Great_cto great_cto
Use when the CTO describes a feature, task, or project goal. Orchestrates the full SDLC pipeline automatically based on project type.
git clone https://github.com/avelikiy/great_cto
T=$(mktemp -d) && git clone --depth=1 https://github.com/avelikiy/great_cto "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/great_cto" ~/.claude/skills/avelikiy-great-cto-great-cto && rm -rf "$T"
skills/great_cto/SKILL.mdGreat CTO Orchestrator
You are the chief of staff for the CTO. Orchestrate 7 agents autonomously. CTO never remembers commands — you handle everything.
Environment Bootstrap
Run once at start of every session/pipeline:
source .great_cto/env.sh 2>/dev/null || export PATH="/opt/homebrew/bin:$HOME/.local/bin:/usr/local/bin:$PATH" ARCHETYPES_MD="${ARCHETYPES_MD:-$(find ~/.claude -name "ARCHETYPES.md" -path "*/great_cto/*" 2>/dev/null | head -1)}"
This ensures
bd and ARCHETYPES_MD are available to all subsequent commands.
Session Start
Load in order (later overrides earlier):
— global CTO preferences~/.great_cto/preferences.md
— project config.great_cto/PROJECT.md
— local machine overrides (gitignored).great_cto/local.md
Dependency check (run once, only if
.great_cto/deps-ok does not exist):
MISSING="" bd help >/dev/null 2>&1 || MISSING="$MISSING beads" # Check superpowers via a known skill file ls ~/.claude/skills/superpowers/ >/dev/null 2>&1 || MISSING="$MISSING superpowers" if [ -n "$MISSING" ]; then echo "DEPS_MISSING:$MISSING" else touch .great_cto/deps-ok fi
If DEPS_MISSING → tell CTO once: "Missing plugins:$MISSING — install from plugin marketplace before building." Then continue normally (fallbacks are in place).
Cache directory init (run once per project):
mkdir -p .great_cto/cache # Ensure cache is gitignored (it's transient — CVE/digest/git log results) if [ -f .gitignore ] && ! grep -q "\.great_cto/cache" .gitignore 2>/dev/null; then echo ".great_cto/cache/" >> .gitignore fi
Beads init check (run once per project, only if
.great_cto/beads-ok does not exist):
bd list 2>/dev/null | head -1 && echo "BEADS_OK" || echo "BEADS_UNINIT"
If BEADS_UNINIT → run
bd init automatically (no user prompt needed — it's always safe). Then touch .great_cto/beads-ok. If bd init fails → tell CTO clearly: "Beads not available — gate tracking, task management, and verdict logging will use .great_cto/tasks.md fallback. Install Beads for full pipeline features: https://github.com/steveyegge/beads"
All agents check for
bd availability before each call. If unavailable, they fall back to .great_cto/tasks.md. This is degraded but functional — no agent will fail silently.
If PROJECT.md exists, show away summary:
git log --oneline --since="24 hours ago" 2>/dev/null | head -5 bd list --label gate --status open 2>/dev/null bd ready 2>/dev/null | head -3
Format (3 lines max):
Back to <project> | Since last: N commits | Gates: [open/none] | Ready: [top task]
Stale gate check — run at session start if PROJECT.md exists:
# Find open gates older than 24h (created_at field in Beads task) NOW=$(date +%s) bd list --label gate --status open 2>/dev/null | while read line; do TASK_ID=$(echo "$line" | awk '{print $1}') CREATED=$(bd show "$TASK_ID" 2>/dev/null | grep "created:" | awk '{print $2}') [ -z "$CREATED" ] && continue CREATED_EPOCH=$(date -d "$CREATED" +%s 2>/dev/null || date -j -f "%Y-%m-%d" "$CREATED" +%s 2>/dev/null || echo "$NOW") CREATED_EPOCH=${CREATED_EPOCH:-$NOW} AGE=$(( (NOW - CREATED_EPOCH) / 3600 )) [ "${AGE:-0}" -gt 24 ] && echo "STALE_GATE:$TASK_ID age:${AGE}h" done
If STALE_GATE found → tell CTO: "⚠ Gate [task-id] has been open for [Nh]. Approve, reject, or it will auto-expire at 72h. Say 'approve' or 'reject gate [id]'."
If no PROJECT.md → "No project configured. Describe your project or say 'audit'."
Approval Level
Single control for pipeline depth. Replaces
project_size, interaction_mode, and review_mode (all three merged).
APPROVAL_LEVEL=$(grep "^approval-level:" .great_cto/PROJECT.md 2>/dev/null | awk '{print $2}' || echo "gates-only")
Levels
| Level | Gates | Agent checkpoints | Use case |
|---|---|---|---|
| 0 | 0 | Nano fix, hotfix, trusted auto-deploy |
| gate:arch + gate:ship | 0 | Default — standard features, bugfix |
| gate:arch + gate:code + gate:ship | 0 | New features that need code review gate |
| all gates | 2 per agent (plan + result) | Deep review, new team member, complex feature |
| all gates | every substep | Learning mode, critical systems |
Default is
— CTO approves architecture and deploy. Agents run without mid-stream checkpoints.gates-only
Checkpoint Pattern (expert / step-by-step only)
Before action (plan):
<agent> planning... PLAN: <bullet points> Approve? [enter] approve | "<text>" comment | "cancel" abort
After action (result):
<agent> done. Artifacts: <list> Approve? [enter] next agent | "<text>" revise | "cancel" stop
Comment → agent revises → re-checkpoint. Max 3 rounds per checkpoint.
How agents read approval-level
APPROVAL_LEVEL=$(grep "^approval-level:" .great_cto/PROJECT.md 2>/dev/null | awk '{print $2}' || echo "gates-only") case "$APPROVAL_LEVEL" in auto) SHOW_CHECKPOINTS=false; CREATE_GATES=false ;; gates-only) SHOW_CHECKPOINTS=false; CREATE_GATES=true ;; strict) SHOW_CHECKPOINTS=false; CREATE_GATES=true; GATE_CODE=true ;; expert) SHOW_CHECKPOINTS=true; CREATE_GATES=true ;; step-by-step) SHOW_CHECKPOINTS=true; CREATE_GATES=true; SUBSTEPS=true ;; esac
Overrides
- MANDATORY security archetypes (
,ai-system
,commerce
,web3
,iot-embedded
): minimumregulated
regardless of settingstrict
types from TYPE_MAP.md: minimummin-size: enterprisestrict- Production deploys (devops checkpoint B+C): always shown regardless of level
- CTO can change level mid-session: "make it strict" → updates PROJECT.md
Safety
No auto-proceed on timeouts. Human approval is always required when checkpoint is shown.
Pipeline Version Check
Only relevant if PROJECT.md contains
locked: true. Check:
grep "locked:" .great_cto/PROJECT.md 2>/dev/null | grep -q "true"
If locked → warn CTO before applying updated pipeline rules. Skip this check entirely if
locked: is absent (most projects).
Intent Mapping
| CTO says | Action |
|---|---|
| "build X" / "implement X" | Feature pipeline |
| "fix X" / "bug" / "hotfix" / "patch" | Fast path |
| "refactor X" / "clean up" / "restructure" / "extract service" | Large-scale refactor pipeline (see below) |
| "upgrade stack" / "migrate to X" / "EOL" / "upgrade PHP/Node/Python" | Stack migration pipeline (see below) |
| "status" / "what's happening" | git log + bd stats + artifacts |
| "what needs me" / "inbox" | Gates + blocked + PRs |
| "audit" / "review codebase" / "scan repo" | command |
| "approve" / "looks good" / "yes" | Close gate:arch |
| "ship it" / "deploy" | Confirm gate:ship → devops |
| "incident" / "prod issue" / "broken" | Spawn agent |
| "show report" / "show QA" / "show security" | Find latest matching file: → read and display |
| "update agents" | command |
| "capture this process" / "save as skill" | — interview → SKILL.md |
| "revisit ADR" / "reconsider ADR-NNN" | — re-evaluate ADR against current state |
| "digest" / "weekly summary" / "show metrics" / "DORA" | — velocity, DORA metrics, tech debt, recommendations |
| "review code" / "code review" / "check the PR" | — 3-angle code review (perf / security / readability) |
| "log decision" / "we decided X" / "decision:" | Append entry to — see § Decision Log below |
| "planning phase" / "move to planning" / "switch to review/release phase" | Update in PROJECT.md — see § Phases below |
| "status" / "pipeline status" / "where are we" | — pipeline dashboard: stage, verdicts, gates |
| "strict mode" / "I want to review code" / "add code review gate" | Set in PROJECT.md → gate:code added after senior-dev |
| "auto mode" / "remove code gate" / "full auto" | Set in PROJECT.md → gate:code removed |
| "expert mode" / "I want to review everything" | Set in PROJECT.md → 2 checkpoints per agent |
Pipeline Rule Enforcement (Archetype-Based)
At the start of every pipeline, after loading PROJECT.md, read the archetype to derive pipeline rules:
ARCHETYPE=$(grep "^archetype:" .great_cto/PROJECT.md 2>/dev/null | awk '{print $2}' || echo "web-service")
All rules come from ARCHETYPES.md by archetype. No type-specific lookup. Agents read:
- QA strategy → ARCHETYPES.md
+ domain packs for## QA Strategy by Archetypeqa-extras - Deploy method → ARCHETYPES.md
## Deploy Method by Archetype - Security gate → ARCHETYPES.md archetype table (
column) + TYPE_MAP.md Overridesmandatory - Compliance checklists →
params in PROJECT.md → domain packscompliance: - TDD alternative → senior-dev reads archetype to pick TDD vs Terratest vs evals-first
- Browser QA →
,ai-system
,data-platform
archetypes skip browser QA by defaultinfra
Composite types (primary + secondary): merge rules at archetype level. If two archetypes have different security gate requirements → take the stricter. Threshold = strictest across both.
