Autonomous multi-agent code implementation pipeline for AI coding agents
Author: TykoDev License: See repository for license details
A modular suite of six specialized AI skills that orchestrate a fully autonomous code implementation pipeline — from approved design specifications to production-ready, security-audited, completeness-verified code. This README assumes the combined AI SkillSets repository is your primary install path, while still staying usable if this SkillSet is published as a separate mirror.
The canonical install rule is the same in both cases: copy the inner skill folders into your agent's skills directory, then start with the build-management entry point. If your assistant does not auto-route installed skills, explicitly reference the relevant <skill>/SKILL.md file as a fallback.
- Overview
- Architecture
- Skill Descriptions
- How the Skills Differ
- How the Skills Connect
- Step-by-Step Usage
- Installation Guide
- Directory Structure
- Contributing
The Build-Team SkillSet transforms an AI coding agent into a complete software implementation team. It receives approved design specifications (from the Dev-Design SkillSet or any implementation plan) and autonomously produces production-ready code through a four-phase pipeline: implementation, testing, security audit, and completeness verification. Every phase output passes through an adversarial gatekeeper before the pipeline advances.
| Principle | Description |
|---|---|
| Spec-Driven Building | Every line of code traces back to a design requirement — no ad-hoc features |
| Separation of Concerns | Each skill owns one build dimension — coding, testing, security, or completeness |
| Adversarial Validation | The Gatekeeper challenges every phase output before the pipeline advances |
| Framework-Anchored | Standards map to IEEE 730, ISO/IEC 25010, OWASP Top 10, CWE Top 25, NIST SSDF, CVSS v4.0 |
| Completeness-First | No placeholder code, no TODOs, no mocks in production paths — verified by dedicated scanner |
The SkillSet follows a strict orchestrator-led pipeline where build-management
drives transitions through four mandatory specialist phases, and
gatekeeper-build guards every handoff:
APPROVED DESIGN PACKAGE
│
▼
BUILD-MANAGEMENT
│
▼
BOB-THE-BUILDER
│
▼
GATEKEEPER-BUILD
│ APPROVED
▼
TEST-BUILDER
│
▼
GATEKEEPER-BUILD
│ APPROVED
▼
SECURITY-BUILDER
│
▼
GATEKEEPER-BUILD
│ APPROVED
▼
CROSS-CHECK-BUILD-CONFIRM
│ CLEAN
▼
GATEKEEPER-BUILD
│ APPROVED
▼
FINAL BUILD PACKAGE
Security remediation loop:
security-builder findings -> bob-the-builder -> gatekeeper-build re-validation
Completeness remediation loop:
cross-check-build-confirm findings -> bob-the-builder -> cross-check-build-confirm -> gatekeeper-build
- The user provides an approved design specification or implementation plan to
build-management. build-managementvalidates the input and delegates tobob-the-builderfor Phase 1 implementation.bob-the-builderproduces production code with a structured change manifest.gatekeeper-buildadversarially reviews the implementation against the design spec.- If approved,
build-managementdelegates totest-builderfor Phase 2 test creation. gatekeeper-buildvalidates test quality and coverage.- If approved,
build-managementdelegates tosecurity-builderfor Phase 3 security audit. gatekeeper-buildvalidates the audit's accuracy and completeness.- If security remediation is required,
bob-the-builderapplies the fixes and the updated code returns togatekeeper-buildfor re-validation before the pipeline advances. cross-check-build-confirmperforms the 7-step completeness scan, delegating findings back tobob-the-builderuntil the codebase is clean.- A
CLEANcompleteness report is submitted togatekeeper-buildfor final Phase 4 approval. build-managementconsolidates all approved deliverables into a final build package and delivers to the user.
INTAKE → PHASE_1_BUILD → PHASE_1_GATE →
PHASE_2_TEST → PHASE_2_GATE →
PHASE_3_SECURITY → PHASE_3_GATE →
PHASE_4_COMPLETENESS → PHASE_4_GATE →
CONSOLIDATION → DELIVERED
- Maximum 3 revision cycles per phase before escalation to user
- Maximum 2 completeness scan cycles before escalation to user
| Skill name | Build Pipeline Orchestrator |
| Directory | build-management/ |
| Focus | Pipeline oversight, state management, phase delegation, and delivery |
| Methodology | Phased delegation protocol, autonomous state transitions, gatekeeper-gated handoffs |
The Build Management skill is the central orchestrator and single entry point for the Build-Team SkillSet. It receives design packages or implementation plans, creates a phased execution plan, delegates to each specialist skill in sequence, manages gatekeeper review cycles, and delivers the final consolidated build package. It drives work proactively — advancing autonomously and only returning to the user when blocked by unresolvable ambiguity.
In the canonical workflow it is fail-closed: all four specialist phases are
mandatory, and no output is accepted until gatekeeper-build approves it.
| File | Contents |
|---|---|
references/workflow-protocol.md |
Full state machine with all states, transitions, revision cycle management, and error recovery |
references/handoff-templates.md |
Delegation templates for all 4 phases, gatekeeper submissions, and final delivery |
| Skill name | Senior Development Engineer |
| Directory | bob-the-builder/ |
| Focus | Production code implementation, remediation, and change management |
| Methodology | IEEE 730-2026, ISO/IEC 25010, Clean Code principles, domain-first architecture |
The Bob the Builder skill is the primary code producer. It translates design specifications into production-ready implementations — the workhorse of the Build Team. It analyzes delegation packages, plans implementation order by dependency, implements incrementally with full error handling, applies coding standards, performs self-review, and submits structured change manifests to the gatekeeper. It also handles remediation of findings from gatekeeper-build, security-builder, and cross-check-build-confirm.
Every output is held to a strict anti-pattern policy: zero placeholder code, zero TODO/FIXME/HACK comments, zero fake data, zero mock implementations in production paths, zero commented-out code, and zero hardcoded secrets.
| File | Contents |
|---|---|
references/coding-standards.md |
Clean Code principles, naming, function design, error handling, documentation, security |
references/implementation-patterns.md |
Domain-first organization, repository pattern, validation, DI, migrations, API patterns |
references/output-protocol.md |
Structured change manifest format, incremental delivery, remediation response format |
| Skill name | Test Engineering Specialist |
| Directory | test-builder/ |
| Focus | Comprehensive test suite creation, coverage, and test quality validation |
| Methodology | ISO/IEC 29119, ISTQB, test pyramid/trophy, AAA pattern, property-based testing |
The Test Builder skill is a dedicated test engineer that creates comprehensive, meaningful test suites as production-grade artifacts. It analyzes the implemented codebase, designs a test strategy following the test pyramid or trophy model, writes unit tests with specific assertions, writes integration tests for module boundaries, and validates that every test is meaningful — capable of failing when the production logic is inverted.
Every test must have at least one specific assertion (not just "does not throw"), test observable behavior (not implementation details), follow the Arrange-Act-Assert pattern, and be fully independent and deterministic.
| File | Contents |
|---|---|
references/test-strategy.md |
Test pyramid/trophy models, coverage targets, TDD methodology, property-based and contract testing |
references/test-patterns.md |
AAA pattern, fixtures, mocking strategies, database testing, API testing, anti-patterns |
| Skill name | Code Security Auditor |
| Directory | security-builder/ |
| Focus | Vulnerability detection, security compliance, and remediation handoff |
| Methodology | OWASP Top 10:2025, CWE Top 25:2025, NIST SSDF v1.1, OWASP ASVS 5.0, CVSS v4.0 |
The Security Builder skill audits the actual implemented code — not designs or plans — for vulnerabilities, misconfigurations, and security anti-patterns. It performs risk assessment, sweeps all OWASP Top 10 categories, traces every external input from entry to sink, audits authentication and authorization, scans dependencies against vulnerability databases, and detects hardcoded secrets. Findings are packaged as structured remediation items for bob-the-builder.
Security Builder does not approve delivery on its own. Its audit report and any
follow-up remediation must be validated by gatekeeper-build through
build-management before the pipeline may advance.
Findings use CVSS v4.0 scoring with four severity tiers: Critical (CVSS 9.0-10.0), High (CVSS 7.0-8.9), Medium (CVSS 4.0-6.9), and Low (CVSS 0.1-3.9). Each finding includes CWE mapping, exploit scenario, and a specific remediation action.
| File | Contents |
|---|---|
references/security-checklist.md |
Complete OWASP Top 10 mapping, CWE Top 25 patterns, AI-specific threats, supply chain checks |
references/vulnerability-patterns.md |
Injection, auth bypass, access control, crypto failures, SSRF, deserialization, info disclosure |
references/remediation-guide.md |
Priority matrix, fix patterns per category, verification procedures, remediation report format |
| Skill name | Adversarial Implementation Validator |
| Directory | gatekeeper-build/ |
| Focus | Meta-review — validates the quality of other skills' deliverables |
| Methodology | 5-type challenge protocol, 8-dimension review, delegation workflow, adversarial scoring |
The Gatekeeper Build is fundamentally different from the other five skills. It produces no code, no tests, and no designs. Instead, it receives completed deliverables from the build skills and challenges every claim to ensure accuracy, completeness, and correctness before the pipeline advances. It reviews across 8 dimensions: spec alignment, code quality, security, testing, documentation, completeness, correctness, and runtime verification.
