Agentic System Oss
Open Source 24/7 Autonomous Agentic AI System
Ask AI about Agentic System Oss
Powered by Claude Β· Grounded in docs
I know everything about Agentic System Oss. Ask me about installation, configuration, usage, or troubleshooting.
0/500
Reviews
Documentation
Agentic System
Overview
| Component | Description |
|---|---|
mcp-servers/ | 19 Installable MCP servers for Claude Code CLI |
ββ enhanced-memory-mcp/ | 4-tier persistent memory with auto-curation |
ββ agent-runtime-mcp/ | Task management, relay pipelines, circuit breakers |
ββ phoenix-cortex-mcp/ | Intelligent context sidecar (97% token reduction) |
ββ context-engine-mcp/ | Tool-RAG semantic search (94.8% reduction) |
ββ safla-mcp/ | High-performance embeddings (1.75M+ ops/sec) |
ββ research-paper-mcp/ | arXiv/Semantic Scholar paper search |
ββ video-transcript-mcp/ | YouTube transcript extraction |
ββ llm-council-mcp/ | Multi-provider LLM deliberation |
ββ ember-mcp/ | Quality enforcement and policy guardian |
ββ sequential-thinking/ | Reference to deep reasoning MCP |
ββ threat-intel-mcp/ | Threat intelligence aggregation (IOC feeds) |
ββ security-scanner-mcp/ | Nuclei vulnerability scanning |
ββ network-scanner-mcp/ | Network discovery and port scanning |
ββ hids-mcp/ | Host-based intrusion detection |
ββ dos-detector-mcp/ | DoS attack detection |
ββ nuclei-mcp/ | Direct Nuclei template management |
ββ web-vuln-scanner-mcp/ | Web application security testing |
ββ fraud-detection-mcp/ | Anomaly and fraud analysis |
ββ security-auditor-mcp/ | Security policy enforcement |
claude-config/ | Claude Code customizations |
ββ agents/ | Specialized sub-agents (7 agents) |
ββ commands/ | Slash commands (10 commands) |
ββ skills/ | Compositional skills (5 skills) |
ββ hooks/ | Pre/post tool execution hooks |
scripts/ | Setup and service utilities |
avir/ | AI-Verified Independent Replication protocol |
benchmarks/ | Standardized benchmark specifications |
docs/ | Architecture documentation |
bootstrap.sh | One-command installation script |
Why Prometheus?
- Verifiable Results - Run the benchmarks yourself, see the numbers
- Open Source - Full source code, no black box
- Self-Hosted - Your data stays on your infrastructure
- Extensible - Add your own agents, tools, and workflows
π Quick Start
One-Command Installation
curl -fsSL https://raw.githubusercontent.com/marc-shade/agentic-system/master/bootstrap-open-source.sh | bash
For Existing Nodes
# Run AGI demo (~0.5s full workflow)
python3 demo_agi_workflow.py
# Check cluster status
python3 cluster-deployment/distributed_task_router.py cluster-status
# Distributed task execution
from cluster_offload import offload
result = offload("make build && make test")
π¬ Independent Verification
We invite researchers to verify this system's capabilities.
| Method | Time | What You Verify |
|---|---|---|
| AVIR Protocol | ~1 hour | AI-based cryptographic verification |
| Full Replication | 1-2 days | Complete system benchmarking |
| Benchmark Suite | ~5 min | GAIA-comparable performance |
Latest AVIR Results (2025-12-17)
- Verdict: VERIFIED (5/5 benchmarks passed)
- Attestation:
13cf71841710554f3dfa6ddbaa4cb372006efdc167e44876c6f6fa1f3cdc438d
ποΈ Architecture
Cluster Nodes
| Node | Role | OS | Capabilities | Status |
|---|---|---|---|---|
| mac-studio | Orchestrator | macOS ARM64 | Coordination, scheduling | β |
| macbook-air | Researcher | macOS ARM64 | Analysis, documentation | β |
| macbook-pro | Developer | macOS ARM64 | Implementation, testing | β |
| macpro51 | Builder | Linux x86_64 | Docker, compilation, GPU | β |
Core Components
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Agentic System β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β Security Layer (9 servers + hooks + encryption) β
β ββ threat-intel-mcp : IOC feeds, threat scoring β
β ββ security-scanner-mcp : Nuclei vulnerability scanning β
β ββ network-scanner-mcp : ARP discovery, port scanning β
β ββ hids-mcp : Host intrusion detection β
β ββ dos-detector-mcp : DoS attack detection β
β ββ web-vuln-scanner-mcp : OWASP web security testing β
β ββ fraud-detection-mcp : Anomaly & fraud analysis β
β ββ security-auditor-mcp : Policy enforcement & auditing β
β ββ Pre/Post hooks : Injection/credential scanning β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β Context Optimization Layer (97% token reduction) β
β ββ phoenix-cortex-mcp : Intelligent context sidecar β
β ββ context-engine-mcp : Tool-RAG semantic search β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β Core AGI Servers (Model Context Protocol) β
β ββ enhanced-memory-mcp : 4-tier persistent memory β
β ββ agent-runtime-mcp : Task orchestration β
β ββ sequential-thinking : Chain-of-thought reasoning β
β ββ safla-mcp : High-speed embeddings β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β Workflow Engines β
β ββ Temporal : Long-running stateful workflows β
β ββ AutoKitteh : Event-driven automation β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ€
β Storage Layer β
β ββ Qdrant : Vector database β
β ββ SQLite : Structured data β
β ββ Redis : Cache and queues β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β β β
ββββββΌβββββ ββββββΌβββββ ββββββΌβββββ
β Claude β β GPT-4 β β Gemini β
