Agent OS — Community Edition
A kernel architecture for governing autonomous AI agents
⭐ If this project helps you, please star it! It helps others discover Agent OS.
📦 Install the full stack:
pip install ai-agent-governance[full]— PyPI | GitHub
Quick Start • Documentation • VS Code Extension • Examples • Agent Hypervisor • AgentMesh • Agent SRE
Try Agent OS instantly in your browser - no installation required
Integrated With
Featured In
across 170K+ GitHub stars. Governance for [Dify](https://github.com/langgenius/dify-plugins/pull/2060) (65K ⭐), [LlamaIndex](https://github.com/run-llama/llama_index/pull/20644) (47K ⭐), [LangGraph](https://pypi.org/project/langgraph-trust/), [OpenAI Agents](https://pypi.org/project/openai-agents-trust/), [Agent-Lightning](https://github.com/microsoft/agent-lightning/pull/478), and [OpenClaw](https://clawhub.ai/imran-siddique/agentmesh-governance).📊 By The Numbers
1,680+Tests Passing |
12Framework Integrations |
170K+Combined Stars ofIntegrated Projects |
<0.1ms p99Governance LatencyBenchmarks |
9More Framework ProposalsUnder Review |
🏢 Adopted By Leading AI Frameworks
| Framework | Stars | Status | Link |
|---|---|---|---|
| Dify | 65K ⭐ | ✅ Merged | dify-plugins#2060 |
| LlamaIndex | 47K ⭐ | ✅ Merged | llama_index#20644 |
| Microsoft Agent-Lightning | 15K ⭐ | ✅ Merged | agent-lightning#478 |
| LangGraph | 24K ⭐ | 📦 Published on PyPI | langgraph-trust |
| OpenAI Agents SDK | — | 📦 Published on PyPI | openai-agents-trust |
| OpenClaw | — | 📦 Published on ClawHub | agentmesh-governance |
| Framework | Stars | Proposal |
|---|---|---|
| AutoGen | 54K ⭐ | microsoft/autogen#7242 |
| CrewAI | 44K ⭐ | crewAIInc/crewAI#4502 |
| Haystack | 22K ⭐ | deepset-ai/haystack#10615 |
| Semantic Kernel | 27K ⭐ | microsoft/semantic-kernel#13556 |
| smolagents | 25K ⭐ | ✅ Adapter built — huggingface/smolagents#1989 |
| LangGraph | 24K ⭐ | langchain-ai/langgraph#6824 |
| Google ADK | 18K ⭐ | ✅ Adapter built — google/adk-python#4517 |
| PydanticAI | 15K ⭐ | ✅ Adapter built — pydantic/pydantic-ai#4335 |
| OpenAI Agents SDK | — | openai/openai-agents-python#2515 |
| A2A Protocol | 21K ⭐ | a2aproject/A2A#1501 |
| Oracle Agent Spec | — | oracle/agent-spec#105 |
| AI Card Spec | — | agent-card/ai-card#16 |
💡 Why Agent OS?
The AI agent market is projected to reach $47B by 2030. As enterprises deploy autonomous agents at scale, governance becomes the critical infrastructure layer. Agent OS is the kernel that ensures every agent action is policy-enforced, auditable, and compliant — making AI agents enterprise-ready.
The problem: AI agents can execute arbitrary tools, access sensitive data, and make autonomous decisions — with no built-in governance, audit trails, or policy enforcement.
Our solution: A governance kernel that sits between agents and their actions, providing deterministic policy enforcement in <1ms with zero agent code changes.
How Agent OS Compares
| Tool | Focus | When it acts |
|---|---|---|
| LangChain/CrewAI | Building agents | N/A (framework) |
| NeMo Guardrails | Input/output filtering | Before/after LLM call |
| LlamaGuard | Content classification | Before/after LLM call |
| Agent OS | Action interception | During execution |
Agent frameworks build agents. Safety tools filter I/O. Agent OS intercepts actions mid-execution — the only kernel-level governance layer.
🛡️ OWASP Agentic Top 10 Coverage
Agent OS + ecosystem covers 8 out of 10 OWASP Agentic Application Security risks:
| Risk | Coverage | Module |
|---|---|---|
| ASI01 Agent Goal Hijack | ✅ Full | GovernancePolicy.blocked_patterns |
| ASI02 Tool Misuse | ✅ Full | MCPGateway — tool filtering, rate limiting, audit |
| ASI03 Identity & Privilege | ✅ Full | require_human_approval, RBAC policies |
| ASI04 Supply Chain | ⚠️ Partial | Tool allowlisting (no deep scanning yet) |
| ASI05 Code Execution | ✅ Full | blocked_patterns, sandbox integration |
| ASI06 Memory Poisoning | ✅ Full | MemoryGuard — hash integrity, injection detection |
| ASI07 Inter-Agent Comms | ✅ Full | AgentMesh trust handshake, HMAC auth |
| ASI08 Cascading Failures | ✅ Full | Agent SRE circuit breakers, cascade detection |
| ASI09 Human-Agent Trust | ✅ Full | Human approval workflows, audit logging |
| ASI10 Rogue Agents | ⚠️ Partial | Agent Hypervisor execution rings, kill switch |
📄 Full OWASP mapping →
🌐 The Agent Governance Ecosystem
| Layer | Package | Purpose | Install |
|---|---|---|---|
| Kernel | Agent OS | Policy enforcement, action interception | pip install agent-os-kernel |
| Network | AgentMesh | Identity, trust, delegation | pip install agentmesh-platform |
| Reliability | Agent SRE | SLOs, chaos testing, circuit breakers | pip install agent-sre |
| Runtime | Agent Hypervisor | Execution rings, resource limits, saga | pip install agent-hypervisor |
| Full Stack | ai-agent-governance | All of the above | pip install ai-agent-governance[full] |
⚡ Quick Start in 30 Seconds
pip install agent-os-kernel
from agent_os import StatelessKernel, ExecutionContext
# Create a governed agent in 3 lines
kernel = StatelessKernel()
# Define execution context with governance policies
ctx = ExecutionContext(agent_id="demo-agent", policies=["read_only"])
# Your agent runs with policy enforcement
result = await kernel.execute(
action="database_query",
params={"query": "SELECT * FROM users"},
context=ctx
)
# ✅ Safe queries execute
# ❌ "DROP TABLE users" → Blocked by kernel
That's it! Your agent now has deterministic policy enforcement. Learn more →
🎬 See all features in action:
git clone https://github.com/imran-siddique/agent-os && python agent-os/demo.py
📋 More examples (click to expand)
Policy enforcement with custom rules
from agent_os import StatelessKernel
kernel = StatelessKernel()
kernel.load_policy_yaml("""
version: "1.0"
name: api-safety
rules:
- name: block-destructive-sql
condition: "action == 'database_query'"
action: deny
pattern: "DROP|TRUNCATE|DELETE FROM .* WHERE 1=1"
- name: rate-limit-api
condition: "action == 'api_call'"
limit: "100/hour"
""")
result = await kernel.execute(action="database_query", params={"query": "DROP TABLE users"})
# ❌ Blocked: Matched rule 'block-destructive-sql'
Audit logging
from agent_os import KernelSpace
kernel = KernelSpace()
# Every kernel action is automatically recorded
result = await kernel.execute(action="read_file", params={"path": "/data/report.csv"})
# Query the flight recorder
entries = kernel.flight_recorder.query(agent_id="agent-001", limit=10)
for entry in entries:
print(f"{entry.timestamp} | {entry.action} | {entry.outcome}")
Governed chatbot with memory
from agent_os import KernelSpace
from agent_os.emk import EpisodicMemory
kernel = KernelSpace(policy_file="policies.yaml")
memory = EpisodicMemory(max_turns=50)
@kernel.register
async def chat(message: str, conversation_id: str = "default") -> str:
history = memory.get_history(conversation_id)
response = await call_llm(history + [{"role": "user", "content": message}])
memory.add_turn(conversation_id, message, response)
return response
# Outputs are checked against content policies; violations trigger SIGSTOP
See examples/ for 20+ runnable demos including SQL agents, GitHub reviewers, and compliance bots.
🎯 What You'll Build in 5 Minutes
from agent_os import stateless_execute
# 1. Define safety policies (not prompts — actual enforcement)
# 2. Actions are checked against policies before execution
result = await stateless_execute(
action="database_query",
params={"query": "SELECT revenue FROM sales"},
agent_id="analyst-001",
policies=["read_only"]
)
# ✅ Safe queries execute
# ❌ "DROP TABLE users" → BLOCKED (not by prompt, by kernel)
Result: Defined policies are deterministically enforced by the kernel—not by hoping the LLM follows instructions.
For the full kernel with signals, VFS, and protection rings:
from agent_os import KernelSpace, AgentSignal, AgentVFS
# Requires: pip install agent-os-kernel[full]
kernel = KernelSpace()
ctx = kernel.create_agent_context("agent-001")
await ctx.write("/mem/working/task.txt", "Hello World")
Note:
KernelSpace,AgentSignal, andAgentVFSrequire installing the control-plane module:pip install agent-os-kernel[full]
What is Agent OS?
Agent OS applies operating system concepts to AI agent governance. Instead of relying on prompts to enforce safety ("please don't do dangerous things"), it provides application-level middleware that intercepts and validates agent actions before execution.
Note: This is application-level enforcement (Python middleware), not OS kernel-level isolation. Agents run in the same process. For true isolation, run agents in containers.
┌─────────────────────────────────────────────────────────┐
│ USER SPACE (Agent Code) │
│ Your agent code runs here. The kernel intercepts │
│ actions before they execute. │
├─────────────────────────────────────────────────────────┤
│ KERNEL SPACE │
│ Policy Engine │ Flight Recorder │ Signal Dispatch │
│ Actions are checked against policies before execution │
└─────────────────────────────────────────────────────────┘
The Idea
Prompt-based safety asks the LLM to follow rules. The LLM decides whether to comply.
Kernel-based safety intercepts actions before execution. The policy engine decides, not the LLM.
This is the same principle operating systems use: applications request resources, the kernel grants or denies access based on permissions.
Architecture
graph TB
subgraph Frameworks["External Frameworks"]
LC[LangChain]
CA[CrewAI]
AG[AutoGen]
OA[OpenAI]
AN[Anthropic]
GE[Gemini]
end
ADAPT[[Adapters]]
subgraph L4["Layer 4: Intelligence"]
SC[Self-Correction]
SA[Semantic Analysis]
end
subgraph L3["Layer 3: Control Plane"]
PE[Policy Engine]
AL[Audit Logging]
end
subgraph L2["Layer 2: Infrastructure"]
NM[Nexus Marketplace]
OB[Observability]
end
subgraph L1["Layer 1: Primitives"]
VE[Verification Engine]
CS[Context Service]
MS[Memory Store]
end
LC & CA & AG & OA & AN & GE --> ADAPT
ADAPT --> L4
SC & SA --> PE
SC & SA --> AL
PE & AL --> NM
PE & AL --> OB
NM & OB --> VE
NM & OB --> CS
NM & OB --> MS
Directory Structure
agent-os/
├── src/agent_os/ # Core Python package
│ ├── __init__.py # Public API (re-exports from all layers)
│ ├── stateless.py # StatelessKernel (zero-dependency core)
│ ├── base_agent.py # BaseAgent, ToolUsingAgent classes
│ ├── agents_compat.py # AGENTS.md parser (OpenAI/Anthropic standard)
│ ├── cli.py # CLI (agent-os check, review, init, etc.)
│ └── integrations/ # Framework adapters (LangChain, OpenAI, etc.)
├── modules/ # Kernel Modules (4-layer architecture)
│ ├── primitives/ # Layer 1: Base types and failures
│ ├── cmvk/ # Layer 1: Verification
│ ├── emk/ # Layer 1: Episodic memory kernel
│ ├── caas/ # Layer 1: Context-as-a-Service
│ ├── amb/ # Layer 2: Agent message bus
│ ├── iatp/ # Layer 2: Inter-agent trust protocol
│ ├── atr/ # Layer 2: Agent tool registry
│ ├── observability/ # Layer 3: Prometheus + OpenTelemetry
│ ├── control-plane/ # Layer 3: THE KERNEL (policies, signals)
│ ├── scak/ # Layer 4: Self-correcting agent kernel
│ ├── mute-agent/ # Layer 4: Face/Hands architecture
│ ├── nexus/ # Experimental: Trust exchange network
│ └── mcp-kernel-server/ # Integration: MCP protocol support
├── extensions/ # IDE & AI Assistant Extensions
│ ├── mcp-server/ # ⭐ MCP Server (Copilot, Claude, Cursor)
│ ├── vscode/ # VS Code extension
│ ├── copilot/ # GitHub Copilot extension
│ ├── jetbrains/ # IntelliJ/PyCharm plugin
│ ├── cursor/ # Cursor IDE extension
│ ├── chrome/ # Chrome extension
│ └── github-cli/ # gh CLI extension
├── examples/ # Working examples
├── docs/ # Documentation
├── tests/ # Test suite (organized by layer)
├── notebooks/ # Jupyter tutorials
├── papers/ # Research papers
└── templates/ # Policy templates
Core Modules
| Module | Layer | PyPI Package | Description | Status |
|---|---|---|---|---|
primitives |
1 | agent-primitives |
Base failure types, severity levels | ✅ Stable |
cmvk |
1 | cmvk |
Verification, drift detection | ✅ Stable |
emk |
1 | emk |
Episodic memory kernel (append-only ledger) | ✅ Stable |
caas |
1 | caas-core |
Context-as-a-Service, RAG pipeline | ✅ Stable |
amb |
2 | amb-core |
Agent message bus (async pub/sub) | ✅ Stable |
iatp |
2 | inter-agent-trust-protocol |
Sidecar trust protocol, typed IPC pipes | ✅ Stable |
atr |
2 | agent-tool-registry |
Tool registry with LLM schema generation | ✅ Stable |
control-plane |
3 | agent-control-plane |
THE KERNEL — Policy engine, signals, VFS | ✅ Stable |
observability |
3 | agent-os-observability |
Prometheus metrics + OpenTelemetry tracing | ⚠️ No tests |
scak |
4 | scak |
Self-correcting agent kernel | ✅ Stable |
mute-agent |
4 | mute-agent |
Decoupled reasoning/execution architecture | ⚠️ No tests |
nexus |
— | Not published | Trust exchange network | 🔬 Prototype |
mcp-kernel-server |
Int | mcp-kernel-server |
MCP server for Claude Desktop | ⚠️ No tests |
hypervisor |
⭐ | agent-hypervisor |
Runtime supervisor — Execution Rings, Joint Liability, Saga Orchestrator (own repo) | ✅ 184 tests |
⭐ Star Feature: Agent Hypervisor
Runtime supervisor for multi-agent collaboration — think "VMware for AI agents."
