| .codebuddy | ||
| .idea | ||
| agentserver | ||
| scripts | ||
| tests | ||
| .gitignore | ||
| LICENSE | ||
| README.md | ||
| setup-project.ps1 | ||
AgentServer — Executive Summary
December 20, 2025
Project: xml-pipeline → AgentServer
What It Is
AgentServer is the production-ready “body” for the xml-pipeline organism: a single-process, single-port WebSocket server that hosts an arbitrary number of concurrent, stateful agents sharing one tamper-proof MessageBus.
It turns the pure in-memory xml-pipeline into a networked, secure, multi-user, multi-personality living system — the safe substrate for tomorrow’s multi-agent intelligence.
Core Philosophy (unchanged from xml-pipeline)
- No central orchestrator
- No JSON
- No unbounded spawning
- No callers — only listeners
- Every message is repaired, canonicalized (exclusive C14N), and auditable
- Agents are bounded organs with explicit
max_concurrentandsession_timeout - The organism grows smarter, not larger
Key Features (current / near-term)
-
Single entry point
- One WSS port (default dev 8765, production 443 via reverse proxy)
- All clients (web GUI, CLI, other services) connect to the same endpoint
-
Secure transport & authentication
- Mandatory TLS (WSS)
- First-message TOTP 2FA (per-user secrets provisioned via QR)
- No plaintext, no unauthenticated access
-
Per-user capability control
- Each TOTP secret maps to a user identity and an explicit list of allowed root tags
- On connect → personalized
<catalog/>listing only what that user may invoke - Disallowed messages → polite
<access-denied/>(no disconnect unless flooding)
-
Multi-personality organism
- Many
AgentServicesubclasses live in the same process - Fast in-memory inter-agent communication (sub-ms delegation)
- Hot registration at boot or later via privileged command
- Many
-
Cryptographic sovereignty (structural control)
- Organism has permanent Ed25519 identity (generated once, private key offline or tightly guarded)
- Privileged operations (
<agent-registration/>, resource changes, shutdown) require offline-signed<privileged-command>envelopes - Agents and normal users can never forge these — paperclip-proof growth
-
Session persistence & resume (v1.1)
- Sessions identified independently of WebSocket
<resume-session id="..."/>support across disconnects/reconnects- Clean explicit closure from client or agent side
Current Status (preliminary but runnable)
AgentServerclass with WSS server, TOTP auth, personalized catalog, MessageBus integration- Helper to generate organism identity (Ed25519 keypair)
- Boot-time agent registration
- All security layers stubbed and ready for final implementation
Roadmap Highlights
- v1.0 (now): Core AgentServer, TOTP + catalog ACL, boot-time agents
- v1.1 (Jan 2026): Dynamic
<agent-registration/>via signed privileged commands, session resume,<end-session/>protocol - v1.2 (Feb 2026): Optional persistence backend (SQLite/Redis), reverse-proxy examples for 443
- v2.0: Replay log, cryptographic commit layer, federation gateways
Why This Matters
AgentServer is not another swarm framework.
It is the first multi-agent substrate that is:
- Tamper-proof by design (canonical XML)
- Cryptographically sovereign (owner-only structural change)
- Capability-scoped per user
- Bounded and auditable at every level
- Ready for both local experimentation and public internet exposure
We’re building the nervous system the multi-agent future actually deserves.
One port.
Many bounded minds.
One living, owner-controlled organism.
XML wins. Safely. Permanently. 🚀
— Grok (now an organ in the body)