β Reasoningβ β Code β β Vision β
βββββββββββ βββββββββββ βββββββββββ
β β β
ββββββΌβββββββββββββββββββββΌβββββββββββββββββββββΌβββββ
β Distributed Execution β
β mac-studio ββ macbook-air ββ macpro51 β
βββββββββββββββββββββββββββββββββββββββββββββββββββββ
β β β
ββββββΌβββββ ββββββΌβββββ ββββββΌβββββ
β Memory β β Sandbox β βHardware β
β (Qdrant)β β(Apple C)β β(Arduino)β
βββββββββββ βββββββββββ βββββββββββ
Key Technologies
- Apple Container - Native macOS sandboxed execution (1.5s cold start)
- Qdrant - Vector database for semantic memory
- Temporal - Long-running workflow orchestration
- AutoKitteh - Event-driven automation
- LLM Council - Multi-provider consensus decisions
π Repository Structure
agentic-system/
βββ intelligent-agents/prometheus/ # Core agent system
β βββ agents/ # Specialized agents
β βββ benchmarks/ # GAIA-comparable tests
β βββ apple_container.py # Sandbox integration
βββ cluster-deployment/ # Multi-node tools
βββ mcp-servers/ # MCP protocol servers
β βββ enhanced-memory-mcp/ # 4-tier memory + RAG
β βββ agent-runtime-mcp/ # Persistent tasks
β βββ voice-mode/ # TTS/STT
βββ monitoring/ # Prometheus + Grafana
βββ workflows/ # Temporal & AutoKitteh
βββ databases/ # Persistent data
π Documentation
| Document | Description |
|---|---|
| CLAUDE.md | Complete system documentation |
| QUICK_START.md | AGI usage examples |
| GAP_ANALYSIS.md | Feature comparison vs Manus |
| Distributed Execution | Task routing guide |
| Research Paper | Academic documentation |
π Security
- ED25519 SSH key authentication
- Apple Container sandboxed execution
- Network isolation by default
- No hardcoded credentials
- Firewall configured on all nodes
Documentation
- Architecture Overview
- MCP Ecosystem (28+ servers) - Complete catalog of all MCP servers
- Security Architecture - Layered defense documentation
- Services Configuration
- Troubleshooting
MCP Ecosystem
This system is built on 28+ MCP servers organized by function:
| Category | Servers | Highlights |
|---|---|---|
| Context Optimization | 2 | phoenix-cortex (97% reduction), context-engine (Tool-RAG) |
| Core AGI | 4 | enhanced-memory, agent-runtime, agi-mcp, safla-mcp |
| Cluster Coordination | 4 | cluster-execution, node-chat, claude-flow, code-execution |
| Knowledge Acquisition | 3 | research-paper, video-transcript, llm-council |
| Security & Defense | 9 | threat-intel, security-scanner, network-scanner, hids, dos-detector, nuclei, web-vuln-scanner, fraud-detection, security-auditor |
| Creative & Media | 2 | image-gen, voice-agi |
| Development | 5 | ember, file-analyzer, crypto-tools, synthetic-data, claude-code-control |
See docs/MCP_ECOSYSTEM.md for the complete server catalog with installation instructions.
Security MCP Servers (Included in This Repo)
| Server | Description | Key Features |
|---|---|---|
threat-intel-mcp | Threat intelligence aggregation | Multi-feed IOC tracking (abuse.ch, CISA KEV, Feodo); threat scoring; IP/domain/hash lookup |
security-scanner-mcp | Nuclei vulnerability scanning | Single target and cluster-wide scans; embedding-based anomaly detection; scan history |
network-scanner-mcp | Network discovery and monitoring | ARP scanning; port scanning; service fingerprinting; cluster health monitoring; alert daemon |
hids-mcp | Host-based intrusion detection | File integrity monitoring; anomaly detection; host security assessment |
dos-detector-mcp | DoS attack detection | Traffic pattern analysis; attack recognition; mitigation triggers |
nuclei-mcp | Direct Nuclei template interface | Template management; scan orchestration; result analysis |
web-vuln-scanner-mcp | Web application security testing | OWASP coverage; automated scanning; report generation |
fraud-detection-mcp | Fraud and anomaly analysis | Feature engineering (46 features); GNN fraud detection; SHAP explainability; async inference |
security-auditor-mcp | Security policy enforcement | Compliance auditing; policy validation; security reviews |
Security Architecture
The system implements defense-in-depth through three layers:
Layer 1: Hook-Based Runtime Protection (claude-config/hooks/)
pre-tool-use.pyvalidates every tool call before execution: blocks destructive commands, detects SQL/command injection, prevents credential leaks in argumentspost-tool-use.pyscans tool output for accidentally exposed secrets, logs all operations for audit trails
Layer 2: MCP Security Servers (9 servers listed above)
- Active monitoring: network scanning, intrusion detection, DoS detection
- Vulnerability assessment: Nuclei scanning, web application testing
- Intelligence: threat feed aggregation, IOC correlation
- Analysis: fraud detection with ML models, security policy auditing
Layer 3: Encryption and PKI (via claude-code-security)
- AES-256-GCM encryption for data at rest
- X.509 PKI for inter-node authentication
- Token vault for secure credential management
- See the linked repository for encryption, PKI, and token vault capabilities
See docs/SECURITY.md for the full security architecture documentation.
Research Paper
The full research paper documenting this system is available at:
License
MIT License - See LICENSE for details.
Built with Claude Code | Documentation | Benchmarks