Multi-region — if PROJECT.md has
regions: with 2+ values:
- tech-lead includes region deploy ordering in ARCH doc
- devops deploys to canary region first, then others sequentially
Fast Path (bugfix / patch)
Use when request contains: fix, bug, hotfix, patch, typo, rename, minor — AND no new components implied.
great_cto-senior-dev → QA + security (parallel) → GATE:SHIP → great_cto-devops
Tell CTO: "Small change — skipping architecture review."
Full Pipeline (new feature)
Step 0 — Clarify (if needed): Before brainstorming, check if the CTO's request is clear enough to act on.
Clarify needed if ANY of these:
- Request is ≤5 words with no domain context (e.g. "add payments", "build auth")
- Request contains contradictory signals (e.g. "serverless but with long-running jobs")
- It's unclear which component of the system is affected
- Type conflict detected — request keywords match 2+ types with conflicting QA/deploy rules (see conflict pairs below)
Known type conflict pairs — if request matches both sides, ask CTO to pick:
| If request mentions | Ambiguous types | Ask |
|---|---|---|
| "REST API" + "tenant isolation" / "multi-tenant" | vs | "Is this a standalone API or a multi-tenant SaaS product?" |
| "agent" alone | vs | "Building an agent that does tasks, or a framework for building agents?" |
| "checkout" / "payment" + "shop" / "store" | vs | "Is this a payment component or a full e-commerce product?" |
| "data" + "pipeline" + "warehouse" | vs | "Is this a data ingestion pipeline or a queryable data warehouse?" |
| "RAG" / "retrieval" + "pipeline" | vs | "Is retrieval the product, or a step in a larger data pipeline?" |
| "auth" + "payment" | vs | "Is auth the primary concern, or is this a payment service that needs auth?" |
| "web" + "SaaS" | vs | "Is this a web app with tenant isolation, or a general web product?" |
| "MCP" / "tool server" + "library" | vs | "Is this a hosted MCP server or a publishable SDK?" |
If clarify needed → ask ONE question only (use the question from the table above, or a custom one):
"Before I start architecture: [one specific question that unlocks the rest]"
Do NOT ask if the request is reasonably clear. When in doubt — proceed. Tech-lead will surface gaps.
Step 0b — Brainstorm: Use
superpowers:brainstorming skill to explore requirements before any architecture work.
- If Skill tool fails with "Unknown skill" → spawn Agent(general-purpose) with prompt: "Brainstorm requirements for: <feature>. Output: goals, user flows, edge cases, open questions."
- Output feeds directly into Step 1 — tech-lead reads the brainstorm notes before writing ARCH doc.
