Houmao runtime package for realm controller and CAO launcher workflows
Project description
Houmao
A framework and CLI toolkit for orchestrating teams of loosely-coupled AI agents.
Current Status
Houmao is under active development. The operator-facing workflow is stabilizing around the houmao-mgr + houmao-server pair, with local_interactive (tmux-backed) as the primary backend. Expect interface changes while the core runtime, gateway, and mailbox contracts continue to harden.
Project Introduction
What It Is
Houmao is a framework and CLI toolkit designed to orchestrate teams of loosely-coupled, CLI-based AI agents.
Name Origin:
Houmao(猴毛, "monkey hair") is inspired by the classic tale Journey to the West. Just as Sun Wukong (The Monkey King) plucks strands of his magical hair to create independent, capable clones of himself, this framework allows you to multiply your capabilities by spinning up numerous autonomous helpers.
Unlike traditional orchestration models where an "agent" is merely an in-process object graph, Houmao treats each agent as a first-class citizen. Every agent is a dedicated, real CLI process (such as codex, claude, or gemini) operating with its own isolated disk state, memory, and native user experience.
The Core Idea (What We Avoid)
The core idea is to avoid a hard-coded orchestration model.
Instead of shipping a fixed “agent graph” runtime (LangGraph / AutoGen-style orchestration), Houmao treats a team as a set of independently runnable CLI agents and provides lightweight primitives to construct, start, and manage them, while keeping “how the team coordinates” flexible and context-driven.
Note Today, the primary construction paradigm is an agent definition directory (brains + roles + optional blueprints). The details of “tool specs vs skills vs roles” are implementation choices that may evolve; the stable goal is maximum flexibility with real, inspectable CLI agent processes.
What The Framework Provides
- Construction: build agent runtimes from tool specs + skills + roles (and optional blueprints).
- Management: start/resume/prompt/stop agents with
houmao-mgr(typically tmux-backed so you can attach and interact). - Team communication: a shared gateway and mailbox plane for groups of agents (built on Houmao's own gateway service).
Why This Is Useful (Benefits)
- Low barrier to composition: assemble new agent teams from human-like instruction packages (skills + roles) and tool profiles, without designing rigid contracts up front.
- Flexible team contracts: coordination choices can change with context because the framework does not impose a fixed graph or flow.
- Transparent per-agent UX: each agent is a real CLI process; you can attach to its tmux window/session to see what it’s doing and interact with its native TUI when needed.
- Full tool surface area: the system operates the same terminal/TUI interface you do, so every native capability remains usable (and you can always take over manually if automation hits an unexpected prompt).
Typical Use Cases
- Parallel specialist agents: run a "coder" agent and a "reviewer" agent side by side on the same repo — each with a different role and tool — so one writes while the other critiques.
- Optimization loops: set up a coder agent that implements changes and a profiler agent that benchmarks them, iterating back and forth without manual handoff.
- Team agent presets: give every team member the same pre-configured agent lineup (same models, skills, and roles) checked into the repo, without sharing anyone's API keys.
- Swap the AI, keep the workflow: change which model or CLI tool an agent uses without touching its role prompt or the task it is working on.
How Agents Join Your Workflow
- Managed launch (recommended): construct from tool specs + skills + roles/blueprints, then start/resume/prompt/stop via
houmao-mgr. - Bring-your-own process: you can also start the underlying CLI tool manually (for example via the generated
launch_helper_pathfrombuild-brain) and still participate in the same “agent team” workflow. First-class adoption/attach of an already-running tmux session is a design goal; today, the management commands assume the session was launched byhoumao-mgr.
Installation
Pixi (recommended):
pixi install
pixi shell
Documentation
The repository docs under docs/ are built with MkDocs and are intended for GitHub Pages publishing.
Build the site locally:
pixi run docs-build
Serve the site locally with live reload:
pixi run docs-serve
Optional Postgres + pgvector environment (for future context hosting):
- Intended future use: manage persistent agent context such as RAG knowledge bases, dialog history, and work artifacts.
