Skip to content

Pattern catalogue

The Genesis catalogue names 37 patterns across three tiers. Each pattern carries a verbatim WHEN clause, a MECHANISM, and a list of ANTI-PATTERNS. Cite the WHEN clause in your handoff packet so reviewers can tell whether your selection is justified or arbitrary.

TIER 3 (10) - macro shape of one capability
TIER 2 (23) - composes inside Tier 3
TIER 4 (4) - source-time refactors that re-shape the module graph

Macro shapes a capability takes. Pick one (sometimes two) per non-trivial design. Each composes several Tier-2 patterns plus substrate primitives. See Architectural patterns (A1-A10).

AI-native nameClassical analogOne-line tagline
A1. PANELMicroservices + GatewayN specialized lenses + one synthesizer; the workhorse of multi-perspective deliberation.
A2. PIPELINEPipes-and-FiltersLinear stages with verifiable hand-offs; the canonical PLAN / TASKS / IMPLEMENT spine.
A3. ORCHESTRATOR-SAGASagaLong-lived multi-step transaction with per-step compensation across triggers.
A4. STAFFED PLANWorkflow EngineEach todo names the persona / skill the executor must load.
A5. WAVE EXECUTIONBuild Pipeline (CI stages)Topologically-sorted tasks gated wave-by-wave; re-plan from the failed wave.
A6. EVENT-DRIVENEvent-Driven ArchitectureTriggers fire handlers; loose coupling; cadence is event-shaped.
A7. ADVERSARIAL REVIEWCode Review + Red TeamCold-context reviewers whose job is to break the artifact, not bless it.
A8. ALIGNMENT LOOPIteration with stop-condition + stewardBounded round body + B9 steward; converges on goal alignment, not byte equality.
A9. SUPERVISED EXECUTIONPlan-Execute-Verify with controllerPlan, run via S7 deterministic bridge, verify via another tool call. Two enforcement forms (weak / strong).
A10. GOVERNED OUTER LOOPCI/CD + capability-bounded service accountSandboxed event-driven A6 + strong-form A9 + audit; agent never holds the write token.

The 23-pattern catalogue an architect picks from when shaping ONE piece of work. Cut on the Gang-of-Four axes so a classical software architect lands on familiar ground. See Design patterns (C1-C6, S1-S7, B1-B10).

Creational (6) — how primitives come into being

Section titled “Creational (6) — how primitives come into being”
IDNameTagline
C1LAZY ASSETDefer asset load until the step that needs it.
C2PERSONA PRELOADLoad a stable lens at session start (with GROUNDED EXPERT BRIEFING sub-rule).
C3THREAD SPAWNFork a fresh context window for an isolated unit of work.
C4DESCRIPTION DISPATCHDispatcher LLM picks the module by frontmatter description (signature match).
C5PERSONA PROTOTYPEBase persona + thin variant deltas; avoid persona copy-paste.
C6EXTERNAL CORPUS GROUNDINGLazy fetch from a named, authoritative source with a bounded scope sub-rule.

Structural (7) — how primitives compose at rest

Section titled “Structural (7) — how primitives compose at rest”
IDNameTagline
S1COMPOSED MODULEOrchestrator depends on leaf modules; no content duplication.
S2DEPENDENCY ADAPTERArchitect persona ignorant of concrete syntax; adapter file translates.
S3ORCHESTRATOR FACADEOne callable signature in front of an internally complex topology.
S4VALIDATION DECORATORWrap a producing step with a deterministic pass/revise gate.
S5LAZY PROXYPath reference materialized on demand by the runtime.
S6RULE BRIDGEVoice in personas, constraints in scope-attached rule files; vary independently.
S7DETERMINISTIC TOOL BRIDGECross the LLM/CPU boundary explicitly via tools; do not regenerate the artifact in prose.

Behavioral (10) — how primitives interact at run

Section titled “Behavioral (10) — how primitives interact at run”
IDNameTagline
B1FAN-OUT + SYNTHESIZERMaster-Worker; engine inside A1 PANEL.
B2CONDITIONAL DISPATCHStrategy; pick the branch by input class.
B3SUPERVISORBounded supervision tree; workers do not spawn workers.
B4PLAN MEMENTOExternalize plan state; reload at every re-grounding boundary.
B5ACCEPTANCE OBSERVERRead the criterion before reading the implementation; mismatch is drift.
B6PROMPT TEMPLATETemplate Method; shared skeleton, slot-filling content.
B7TODO COMMANDEach todo is a serialized, dispatchable command.
B8ATTENTION ANCHORRe-inject goal + hard constraints at scheduled boundaries. The dominant cure for goal drift.
B9GOAL STEWARDNamed owner of “alignment to original intent”.
B10HUMAN CHECKPOINTApproval gate at irrecoverable / drifted / unauthorized boundaries.

Source-time restructurings of the module graph. Run BEFORE re-picking a Tier-2 / Tier-3 pattern; restructuring often dissolves the need for a more elaborate runtime topology. See Refactor patterns (R1-R4).

IDNameTagline
R1SPLITDecompose an over-broad module along a natural seam.
R2FUSEMerge siblings whose descriptions collide or that are always co-invoked.
R3EXTRACTPromote inlined content to its own primitive when reuse / lens / cadence justifies it.
R4INLINECollapse a thin proxy that exists only to forward to one target.
  1. Read the architectural patterns page and find the Tier-3 shape that matches your capability’s macro topology. Cite its WHEN clause.
  2. List the Tier-2 patterns that compose inside that shape (each Tier-3 entry names them explicitly).
  3. Run the Tier-4 refactor triggers across the existing module graph. Apply any that fire BEFORE you finalize the Tier-3 / Tier-2 selection.
  4. When two patterns from the same tier fit equally, name the matrix that cut your choice in the handoff packet.

Three patterns earn their own focus pages because they carry outsized weight in real designs: