Custom specialist agents in Intent are domain-specific agent definitions that extend Intent's built-in coordinator-implementer-verifier architecture, enabling teams to handle recurring tasks such as security scanning, documentation generation, or code migrations with purpose-built prompts, scoped tool access, and explicit behavioral constraints.
TL;DR
Custom specialist agents extend Intent when recurring domain tasks need tighter prompts, scoped tools, and clearer boundaries than the default trio provides. Define Auggie CLI subagents as Markdown files with YAML front matter in .augment/agents/, and use rules to constrain their behavior. In Intent, custom specialists are configurable per workspace.
Intent's Coordinator-Implementer-Verifier Architecture
Intent, Augment Code's agentic development environment, organizes work through three roles: a Coordinator that plans, an Implementer that executes, and a Verifier that validates. Understanding this architecture is essential before extending it with custom agents.
The Coordinator analyzes the codebase using Intent's Context Engine, which semantically indexes repositories across 400,000+ files. It drafts a living spec as an evolving document, decomposes the spec into a dependency-ordered directed acyclic graph (DAG), and delegates subtasks to Implementers in parallel batches called waves. Developers can stop the Coordinator at any point to manually edit the spec before agents continue.
Implementers execute subtasks in isolated git worktrees, each with its own dedicated workspace. Multiple Implementers run simultaneously within each wave, and each runs its own reason-act-observe cycle within a scoped context. Intent ships with six built-in specialist personas: Investigate, Implement, Verify, Critique, Debug, and Code Review.
The Verifier checks each output against the living spec, not isolated diffs. The Verifier and Implementers have opposing goals by design: one optimizes for completing the task, the other for finding failures. Together, the Coordinator and Verifier form an outer control loop: plan, execute, verify, then replan.
These two loops operate at different scopes and serve different purposes, summarized below:
| Loop | Scope | Mechanism |
|---|---|---|
| Inner loop | Per the Implementer agent | ReAct-style reason-act-observe cycle within each agent's own context |
| Outer loop | Across Coordinator + Verifier | Plan-execute-verify-replan cycle crossing agent boundaries via structured data contracts |
Custom specialist agents plug into this system as additional Implementers. The Coordinator can delegate domain-specific subtasks to a custom agent the same way it delegates to built-in personas, and the Verifier validates the output against the same living spec.
See how Intent's living specs keep parallel agents aligned as work fans out across waves.
Free tier available · VS Code extension · Takes 2 minutes
in src/utils/helpers.ts:42
When Teams Need Custom Specialists
Custom specialist agents are not required for every workflow. The default trio handles most general-purpose development tasks effectively, including cross-service refactors, feature work with clear decomposition, and codebases where context management is the primary constraint.
Custom specialists become valuable when a clear pattern emerges. The threshold test is simple: the task should involve nondeterministic decisions rather than a fixed deterministic workflow, and it should recur often enough to justify prompt maintenance, tool scoping, and coordination overhead. A fixed workflow with almost no subjective decisions is better handled by a traditional tool.
Teams should consider creating a custom specialist when:
- A recurring domain task produces inconsistent results. Security reviews that miss the same vulnerability classes, documentation that drifts from code, or migrations that repeatedly introduce the same integration failures.
- The default agents lack domain-specific knowledge. General-purpose agents do not encode rules about a team's design token taxonomy, security threat model, or migration compatibility matrix.
- Tool access needs to be restricted or expanded. A read-only reviewer should not have write access. A security scanner may need access to a vulnerability database tool that general agents do not use.
Adding specialists introduces prompt maintenance, tool scoping decisions, and coordination overhead. Start with the default trio, observe where it falls short, and extract a specialist only when a repeatable pattern justifies the investment.
Defining Custom Agents with YAML-Frontmatter Markdown Files
Auggie CLI subagents are defined as Markdown files with YAML frontmatter, stored in one of two directories. This file-based mechanism is distinct from Intent custom specialists, which are configured through the Intent Settings UI.
The two directories differ in scope and version-control behavior:
| Scope | Directory | Availability |
|---|---|---|
| User | ~/.augment/agents/ | All workspaces |
| Workspace | ./.augment/agents/ | Current workspace only; version-controllable |
Workspace-level agents in .augment/agents/ can be committed to version control and shared across a team. This makes agent definitions part of the codebase rather than personal configuration.
File Structure
Each agent file uses the following YAML frontmatter fields:
| Field | Required | Type | Purpose |
|---|---|---|---|
| name | Yes | String | Name of the agent |
| description | No | String | Description of the agent |
| color | No | String | CLI display color; valid ANSI color name |
| model | No | String | Model to use; defaults to CLI default if omitted |
| tools | No | List or comma-separated string | Allowlist: only these tools are available |
| disabled_tools | No | List or comma-separated string | Denylist: all tools except these are available |
If both tools and disabled_tools are specified, disabled_tools takes precedence, and tools is ignored. If neither is specified, the subagent has access to all tools by default. The agent prompt is the main body of the Markdown file and supports headings, lists, code blocks, and standard Markdown formatting.
Available Tools for Restriction
| Tool Name | Function |
|---|---|
| view | View files and directories |
| codebase-retrieval | Search the codebase |
| str-replace-editor | Edit existing files |
| save-file | Create new files |
| remove-files | Delete files |
| launch-process | Run shell commands |
| github-api | Interact with GitHub |
| web-fetch | Fetch web content |
| web-search | Search the web |
For Intent custom specialist agents created through the Settings UI, refer to the Intent overview for the exact configuration options.
Creating a Security-Scanner Agent
A security-scanner agent addresses the gap between vulnerability detection and remediation. Traditional SAST tools flag issues but produce no fixes. A specialist agent can identify vulnerabilities, classify severity, and propose specific remediations within the constraints of a codebase.
The prompt should specify what the agent analyzes, what it does not cover, and how it handles uncertainty. Explicit negative scope statements prevent the agent from drifting into architectural suggestions or performance optimization.
Tool restriction is the design principle at work here. The disabled_tools field removes write access entirely, making this agent read-only. Tool restriction shapes how an agent reasons, not just what it can do.
Creating a Documentation-Writer Agent
A documentation-writer agent addresses documentation drift by generating API documentation, inline comments, and README sections directly from source code. Research from Microsoft's DocAider project found that single-agent documentation design led to hallucinations and incomplete documentation; DocAider uses a multi-agent approach for documentation generation and revision.
The disabled_tools configuration prevents the agent from editing existing files or running shell commands, limiting its scope to reading code and creating new documentation files.
Creating a Migration Specialist
A migration specialist handles large-scale transformations such as language version upgrades, framework replacements, or monolith decomposition. The critical design principle is that the migration agent should not decide what to migrate or in what order. It receives a pre-defined task from the Coordinator's plan and translates one file at a time. Google's research on agent-assisted migrations documents the same principle: provide agents with change locations rather than having agents discover changes autonomously.
Scoping Agent Behavior with the Rules System
The Rules System layers behavioral constraints onto agent definitions. Rules are distinct from agents but critical for controlling how agents operate across different parts of the codebase.
AGENTS.md and CLAUDE.md files placed in subdirectories enable directory-scoped rules. The system walks up the directory tree and loads all relevant rules along the path:
Well-scoped rules reduce hallucination, unnecessary edits, and workflow noise. A security-scanner agent operating in src/backend/ automatically picks up backend-specific constraints, such as which authentication patterns are required, without those constraints cluttering the agent's base prompt. Rules also support two application modes through the type frontmatter field: always_apply, included in every prompt, and agent_requested, attached only when the agent determines relevance based on the rule's description.
Mixing Custom and Built-In Agents in a Single Workspace
Intent's architecture allows custom specialists to operate alongside the default coordinator-implementer-verifier trio without replacing them. The Coordinator decomposes tasks into a DAG, and any subtask can be routed to either a built-in persona or a custom specialist based on the task's requirements.
On a single feature task, the roles are typically split like this:
- The Coordinator drafts the spec and decomposes the work.