- Not required for current core runtime flows.
pixi install -e pg-hosting --manifest-path pyproject.toml
pixi run -e pg-hosting pg-init
Or editable install:
pip install -e .
tmux (required)
The primary backend (local_interactive) runs each agent CLI inside a tmux session. Ensure tmux is installed:
command -v tmux
Usage Guide
CLI Entry Points
| Entrypoint | Purpose | Status |
|---|---|---|
houmao-mgr |
Primary operator CLI — build, launch, prompt, stop, server control | Active |
houmao-server |
Houmao-owned REST server for multi-agent coordination | Active |
houmao-passive-server |
Lightweight passive validation server (no CAO dependency) | Active |
houmao-cli |
Legacy build/start/prompt/stop entrypoint | Deprecated — use houmao-mgr |
houmao-cao-server |
Legacy CAO server launcher | Deprecated — exits with migration guidance |
houmao-mgr --help
houmao-server --help
1. Create / Choose An Agent Definition Directory
An agent definition directory is any folder (name is not hard-coded) that contains brains/, roles/, and optionally blueprints/.
Commands that need agent definitions resolve the directory with this precedence:
- CLI
--agent-def-dir - env
AGENTSYS_AGENT_DEF_DIR - default
<pwd>/.agentsys/agents
This repo includes a complete template you can copy and customize:
mkdir -p .agentsys
cp -a tests/fixtures/agents .agentsys/agents
export AGENTSYS_AGENT_DEF_DIR="$PWD/.agentsys/agents"
Then replace the credential profiles under brains/api-creds/ with your own (keep them uncommitted).
2. Prepare The Agent Definition Directory Contents
Top-level purpose summary:
brains/: reusable building blocks for constructing runtime homes.roles/: role prompt packages that define agent behavior/policy for a session.blueprints/: optional presets that bind a recipe to a role.
Within brains/:
tool-adapters/: per-tool build/launch contract.skills/: reusable capabilities; each agent selects a subset.cli-configs/: secret-free tool config profiles.api-creds/: local-only credential profiles (gitignored).brain-recipes/: secret-free presets for tool + skill subset + profiles.
<agent-def-dir>/
brains/
tool-adapters/ # REQUIRED: one `<tool>.yaml` per supported tool
skills/<skill-name>/SKILL.md # REQUIRED (per recipe): reusable skill packages
cli-configs/<tool>/<profile>/... # REQUIRED (per recipe): secret-free tool config profiles
api-creds/<tool>/<profile>/... # REQUIRED (per recipe): local-only credential profiles (gitignored)
brain-recipes/<tool>/*.yaml # OPTIONAL: secret-free presets (recommended)
roles/<role>/system-prompt.md # REQUIRED: role prompt packages
blueprints/*.yaml # OPTIONAL: recipe+role bindings (recommended)
brains/tool-adapters/ (required)
Tool adapters are the per-tool contract between your source tree and the generated runtime home.
- Purpose: define how
build-brainmaterializes a runnable home for each tool (codex,claude,gemini). - Launch definition: executable, default args, and home selector env var (for example
CODEX_HOME). - Projection rules: where selected
cli-configs/,skills/, and credential files land inside the runtime home. - Credential env policy: which keys from
env/vars.envare allowlisted and how they are injected at launch.
For the full adapter model and end-to-end behavior, see Agents & Brains.
brains/skills/ (required by recipes)
Skills are reusable capability modules (each with a SKILL.md entrypoint) that recipes select from.
- Purpose: define composable behaviors and workflows that can be mixed per agent.
- Agent shaping: each agent selects a subset of available skills, and that selected subset is what makes the resulting agent role-specific in practice.
Skill example (tests/fixtures/agents/brains/skills/openspec-apply-change/SKILL.md):
---
name: openspec-apply-change
description: Implement tasks from an OpenSpec change.
---
Implement tasks from an OpenSpec change.
brains/cli-configs/ (required by recipes, secret-free)
Tool-specific config profiles that the builder projects into the constructed runtime home.
Codex default profile example (tests/fixtures/agents/brains/cli-configs/codex/default/config.toml):
model = "gpt-5.3-codex"
model_reasoning_effort = "high"
personality = "friendly"
Claude default profile example (tests/fixtures/agents/brains/cli-configs/claude/default/settings.json):
{
"skipDangerousModePermissionPrompt": true
}
brains/api-creds/ (required by recipes, local-only)
Credential profiles must stay uncommitted. Use a files/ directory plus an env/vars.env file.
Template layout example:
brains/api-creds/codex/personal-a-default/
files/auth.json
env/vars.env
vars.env example (tests/fixtures/agents/brains/api-creds/codex/personal-a-default/env/vars.env):
# OPENAI_API_KEY=<unset>
# OPENAI_BASE_URL=<unset>
# OPENAI_ORG_ID=<unset>
Keep real credential files (like files/auth.json) local-only and gitignored.
brains/brain-recipes/ (recommended, secret-free)
Recipes are declarative presets selecting tool + skill subset + config profile + credential profile.
Example recipe (tests/fixtures/agents/brains/brain-recipes/codex/gpu-kernel-coder-default.yaml):
schema_version: 1
name: gpu-kernel-coder-default
tool: codex
skills:
- openspec-apply-change
- openspec-verify-change
config_profile: default
credential_profile: personal-a-default
roles/ (required)
Each role is a package directory with a required system-prompt.md (and optional files/).
Role prompt excerpt (tests/fixtures/agents/roles/gpu-kernel-coder/system-prompt.md):
# SYSTEM PROMPT: GPU KERNEL CODER
You are the coding worker in a GPU kernel optimization loop.
You implement bounded CUDA/C++ changes, run validation, and report reproducible results.
blueprints/ (recommended, secret-free)
Blueprints bind a brain recipe to a role without embedding credentials.
Example blueprint (tests/fixtures/agents/blueprints/gpu-kernel-coder.yaml):
schema_version: 1
name: gpu-kernel-coder
brain_recipe: ../brains/brain-recipes/codex/gpu-kernel-coder-default.yaml
role: gpu-kernel-coder
3. Basic Workflow (Local tmux)
Build a brain, start a session, interact, and stop:
# Build a runtime home from a recipe
houmao-mgr build-brain \
--recipe brains/brain-recipes/codex/gpu-kernel-coder-default.yaml \
--runtime-root tmp/agents-runtime
# Start a managed session (output includes agent-identity)
houmao-mgr start-session \
--brain-manifest <manifest-path-from-build-output> \
--role gpu-kernel-coder \
--agent-identity my-agent
# Send a prompt and wait for the structured turn result
houmao-mgr send-prompt \
--agent-identity my-agent \
--prompt "Review the latest commit for security issues"
# Stop and clean up
houmao-mgr stop-session --agent-identity my-agent
The build step outputs JSON with home_path, manifest_path, and launch_helper_path. You can also run the tool manually via launch_helper_path inside your own tmux window; managed lifecycle commands require a session started through houmao-mgr.
4. Blueprint-Driven Preset (Recipe + Role)
houmao-mgr build-brain --blueprint blueprints/gpu-kernel-coder.yaml
houmao-mgr start-session \
--brain-manifest <manifest-path-from-build-output> \
--blueprint blueprints/gpu-kernel-coder.yaml
5. Server-Backed Multi-Agent Coordination
For multi-agent workflows that need a shared gateway and mailbox, use the houmao-server + houmao-mgr pair:
# Start the Houmao server
pixi run houmao-mgr server start --api-base-url http://127.0.0.1:9889
# Launch a managed agent through the server
pixi run houmao-mgr agents launch --agents gpu-kernel-coder --provider codex
See docs/reference/houmao_server_pair.md for the full server-pair workflow.
Developer Guide
Architecture
flowchart TB
subgraph agentdef ["Agent Definition Directory"]
adapter["Tool Adapter<br/>(per-tool build & launch rules)"]
recipe["Brain Recipe<br/>(tool + skills + profiles)"]
role["Role<br/>(system prompt package)"]
blueprint["Blueprint (optional)<br/>(recipe + role binding)"]
end
subgraph buildphase ["① Build Phase"]
builder["Brain Builder"]
artifact["Brain Manifest<br/>& Runtime Home"]
builder --> artifact
end
subgraph runphase ["② Run Phase"]
runtime["Session Driver<br/>(LaunchPlan)"]
subgraph backends ["Backend"]
direction LR
local["local_interactive<br/>(tmux — primary)"]
headless["Headless<br/>(codex · claude · gemini)"]
end
toolcli["Tool CLI Process"]
runtime --> local & headless --> toolcli
end
mgrcli["houmao-mgr<br/>(build · launch · prompt · stop)"]
srvpair["houmao-server<br/>(multi-agent coordination)"]
adapter --> builder
recipe --> builder
blueprint -. "shorthand" .-> builder
artifact --> runtime
role --> runtime
blueprint -. "role ref" .-> runtime
mgrcli --> builder
mgrcli --> runtime
mgrcli -. "server control" .-> srvpair
srvpair -. "gateway + mailbox" .-> runtime
