Skip to content

Add architect-reviewer skill, lenses, and agent#427

Open
moumighosh wants to merge 3 commits intomasterfrom
moghosh/architect-reviewer-brief-agent
Open

Add architect-reviewer skill, lenses, and agent#427
moumighosh wants to merge 3 commits intomasterfrom
moghosh/architect-reviewer-brief-agent

Conversation

@moumighosh
Copy link
Copy Markdown

No description provided.

@moumighosh moumighosh requested a review from a team as a code owner April 27, 2026 20:43
@github-actions
Copy link
Copy Markdown

❌ Work item link check failed. Description does not contain AB#{ID}.

Click here to Learn more.

@moumighosh
Copy link
Copy Markdown
Author

Copy link
Copy Markdown
Contributor

Copilot AI commented Apr 27, 2026

@copilot link this https://identitydivision.visualstudio.com/Engineering/_workitems/edit/3587751 to the PR

Added AB#3587751 to the PR description to link the ADO work item.

Comment thread .github/skills/architect-reviewer/references/threat-model-lens.md Outdated
2. **[Gap: Threat Model]** Question text
...

### 5. Recommendation
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Any possible examples we can include in "references"?

Examples/templates, etc help significantly in replicating the output you are looking for. Perhaps we can test this agent/skill on some example, agree if we like the output and then add that as a reference

Comment on lines +1 to +4
---
name: architect-reviewer
description: >
Produce a structured Architect Review Brief from an Android Identity Platform developer design document.
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could you shared (maybe on Teams) a run of this against the telemetry spec?

Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's fairly hard to tell if these definitions are good or need changes without throwing them at some test cases, so I consider this to be almost like an acceptance test for the merge.


- Do NOT summarize the document — produce only the structured brief
- Do NOT skip the lens-loading step — the lenses encode the platform-specific rules
- Absent threat model in the design → automatic 🔴 in the Risk Register
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This seems a little extreme, but that's just my personal opinion. I expect some docs are going to discuss things that don't have security impact.

| Rename public method/class | 🔴 Breaking |
| Change method signature (add required param) | 🔴 Breaking |
| Add new required field to Parcelable/Serializable | 🔴 Breaking |
| Change enum values | 🔴 Breaking |
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Another huge one here -- adding new error code strings without checking protocol version.

This is one of the biggest sources of problem for our dashboards. New error codes get added for existing cases, then all the existing clients start to go from some error that the OneAuth version they shipped with understood like 'ServerTemporarilyUnavailable' which we can account for, to an unknown value we classify as Unexpected.

Maybe we can't enforce this just yet without protocol changes. But I would like to start marking error enum values as introduced in some particular broker protocol SDK version and require the broker to map errors backwards to less-precise but better-than-Unexpected errors at the IPC boundary when they realize the client won't know how to handle it.

I'd love to get a feature on the books for this, we've had several of these recently.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants