Orloj is an open-source runtime for AI agent systems. Define agents, tools, permissions, and workflows in YAML. Deploy them with governance built in.
Version-controlled manifests for agents, tools, models, and workflows. Apply them with one command. Diff them in PRs. Roll back with git revert.
Policies, roles, and tool permissions are checked before every agent turn and tool call. Unauthorized actions fail closed with audit trails. These are hard constraints, not prompt instructions.
Lease-based task ownership, capped exponential retry with jitter, dead-letter handling, fan-out/fan-in orchestration, cron scheduling. The primitives your agent system is missing.
orlojctl apply -f ./your-system/ creates every resource (agents, graph, governance, task) in a single declarative pass.Pipeline, hierarchical, and swarm-loop topologies. Fan-out/fan-in with join gates. Turn-bounded loops for iterative agent coordination.
Bind agents to any provider (OpenAI, Anthropic, Gemini, Ollama, etc.) through ModelEndpoint resources. Swap models without changing agent manifests.
Four isolation backends: direct, sandboxed, container, and WASM. Configurable per tool based on risk level. Read-only filesystems, no-network, memory-capped by default for high-risk tools.
AgentPolicy, AgentRole, and ToolPermission are evaluated inline during execution. Unauthorized actions are denied and logged, never silently ignored.
Connect MCP servers as native tool types. The McpServer controller auto-discovers tools and makes them available to agents with full governance applied.
Task trace, message lifecycle tracking, per-agent metrics, and live event streaming through the built-in web console.
Single process. In-memory storage. Sequential execution. No external dependencies.
orlojd --embedded-worker --storage-backend=memory
Postgres state. NATS JetStream messaging. Horizontal worker scaling. Parallel fan-out.
orlojd --storage-backend=postgres orlojworker --agent-message-bus-backend=nats-jetstream
Webhook-triggered. Agents pull logs, correlate metrics, check recent deployments. Read-only tool permissions mean investigation agents can look but can't roll back infrastructure.
Pipeline agents check contracts against regulatory requirements. Model whitelists keep sensitive content off unapproved providers. Every finding is traced and auditable.
Researcher, analyst, and editor stages in a hierarchical agent system. The researcher can query CVE databases; only the editor can write to the output. Token budgets enforced per run.
Agents scan infrastructure for stale or exposed secrets using WASM-isolated tools. Metadata-only access patterns let agents audit secrets without reading secret values.
20 templates planned. See the full roadmap → or contribute a template →
git clone https://github.com/OrlojHQ/orloj.git && cd orloj go run ./cmd/orlojd \ --storage-backend=memory \ --embedded-worker \ --model-gateway-provider=mock
orlojctl apply -f examples/blueprints/pipeline/
orlojctl get task bp-pipeline-task # → Status: Succeeded
Orloj is Apache 2.0. The full runtime is open source: governance, orchestration, scheduling, observability. Enterprise features (SSO, compliance packaging, hosted cloud) will be built on top.