AIDE (Agent-Informed Development Engineering) -- A Software Development Methodology for the Agentic Era v1.0¶
Author: CTO (20+ years of architecture experience, 3 years of hands-on AI agent experience) Based on: GPT/Claude/Gemini triple deep research + Team Alpha (Integrationists) 2 reports + Team Beta (Radicals) 1 report Date: 2026-02-18
Part 5: CI/CD Pipeline¶
AIDE CI/CD Diagram¶
flowchart TB
A["Change Detected<br/>code / meta / skill"] --> B["Stage 1: Static Analysis<br/>TypeScript strict · ESLint · Prettier<br/>Security linters"]
B --> C["Stage 2: Unit Tests<br/>Parsers · Policies · Business Logic · State Transitions"]
C --> D["Stage 3: Property-Based Tests<br/>Business Invariant Property Verification"]
D --> E["Stage 4: Integration Tests<br/>Cross-Feature Coordination · Data Flow · Integration Environment"]
E --> F["Stage 5: Eval Suites<br/>Dataset + Scenario-Based Code Quality Evaluation"]
F --> G["Stage 6: Security Gate<br/>AI-Generated Code Security Scan<br/>XSS · SQL Injection · Logic Errors<br/>SCA / Dependency Scan"]
G --> H["Stage 7: Meta-File Validation<br/>Tier 1 Size Limit (300 lines)<br/>manifest.yaml Consistency"]
H --> I{"All Gates<br/>Pass?"}
I -->|Yes| J["Canary Deploy<br/>Conservative Release · Progressive Rollout"]
I -->|No| K["Block & Report<br/>Structured Error Feedback"]
J --> L["Production Monitor<br/>Traces · Metrics · Latency · Alerts"]
L --> M["Eval Flywheel<br/>Incorporate Production Failures into Eval Datasets"]
M --> F
Eval Flywheel Concept¶
The Eval Flywheel is a continuous improvement loop that automatically incorporates failures discovered in production into eval datasets to prevent regressions:
- Production Monitoring: Detect errors/anomalous behavior from logs/metrics
- Failure Case Collection: Structure the relevant input/context/expected results
- Eval Dataset Incorporation: Add new test cases to
evals/datasets/ - Automatic CI Execution: The case is included in gates from the next deployment
- Progressive Quality Improvement: Eval datasets become richer over time, strengthening regression prevention
# evals/datasets/production-failures.yaml
- id: "PF-2026-0218-001"
source: "production_log_abc123"
discovered_at: "2026-02-18T10:30:00Z"
scenario:
feature: "cart"
action: "Discount rate application error in cart total calculation"
input:
items:
- unit_price: 10000
quantity: 2
discount_rate: 15
expected_behavior:
- "Amount after discount: 17,000 KRW"
- "Total must not be negative"
actual_behavior: "Amount error due to processing discount rate as decimal instead of percentage"
severity: "high"
fix_applied: "Fixed calculate_item_price function in logic.ts"
Security Gate¶
The Security Gate runs at Stage 6 of CI/CD and includes the following:
- AI-generated code security scan: Detect XSS, SQL Injection, and logic error patterns (ESLint security plugins, Semgrep, etc.)
- Auth/AuthZ verification: Confirm that appropriate authentication middleware is applied to all API endpoints
- SCA (Software Composition Analysis): Scan npm packages and external dependencies for vulnerabilities
- Sensitive data exposure check: Verify that sensitive information (passwords, tokens, personal data) is not included in logs or responses
← Previous: 04-PRACTICAL-GUIDE | Next: 06-ADOPTION-GUIDE →