Sequence (UML)
sequenceDiagram
autonumber
actor Op as Operator
participant Mgr as houmao-mgr
participant Bld as BrainBuilder
participant Drv as SessionDriver
participant Tmux as tmux
participant Tool as Tool CLI
Op->>Mgr: build-brain --recipe R
Mgr->>Bld: resolve adapter, project<br/>configs, skills, creds
Bld-->>Mgr: manifest_path, home_path
Op->>Mgr: start-session --brain-manifest M --role R
Mgr->>Drv: build LaunchPlan
Drv->>Tmux: create session/window
Drv->>Tool: exec tool CLI under tmux
Op->>Mgr: send-prompt --agent-identity A
Mgr->>Drv: submit prompt
Drv->>Tool: paste prompt into tmux pane
Tool-->>Drv: (TUI state tracking detects turn completion)
Drv-->>Mgr: structured turn result
Op->>Mgr: stop-session --agent-identity A
Mgr->>Drv: stop / cleanup
Drv->>Tmux: kill session
Development Checks
pixi run format
pixi run lint
pixi run typecheck
pixi run test-runtime
Appendix
Legacy: CAO Integration
Houmao was originally inspired by and built on CAO (CLI Agent Orchestrator). Part of CAO's functionality has been integrated into Houmao's own runtime (the cao_rest and houmao_server_rest backends), but this integration is planned for removal in favor of Houmao's native local_interactive backend and the houmao-server + houmao-mgr pair.
If you encounter legacy paths that reference CAO, prefer the native Houmao equivalents:
| Legacy | Replacement |
|---|---|
houmao-cao-server |
houmao-server (managed via houmao-mgr server start) |
houmao-cli |
houmao-mgr |
cao_rest backend |
local_interactive backend (default) |
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file houmao-0.1.0.tar.gz.
File metadata
- Download URL: houmao-0.1.0.tar.gz
- Upload date:
- Size: 684.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
31d9eb8463cb86c5cfb7ea611f4e74fd27749dfc197d15d684dfbdc17a210e45
|
|
| MD5 |
9355178bddb0cd505f79c41c928b0282
|
|
| BLAKE2b-256 |
865a1e98c46881a744a1d06df77a664be1b4c4386376b97c8f17844b4b5986eb
|
Provenance
The following attestation bundles were made for houmao-0.1.0.tar.gz:
Publisher:
pypi-release.yml on igamenovoer/houmao
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
houmao-0.1.0.tar.gz -
Subject digest:
31d9eb8463cb86c5cfb7ea611f4e74fd27749dfc197d15d684dfbdc17a210e45 - Sigstore transparency entry: 1188326789
- Sigstore integration time:
-
Permalink:
igamenovoer/houmao@cfd1890989d143efb2209fef21ab713f5b320a7d -
Branch / Tag:
refs/tags/v0.1.0 - Owner: https://github.com/igamenovoer
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
pypi-release.yml@cfd1890989d143efb2209fef21ab713f5b320a7d -
Trigger Event:
release
-
Statement type:
File details
Details for the file houmao-0.1.0-py3-none-any.whl.
File metadata
- Download URL: houmao-0.1.0-py3-none-any.whl
- Upload date:
- Size: 837.1 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
63f3416c22b6fb16d90a3b2ccb6e4cf5ab9b2efb601d41d98cd7d832777ea733
|
|
| MD5 |
563a33fb00688f93d4f431392a3bb046
|
|
| BLAKE2b-256 |
b535bfa3572a5fb34cecc3541b41c49d8e5a34cc8a2829c6099d0fe6c971fbeb
|
Provenance
The following attestation bundles were made for houmao-0.1.0-py3-none-any.whl:
Publisher:
pypi-release.yml on igamenovoer/houmao
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
houmao-0.1.0-py3-none-any.whl -
Subject digest:
63f3416c22b6fb16d90a3b2ccb6e4cf5ab9b2efb601d41d98cd7d832777ea733 - Sigstore transparency entry: 1188326791
- Sigstore integration time:
-
Permalink:
igamenovoer/houmao@cfd1890989d143efb2209fef21ab713f5b320a7d -
Branch / Tag:
refs/tags/v0.1.0 - Owner: https://github.com/igamenovoer
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
pypi-release.yml@cfd1890989d143efb2209fef21ab713f5b320a7d -
Trigger Event:
release
-
Statement type: