Agents
Agents define custom subagents — autonomous AI instances with their own scoped toolset, model selection, permission mode, lifecycle hooks, and skill set. They live in .agentsmesh/agents/ as Markdown files.
File format
---name: code-reviewerdescription: Reviews code changes for quality and security issuestools: - Read - Grep - Glob - Bash(git diff) - Bash(git log)model: sonnetpermissionMode: askmaxTurns: 10mcpServers: - githubhooks: PreToolUse: - matcher: "Edit|Write" type: command command: "eslint --fix $FILE"skills: - security-reviewmemory: .context/review-history.md---
You are a senior code reviewer. Focus on logic correctness, performance,security vulnerabilities, and adherence to project conventions.
Flag issues by severity: Critical, Major, Minor, Suggestion.Suggest concrete fixes, not vague recommendations.Frontmatter reference
| Field | Type | Description |
|---|---|---|
name | string | Agent identifier. Used in tool menus and CLI output. |
description | string | Short description shown when selecting agents. |
tools | string[] | Allowed tools. Supports tool names like Read, Grep, Bash(cmd). |
disallowedTools | string[] | Explicitly denied tools (takes priority over tools). |
model | string | Model hint: sonnet, opus, haiku. Tools map this to their native model selector. |
permissionMode | string | How permissions are handled: ask, default, none. |
maxTurns | number | Maximum conversation turns before the agent stops. |
mcpServers | string[] | MCP server names available to this agent (must be defined in mcp.json). |
hooks | object | Agent-level lifecycle hooks. Same format as hooks.yaml. |
skills | string[] | Skill names (directories in .agentsmesh/skills/) available to this agent. |
memory | string | Path to an external memory file the agent reads at startup. |
Tool-specific behavior
See the Agents row in the supported tools matrix for per-target support levels (native, embedded, or unsupported).
Example agents
Security auditor
---name: security-auditordescription: Audits code for OWASP top 10 vulnerabilities and security anti-patternstools: - Read - Grep - Globmodel: opuspermissionMode: askmaxTurns: 20skills: - owasp-checklist---
You are a security engineer conducting a code audit. Focus on:- Injection vulnerabilities (SQL, command, LDAP)- Authentication and session management flaws- Sensitive data exposure- Insecure direct object references- Security misconfiguration
Report every finding with: file path, line number, severity, and remediation.Test writer
---name: test-writerdescription: Writes unit and integration tests for changed codetools: - Read - Write - Edit - Bash(git diff HEAD~1) - Bash(pnpm test)model: sonnetpermissionMode: defaultmaxTurns: 15---
You are a test engineer. Given the recent code changes, write comprehensive tests.Follow the existing test patterns in the repository.Target 90%+ coverage for changed files.Run the tests to verify they pass.Disabling projection for a target
conversions: agents_to_skills: cline: false # skip Cline instead of embedding windsurf: false # skip Windsurf instead of embedding