Now its own repo:
agent-hypervisor— 184 tests, 268μs full pipeline, zero dependencies beyond pydantic.
Just as OS hypervisors isolate virtual machines and enforce resource boundaries, the Agent Hypervisor isolates AI agent sessions and enforces governance boundaries at sub-millisecond latency.
┌────────────────────────────────────────────────────────────┐
│ AGENT HYPERVISOR │
│ │
│ Ring 0 (Root) ← SRE Witness required │
│ Ring 1 (Privileged)← σ_eff > 0.95 + consensus │
│ Ring 2 (Standard) ← σ_eff > 0.60 │
│ Ring 3 (Sandbox) ← Default for unknown agents │
│ │
│ ┌──────────┐ ┌───────────┐ ┌────────────────────────┐ │
│ │ Joint │ │ Semantic │ │ Hash-Chained │ │
│ │ Liability │ │ Saga │ │ Delta Audit Trail │ │
│ │ Engine │ │ Orchestr. │ │ (Tamper-Evident) │ │
│ └──────────┘ └───────────┘ └────────────────────────┘ │
└────────────────────────────────────────────────────────────┘
Key Capabilities
| Feature | Description | Latency |
|---|---|---|
| Execution Rings | 4-level privilege model (Ring 0–3) based on trust score | 0.3μs |
| Joint Liability | High-trust agents vouch for low-trust agents with bonded reputation | 7μs |
| Saga Orchestrator | Multi-step transactions with timeout, retry, and auto-compensation | 151μs |
| Delta Audit | Hash-chained semantic diffs with blockchain commitment | 27μs |
| Full Pipeline | Session + join + audit + saga + terminate | 268μs |
Quick Start
pip install agent-hypervisor
from hypervisor import Hypervisor, SessionConfig, ConsistencyMode
hv = Hypervisor()
# Create a governed multi-agent session
session = await hv.create_session(
config=SessionConfig(consistency_mode=ConsistencyMode.EVENTUAL, max_participants=5),
creator_did="did:mesh:admin",
)
# Agents are automatically assigned privilege rings based on trust score
ring = await hv.join_session(session.sso.session_id, "did:mesh:agent-alpha", sigma_raw=0.85)
# → Ring 2 (Standard) — can execute reversible actions
# Multi-step saga with automatic timeout and compensation
saga = session.saga.create_saga(session.sso.session_id)
step = session.saga.add_step(
saga.saga_id, "draft_email", "did:mesh:agent-alpha",
execute_api="/api/draft", undo_api="/api/undo-draft",
timeout_seconds=30, max_retries=2,
)
# Terminate — returns tamper-evident summary hash
summary_hash = await hv.terminate_session(session.sso.session_id)
📖 Full Hypervisor documentation →
IDE & CLI Extensions
| Extension | Description | Status |
|---|---|---|
mcp-server |
⭐ MCP Server — Works with Claude, Copilot, Cursor (npx agentos-mcp-server) |
✅ Published (v1.0.1) |
vscode |
VS Code extension with real-time policy checks, enterprise features | ✅ Published (v1.0.1) |
copilot |
GitHub Copilot extension (Vercel/Docker deployment) | ✅ Published (v1.0.0) |
jetbrains |
IntelliJ, PyCharm, WebStorm plugin (Kotlin) | ✅ Built (v1.0.0) |
cursor |
Cursor IDE extension (Composer integration) | ✅ Built (v0.1.0) |
chrome |
Chrome extension for GitHub, Jira, AWS, GitLab | ✅ Built (v1.0.0) |
github-cli |
gh agent-os CLI extension |
⚠️ Basic |
Install
pip install agent-os-kernel
Or with optional components:
pip install agent-os-kernel[cmvk] # + verification
pip install agent-os-kernel[iatp] # + inter-agent trust
pip install agent-os-kernel[observability] # + Prometheus/OpenTelemetry
pip install agent-os-kernel[nexus] # + trust exchange network
pip install agent-os-kernel[full] # Everything
One-Command Quickstart
macOS/Linux:
curl -sSL https://raw.githubusercontent.com/imran-siddique/agent-os/main/scripts/quickstart.sh | bash
Windows (PowerShell):
iwr -useb https://raw.githubusercontent.com/imran-siddique/agent-os/main/scripts/quickstart.ps1 | iex
Quick Example
Stateless API (Always Available — Zero Dependencies Beyond Pydantic)
from agent_os import stateless_execute
# Execute with policy enforcement
result = await stateless_execute(
action="database_query",
params={"query": "SELECT * FROM users"},
agent_id="analyst-001",
policies=["read_only"]
)
Full Kernel API (Requires pip install agent-os-kernel[full])
from agent_os import KernelSpace, AgentSignal, PolicyRule
kernel = KernelSpace()
# Create agent context with VFS
ctx = kernel.create_agent_context("agent-001")
await ctx.write("/mem/working/task.txt", "analyze this data")
# Policy enforcement
from agent_os import PolicyEngine
engine = PolicyEngine()
engine.add_rule(PolicyRule(name="no_sql_injection", pattern="DROP|DELETE|TRUNCATE"))
POSIX-Inspired Primitives
Agent OS borrows concepts from POSIX operating systems:
| Concept | POSIX | Agent OS |
|---|---|---|
| Process control | SIGKILL, SIGSTOP |
AgentSignal.SIGKILL, AgentSignal.SIGSTOP |
| Filesystem | /proc, /tmp |
VFS with /mem/working, /mem/episodic |
| IPC | Pipes (|) |
Typed IPC pipes between agents |
| Syscalls | open(), read() |
kernel.execute() |
Signals
# Requires: pip install agent-os-kernel[full]
from agent_os import SignalDispatcher, AgentSignal
dispatcher = SignalDispatcher()
dispatcher.signal(agent_id, AgentSignal.SIGSTOP) # Pause
dispatcher.signal(agent_id, AgentSignal.SIGCONT) # Resume
dispatcher.signal(agent_id, AgentSignal.SIGKILL) # Terminate
VFS (Virtual File System)
# Requires: pip install agent-os-kernel[full]
from agent_os import AgentVFS
vfs = AgentVFS(agent_id="agent-001")
vfs.write("/mem/working/task.txt", "Current task")
vfs.read("/policy/rules.yaml") # Read-only from user space
Framework Integrations
Wrap existing frameworks with Agent OS governance:
# LangChain
from agent_os.integrations import LangChainKernel
governed = LangChainKernel().wrap(my_chain)
# OpenAI Assistants
from agent_os.integrations import OpenAIKernel
governed = OpenAIKernel().wrap_assistant(assistant, client)
# Semantic Kernel
from agent_os.integrations import SemanticKernelWrapper
governed = SemanticKernelWrapper().wrap(sk_kernel)
# CrewAI
from agent_os.integrations import CrewAIKernel
governed = CrewAIKernel().wrap(my_crew)
# AutoGen
from agent_os.integrations import AutoGenKernel
governed = AutoGenKernel().wrap(autogen_agent)
# OpenAI Agents SDK
from agent_os.integrations import OpenAIAgentsSDKKernel
governed = OpenAIAgentsSDKKernel().wrap(agent)
Note: These adapters use lazy interception — they don't require the target framework to be installed until you call
.wrap().
See integrations documentation for full details.