- The Implement persona handles standard feature code.
- A custom security-scanner agent reviews changes for vulnerabilities.
- A custom doc-writer agent generates documentation for new APIs.
- The Verifier checks all outputs against the living spec.
Intent keeps orchestration lightweight through wave-based delegation. The Coordinator fans work out in parallel batches, and each agent, built-in or custom, runs in an isolated git worktree with its own scoped context. This avoids the overhead of heavier multi-agent frameworks, particularly in peer-to-peer meshes, where communication pathways grow combinatorially as agents are added.
When using Intent's Context Engine, teams implementing mixed-agent configurations maintain coordinated context within the same semantic index, preventing the fragmentation that occurs when agents have independent, partial views of the codebase.
Explore how Intent's wave-based delegation routes built-in and custom specialists through one coordinated workspace.
Free tier available · VS Code extension · Takes 2 minutes
Key Decision Points When Defining Custom Agents
Several decisions shape how effective a custom agent will be. These are practical tradeoffs, not rigid rules.
- Single specialist vs. multiple specialists. Start with one agent per domain. A single security-scanner agent is easier to test and maintain than separate agents for injection detection, authentication review, and dependency scanning. Split into multiple specialists only when a single agent's prompt grows large enough to degrade reasoning quality.
- Prompt detail level. Follow the minimal sufficiency principle: include the smallest set of information that fully outlines expected behavior. Start with a minimal prompt using the best available model, then add instructions based on observed failure modes rather than anticipated ones. Hardcoding complex, brittle logic creates fragility; vague, high-level guidance fails to give the model concrete signals.
- Tool access scope. Tool access is the hard enforcement layer that prompt text alone cannot provide. An agent bound only to
viewandcodebase-retrievalcannot modify files regardless of what its prompt says. Grant only the tools required for each agent's role, and treat tool restrictions as a reliability decision.
Common Failure Points and What Works
Teams that extend Intent with custom specialists encounter predictable failure modes in the early stages. The patterns below capture what consistently works and what creates avoidable complexity.
Agents hallucinating outside their context. When a prompt lacks explicit uncertainty handling, the agent guesses rather than flagging ambiguity. The mitigation: include escape hatches like "return REQUIRES_MANUAL_REVIEW with your reasoning" or "return UNKNOWN for any field you cannot determine from the provided source code."
Vague role boundaries are causing handoff loops. When two agents have overlapping scope, a security scanner that also suggests refactors, or a documentation writer that also fixes code, the Coordinator may route tasks ambiguously. State what the agent does not cover as explicitly as what it does.
Rubber-stamp verification. Verifier agents can systematically approve incorrect outputs because agreement is the path of least resistance. Mitigation: frame verification adversarially, requiring the Verifier to identify at least one specific problem before an approval is valid.
Prompt bloat over time. Agent prompts accumulate instructions, examples, and edge cases until they consume a significant amount of context space. Shopify's engineering team documented this pattern: as their tool inventory grew, their system prompt became "an unwieldy collection of special cases, conflicting guidance, and edge case handling that slowed the system down and made it nearly impossible to maintain." The solution is just-in-time instruction injection, dynamically loading only the instructions relevant to the current task.
What works well. Domain-specific prompts that encode vulnerability classes, token taxonomies, or migration patterns yield more accurate results than general-purpose agents. Chaining specialists through wave-based delegation speeds up PR cycles by running security reviews and generating documentation in parallel. Version-controlled agent definitions in .augment/agents/ let teams review, iterate, and share agent configurations like code. Editable prompts stored in Markdown files keep detection logic reviewable rather than buried in tooling.
Custom Specialists vs. Default Trio
Custom specialists improve fit for recurring domain tasks, but they add setup and maintenance overhead that the default trio avoids.