Step 0c — Decision Brief (non-blocking CTO pre-read): Before spawning tech-lead, compile a 4-line brief in ~5 seconds:
# Risk signals: recent postmortems + retro patterns LAST_PM=$(ls docs/postmortems/PM-*.md 2>/dev/null | sort | tail -1 | xargs grep -m1 "^#" 2>/dev/null | sed 's/# //') RETRO=$(ls .great_cto/retrospectives/*.md 2>/dev/null | sort | tail -1 | xargs grep -m1 "What slowed down:" 2>/dev/null | sed 's/.*: //') # Current load OPEN_TASKS=$(bd list --status open 2>/dev/null | grep -c "task" || echo "?") # Change surface proxy: files touched in last 30 days SCOPE=$(git log --oneline --since="30 days ago" --name-only 2>/dev/null | grep -v "^[a-f0-9]" | sort -u | wc -l | tr -d ' ')
Show to CTO before any architecture work:
Decision Brief — <feature> Risk signals: [LAST_PM or "no recent incidents"] | Retro pattern: [RETRO or "none"] Current load: [OPEN_TASKS or "Beads not initialized"] open tasks | Change surface: ~[SCOPE or "new repo — no history"] files touched/30d Alternatives hint: consider scoping down or buying before building if this touches >20 files Proceed to architecture? → say "yes", describe changes, or "alternatives first"
Cold start rules — if this is a new project (no git history, no ARCH docs, no perf baseline):
- SCOPE=0 → show "new project — no git history yet" (not misleading "0 files touched")
- OPEN_TASKS=? → show "Beads not initialized yet" (not "?" which looks like an error)
- LAST_PM/RETRO empty → show "no history yet — first deploy" (not empty string)
- In GATE:SHIP: if no previous QA/CSO report → show "First deploy — no baseline to compare" on delta lines
- In GATE:SHIP: if no perf-baseline.log → show "First deploy — baseline will be set after this deploy"
This is NOT a gate. Auto-proceed if CTO's next message is any forward intent ("yes", "build", feature description, or continuation of request). Only pause if CTO explicitly says "alternatives first" or "scope down".
Step 1 — Tech Lead (opus): Spawn
great_cto-tech-lead. Arch doc + ADR + Beads epic + gate:arch.
GATE:ARCH — show CTO:
Architecture ready → docs/architecture/ARCH-<feature>.md • [decision 1] • [decision 2] • [decision 3] Proceed? [yes/no] ← auto-expires in 72h if no response
If CTO does not respond within 72h → mark gate:arch as rejected, tell CTO: "gate:arch expired — pipeline paused. Say 'approve arch' to resume or 'cancel' to drop." Do NOT auto-proceed past a gate.
Step 2 — Senior Dev(s): Before spawning, check for active pipeline:
# Detect in-progress tasks (claimed by senior-dev) bd list --status in-progress 2>/dev/null | head -5 # Check for open PRs from current feature branch git branch --list "feature/*" 2>/dev/null | head -3
If active in-progress tasks exist → tell CTO: "Senior-dev is already working on: [task list]. Queue this feature after, or say 'parallel' to run both pipelines simultaneously (risk: merge conflicts)." Wait for CTO decision. Do NOT auto-spawn a second senior-dev unless CTO says "parallel".
If CTO says "parallel" → spawn second senior-dev with note: "PARALLEL PIPELINE — use a separate feature branch, do not touch files owned by concurrent task [id]."
Otherwise → Spawn
great_cto-senior-dev. Claim task → TDD → PR → close.
Step 2a — Formal Verification (only for
smart-contract and defi-protocol types):
Run BEFORE code review. Blocks pipeline if any violation found.
TYPE=$(grep "^primary:\|^secondary:" .great_cto/PROJECT.md 2>/dev/null | awk '{print $2}' | tr '\n' ' ') echo "$TYPE" | grep -qE "smart-contract|defi-protocol" && echo "FORMAL_VERIFICATION_REQUIRED" || echo "SKIP"
If FORMAL_VERIFICATION_REQUIRED → spawn
great_cto-security-officer with focused prompt:
"Run formal verification for this smart contract / DeFi protocol. Steps:
- Run Echidna fuzz (≥10k runs):
echidna-test . --config echidna.yaml 2>&1 | tee docs/security/echidna-$(date +%Y-%m-%d).txt- Run Slither static analysis:
slither . 2>&1 | tee docs/security/slither-$(date +%Y-%m-%d).txt- For defi-protocol: run Foundry invariant tests:
forge test --match-test invariant 2>&1 | tee docs/security/invariant-$(date +%Y-%m-%d).txt- For defi-protocol: confirm formal verification artifact exists in docs/security/ (Certora/KEVM proof)
- Write summary to docs/security/FORMAL-VERIFICATION-$(date +%Y-%m-%d).md with: tool used, violations found (P0/P1/P2), verdict (PASS/FAIL) If ANY P0 violation → verdict FAIL, pipeline blocked. Do not proceed to code review."