| # | Challenge | What It Verifies |
|---|---|---|
| 1 | Existence | Does the cited code, test, or finding actually exist at the stated location? |
| 2 | Accuracy | Are implementations logically correct and classifications properly assigned? |
| 3 | Completeness | Does the deliverable cover the full scope defined by the design spec? |
| 4 | Proportionality | Do severity ratings and effort allocation match actual impact? |
| 5 | Consistency | Is there internal coherence within and across deliverables? |
| Verdict | Condition |
|---|---|
| APPROVED | All challenges resolved, evidence verified, no contradictions |
| REVISE | Specific issues identified — delegated back to originating skill with clear instructions |
| ESCALATE | Fundamental misalignment or 3+ revision cycles exhausted — requires user intervention |
When the Gatekeeper finds an issue, it sends a structured delegation request back to the originating skill. The skill responds with one of three resolutions: corrected, defended, or withdrawn. Maximum 2 rounds per finding — after Round 2, unresolved findings are marked Disputed with both positions documented for the user.
| File | Contents |
|---|---|
references/challenge-protocol.md |
Complete challenge rubric: 5 categories x 8 dimensions with examples and resolution criteria |
references/review-criteria.md |
Per-phase review checklists for code, tests, security audit, and completeness scan deliverables |
references/delegation-workflow.md |
Delegation formats, batch strategies, round management, escalation procedures |
| Skill name | Implementation Completeness Scanner |
| Directory | cross-check-build-confirm/ |
| Focus | Final completeness verification — no scaffold, no placeholders, no unfinished code |
| Methodology | Static pattern scanning, structural analysis, behavioral verification, exhaustive completeness checklist |
The Cross-Check Build Confirm skill is the final specialist scan before delivery. It performs an exhaustive 7-step scan of the entire codebase to verify that no placeholder code, TODO markers, mock implementations, fake data, debug statements, incomplete logic, or runtime startup failures survived the build process. Every finding is non-negotiable — findings are delegated to bob-the-builder for remediation, and the scan repeats until the codebase achieves a CLEAN verdict that can be submitted to gatekeeper-build.
- Static pattern scan — TODO, FIXME, HACK, XXX, PLACEHOLDER, MOCK, STUB, TEMP, DUMMY, FAKE, SAMPLE
- Structural completeness — Verify all modules from the design spec have corresponding implementations
- Behavioral completeness — Detect hardcoded returns, empty catch blocks, console.log debugging
- Data completeness — Find lorem ipsum, example.com, test@test.com, fake addresses
- Configuration completeness — Audit default configs, missing .env.example entries, hardcoded URLs
- Documentation completeness — Detect INSERT HERE, blank sections, template text
- Runtime startup verification — Verify backend and/or frontend startup, health checks, stability, and cleanup
Zero BLOCKER findings, zero WARNING findings (or all justified), 100% feature completeness, 100% API endpoint completeness, all environment variables documented, no scaffold code in production paths, and runtime verification results (or a documented exemption) that can pass final gatekeeper review.