Integration Comparison
| Framework | Governance Level | Async Support | Status | Adapter File |
|---|---|---|---|---|
| LangChain | Chain/Agent/Runnable | ✅ ainvoke |
✅ Stable | integrations/langchain_adapter.py |
| OpenAI Assistants | Run/Thread/Tool Call | ✅ Streaming | ✅ Stable | integrations/openai_adapter.py |
| AutoGen | Multi-Agent Orchestration | ❌ Sync only | ✅ Stable | integrations/autogen_adapter.py |
| Semantic Kernel | Function/Plugin/Memory | ✅ Native async | ✅ Stable | integrations/semantic_kernel_adapter.py |
| CrewAI | Crew/Agent/Task | ❌ Sync only | ✅ Stable | integrations/crewai_adapter.py |
| OpenAI Agents SDK | Agent/Tool/Handoff | ✅ Native async | ✅ Stable | integrations/openai_agents_sdk_adapter.py |
Examples
The examples/ directory contains demos at various levels:
Getting Started
| Demo | Description | Command |
|---|---|---|
| demo-app | Uses the stateless API (most reliable) | cd examples/demo-app && python demo.py |
| hello-world | Minimal example | cd examples/hello-world && python agent.py |
| quickstart | Quick intro | cd examples/quickstart && python my_first_agent.py |
Domain Examples (Self-Contained)
These examples are self-contained and don't require external Agent OS imports:
| Demo | Description |
|---|---|
| healthcare-hipaa | HIPAA-compliant agent |
| customer-service | Customer support agent |
| legal-review | Legal document analysis |
| crewai-safe-mode | CrewAI with safety wrappers |
Production Demos (with Docker + Observability)
| Demo | Description | Command |
|---|---|---|
| carbon-auditor | Multi-model verification | cd examples/carbon-auditor && docker-compose up |
| grid-balancing | Multi-agent coordination | cd examples/grid-balancing && docker-compose up |
| defi-sentinel | Real-time attack detection | cd examples/defi-sentinel && docker-compose up |
| pharma-compliance | Document analysis | cd examples/pharma-compliance && docker-compose up |
Each production demo includes:
- Grafana dashboard on port 300X
- Prometheus metrics on port 909X
- Jaeger tracing on port 1668X
# Run carbon auditor with full observability
cd examples/carbon-auditor
cp .env.example .env # Optional: add API keys
docker-compose up
# Open dashboards
open http://localhost:3000 # Grafana (admin/admin)
open http://localhost:16686 # Jaeger traces
Safe Tool Plugins
Agent OS includes pre-built safe tools via the Agent Tool Registry:
# Requires: pip install agent-os-kernel[full]
from atr import ToolRegistry, tool
@tool(name="safe_http", description="Rate-limited HTTP requests")
async def safe_http(url: str) -> dict:
# Tool is automatically registered and sandboxed
...
registry = ToolRegistry()
registry.register(safe_http)
# Generate schemas for any LLM
openai_tools = registry.to_openai_schema()
anthropic_tools = registry.to_anthropic_schema()
Message Bus
Connect agents using the async message bus:
# Requires: pip install agent-os-kernel[full]
from amb_core import MessageBus, Message
bus = MessageBus()
await bus.subscribe("tasks", handler)
await bus.publish("tasks", Message(payload={"task": "analyze"}))
Broker adapters available for Redis, Kafka, and NATS (requires optional dependencies).
CLI Tool
Agent OS includes a CLI for terminal workflows:
