imran-siddique

Agent OS — Community Edition

Community imran-siddique
Updated

A Safety-First Kernel for Autonomous AI Agents - POSIX-inspired primitives with 0% policy violation guarantee

Agent OS — Community Edition

A kernel architecture for governing autonomous AI agents

GitHub StarsSponsorLicensePythonCIPyPIDownloadsOWASPVS Code ExtensionDocumentationFeatured in awesome-llm-appsawesome-mcp-serversIntegrated in agent-lightningIntegrated in LlamaIndexawesome-AI-Agentsawesome-agent-skillsawesome-devops-mcpDownloadsDiscussions

If this project helps you, please star it! It helps others discover Agent OS.

📦 Install the full stack: pip install ai-agent-governance[full]PyPI | GitHub

Quick Start • DocumentationVS Code Extension • Examples • Agent HypervisorAgentMeshAgent SRE

Open in Gitpod

Try Agent OS instantly in your browser - no installation required

Integrated With

Featured In

across 170K+ GitHub stars. Governance for [Dify](https://github.com/langgenius/dify-plugins/pull/2060) (65K ⭐), [LlamaIndex](https://github.com/run-llama/llama_index/pull/20644) (47K ⭐), [LangGraph](https://pypi.org/project/langgraph-trust/), [OpenAI Agents](https://pypi.org/project/openai-agents-trust/), [Agent-Lightning](https://github.com/microsoft/agent-lightning/pull/478), and [OpenClaw](https://clawhub.ai/imran-siddique/agentmesh-governance).

📊 By The Numbers

1,680+

Tests Passing

12

Framework Integrations

170K+

Combined Stars ofIntegrated Projects

<0.1ms p99

Governance LatencyBenchmarks

9

More Framework ProposalsUnder Review

🏢 Adopted By Leading AI Frameworks

Framework Stars Status Link
Dify 65K ⭐ ✅ Merged dify-plugins#2060
LlamaIndex 47K ⭐ ✅ Merged llama_index#20644
Microsoft Agent-Lightning 15K ⭐ ✅ Merged agent-lightning#478
LangGraph 24K ⭐ 📦 Published on PyPI langgraph-trust
OpenAI Agents SDK 📦 Published on PyPI openai-agents-trust
OpenClaw 📦 Published on ClawHub agentmesh-governance
📋 Proposals under review at 10+ frameworks (click to expand)
Framework Stars Proposal
AutoGen 54K ⭐ microsoft/autogen#7242
CrewAI 44K ⭐ crewAIInc/crewAI#4502
Haystack 22K ⭐ deepset-ai/haystack#10615
Semantic Kernel 27K ⭐ microsoft/semantic-kernel#13556
smolagents 25K ⭐ ✅ Adapter built — huggingface/smolagents#1989
LangGraph 24K ⭐ langchain-ai/langgraph#6824
Google ADK 18K ⭐ ✅ Adapter built — google/adk-python#4517
PydanticAI 15K ⭐ ✅ Adapter built — pydantic/pydantic-ai#4335
OpenAI Agents SDK openai/openai-agents-python#2515
A2A Protocol 21K ⭐ a2aproject/A2A#1501
Oracle Agent Spec oracle/agent-spec#105
AI Card Spec agent-card/ai-card#16

💡 Why Agent OS?

The AI agent market is projected to reach $47B by 2030. As enterprises deploy autonomous agents at scale, governance becomes the critical infrastructure layer. Agent OS is the kernel that ensures every agent action is policy-enforced, auditable, and compliant — making AI agents enterprise-ready.

The problem: AI agents can execute arbitrary tools, access sensitive data, and make autonomous decisions — with no built-in governance, audit trails, or policy enforcement.

Our solution: A governance kernel that sits between agents and their actions, providing deterministic policy enforcement in <1ms with zero agent code changes.

How Agent OS Compares

Tool Focus When it acts
LangChain/CrewAI Building agents N/A (framework)
NeMo Guardrails Input/output filtering Before/after LLM call
LlamaGuard Content classification Before/after LLM call
Agent OS Action interception During execution

Agent frameworks build agents. Safety tools filter I/O. Agent OS intercepts actions mid-execution — the only kernel-level governance layer.

🛡️ OWASP Agentic Top 10 Coverage

Agent OS + ecosystem covers 8 out of 10 OWASP Agentic Application Security risks:

Risk Coverage Module
ASI01 Agent Goal Hijack ✅ Full GovernancePolicy.blocked_patterns
ASI02 Tool Misuse ✅ Full MCPGateway — tool filtering, rate limiting, audit
ASI03 Identity & Privilege ✅ Full require_human_approval, RBAC policies
ASI04 Supply Chain ⚠️ Partial Tool allowlisting (no deep scanning yet)
ASI05 Code Execution ✅ Full blocked_patterns, sandbox integration
ASI06 Memory Poisoning ✅ Full MemoryGuard — hash integrity, injection detection
ASI07 Inter-Agent Comms ✅ Full AgentMesh trust handshake, HMAC auth
ASI08 Cascading Failures ✅ Full Agent SRE circuit breakers, cascade detection
ASI09 Human-Agent Trust ✅ Full Human approval workflows, audit logging
ASI10 Rogue Agents ⚠️ Partial Agent Hypervisor execution rings, kill switch

📄 Full OWASP mapping →

🌐 The Agent Governance Ecosystem

Layer Package Purpose Install
Kernel Agent OS Policy enforcement, action interception pip install agent-os-kernel
Network AgentMesh Identity, trust, delegation pip install agentmesh-platform
Reliability Agent SRE SLOs, chaos testing, circuit breakers pip install agent-sre
Runtime Agent Hypervisor Execution rings, resource limits, saga pip install agent-hypervisor
Full Stack ai-agent-governance All of the above pip install ai-agent-governance[full]

⚡ Quick Start in 30 Seconds

pip install agent-os-kernel
from agent_os import StatelessKernel, ExecutionContext

# Create a governed agent in 3 lines
kernel = StatelessKernel()

# Define execution context with governance policies
ctx = ExecutionContext(agent_id="demo-agent", policies=["read_only"])

# Your agent runs with policy enforcement
result = await kernel.execute(
    action="database_query",
    params={"query": "SELECT * FROM users"},
    context=ctx
)

# ✅ Safe queries execute
# ❌ "DROP TABLE users" → Blocked by kernel

That's it! Your agent now has deterministic policy enforcement. Learn more →

🎬 See all features in action:

git clone https://github.com/imran-siddique/agent-os && python agent-os/demo.py
📋 More examples (click to expand)

Policy enforcement with custom rules

from agent_os import StatelessKernel

kernel = StatelessKernel()
kernel.load_policy_yaml("""
version: "1.0"
name: api-safety
rules:
  - name: block-destructive-sql
    condition: "action == 'database_query'"
    action: deny
    pattern: "DROP|TRUNCATE|DELETE FROM .* WHERE 1=1"
  - name: rate-limit-api
    condition: "action == 'api_call'"
    limit: "100/hour"
""")

result = await kernel.execute(action="database_query", params={"query": "DROP TABLE users"})
# ❌ Blocked: Matched rule 'block-destructive-sql'

Audit logging

from agent_os import KernelSpace

kernel = KernelSpace()

# Every kernel action is automatically recorded
result = await kernel.execute(action="read_file", params={"path": "/data/report.csv"})

# Query the flight recorder
entries = kernel.flight_recorder.query(agent_id="agent-001", limit=10)
for entry in entries:
    print(f"{entry.timestamp} | {entry.action} | {entry.outcome}")

Governed chatbot with memory

from agent_os import KernelSpace
from agent_os.emk import EpisodicMemory

kernel = KernelSpace(policy_file="policies.yaml")
memory = EpisodicMemory(max_turns=50)

@kernel.register
async def chat(message: str, conversation_id: str = "default") -> str:
    history = memory.get_history(conversation_id)
    response = await call_llm(history + [{"role": "user", "content": message}])
    memory.add_turn(conversation_id, message, response)
    return response
# Outputs are checked against content policies; violations trigger SIGSTOP

See examples/ for 20+ runnable demos including SQL agents, GitHub reviewers, and compliance bots.

🎯 What You'll Build in 5 Minutes

from agent_os import stateless_execute

# 1. Define safety policies (not prompts — actual enforcement)

# 2. Actions are checked against policies before execution
result = await stateless_execute(
    action="database_query",
    params={"query": "SELECT revenue FROM sales"},
    agent_id="analyst-001",
    policies=["read_only"]
)
# ✅ Safe queries execute
# ❌ "DROP TABLE users" → BLOCKED (not by prompt, by kernel)

Result: Defined policies are deterministically enforced by the kernel—not by hoping the LLM follows instructions.

For the full kernel with signals, VFS, and protection rings:

from agent_os import KernelSpace, AgentSignal, AgentVFS

# Requires: pip install agent-os-kernel[full]
kernel = KernelSpace()
ctx = kernel.create_agent_context("agent-001")
await ctx.write("/mem/working/task.txt", "Hello World")

Note: KernelSpace, AgentSignal, and AgentVFS require installing the control-plane module: pip install agent-os-kernel[full]

What is Agent OS?

Agent OS applies operating system concepts to AI agent governance. Instead of relying on prompts to enforce safety ("please don't do dangerous things"), it provides application-level middleware that intercepts and validates agent actions before execution.

Note: This is application-level enforcement (Python middleware), not OS kernel-level isolation. Agents run in the same process. For true isolation, run agents in containers.

┌─────────────────────────────────────────────────────────┐
│              USER SPACE (Agent Code)                    │
│   Your agent code runs here. The kernel intercepts      │
│   actions before they execute.                          │
├─────────────────────────────────────────────────────────┤
│              KERNEL SPACE                               │
│   Policy Engine │ Flight Recorder │ Signal Dispatch     │
│   Actions are checked against policies before execution │
└─────────────────────────────────────────────────────────┘

The Idea

Prompt-based safety asks the LLM to follow rules. The LLM decides whether to comply.

Kernel-based safety intercepts actions before execution. The policy engine decides, not the LLM.

This is the same principle operating systems use: applications request resources, the kernel grants or denies access based on permissions.

Architecture

graph TB
    subgraph Frameworks["External Frameworks"]
        LC[LangChain]
        CA[CrewAI]
        AG[AutoGen]
        OA[OpenAI]
        AN[Anthropic]
        GE[Gemini]
    end

    ADAPT[[Adapters]]

    subgraph L4["Layer 4: Intelligence"]
        SC[Self-Correction]
        SA[Semantic Analysis]
    end

    subgraph L3["Layer 3: Control Plane"]
        PE[Policy Engine]
        AL[Audit Logging]
    end

    subgraph L2["Layer 2: Infrastructure"]
        NM[Nexus Marketplace]
        OB[Observability]
    end

    subgraph L1["Layer 1: Primitives"]
        VE[Verification Engine]
        CS[Context Service]
        MS[Memory Store]
    end

    LC & CA & AG & OA & AN & GE --> ADAPT
    ADAPT --> L4
    SC & SA --> PE
    SC & SA --> AL
    PE & AL --> NM
    PE & AL --> OB
    NM & OB --> VE
    NM & OB --> CS
    NM & OB --> MS

Directory Structure

agent-os/
├── src/agent_os/             # Core Python package
│   ├── __init__.py           # Public API (re-exports from all layers)
│   ├── stateless.py          # StatelessKernel (zero-dependency core)
│   ├── base_agent.py         # BaseAgent, ToolUsingAgent classes
│   ├── agents_compat.py      # AGENTS.md parser (OpenAI/Anthropic standard)
│   ├── cli.py                # CLI (agent-os check, review, init, etc.)
│   └── integrations/         # Framework adapters (LangChain, OpenAI, etc.)
├── modules/                  # Kernel Modules (4-layer architecture)
│   ├── primitives/           # Layer 1: Base types and failures
│   ├── cmvk/                 # Layer 1: Verification
│   ├── emk/                  # Layer 1: Episodic memory kernel
│   ├── caas/                 # Layer 1: Context-as-a-Service
│   ├── amb/                  # Layer 2: Agent message bus
│   ├── iatp/                 # Layer 2: Inter-agent trust protocol
│   ├── atr/                  # Layer 2: Agent tool registry
│   ├── observability/        # Layer 3: Prometheus + OpenTelemetry
│   ├── control-plane/        # Layer 3: THE KERNEL (policies, signals)
│   ├── scak/                 # Layer 4: Self-correcting agent kernel
│   ├── mute-agent/           # Layer 4: Face/Hands architecture
│   ├── nexus/                # Experimental: Trust exchange network
│   └── mcp-kernel-server/    # Integration: MCP protocol support
├── extensions/               # IDE & AI Assistant Extensions
│   ├── mcp-server/           # ⭐ MCP Server (Copilot, Claude, Cursor)
│   ├── vscode/               # VS Code extension
│   ├── copilot/              # GitHub Copilot extension
│   ├── jetbrains/            # IntelliJ/PyCharm plugin
│   ├── cursor/               # Cursor IDE extension
│   ├── chrome/               # Chrome extension
│   └── github-cli/           # gh CLI extension
├── examples/                 # Working examples
├── docs/                     # Documentation
├── tests/                    # Test suite (organized by layer)
├── notebooks/                # Jupyter tutorials
├── papers/                   # Research papers
└── templates/                # Policy templates

Core Modules

Module Layer PyPI Package Description Status
primitives 1 agent-primitives Base failure types, severity levels ✅ Stable
cmvk 1 cmvk Verification, drift detection ✅ Stable
emk 1 emk Episodic memory kernel (append-only ledger) ✅ Stable
caas 1 caas-core Context-as-a-Service, RAG pipeline ✅ Stable
amb 2 amb-core Agent message bus (async pub/sub) ✅ Stable
iatp 2 inter-agent-trust-protocol Sidecar trust protocol, typed IPC pipes ✅ Stable
atr 2 agent-tool-registry Tool registry with LLM schema generation ✅ Stable
control-plane 3 agent-control-plane THE KERNEL — Policy engine, signals, VFS ✅ Stable
observability 3 agent-os-observability Prometheus metrics + OpenTelemetry tracing ⚠️ No tests
scak 4 scak Self-correcting agent kernel ✅ Stable
mute-agent 4 mute-agent Decoupled reasoning/execution architecture ⚠️ No tests
nexus Not published Trust exchange network 🔬 Prototype
mcp-kernel-server Int mcp-kernel-server MCP server for Claude Desktop ⚠️ No tests
hypervisor agent-hypervisor Runtime supervisor — Execution Rings, Joint Liability, Saga Orchestrator (own repo) ✅ 184 tests

⭐ Star Feature: Agent Hypervisor

Runtime supervisor for multi-agent collaboration — think "VMware for AI agents."

Now its own repo: agent-hypervisor — 184 tests, 268μs full pipeline, zero dependencies beyond pydantic.

Just as OS hypervisors isolate virtual machines and enforce resource boundaries, the Agent Hypervisor isolates AI agent sessions and enforces governance boundaries at sub-millisecond latency.

┌────────────────────────────────────────────────────────────┐
│                    AGENT HYPERVISOR                         │
│                                                            │
│   Ring 0 (Root)      ← SRE Witness required                │
│   Ring 1 (Privileged)← σ_eff > 0.95 + consensus           │
│   Ring 2 (Standard)  ← σ_eff > 0.60                        │
│   Ring 3 (Sandbox)   ← Default for unknown agents          │
│                                                            │
│   ┌──────────┐  ┌───────────┐  ┌────────────────────────┐  │
│   │  Joint    │  │  Semantic  │  │  Hash-Chained          │  │
│   │ Liability │  │   Saga     │  │  Delta Audit Trail     │  │
│   │  Engine   │  │ Orchestr.  │  │  (Tamper-Evident)      │  │
│   └──────────┘  └───────────┘  └────────────────────────┘  │
└────────────────────────────────────────────────────────────┘

Key Capabilities

Feature Description Latency
Execution Rings 4-level privilege model (Ring 0–3) based on trust score 0.3μs
Joint Liability High-trust agents vouch for low-trust agents with bonded reputation 7μs
Saga Orchestrator Multi-step transactions with timeout, retry, and auto-compensation 151μs
Delta Audit Hash-chained semantic diffs with blockchain commitment 27μs
Full Pipeline Session + join + audit + saga + terminate 268μs

Quick Start

pip install agent-hypervisor
from hypervisor import Hypervisor, SessionConfig, ConsistencyMode

hv = Hypervisor()

# Create a governed multi-agent session
session = await hv.create_session(
    config=SessionConfig(consistency_mode=ConsistencyMode.EVENTUAL, max_participants=5),
    creator_did="did:mesh:admin",
)

# Agents are automatically assigned privilege rings based on trust score
ring = await hv.join_session(session.sso.session_id, "did:mesh:agent-alpha", sigma_raw=0.85)
# → Ring 2 (Standard) — can execute reversible actions

# Multi-step saga with automatic timeout and compensation
saga = session.saga.create_saga(session.sso.session_id)
step = session.saga.add_step(
    saga.saga_id, "draft_email", "did:mesh:agent-alpha",
    execute_api="/api/draft", undo_api="/api/undo-draft",
    timeout_seconds=30, max_retries=2,
)

# Terminate — returns tamper-evident summary hash
summary_hash = await hv.terminate_session(session.sso.session_id)

📖 Full Hypervisor documentation →

IDE & CLI Extensions

Extension Description Status
mcp-server MCP Server — Works with Claude, Copilot, Cursor (npx agentos-mcp-server) ✅ Published (v1.0.1)
vscode VS Code extension with real-time policy checks, enterprise features ✅ Published (v1.0.1)
copilot GitHub Copilot extension (Vercel/Docker deployment) ✅ Published (v1.0.0)
jetbrains IntelliJ, PyCharm, WebStorm plugin (Kotlin) ✅ Built (v1.0.0)
cursor Cursor IDE extension (Composer integration) ✅ Built (v0.1.0)
chrome Chrome extension for GitHub, Jira, AWS, GitLab ✅ Built (v1.0.0)
github-cli gh agent-os CLI extension ⚠️ Basic