| File | Contents |
|---|---|
references/scaffold-detection.md |
Exhaustive pattern catalog: comment markers, code patterns, data patterns, structural and config patterns |
references/completeness-checklist.md |
Feature matrix, module checklist, API endpoints, migrations, config, CLEAN verdict criteria |
references/runtime-verification.md |
Project classification, startup detection, health checks, simultaneous operation, and cleanup procedures |
The six skills are designed to be complementary, not overlapping. Each owns a distinct concern within the build pipeline:
| Aspect | build-management | bob-the-builder | test-builder | security-builder | gatekeeper-build | cross-check-build-confirm |
|---|---|---|---|---|---|---|
| Core question | "Is the pipeline on track?" | "Is the code correct?" | "Is the code tested?" | "Is the code secure?" | "Is the output valid?" | "Is the code complete?" |
| Focus | Orchestration & delivery | Production implementation | Test suite creation | Vulnerability detection | Adversarial validation | Completeness verification |
| Produces | Delegation & consolidation | Source code & manifests | Test files & coverage | Audit reports & findings | Review verdicts | Scan reports & verdicts |
| Mindset | Strategic / Managerial | Pragmatic / Engineering | Methodical / Analytical | Skeptical / Defensive | Adversarial / Skeptical | Exhaustive / Forensic |
| Key standards | State machine protocol | IEEE 730, ISO 25010 | ISO 29119, ISTQB | OWASP, CWE, NIST SSDF | 5-type challenge protocol | Pattern detection catalog |
| Output verdict | Pipeline state transitions | Change manifest | Test report + coverage | Security audit + CVSS | APPROVED / REVISE / ESCALATE | CLEAN / FINDINGS |
| Scenario | Skill(s) to invoke |
|---|---|
| "Build this project from a design spec" | build-management (orchestrates all others) |
| "Implement this feature" | bob-the-builder |
| "Write tests for this codebase" | test-builder |
| "Audit this code for security" | security-builder |
| "Validate this build output" | gatekeeper-build |
| "Check for TODOs and placeholder code" | cross-check-build-confirm |
| "Full autonomous build pipeline" | build-management → all skills in sequence |
APPROVED PLAN
-> build-management
-> bob-the-builder
-> gatekeeper-build
-> test-builder
-> gatekeeper-build
-> security-builder
-> gatekeeper-build
-> cross-check-build-confirm
-> gatekeeper-build
-> final build package
Security remediation:
security-builder -> bob-the-builder -> gatekeeper-build -> resume pipeline
Completeness remediation:
cross-check-build-confirm -> bob-the-builder -> cross-check-build-confirm -> gatekeeper-build
Connection points:
- Phased Delegation:
build-managementorchestrates the sequential workflow, advancing only when the gatekeeper approves each phase. - Gatekeeper Gates:
gatekeeper-buildsits between every phase transition. No phase output reaches the next skill without adversarial validation. - Remediation Loops:
gatekeeper-buildandcross-check-build-confirmboth route findings back tobob-the-builderfor correction, creating closed-loop quality feedback. - Security Remediation:
security-builderfindings flow throughbuild-managementback tobob-the-builder, withgatekeeper-buildvalidating the fixes. - Completeness Verification:
cross-check-build-confirmoperates as the final specialist sweep after all other phases, with its own loop back tobob-the-builderuntil the codebase is clean. - Final Phase 4 Gate: A
CLEANcompleteness report still passes throughgatekeeper-buildbefore the final build package can be delivered.
Activation note: The canonical entry point is
build-management. In agentic frameworks that auto-route installed skills, prompt that entry point directly. In assistants that do not auto-route skills, referencebuild-management/SKILL.mdor another specific skill file explicitly as a fallback.
- Install the inner skill folders in your configured skills directory.
- Open your AI coding agent (Codex, Kilo Code, or OpenCode).
- Provide the design specification (a design package from Dev-Design SkillSet, an SRS, or an implementation plan).
- Request the
build-managemententry point:"Use the build-management skill to implement this design specification" - The
build-managementskill orchestrates all phases autonomously. - The
gatekeeper-buildskill validates every phase output behind the scenes. - The
cross-check-build-confirmskill performs the final specialist completeness scan. gatekeeper-buildperforms the final Phase 4 approval after the completeness scan returnsCLEAN.- You receive a fully implemented, tested, security-audited, completeness-verified, and gatekeeper-approved build package.
You can bypass build-management and target a specific skill directly when you only need one part of the workflow. This is a manual, out-of-band usage pattern — useful for focused tasks, but it is not the canonical fully gated pipeline:
- Provide context (if required by your agent): Explicitly attach or reference the relevant
SKILL.mdfile (e.g.,@workspace, or dragging the file into chat). - Ask for a specific task using natural language:
"Read build-management/SKILL.md and implement this design specification"→ activates build-management"Read bob-the-builder/SKILL.md and implement this feature"→ activates bob-the-builder"Read test-builder/SKILL.md and write tests for this codebase"→ activates test-builder"Read security-builder/SKILL.md and audit this code for vulnerabilities"→ activates security-builder"Read gatekeeper-build/SKILL.md and validate this implementation"→ activates gatekeeper-build"Read cross-check-build-confirm/SKILL.md and scan for placeholder code"→ activates cross-check-build-confirm
| Skill | Example Prompting Phrases |
|---|---|
| build-management | "build this project", "implement this design", "start the build pipeline", "run the Build Team" |
| bob-the-builder | "write the code", "implement this feature", "build this component", "fix these findings" |
| test-builder | "write tests", "create test suite", "add unit tests", "improve test coverage" |
| security-builder | "audit code security", "check for vulnerabilities", "review security", "check OWASP compliance" |
| gatekeeper-build | "review this build", "validate the implementation", "gate-check the code", "approve this phase" |
| cross-check-build-confirm | "scan for incomplete code", "check for TODOs", "find placeholder code", "confirm build is production-ready" |
Each skill relies on a SKILL.md file (the main instructions) and a references/ directory (detailed checklists and patterns). To install them, copy the inner skill folders from Build-Team_SkillSet/ into the skills directory your agent is configured to read.