# Check files for safety violations
agentos check src/app.py
# ✓ src/app.py: No violations
# OR
# ⚠️ 2 violation(s) found in src/app.py:
# Line 12: DROP TABLE users;
# Violation: Destructive SQL: DROP operation detected
# Policy: block-destructive-sql
# Check staged git files (ideal for pre-commit hooks)
agentos check --staged
# ✓ No violations in staged files
# Machine-readable JSON output (for CI pipelines)
agentos check src/app.py --format json
# CI mode (no colors, strict exit codes)
agentos check --staged --ci
# Initialize Agent OS in a project
agentos init
# Initialized Agent OS in .agents/
# - agents.md: Agent instructions (OpenAI/Anthropic standard)
# - security.md: Kernel policies (Agent OS extension)
# - Template: strict
# Choose a permissive or audit-only template
agentos init --template permissive
agentos init --template audit
# Overwrite an existing .agents/ directory
agentos init --force
# Enable kernel governance and verify the configuration
agentos secure
# Securing agents in .
# [PASS] kernel version
# [PASS] signals defined
# [PASS] policies defined
# Security configuration valid.
# Audit agent security configuration
agentos audit
# Auditing .
# [OK] agents.md
# [OK] security.md
# No issues found.
# JSON output for CI
agentos audit --format json
# Show kernel status (version, installed packages)
agentos status
# Agent OS Kernel Status
# ========================================
# Version: 1.2.0
# Status: Installed
# Project: /home/user/myproject
# Agents: Configured (.agents/ found)
# Multi-model code review with CMVK consensus
agentos review src/app.py --cmvk
# 🔍 Reviewing src/app.py with CMVK...
# Multi-Model Review (3 models):
# ✅ gpt-4: No issues
# ⚠️ claude-sonnet-4: 1 potential issue(s)
# ✅ gemini-pro: No issues
# Consensus: 67%
# Specify models
agentos review src/app.py --cmvk --models "gpt-4,claude-sonnet-4"
# Validate policy YAML files
agentos validate
# Checking .agents/policy.yaml... OK
# ✓ All 1 policy file(s) valid.
# Validate specific files in strict mode
agentos validate policies/*.yaml --strict
# Install git pre-commit hook
agentos install-hooks
# ✓ Installed pre-commit hook: .git/hooks/pre-commit
# Agent OS will now check staged files before each commit.
# Append to an existing hook
agentos install-hooks --append
# Start the HTTP API server
agentos serve --port 8080
# Agent OS API server starting on 0.0.0.0:8080
# Endpoints:
# GET /health Health check
# GET /status Kernel status
# GET /agents List agents
# POST /agents/{id}/execute Execute agent action
# Output Prometheus-style metrics
agentos metrics
# # HELP agentos_policy_violations_total Total policy violations.
# # TYPE agentos_policy_violations_total counter
# agentos_policy_violations_total 0
# ...
MCP Integration (Claude Desktop, GitHub Copilot, Cursor)
Agent OS provides an MCP server that works with any MCP-compatible AI assistant:
# Quick install via npx
npx agentos-mcp-server
npm: agentos-mcp-server MCP Registry: io.github.imran-siddique/agentos
Add to your config file:
Claude Desktop (%APPDATA%\Claude\claude_desktop_config.json on Windows):
{
"mcpServers": {
"agentos": {
"command": "npx",
"args": ["-y", "agentos-mcp-server"]
}
}
}
Features: 10 tools for agent creation, policy enforcement, compliance checking (SOC 2, GDPR, HIPAA), human-in-the-loop approvals, and audit logging.
See MCP server documentation for full details.
Documentation
Tutorials
- 5-Minute Quickstart — Get running fast
- 30-Minute Deep Dive — Comprehensive walkthrough
- Building Your First Governed Agent — Complete tutorial
- Using Message Bus Adapters — Connect agents
- Creating Custom Tools — Build safe tools
- Cheatsheet — Quick reference
Interactive Notebooks
| Notebook | Description | Time |
|---|---|---|
| Hello Agent OS | Your first governed agent | 5 min |
| Episodic Memory | Agent memory that persists | 15 min |
| Time-Travel Debugging | Replay and debug decisions | 20 min |
| Verification | Detect hallucinations | 15 min |
| Multi-Agent Coordination | Trust between agents | 20 min |
| Policy Engine | Deep dive into policies | 15 min |
Reference
- Quickstart Guide — 60 seconds to first agent
- Framework Integrations — LangChain, OpenAI, etc.
- Kernel Internals — How the kernel works
- Architecture Overview — Getting started
- Kernel Internals — How the kernel works
- RFC-003: Agent Signals — POSIX-style signals
- RFC-004: Agent Primitives — Core primitives
Status & Maturity
This is a research project exploring kernel concepts for AI agent governance.
✅ Production-Ready
These components are fully implemented and tested:
| Component | Tests |
|---|---|
StatelessKernel — Zero-dependency policy enforcement (src/agent_os/) |
✅ Full coverage |
| Policy Engine — Deterministic rule enforcement | ✅ Tested |
| Flight Recorder — SQLite-based audit logging | ✅ Tested |
CLI — agent-os check, init, secure, validate |
✅ Tested |
| Framework Adapters — LangChain, OpenAI, Semantic Kernel, CrewAI, AutoGen, OpenAI Agents SDK | ✅ Implemented |
| AGENTS.md Parser — OpenAI/Anthropic standard agent config | ✅ Full coverage |
Primitives (agent-primitives) — Failure types, severity levels |
✅ Tested |
CMVK (cmvk) — Drift detection, distance metrics (955+ lines) |
✅ Tested |
EMK (emk) — Episodic memory with JSONL storage |
✅ 8 test files |
AMB (amb-core) — Async message bus, DLQ, tracing |
✅ 6 test files |
IATP (inter-agent-trust-protocol) — Sidecar trust, typed IPC |
✅ 9 test files |
ATR (agent-tool-registry) — Multi-LLM schema generation |
✅ 6 test files |
Control Plane (agent-control-plane) — Signals, VFS, protection rings |
✅ 18 test files |
SCAK (scak) — Self-correcting agent kernel |
✅ 23 test files |
⚠️ Experimental (Code Exists, Tests Missing or Incomplete)
| Component | What's Missing |
|---|---|
Mute Agent (mute-agent) |
No tests; all layer dependencies use mock adapters |
Observability (agent-os-observability) |
No tests; Prometheus metrics, Grafana dashboards, OTel tracing implemented |
MCP Kernel Server (mcp-kernel-server) |
No tests; 1173-line implementation |
| GitHub CLI Extension | Single bash script with simulated output |
| Control Plane MCP Adapter | Placeholder — returns canned responses |
| Control Plane A2A Adapter | Placeholder — negotiation accepts all params |
🔬 Research Prototype
| Component | What's Missing |
|---|---|
| Nexus Trust Exchange | No pyproject.toml, no tests, placeholder cryptography (XOR — not secure), all signature verification stubbed, in-memory storage only |
Known Architectural Limitations
| Limitation | Impact | Mitigation |
|---|---|---|
| Application-level only | Direct stdlib calls (subprocess, open) bypass kernel |
Pair with container isolation for production |
| Blocklist-based policies | Novel attack patterns not in rules will pass | Add AST-level parsing (#32), use defense in depth |
| Shadow Mode single-step | Multi-step agent simulations diverge from reality | Use for single-turn validation only |
| No tamper-proof audit | Flight Recorder SQLite can be modified by compromised agent | Write to external sink for critical audits |
| Provider-coupled adapters | Each SDK needs separate adapter | Abstract interface planned (#47) |
See GitHub Issues for the full roadmap.