Install

pip install agent-os-kernel

Or with optional components:

pip install agent-os-kernel[cmvk]           # + verification
pip install agent-os-kernel[iatp]           # + inter-agent trust
pip install agent-os-kernel[observability]  # + Prometheus/OpenTelemetry
pip install agent-os-kernel[nexus]          # + trust exchange network
pip install agent-os-kernel[full]           # Everything

One-Command Quickstart

macOS/Linux:

curl -sSL https://raw.githubusercontent.com/imran-siddique/agent-os/main/scripts/quickstart.sh | bash

Windows (PowerShell):

iwr -useb https://raw.githubusercontent.com/imran-siddique/agent-os/main/scripts/quickstart.ps1 | iex

Quick Example

Stateless API (Always Available — Zero Dependencies Beyond Pydantic)

from agent_os import stateless_execute

# Execute with policy enforcement
result = await stateless_execute(
    action="database_query",
    params={"query": "SELECT * FROM users"},
    agent_id="analyst-001",
    policies=["read_only"]
)

Full Kernel API (Requires pip install agent-os-kernel[full])

from agent_os import KernelSpace, AgentSignal, PolicyRule

kernel = KernelSpace()

# Create agent context with VFS
ctx = kernel.create_agent_context("agent-001")
await ctx.write("/mem/working/task.txt", "analyze this data")

# Policy enforcement
from agent_os import PolicyEngine
engine = PolicyEngine()
engine.add_rule(PolicyRule(name="no_sql_injection", pattern="DROP|DELETE|TRUNCATE"))

POSIX-Inspired Primitives

Agent OS borrows concepts from POSIX operating systems:

Concept POSIX Agent OS
Process control SIGKILL, SIGSTOP AgentSignal.SIGKILL, AgentSignal.SIGSTOP
Filesystem /proc, /tmp VFS with /mem/working, /mem/episodic
IPC Pipes (|) Typed IPC pipes between agents
Syscalls open(), read() kernel.execute()

Signals

# Requires: pip install agent-os-kernel[full]
from agent_os import SignalDispatcher, AgentSignal

dispatcher = SignalDispatcher()
dispatcher.signal(agent_id, AgentSignal.SIGSTOP)  # Pause
dispatcher.signal(agent_id, AgentSignal.SIGCONT)  # Resume
dispatcher.signal(agent_id, AgentSignal.SIGKILL)  # Terminate

VFS (Virtual File System)

# Requires: pip install agent-os-kernel[full]
from agent_os import AgentVFS

vfs = AgentVFS(agent_id="agent-001")
vfs.write("/mem/working/task.txt", "Current task")
vfs.read("/policy/rules.yaml")  # Read-only from user space

Framework Integrations

Wrap existing frameworks with Agent OS governance:

# LangChain
from agent_os.integrations import LangChainKernel
governed = LangChainKernel().wrap(my_chain)

# OpenAI Assistants
from agent_os.integrations import OpenAIKernel
governed = OpenAIKernel().wrap_assistant(assistant, client)

# Semantic Kernel
from agent_os.integrations import SemanticKernelWrapper
governed = SemanticKernelWrapper().wrap(sk_kernel)

# CrewAI
from agent_os.integrations import CrewAIKernel
governed = CrewAIKernel().wrap(my_crew)

# AutoGen
from agent_os.integrations import AutoGenKernel
governed = AutoGenKernel().wrap(autogen_agent)

# OpenAI Agents SDK
from agent_os.integrations import OpenAIAgentsSDKKernel
governed = OpenAIAgentsSDKKernel().wrap(agent)

Note: These adapters use lazy interception — they don't require the target framework to be installed until you call .wrap().

See integrations documentation for full details.

Integration Comparison

Framework Governance Level Async Support Status Adapter File
LangChain Chain/Agent/Runnable ainvoke ✅ Stable integrations/langchain_adapter.py
OpenAI Assistants Run/Thread/Tool Call ✅ Streaming ✅ Stable integrations/openai_adapter.py
AutoGen Multi-Agent Orchestration ❌ Sync only ✅ Stable integrations/autogen_adapter.py
Semantic Kernel Function/Plugin/Memory ✅ Native async ✅ Stable integrations/semantic_kernel_adapter.py
CrewAI Crew/Agent/Task ❌ Sync only ✅ Stable integrations/crewai_adapter.py
OpenAI Agents SDK Agent/Tool/Handoff ✅ Native async ✅ Stable integrations/openai_agents_sdk_adapter.py

Examples

The examples/ directory contains demos at various levels:

Getting Started

Demo Description Command
demo-app Uses the stateless API (most reliable) cd examples/demo-app && python demo.py
hello-world Minimal example cd examples/hello-world && python agent.py
quickstart Quick intro cd examples/quickstart && python my_first_agent.py

Domain Examples (Self-Contained)

These examples are self-contained and don't require external Agent OS imports:

Demo Description
healthcare-hipaa HIPAA-compliant agent
customer-service Customer support agent
legal-review Legal document analysis
crewai-safe-mode CrewAI with safety wrappers

Production Demos (with Docker + Observability)

Demo Description Command
carbon-auditor Multi-model verification cd examples/carbon-auditor && docker-compose up
grid-balancing Multi-agent coordination cd examples/grid-balancing && docker-compose up
defi-sentinel Real-time attack detection cd examples/defi-sentinel && docker-compose up
pharma-compliance Document analysis cd examples/pharma-compliance && docker-compose up

Each production demo includes:

  • Grafana dashboard on port 300X
  • Prometheus metrics on port 909X
  • Jaeger tracing on port 1668X
# Run carbon auditor with full observability
cd examples/carbon-auditor
cp .env.example .env  # Optional: add API keys
docker-compose up

# Open dashboards
open http://localhost:3000  # Grafana (admin/admin)
open http://localhost:16686 # Jaeger traces

Safe Tool Plugins

Agent OS includes pre-built safe tools via the Agent Tool Registry:

# Requires: pip install agent-os-kernel[full]
from atr import ToolRegistry, tool

@tool(name="safe_http", description="Rate-limited HTTP requests")
async def safe_http(url: str) -> dict:
    # Tool is automatically registered and sandboxed
    ...

registry = ToolRegistry()
registry.register(safe_http)

# Generate schemas for any LLM
openai_tools = registry.to_openai_schema()
anthropic_tools = registry.to_anthropic_schema()

Message Bus

Connect agents using the async message bus:

# Requires: pip install agent-os-kernel[full]
from amb_core import MessageBus, Message

bus = MessageBus()
await bus.subscribe("tasks", handler)
await bus.publish("tasks", Message(payload={"task": "analyze"}))

Broker adapters available for Redis, Kafka, and NATS (requires optional dependencies).

CLI Tool

Agent OS includes a CLI for terminal workflows:

# Check files for safety violations
agentos check src/app.py
# ✓ src/app.py: No violations
# OR
# ⚠️  2 violation(s) found in src/app.py:
#   Line 12: DROP TABLE users;
#     Violation: Destructive SQL: DROP operation detected
#     Policy: block-destructive-sql

# Check staged git files (ideal for pre-commit hooks)
agentos check --staged
# ✓ No violations in staged files

# Machine-readable JSON output (for CI pipelines)
agentos check src/app.py --format json

# CI mode (no colors, strict exit codes)
agentos check --staged --ci
# Initialize Agent OS in a project
agentos init
# Initialized Agent OS in .agents/
#   - agents.md: Agent instructions (OpenAI/Anthropic standard)
#   - security.md: Kernel policies (Agent OS extension)
#   - Template: strict

# Choose a permissive or audit-only template
agentos init --template permissive
agentos init --template audit

# Overwrite an existing .agents/ directory
agentos init --force
# Enable kernel governance and verify the configuration
agentos secure
# Securing agents in .
#   [PASS] kernel version
#   [PASS] signals defined
#   [PASS] policies defined
# Security configuration valid.
# Audit agent security configuration
agentos audit
# Auditing .
#   [OK] agents.md
#   [OK] security.md
# No issues found.

# JSON output for CI
agentos audit --format json
# Show kernel status (version, installed packages)
agentos status
# Agent OS Kernel Status
# ========================================
#   Version: 1.2.0
#   Status: Installed
#   Project: /home/user/myproject
#   Agents: Configured (.agents/ found)
# Multi-model code review with CMVK consensus
agentos review src/app.py --cmvk
# 🔍 Reviewing src/app.py with CMVK...
# Multi-Model Review (3 models):
#   ✅ gpt-4: No issues
#   ⚠️  claude-sonnet-4: 1 potential issue(s)
#   ✅ gemini-pro: No issues
# Consensus: 67%

# Specify models
agentos review src/app.py --cmvk --models "gpt-4,claude-sonnet-4"
# Validate policy YAML files
agentos validate
#   Checking .agents/policy.yaml... OK
# ✓ All 1 policy file(s) valid.

# Validate specific files in strict mode
agentos validate policies/*.yaml --strict
# Install git pre-commit hook
agentos install-hooks
# ✓ Installed pre-commit hook: .git/hooks/pre-commit
# Agent OS will now check staged files before each commit.

# Append to an existing hook
agentos install-hooks --append
# Start the HTTP API server
agentos serve --port 8080
# Agent OS API server starting on 0.0.0.0:8080
# Endpoints:
#   GET  /health              Health check
#   GET  /status              Kernel status
#   GET  /agents              List agents
#   POST /agents/{id}/execute  Execute agent action
# Output Prometheus-style metrics
agentos metrics
# # HELP agentos_policy_violations_total Total policy violations.
# # TYPE agentos_policy_violations_total counter
# agentos_policy_violations_total 0
# ...

MCP Integration (Claude Desktop, GitHub Copilot, Cursor)

Agent OS provides an MCP server that works with any MCP-compatible AI assistant:

# Quick install via npx
npx agentos-mcp-server

npm: agentos-mcp-server MCP Registry: io.github.imran-siddique/agentos

Add to your config file:

Claude Desktop (%APPDATA%\Claude\claude_desktop_config.json on Windows):

{
  "mcpServers": {
    "agentos": {
      "command": "npx",
      "args": ["-y", "agentos-mcp-server"]
    }
  }
}

Features: 10 tools for agent creation, policy enforcement, compliance checking (SOC 2, GDPR, HIPAA), human-in-the-loop approvals, and audit logging.

See MCP server documentation for full details.

Documentation

Tutorials

  • 5-Minute Quickstart — Get running fast
  • 30-Minute Deep Dive — Comprehensive walkthrough
  • Building Your First Governed Agent — Complete tutorial
  • Using Message Bus Adapters — Connect agents
  • Creating Custom Tools — Build safe tools
  • Cheatsheet — Quick reference

Interactive Notebooks

Notebook Description Time
Hello Agent OS Your first governed agent 5 min
Episodic Memory Agent memory that persists 15 min
Time-Travel Debugging Replay and debug decisions 20 min
Verification Detect hallucinations 15 min
Multi-Agent Coordination Trust between agents 20 min
Policy Engine Deep dive into policies 15 min

Reference

  • Quickstart Guide — 60 seconds to first agent
  • Framework Integrations — LangChain, OpenAI, etc.
  • Kernel Internals — How the kernel works
  • Architecture Overview — Getting started
  • Kernel Internals — How the kernel works
  • RFC-003: Agent Signals — POSIX-style signals
  • RFC-004: Agent Primitives — Core primitives

Status & Maturity

This is a research project exploring kernel concepts for AI agent governance.

✅ Production-Ready

These components are fully implemented and tested:

Component Tests
StatelessKernel — Zero-dependency policy enforcement (src/agent_os/) ✅ Full coverage
Policy Engine — Deterministic rule enforcement ✅ Tested
Flight Recorder — SQLite-based audit logging ✅ Tested
CLIagent-os check, init, secure, validate ✅ Tested
Framework Adapters — LangChain, OpenAI, Semantic Kernel, CrewAI, AutoGen, OpenAI Agents SDK ✅ Implemented
AGENTS.md Parser — OpenAI/Anthropic standard agent config ✅ Full coverage
Primitives (agent-primitives) — Failure types, severity levels ✅ Tested
CMVK (cmvk) — Drift detection, distance metrics (955+ lines) ✅ Tested
EMK (emk) — Episodic memory with JSONL storage ✅ 8 test files
AMB (amb-core) — Async message bus, DLQ, tracing ✅ 6 test files
IATP (inter-agent-trust-protocol) — Sidecar trust, typed IPC ✅ 9 test files
ATR (agent-tool-registry) — Multi-LLM schema generation ✅ 6 test files
Control Plane (agent-control-plane) — Signals, VFS, protection rings ✅ 18 test files
SCAK (scak) — Self-correcting agent kernel ✅ 23 test files

⚠️ Experimental (Code Exists, Tests Missing or Incomplete)

Component What's Missing
Mute Agent (mute-agent) No tests; all layer dependencies use mock adapters
Observability (agent-os-observability) No tests; Prometheus metrics, Grafana dashboards, OTel tracing implemented
MCP Kernel Server (mcp-kernel-server) No tests; 1173-line implementation
GitHub CLI Extension Single bash script with simulated output
Control Plane MCP Adapter Placeholder — returns canned responses
Control Plane A2A Adapter Placeholder — negotiation accepts all params

🔬 Research Prototype

Component What's Missing
Nexus Trust Exchange No pyproject.toml, no tests, placeholder cryptography (XOR — not secure), all signature verification stubbed, in-memory storage only

Known Architectural Limitations

Limitation Impact Mitigation
Application-level only Direct stdlib calls (subprocess, open) bypass kernel Pair with container isolation for production
Blocklist-based policies Novel attack patterns not in rules will pass Add AST-level parsing (#32), use defense in depth
Shadow Mode single-step Multi-step agent simulations diverge from reality Use for single-turn validation only
No tamper-proof audit Flight Recorder SQLite can be modified by compromised agent Write to external sink for critical audits
Provider-coupled adapters Each SDK needs separate adapter Abstract interface planned (#47)

See GitHub Issues for the full roadmap.

FAQ

How is this different from prompt-based safety?

Prompt-based safety relies on instructing the LLM to follow rules via system prompts. This approach is probabilistic — the model may still produce unsafe outputs under certain conditions.

Agent OS enforces policies at the middleware layer. Actions are intercepted and validated before execution, making enforcement deterministic rather than dependent on model compliance.

What frameworks are supported?

Agent OS can wrap and govern agents built with popular frameworks including LangChain, CrewAI, AutoGen, Semantic Kernel, and the OpenAI SDK. It also supports MCP-based integrations.

Can I use this in production?

Core components such as the StatelessKernel and Policy Engine are production-ready. However, Agent OS provides application-level enforcement. For high-security environments, it should be combined with infrastructure isolation (e.g., containers).

How do I write custom policies?

Custom policies can be defined programmatically in Python or declaratively using YAML. Policies define rules that inspect and allow or deny agent actions before execution.

What is the performance overhead?

Policy checks are lightweight and typically introduce only minimal latency per action. The overhead depends on the number and complexity of rules configured.

Troubleshooting

Common Issues

ModuleNotFoundError: No module named 'agent_os'

# Install from source
git clone https://github.com/imran-siddique/agent-os.git
cd agent-os
pip install -e .

Optional modules not available

# Check what's installed
python -c "from agent_os import check_installation; check_installation()"

# Install everything
pip install -e ".[full]"

Permission errors on Windows

# Run PowerShell as Administrator, or use --user flag
pip install --user -e .

Docker not working

# Build with Dockerfile (no Docker Compose needed for simple tests)
docker build -t agent-os .
docker run -it agent-os python examples/demo-app/demo.py

Tests failing with API errors

# Most tests work without API keys — mock mode is default
pytest tests/ -v

# For real LLM tests, set environment variables
export OPENAI_API_KEY=sk-...
export ANTHROPIC_API_KEY=sk-ant-...

Frequently Asked Questions

What is the difference between Agent OS and prompt-based guardrails?Prompt-based guardrails ask the LLM to self-police, which is probabilistic. Agent OS enforces governance at the middleware level using deterministic policy engines and POSIX-inspired access controls. It controls what agents can do (capability-based), not just what they should not do (filter-based).

How does Agent OS work with other frameworks?Agent OS integrates with 14+ frameworks via adapters. Install the governance layer alongside your existing framework: use langgraph-trust for LangGraph, openai-agents-trust for OpenAI Agents, or the MCP server for any MCP-compatible client. Agent OS acts as a kernel layer underneath your agent framework.

What is the Agent Governance Ecosystem?Agent OS is part of a suite of four projects: Agent OS (policy kernel), AgentMesh (trust network), Agent Hypervisor (runtime supervisor), and Agent SRE (reliability platform). Together they provide 4,310+ tests across 17 modules.

Can I use Agent OS in production?Yes. Agent OS has 1,500+ tests, a VS Code extension, PyPI package (pip install agent-os-kernel), and is integrated into production frameworks like Dify (65K stars) and LlamaIndex (47K stars). It supports Python 3.9+ and runs on any platform.

Contributing

git clone https://github.com/imran-siddique/agent-os.git
cd agent-os
pip install -e ".[dev]"
pytest

License

MIT — See LICENSE

Exploring kernel concepts for AI agent safety.

GitHub · Docs

MCP Server · Populars

MCP Server · New