The table below contrasts both configurations across the dimensions that typically drive the decision:
| Dimension | Default Trio Only | Default Trio + Custom Specialists |
|---|---|---|
| Setup time | Minimal; works out of the box | Requires prompt design, tool scoping, and testing |
| Accuracy on general tasks | Strong for feature work, refactors | No improvement over default |
| Accuracy on domain tasks | Inconsistent without domain-specific prompts | Higher when prompts encode domain rules |
| Maintenance overhead | Low | Grows with number of specialists and prompt complexity |
| Tool access control | Default tool set for all agents | Per-agent tool restriction reduces risk |
| Scalability | Sufficient for most codebases | Enables parallel domain-specific processing across waves |
| Coordination overhead | Minimal | Slightly higher; each specialist adds a routing decision |
| Onboarding complexity | Low; standard Intent workflow | Requires documentation of agent roles and boundaries |
Practical Tips for Custom Agent Development
Practical custom agent development depends on prompt discipline, narrow permissions, and iterative testing.
- Structure prompts with labeled sections: Use clear headers for Role, Scope, Constraints, Output Format, and Uncertainty Handling. Place hard behavioral constraints near the beginning.
- Test agents incrementally before production use: Run a new agent against a small set of representative tasks. Evaluate output quality, check for scope violations, and add prompt instructions only in response to observed failures.
- Version agent definitions over time: Store project guidance in the documented
.augment/rules/directory orAGENTS.mdfiles in the workspace. Treat prompt changes with the same rigor as code changes: review them, test them, and track what changed. - Limit tool access by default: Start with the minimum tools an agent needs, often just
viewandcodebase-retrievalfor read-only agents, and add tools only when the agent demonstrably needs them. - Use the plugin system for cross-team distribution: Package agents into plugins that can include agent definitions, rules, commands, hooks, skills, and MCP server integrations.
Concrete Example of a Design Token Enforcer Workflow
A design token enforcer illustrates how a custom specialist fits into Intent's coordinator-specialist-verifier flow, from spec through human review before merge.
- Spec creation. A developer writes a spec in Intent: "Audit
src/components/for hardcoded color values and replace them with design tokens fromtokens/colors.json." - Coordinator decomposition. The Coordinator analyzes the codebase using the Context Engine, identifies all components that use hardcoded values, and decomposes the work into file-level subtasks ordered by dependency.
- Specialist execution. A design-token-enforcer agent runs with scope limited to replacing values that have an exact match in the token files. It does not create new tokens, modify token files, or refactor component structure. When a hardcoded value has no exact token match, it outputs
[TOKEN_MISSING: <value> in <file>:<line>]and leaves the original value unchanged. - Verification. The Verifier checks each modified file against the spec, confirming that all replacements reference valid tokens and that no hardcoded values remain in files the specialist processed. Any TOKEN_MISSING flags are surfaced for human review.
- Human review and merge. The developer reviews the changes, resolves TOKEN_MISSING items, and creates a PR.
The living spec updates as agents complete tasks, so the developer can track implementation status in the agent workspace without manually checking each file. When using Intent's Context Engine, the token-enforcer agent maintains awareness of the full token taxonomy across the repository, preventing replacements that reference tokens from incorrect namespaces.
Start with One Specialist Today
The strongest custom agent workflows start small. So, start by defining one specialist for the domain task that causes the most friction, test it against real code, and revise the prompt only after observing concrete failure modes. That keeps the tradeoff clear: better fit for a recurring task, in exchange for prompt maintenance and tool-scoping overhead.
For most teams, the next step is simple: keep the default trio in place, identify the one recurring task where outputs stay inconsistent, and extract that task into a narrowly scoped specialist with explicit uncertainty handling.
See how Intent's wave-based delegation coordinates custom specialists alongside built-in agents as the plan evolves.
Free tier available · VS Code extension · Takes 2 minutes
Frequently Asked Questions About Custom Specialist Agents
Related Guides
Written by

Molisha Shah
Molisha is an early GTM and Customer Champion at Augment Code, where she focuses on helping developers understand and adopt modern AI coding practices. She writes about clean code principles, agentic development environments, and how teams are restructuring their workflows around AI agents. She holds a degree in Business and Cognitive Science from UC Berkeley.