FAQ
How is this different from prompt-based safety?
Prompt-based safety relies on instructing the LLM to follow rules via system prompts. This approach is probabilistic — the model may still produce unsafe outputs under certain conditions.
Agent OS enforces policies at the middleware layer. Actions are intercepted and validated before execution, making enforcement deterministic rather than dependent on model compliance.
What frameworks are supported?
Agent OS can wrap and govern agents built with popular frameworks including LangChain, CrewAI, AutoGen, Semantic Kernel, and the OpenAI SDK. It also supports MCP-based integrations.
Can I use this in production?
Core components such as the StatelessKernel and Policy Engine are production-ready. However, Agent OS provides application-level enforcement. For high-security environments, it should be combined with infrastructure isolation (e.g., containers).
How do I write custom policies?
Custom policies can be defined programmatically in Python or declaratively using YAML. Policies define rules that inspect and allow or deny agent actions before execution.
What is the performance overhead?
Policy checks are lightweight and typically introduce only minimal latency per action. The overhead depends on the number and complexity of rules configured.
Troubleshooting
Common Issues
ModuleNotFoundError: No module named 'agent_os'
# Install from source
git clone https://github.com/imran-siddique/agent-os.git
cd agent-os
pip install -e .
Optional modules not available
# Check what's installed
python -c "from agent_os import check_installation; check_installation()"
# Install everything
pip install -e ".[full]"
Permission errors on Windows
# Run PowerShell as Administrator, or use --user flag
pip install --user -e .
Docker not working
# Build with Dockerfile (no Docker Compose needed for simple tests)
docker build -t agent-os .
docker run -it agent-os python examples/demo-app/demo.py
Tests failing with API errors
# Most tests work without API keys — mock mode is default
pytest tests/ -v
# For real LLM tests, set environment variables
export OPENAI_API_KEY=sk-...
export ANTHROPIC_API_KEY=sk-ant-...
Frequently Asked Questions
What is the difference between Agent OS and prompt-based guardrails?Prompt-based guardrails ask the LLM to self-police, which is probabilistic. Agent OS enforces governance at the middleware level using deterministic policy engines and POSIX-inspired access controls. It controls what agents can do (capability-based), not just what they should not do (filter-based).
How does Agent OS work with other frameworks?Agent OS integrates with 14+ frameworks via adapters. Install the governance layer alongside your existing framework: use langgraph-trust for LangGraph, openai-agents-trust for OpenAI Agents, or the MCP server for any MCP-compatible client. Agent OS acts as a kernel layer underneath your agent framework.
What is the Agent Governance Ecosystem?Agent OS is part of a suite of four projects: Agent OS (policy kernel), AgentMesh (trust network), Agent Hypervisor (runtime supervisor), and Agent SRE (reliability platform). Together they provide 4,310+ tests across 17 modules.
Can I use Agent OS in production?Yes. Agent OS has 1,500+ tests, a VS Code extension, PyPI package (pip install agent-os-kernel), and is integrated into production frameworks like Dify (65K stars) and LlamaIndex (47K stars). It supports Python 3.9+ and runs on any platform.
Contributing
git clone https://github.com/imran-siddique/agent-os.git
cd agent-os
pip install -e ".[dev]"
pytest
License
MIT — See LICENSE
Exploring kernel concepts for AI agent safety.
GitHub · Docs