Multi-Agent Orchestration
Spec Kitty supports multi-agent delivery through a host/provider split:
spec-kittyowns workflow state, lane validation, and git-safe mutations.- External providers orchestrate agent execution and call
spec-kitty orchestrator-api.
This replaces in-core orchestration commands. The core CLI does not provide spec-kitty orchestrate.
Why this model
- Security boundary: autonomous orchestration is optional and can be disallowed by policy.
- Extensibility: multiple provider strategies can exist without branching core CLI behavior.
- Operational clarity: one host contract for state transitions and lifecycle events.
Core Principles
- Planning in main, implementation in worktrees.
- One worktree per WP.
- Lane transitions validated by the host state model.
- External providers drive automation through API calls, not direct file edits.
Two orchestration styles
1) Manual (human- or agent-driven)
Manual coordination still works via normal commands:
spec-kitty implement WP01
spec-kitty agent tasks move-task WP01 --to for_review
spec-kitty agent tasks move-task WP01 --to done
2) External automated orchestration
Automated coordination is run by external providers such as spec-kitty-orchestrator.
spec-kitty orchestrator-api contract-version --json
spec-kitty-orchestrator orchestrate --feature 034-my-feature --dry-run
spec-kitty-orchestrator orchestrate --feature 034-my-feature
Provider loop responsibilities:
- Discover ready WPs via host API.
- Start implementation and run agents in worktrees.
- Transition WPs through review cycles.
- Accept and merge when done.
Host API boundary
All state-changing automation calls flow through spec-kitty orchestrator-api.
start-implementationstart-reviewtransitionappend-historyaccept-featuremerge-feature
The host returns a stable JSON envelope with success and error_code for deterministic provider control flow.
Lane semantics
Public API lanes:
plannedin_progressfor_reviewdoneblockedcanceled
Compatibility mapping:
- API
in_progressmaps to internaldoing. planned,for_review, anddonemap directly.
Policy metadata and mutation authority
Run-affecting operations require policy metadata (--policy) and are validated by the host.
This ensures:
- identity and mode are explicit for each mutation
- malformed or secret-like policy payloads are rejected
- orchestrators cannot bypass host transition rules
What this means for teams
- Teams that want full automation can run an external provider.
- Teams with strict security constraints can keep orchestration manual.
- Teams can build custom providers while preserving a consistent workflow model.