)Each agent executes using its role-specific prompt template
17 PRD-STD StandardsGate criteria enforce specific standards at each transition
Agent Contracts (PRD-STD-009)Every agent operates under a formal contract
Skills Catalog Governance (PRD-STD-017)Skill registry, role/environment skill gates, and community skill attribution controls
OpenClaw for AEEF Agent OrchestrationGateway-style execution surface for multi-agent workflows with AEEF overlays for skills, gates, and approvals
Small-Team Multi-Agent StarterThis guide scales the starter from 4 agents to 11 for full lifecycle coverage
5 PillarsPipeline enforces all 5 pillars through stage-specific gates

Quick Start

  1. Read the Trust Model to understand your starting automation level
  2. Deploy the 4-agent starter from Small-Team Multi-Agent Starter
  3. Expand to 7 agents (add architect-agent, compliance-agent, devmgr-agent) after 2 weeks of stable metrics
  4. Scale to full 11-agent pipeline after demonstrating consistent Gate 1-5 pass rates above 80%
  5. Implement Environment Promotion rules for multi-environment deployments
  6. Configure Skill Registry & Multi-Agent Gate Patterns before enabling broad skill usage in developer/agent workflows
  7. Pilot OpenClaw for AEEF Agent Orchestration as an execution surface (sandboxed, gated, non-production first)
  8. Configure the Orchestration Rules state machine for automated pipeline execution
info

This guide builds on top of all existing AEEF content. It does not replace any existing standard, role guide, or prompt template. It orchestrates them into a single executable pipeline.