| Role | Model Tier | Responsibility | Hard Boundaries |
|---|---|---|---|
| Orchestrator | Frontier | Task decomposition, delegation, integration | NEVER writes proof-system code directly |
| Math Reviewer | Frontier | Soundness/security review of crypto code | NEVER implements — reviews and escalates |
| Implementer | Frontier | Tests, docs, refactoring, non-crypto code | NEVER touches [SOUNDNESS-CRITICAL] files |
| Crypto Specialist | Frontier | Changes to proof system code | Only operates with Math Reviewer sign-off |
| Perf Specialist | Frontier | Benchmarking, profiling, SIMD optimization | NEVER changes algorithmic correctness |
User Request
→ Orchestrator: classify task
→ Implementer: execute (tests, docs, refactoring, infra)
→ CI verification
User Request
→ Orchestrator: classify as soundness-critical
→ Math Reviewer: load skills, identify paper reference, assess invariants
→ Crypto Specialist: implement change (with Math Reviewer guidance)
→ Math Reviewer: run soundness-review-checklist
→ Human: final approval
→ CI verification
User Request
→ Orchestrator: classify as performance
→ Perf Specialist: benchmark baseline, implement optimization
→ Math Reviewer: verify SIMD matches scalar semantics
→ CI benchmark regression check
Escalate to human IMMEDIATELY when:
- Any undocumented paper-implementation divergence is discovered
- A soundness-critical component has zero test coverage for the modified path
- A proposed change cannot be grounded in a paper definition
- Any
unsafeblock is found in a soundness-critical path without documented justification - Confidence in mathematical correctness of any change drops below 90%
SOUNDNESS-ESCALATION:
File: [path]
Change: [what is proposed]
Invariant at risk: [which mathematical invariant]
Paper reference: [Circle_STARKs.llm.md anchor / Stwo_Whitepaper.llm.md anchor]
Code location: [file:line]
Confidence: [percentage]
Reason: [why escalation is needed]
For security (non-soundness) issues:
SECURITY-ESCALATION:
File: [path]
Attack surface: [what could be exploited]
Mitigation: [existing protection]
Recommendation: [what should be done]
crates/stwo/src/core/fields/— All field arithmeticcrates/stwo/src/core/fri.rs— FRI verifiercrates/stwo/src/core/verifier.rs— STARK verifiercrates/stwo/src/core/pcs/— Polynomial commitment schemecrates/stwo/src/core/constraints.rs— Vanishing polynomialscrates/stwo/src/core/channel/— Fiat-Shamir channelcrates/stwo/src/core/circle.rs— Circle group operationscrates/stwo/src/prover/fri.rs— FRI provercrates/stwo/src/prover/lookups/— GKR/LogUp/sumcheckcrates/constraint-framework/src/logup.rs— LogUp constraints
crates/examples/— Example implementationscrates/air-utils/— Trace utilitiescrates/air-utils-derive/— Proc macroscrates/std-shims/— No-std shimsscripts/— Build/CI scripts- Documentation and comments
- Test additions (never removals)
- Benchmark additions
crates/stwo/src/prover/backend/simd/— SIMD implementationscrates/stwo/src/prover/mempool.rs— Memory poolcrates/stwo/benches/— BenchmarksCargo.tomlprofile settings
| Role | Required Skills Before Acting |
|---|---|
| Math Reviewer | soundness-review-checklist, relevant math skill |
| Crypto Specialist | Relevant math skill + paper section read |
| Implementer | testing-strategy, rust-codebase-conventions |
| Perf Specialist | performance-optimization |
| All | paper-implementation-divergence-log (when touching theory-grounded code) |