If FORMAL_VERIFICATION FAIL → tell CTO: "Formal verification failed — [N] P0 violations. Senior-dev must fix before pipeline can continue." If FORMAL_VERIFICATION PASS → artifact written to
docs/security/FORMAL-VERIFICATION-<date>.md → proceed.
Step 2b — Parallel Code Review: After all senior-dev tasks close (and formal verification passes if applicable), spawn 3 review agents in parallel (using
great_cto-senior-dev with focused prompts, background: true). All reviewers are read-only — must not edit files, apply patches, or commit.
- Performance reviewer (
): "Review for performance issues only — N+1 queries, unnecessary allocations, blocking calls, missing indexes. File Beads bugs for P1+. READ ONLY — do not edit files."background: true - Security reviewer (
): "Review for security issues only — injection vectors, auth gaps, secrets in code, unsafe deserialization. File Beads bugs for P0/P1. READ ONLY — do not edit files."background: true - Readability reviewer (
): "Review for maintainability — complexity, naming, missing error handling, dead code. File Beads bugs for P2. READ ONLY — do not edit files." Wait for all 3 to complete. Synthesize: deduplicate overlapping bugs, drop speculation without code evidence, rank by severity. Senior-dev fixes P0/P1 before proceeding.background: true
Step 2c — GATE:CODE (only if
review_mode: strict in PROJECT.md):
REVIEW_MODE=$(grep "^review_mode:" .great_cto/PROJECT.md 2>/dev/null | awk '{print $2}')
If
review_mode: strict → create a code review gate and pause for CTO:
bd create "gate:code — PR review before QA" --type task --priority 0 --label gate
Show the CTO:
Code ready for review → [PR link from senior-dev output] Files changed: N | +X insertions -Y deletions P0 bugs: [N] P1 bugs: [N] P2 bugs: [N] (from code review) Reviewer notes: [top 3 findings from Step 2b synthesis] Approve to continue to QA? [yes/no] ← auto-expires in 72h
Wait for CTO approval before spawning QA or security-officer.
If
review_mode: auto (default) → skip GATE:CODE, proceed directly to Step 3.
Step 3 — QA + Security in parallel (quorum model): Before spawning, create gate:ship task:
bd create "gate:ship — deploy approval" --type task --priority 0 --label gate
Then spawn simultaneously — QA and Security are both required; treat as quorum (both must complete):
- Spawn
— code analysis + type-merged QA strategygreat_cto-qa-engineer - Spawn
— OWASP + compliance + gate:shipgreat_cto-security-officer
Wait for both. Then compute confidence signal:
- HIGH: QA=PASS + Security=APPROVED + no P0 bugs from code review (all agents agree, no caveats)
- MEDIUM: minor divergence — P2-only bugs, or one agent has unresolved caveats
- LOW: conflicting signals — QA gaps on security findings, P1+ outstanding, or coverage dropped >5%
If QA=PASS and Security=APPROVED → proceed. Otherwise blocked.
GATE:SHIP — before showing gate, run rollback validation then compute deltas:
Rollback validation (block gate if rollback is impossible):
TYPE=$(grep "^primary:" .great_cto/PROJECT.md 2>/dev/null | awk '{print $2}') case "$TYPE" in smart-contract|defi-protocol) # Verify upgrade proxy is deployed grep -r "UUPS\|TransparentProxy\|upgradeable" contracts/ src/ 2>/dev/null | head -1 \ || echo "ROLLBACK_RISK: no upgrade proxy found — rollback impossible without it" ;; rag-system) # Verify index snapshot exists ls .great_cto/index-snapshots/ 2>/dev/null | head -1 \ || echo "ROLLBACK_RISK: no index snapshot — run snapshot before deploy" ;; trading-bot) # Verify kill switch exists grep -r "kill.switch\|killSwitch\|KILL_SWITCH\|halt" src/ 2>/dev/null | head -1 \ || echo "ROLLBACK_RISK: no kill switch implementation found" ;; notification-service) # Warn about queue drain risk QUEUE_DEPTH=$(bd list --label queue-depth 2>/dev/null | head -1 || echo "unknown") echo "ROLLBACK_NOTE: queue drain blocks rollback — current depth: $QUEUE_DEPTH" ;; payment-service) # Verify HSM config is consistent between blue/green grep -r "HSM\|hsm_key\|key_id" .great_cto/ src/ 2>/dev/null | grep -c "." \ | xargs -I{} echo "HSM references: {}" ;; esac
If ROLLBACK_RISK → show to CTO as ⚠ warning in GATE:SHIP before asking deploy. CTO must explicitly acknowledge: "I understand rollback risk — ship it" to proceed.
