Engineering

Software Studio

Standard software development lifecycle

6 stages15 hatsPersistence: gitDelivery: pull-request

Stage Pipeline

Stage Details

InceptionAuto review

Understand the problem, define success, and decompose into units

Hats

Architect

Understand the problem space, map the existing codebase, define scope and constraints, and identify technical risks and architectural implications. The architect produces a discovery document that gives downstream stages the context they need.

Decomposer

Break the intent into units with clear boundaries, define the dependency DAG, and write verifiable completion criteria for each unit. Each unit should be completable within a single bolt.

DesignAsk review

Visual and interaction design for user-facing surfaces

Hats

Design Reviewer

Check consistency with the design system, verify all interaction states are covered, confirm responsive behavior at all breakpoints, and validate accessibility requirements.

Designer

Explore wireframes, define design tokens, specify component structure and states, and map interaction flows. Design with existing components and patterns first — only introduce new ones when the existing vocabulary cannot express what's needed.

Requires: discovery from Inception
ProductExternal / Ask review

Define behavioral specifications and acceptance criteria

Hats

Product Owner

Define user stories, prioritize features, make scope decisions, and specify acceptance criteria from the user's perspective. Think in terms of what users do and see, not how the system implements it.

Specification Writer

Write behavioral specs (given/when/then), define data contracts (API schemas, database models), and specify API contracts (endpoints, methods, request/response shapes). Precision matters — ambiguity in specs becomes bugs in code.

Requires: discovery from Inception, design-tokens from Design
DevelopmentAsk review

Implement the specification through code

Hats

Builder

Implement code to satisfy completion criteria, working in small verifiable increments. Quality gates (tests, lint, typecheck) provide continuous feedback — treat failures as guidance, not obstacles.

Planner

Read the unit spec and prior stage outputs, plan the implementation approach, identify files to modify, assess risks, and search for relevant learnings. The plan is a tactical document — specific enough for the builder to execute without guessing.

Reviewer

Verify implementation satisfies completion criteria through multi-stage review. Stage 1: spec compliance (does it do what the criteria say?). Stage 2: code quality (is it well-written?). Stage 3: operational readiness (conditional — only when deployment/monitoring/operations blocks are present).

Requires: discovery from Inception, design-brief from Design, design-tokens from Design, behavioral-spec from Product, data-contracts from Product
OperationsAuto review

Deployment, monitoring, and operational readiness

Hats

Ops Engineer

Configure deployment pipeline, define infrastructure as code, set up CI/CD, and ensure deployment is repeatable and rollback-safe. Every deployment should be automated, auditable, and reversible.

Sre

Define SLOs (availability, latency, error rate), set up monitoring and alerting, and write runbooks for common failure modes. The goal is that when something breaks at 3 AM, the oncall has a step-by-step guide.

Requires: discovery from Inception, behavioral-spec from Product, code from Development, architecture from Development
SecurityExternal / Ask review

Threat modeling, security review, and vulnerability assessment

Hats

Blue Team

Defense verification — implement security controls for identified threats, add security tests that prove the controls work, and validate monitoring coverage for security events. Fix root causes, not symptoms.

Red Team

Attack surface analysis, injection testing (SQL, XSS, command), auth bypass attempts, privilege escalation testing, and data exposure checks. Think like an attacker — find what automated scanners miss.

Security Reviewer

Verify all identified threats have documented mitigations, check OWASP Top 10 coverage, validate security test coverage, and ensure no critical or high findings remain unaddressed. The final gate before security sign-off.

Threat Modeler

STRIDE threat modeling for all data flows and trust boundaries. Identify the attack surface, categorize threats by severity, and map what needs defending before anyone starts testing.

Requires: discovery from Inception, behavioral-spec from Product, data-contracts from Product, code from Development, architecture from Development

Software Studio

Full software development lifecycle from inception through security review. Supports both single-stage (all disciplines merged) and multi-stage (sequential discipline progression) execution modes.