This README assumes you are working from the combined AI SkillSets repository. If you are using a separately published mirror of this SkillSet, the same install rule applies; only the surrounding repo path changes.
Copy these folders, not the top-level Build-Team_SkillSet/ directory:
build-management/bob-the-builder/test-builder/security-builder/gatekeeper-build/cross-check-build-confirm/
Use .agents/skills/ when your environment supports a shared skills directory, or the configured equivalent for your assistant.
These assistants do not always auto-route to installed skill files. Keep the same copied skill folders in an accessible location, then point the assistant at the right entry point or fallback SKILL.md file.
Claude Code does not use a guaranteed native skills directory, so the important part is keeping the copied folders somewhere your project instructions can reference consistently.
- Copy the installed Build-Team skill folders into a location your workspace can reference, such as
.agents/skills/or.claude/skills/. - Add a reference in your
CLAUDE.md(project root):## Build Team Skills This project uses the Build-Team SkillSet. Start implementation work with the build-management entry point. If Claude does not auto-route the installed skill, read `.agents/skills/build-management/SKILL.md` first.
GitHub Copilot does not guarantee automatic routing from a custom skills folder.
- Copy the installed Build-Team skill folders into a location your repository instructions can reference.
- Reference them in
.github/copilot-instructions.md:## Build Implementation When asked to implement designs or build features, start with build-management. If Copilot does not auto-route the installed skill, use `@workspace` and follow `.agents/skills/build-management/SKILL.md`.
If you are using a dedicated agentic runner that natively recognizes a skills directory structure:
- Create the environment's skills directory, typically
.agents/skills/or the framework-specific equivalent. - Copy the individual skill folders (
build-management,bob-the-builder, and the rest) directly into that directory. - Prompt the
build-managemententry point directly. - If the framework does not auto-route as expected, fall back to
build-management/SKILL.md.
After installing in any agent, verify the skills are detected by asking:
"What skills do you have available?"
or directly trigger the pipeline:
"Build this project from the attached design specification"
If the agent responds with a phased build plan following the build-management's orchestration protocol, the installation was successful.
Build-Team_SkillSet/
├── README.md # This file
├── QUICK-START.md # Brief onboarding guide
├── build-management/ # Build Pipeline Orchestrator
│ ├── SKILL.md
│ └── references/
│ ├── workflow-protocol.md # State machine and transition rules
│ └── handoff-templates.md # Delegation templates for all phases
├── bob-the-builder/ # Senior Development Engineer
│ ├── SKILL.md
│ └── references/
│ ├── coding-standards.md # Clean Code, IEEE 730, ISO 25010
│ ├── implementation-patterns.md # Domain-first org, repository, DI, API patterns
│ └── output-protocol.md # Change manifest and delivery format
├── test-builder/ # Test Engineering Specialist
│ ├── SKILL.md
│ └── references/
│ ├── test-strategy.md # Test pyramid, coverage targets, TDD
│ └── test-patterns.md # AAA, fixtures, mocking, anti-patterns
├── security-builder/ # Code Security Auditor
│ ├── SKILL.md
│ └── references/
│ ├── security-checklist.md # OWASP Top 10, CWE Top 25, AI threats
│ ├── vulnerability-patterns.md # Injection, auth, access control, crypto
│ └── remediation-guide.md # Priority matrix, fix patterns, verification
├── gatekeeper-build/ # Adversarial Implementation Validator
│ ├── SKILL.md
│ └── references/
│ ├── challenge-protocol.md # 5-type challenge rubric with examples
│ ├── review-criteria.md # Per-phase checklists (code, tests, security, completeness)
│ └── delegation-workflow.md # Delegation formats and escalation
└── cross-check-build-confirm/ # Implementation Completeness Scanner
├── SKILL.md
└── references/
├── scaffold-detection.md # Pattern catalog with regex and false positives
├── completeness-checklist.md # Feature matrix, CLEAN verdict criteria
└── runtime-verification.md # Startup verification and health-check procedures
Contributions are welcome! If you'd like to improve the skills, add new reference material, or fix issues:
- Fork the repository
- Create a feature branch (
git checkout -b feature/improve-coding-standards) - Make your changes
- Submit a pull request
For questions or suggestions, open an issue or discussion in the repository where you found this SkillSet.
Built by TykoDev · Build-Team SkillSet