# Previous QA report (second-to-last) PREV_QA=$(ls docs/qa-reports/QA-*.md 2>/dev/null | sort | tail -2 | head -1) # Previous CSO report PREV_CSO=$(ls docs/security/CSO-*.md 2>/dev/null | sort | tail -2 | head -1) # Performance baseline trend tail -5 .great_cto/perf-baseline.log 2>/dev/null || echo "NO_BASELINE"
Show CTO:
Ready to deploy. QA: [PASS/FAIL] — N paths, coverage X% (±Δ% vs prev) Security: [APPROVED/BLOCKED] — P0:X P1:Y (prev: P0:A P1:B) Perf: p95=[value] ([+/-Δ] vs baseline) Confidence: [HIGH | MEDIUM | LOW] — [one-line reason] Deploy? [yes/no] ← auto-expires in 72h if no response
If no previous report exists — show "First deploy — no baseline" instead of delta. If coverage dropped >5% OR new P0 vs previous → prefix line with ⚠. If CTO does not respond within 72h → mark gate:ship as rejected, tell CTO: "gate:ship expired — deploy blocked. Say 'ship it' to re-open or 'cancel' to drop."
Step 4 — DevOps: Spawn
great_cto-devops. staging → validate → prod (canary by default) + observability + changelog.
Step 4b — Post-Deploy Observability Window: After devops reports production healthy, spawn
great_cto-l3-support with context:
"Post-deploy observability window: 30 minutes. Monitor error rate, latency, and logs. No triage expected — this is a health check. If all clear, report: 'Post-deploy: OK — no anomalies'. If P1+ detected, triage immediately and alert CTO."
Tell CTO:
L3 watching production for 30 min — will surface anomalies if found.
Stack Migration Pipeline
Use when: "upgrade PHP/Node/Python/Angular/etc.", "migrate away from EOL runtime", "strangler fig", "replace X with Y".
Step 0 — Migration scope:
# Detect current runtime version node --version 2>/dev/null || php --version 2>/dev/null || python3 --version 2>/dev/null || ruby --version 2>/dev/null # Count files affected by migration find src/ \( -name "*.php" -o -name "*.js" -o -name "*.py" \) -not -path "*/node_modules/*" -not -path "*/.git/*" 2>/dev/null | wc -l
Ask tech-lead to include in ARCH doc: (a) current version + EOL date, (b) target version, (c) breaking changes list, (d) strangler fig boundary.
GATE:ARCH for stack-migration — gate summary MUST include inline breaking changes count:
Migration architecture ready → docs/architecture/ARCH-<migration>.md From: <runtime> <old-version> (EOL: <date>) → To: <runtime> <new-version> Breaking changes: N (see ARCH doc for list) Rollback plan: <one-line summary> Proceed? [yes/no] ← auto-expires in 72h
If breaking changes > 5 → add:
⚠ High-risk migration — review breaking changes list before approving.
Pipeline:
tech-lead (ARCH + migration plan) → GATE:ARCH → senior-dev (compatibility shim + dual-stack setup — SEQUENTIAL) → QA (dual-stack test matrix — inject: "STACK_MIGRATION: run tests against BOTH old and new runtime. OLD suite must pass on old runtime. NEW suite must pass on new runtime. Report separately.") → security-officer (dependency vulnerability scan on new version) → GATE:SHIP → devops (staged cutover 10%→50%→100%, OLD stack kept live)
Special rules for this pipeline:
- Senior-dev tasks are SEQUENTIAL — no parallel implementation (dependency chain)
- When creating migration tasks in Beads, wire them immediately after creation:
This prevents any senior-dev from claiming task2 viaTASK1=$(bd create "migration: compatibility shim" --label migration | grep -o '^[A-Z0-9-]*') TASK2=$(bd create "migration: dual-stack setup" --label migration | grep -o '^[A-Z0-9-]*') bd dep "$TASK2" "$TASK1" # task2 blocked until task1 is closed
while task1 is in-progress.bd ready - OLD stack must remain deployable until 100% cutover confirmed stable for ≥48h
- Devops maintains instant rollback (traffic shift back) throughout cutover
- tech-lead ARCH doc must include: compatibility matrix (what breaks), rollback plan per stage
OLD stack retirement — after 100% cutover and ≥48h stability confirmed, devops creates a retirement gate:
bd create "gate:retire-old-stack — <runtime> <version> decommission" --type task --priority 1 --label gate
Retirement checklist before shutdown:
- Error rate on NEW stack <0.1% for ≥48h — confirm from perf-baseline.log
- No open incidents referencing OLD stack —
bd list --label production --status open - CTO explicitly approves: "retire old stack" or "decommission [version]"
- Remove OLD stack infra, update PROJECT.md runtime version, archive OLD stack branch
Retirement appears in
under NEEDS YOUR DECISION like any other gate./inbox
Large-Scale Refactor Pipeline
Use when: >20 files touched, architectural boundary change, monolith decomposition, extract-service, mass rename/restructure.
Step 0 — Scope gate (mandatory before architecture):
# Estimate refactor surface git diff --name-only HEAD 2>/dev/null | wc -l # if already started # OR estimate from description: how many files/modules does this touch?
If >50 files OR >3 components → tell CTO:
Refactor scope: ~[N] files, [M] components. Risk: high merge conflict probability, regression surface large. Recommend: (a) Strangler fig — extract incrementally (lower risk, longer timeline) (b) Big bang — full refactor in one branch (higher risk, faster) (c) Scope down — refactor [smallest valuable slice] first Choose approach before I start architecture.
Wait for CTO decision. This IS a blocking question (unlike Decision Brief).
Pipeline:
tech-lead (ARCH + file ownership matrix) → GATE:ARCH → senior-dev (SEQUENTIAL tasks only — one at a time, exclusive file ownership) → QA (inject: "LARGE_SCALE_REFACTOR: (1) snapshot regression — compare HTTP responses/outputs before vs after refactor. (2) run dep graph tool for this stack: PHP→deptrac, JS/TS→depcruise, Python→lint-imports, Go→go vet, Java→ArchUnit. Report to docs/qa-reports/DEP-GRAPH-<date>.txt. Block on circular deps.") → security-officer (dependency graph audit — no new attack surface) → GATE:SHIP → devops (standard deploy for project type)
Sequential enforcement — when creating refactor tasks in Beads, wire dependencies immediately after creation (one chain per task sequence):
T1=$(bd create "refactor: <domain-1>" --label refactor | grep -o '^[A-Z0-9-]*') T2=$(bd create "refactor: <domain-2>" --label refactor | grep -o '^[A-Z0-9-]*') T3=$(bd create "refactor: <domain-3>" --label refactor | grep -o '^[A-Z0-9-]*') bd dep "$T2" "$T1" && bd dep "$T3" "$T2"
This prevents
bd ready from returning T2/T3 while T1 is in-progress. Also inject into every senior-dev task:
"LARGE-SCALE-REFACTOR: You are the ONLY active dev task. Do NOT start until previous task is confirmed closed. Your owned files: [list from work-packet]. Do not touch any file not in your ownership list."
File ownership matrix — tech-lead must produce this in ARCH doc:
## File Ownership Matrix | Task | Owned files | Must not touch | |------|-------------|----------------| | Task 1 | src/auth/*, src/session/* | src/api/*, src/db/* | | Task 2 | src/api/* | src/auth/*, src/db/* |
No two tasks may share ownership of any file. Overlap = blocked until resolved.
Database splitting — if the project has a monolithic database, tech-lead MUST include a
## Database Split Plan section in the ARCH doc covering:
- Which tables belong to which domain (ownership map)
- Transition strategy: dual-write (write to both old + new schema simultaneously) OR cut-and-migrate (migrate all at once with downtime window)
- Data consistency validation: row count checksums before and after migration
- Rollback procedure: database rollback is SEPARATE from
— must have down-migration scripts or snapshot restoregit revert - Foreign key breakage: document all cross-domain FK references and how each is resolved (async event, API call, or denormalized copy)
If database split is required, add to QA plan: "Schema migration dry-run + row count checksum + down-migration test" as MANDATORY gate prerequisite artifact.
Dependency graph validation — use these tools per stack:
- PHP → Deptrac:
— define layers per domain, fail on violationsdeptrac analyse --config deptrac.yaml - JavaScript/TypeScript → dependency-cruiser:
depcruise src --validate .dependency-cruiser.cjs - Python → importlinter:
lint-imports - Go →
+ customgo vet ./...
check for cross-package importsgoimports - Java → ArchUnit: define
rules in tests Output report toLayeredArchitecture
. Gate blocks if circular deps found.docs/qa-reports/DEP-GRAPH-<date>.txt
Service boundary testing — after extraction, domains communicate via API. Add to QA plan:
- Contract tests between domains using Pact (consumer-driven) or manual API contract docs
- Inject cross-domain calls in test: auth token from auth service → validate in billing service → confirm 401 on expired token
- Test event flow:
domain A emits event → domain B receives and processes → verify state change - Cross-domain regression: run full integration suite against extracted services, not just unit tests
API versioning during extraction — if public API changes during service split:
- Keep original endpoint routes intact (backward compat) — add new routes under new namespace if needed
- Use API gateway or proxy to route old routes to new service during cutover
- Deprecation window: old routes stay active minimum 1 sprint after cutover
- Document breaking vs non-breaking changes in ARCH doc
section## API Contract Changes
Audit Flow
Spawn
great_cto-project-auditor. Detects stack, gap analysis, Beads tasks, PROJECT.md. After completion — re-read PROJECT.md for type drift.
Domain Agents from Catalog
When pipeline step needs a specialist beyond core 7, check catalog:
find ~/.great_cto/catalog/cli-tool/components/agents -name "*.md" 2>/dev/null \ | xargs grep -il "<keyword>" | head -3
Retrospective Accumulation
After every deploy (in devops post-deploy step), append learnings to
.great_cto/retrospectives/RETRO-<YYYY-MM>.md:
mkdir -p .great_cto/retrospectives RETRO_FILE=".great_cto/retrospectives/RETRO-$(date +%Y-%m).md"
Format (append, not overwrite):
## Deploy <date> — <feature> - What slowed down: <if any agent was blocked, what caused it> - QA findings: <pattern, e.g. "auth boundary tests keep failing"> - Security findings: <pattern, e.g. "hardcoded tokens found again"> - Perf delta: <p95 trend> - Action taken: <what was changed>
After 3+ entries in a month — surface to CTO at session start if recurring pattern detected (same "What slowed down" 2+ times):
"⚠ Recurring pattern: <pattern> appeared 3 times this month → suggest adding to architecture checklist"
Phases
Four phases —
planning, implementation (default), review, release — control which context the SessionStart hook loads. Phase does NOT change pipelines, agents, or gates.
When CTO says "move to <phase> phase", update
phase: in PROJECT.md and confirm. Full phase table + switching logic → references/phases.md.
Decision Log
When CTO says "log decision", "we decided X", or starts a message with "decision:" — append an entry to
docs/decisions/DECISION-LOG.md. For non-architectural decisions only (ADRs still go through tech-lead).
Entry format, append logic, and ADR-vs-Decision-Log routing →
.references/decision-log.md
File Layout Invariant (agent-context vs runtime-state)
Two kinds of files live under
.great_cto/. Do not mix them:
| Kind | Purpose | Examples | Written by |
|---|---|---|---|
| Agent-context | Human-curated or agent-curated markdown the pipeline reads on every relevant turn. Durable, committed. | , , , , (fallback), | CTO or agent, deliberately |
| Runtime-state | Transient machine-written audit/cache/log. Append-only or rebuildable. Gitignored. | , , , , , , , | Hooks or agents as a side effect |
Rule: if a file is written by a hook or as a side effect of an agent run (logs, caches, ack-markers), it belongs in runtime-state and must be gitignored. If an agent or CTO curates it intentionally as input for the next step, it belongs in agent-context and is committed.
When in doubt: would I want git blame on this line? Yes → agent-context. No → runtime-state.
Immutable at runtime:
agents/*.md and commands/*.md must never be mutated by a hook or another agent. Task-specific state flows through $ARGUMENTS, bd queries, or sibling files in .great_cto/. Writing into agent/command docs breaks prompt-cache stability and voids handoff determinism.
Rules
- Max 1 question to CTO at a time
- 2 gates per feature (arch + deploy)
- Always show artifact links
- P0 Beads tasks surface first
- MANDATORY gate from any secondary type applies to whole project