Skip to main content

A profile-based personal AI agent for terminal, messengers, and private ALP networks

Project description

alpi

Your private agent network.

alpi starts as the agent in your terminal, then grows with you: profiles for work, cron, home servers, research, and workgroups with other alpis. Each profile owns its memory, keys, model, skills, gateways, approvals, and trust boundary. ALP links them across machines without a registry, central account, or mandatory cloud.

Bring any model. Keep every key. Run one alpi, or a network that stays yours.

Why alpi exists

Most useful agents eventually become infrastructure: they hold memory, touch files, run commands, answer from a phone, wake up on schedules, and coordinate work across machines. alpi treats the profile as the unit of that infrastructure, not the chat.

The design goal is sovereignty:

  • Local-first by default. State lives under ~/.alpi/ or a named profile. Memory, sessions, skills, keys, logs, and peer lists are files on your machine.
  • User-owned models. Fresh profiles ship with no default model. You pick the provider, model, API key, or Ollama server per profile.
  • Security as product shape. Shell commands pass a three-tier approval system. Dangerous commands are blocked with no override. Web and email content is treated as hostile data. Skills and MCPs are scanned before install.
  • Operational UX. One setup wizard, a live doctor, a single per-profile alpi service orchestrator (gateway + scheduler + ALP listener on one asyncio loop), merged logs, and cleanup.
  • Private coordination. ALP.1 links local profiles, ALP.2 links machines over Noise_XK, and ALP.3 adds shared workgroups. Peers are pinned by Ed25519 identity and governed by fail-closed capabilities. No discovery service, no shared account, no central broker.
  • Honest provider boundaries. alpi does not reverse-engineer ChatGPT Plus, Claude Pro, Claude Code, or other first-party subscription clients. If a vendor publishes an official third-party OAuth flow, alpi can adopt it. Until then, users pay per-token API access through their own keys.

What ships today

The current release ships the full local-to-network shape:

  • Textual TUI with streaming replies, slash commands, live tool cards, interrupt, session resume, model switching, and cost/token display.
  • Telegram, IMAP, and Gmail gateways hosted by the unified per-profile service.
  • Inline-learning memory: USER.md, MEMORY.md, and AGENT.md.
  • Live skills under ~/.alpi/skills/<category>/<name>/, scanner-gated and auto-injected into the system prompt.
  • Multi-provider LLM support through LiteLLM, plus first-class Ollama.
  • Read-only research(brief, depth) sub-agent with quick, normal, and deep tiers.
  • Write-capable delegate sub-agent for focused file/web/terminal tasks.
  • Cron + one-shot scheduler hosted by the unified service.
  • MCP client for user-configured local MCP servers.
  • ALP.1: intra-machine agent-to-agent links over Unix sockets.
  • ALP.2: inter-machine links over Noise_XK TCP, with per-peer budget and rate-limit enforcement.
  • ALP.3: hub-anchored shared workgroups for multiple alpis and optional human participants.
  • alpi doctor, alpi logs, one launchd / systemd unit per profile, backup-friendly file layout, and security audit logs.

Quickstart

uv tool install alpi-agent
alpi setup
alpi
alpi doctor

During setup, pick a model, paste the relevant key, and pin a workspace. For local-only inference, install Ollama first and add it in alpi setup -> Model.

The browser tool downloads Chromium (~200 MB) on first use, cached at ~/.cache/ms-playwright/. No manual step.

Common commands:

alpi                         # interactive TUI
alpi -c                      # resume last session
alpi -p work                 # use named profile
alpi chat --once "status?"   # one-shot stdout turn

alpi setup                   # model, gateways, MCPs, sandbox, service
alpi doctor                  # live health checks
alpi update                  # check PyPI and upgrade alpi-agent
alpi logs                    # merged profile logs

alpi profile list
alpi profile create work
alpi profile remove work

alpi service start|stop|restart|status   # unified per-profile orchestrator
alpi schedule run-once|fire <job-id>     # operational scheduler verbs

alpi peers key
alpi peers list
alpi peers add <id> <pubkey>
alpi peers ping <id>

alpi workgroup list
alpi workgroup create <name> --member <peer-id>
alpi workgroup join <hub-id> <wg_id>

For the first-day walkthrough, see QUICKSTART.md.

Core concepts

Profiles are the isolation primitive. A profile is one directory, one identity, one model choice, one memory, one skill set, one gateway configuration, one schedule surface, and one ALP peer list. The default profile lives at ~/.alpi/; named profiles live under ~/.alpi/profiles/<name>/.

Memory is plain Markdown. USER.md captures facts about the user, MEMORY.md captures environment quirks and durable operational facts, and AGENT.md shapes how alpi should respond. Memory is updated inline during conversations; there is no post-session reflection loop.

Skills are reusable recipes with a strict directory contract. They can include instructions, scripts, references, assets, secrets, and state. Mutations go through validation and a security scanner; secrets live in either .env or a per-skill secrets/ directory.

Workspace is the default root for relative paths, not a fake security wall. File tools and terminal can use absolute paths except for a sensitive-path denylist. Real workspace-only isolation is the opt-in OS sandbox.

ALP is the Alpi Link Protocol. Each profile owns an Ed25519 keypair. Peers pin pubkeys out of band and grant explicit capabilities such as link.ping, link.ask, and workgroup.post. ALP.1 handles same-machine profiles over Unix sockets. ALP.2 handles inter-machine links with Noise_XK over TCP plus budgets and rate limits. ALP.3 adds hub-anchored workgroups.

Security posture

alpi assumes the LLM is powerful, fallible, and sitting next to user credentials. The guardrails are local and layered:

  • safe / caution / dangerous command classification;
  • dangerous commands blocked with no config escape hatch;
  • caution commands require interactive approval or configured allowlist;
  • sensitive-path denylist shared across file and terminal posture;
  • SSRF protection on web tools;
  • prompt-injection warnings on fetched web/email content;
  • OSV malware checks before skill or MCP install;
  • optional macOS/Linux OS sandbox per profile;
  • approval.log and agent.log for audit.

See docs/SECURITY.md for the full model.

Documentation

  • QUICKSTART.md — install, model, workspace, first chat, gateways, profiles, ALP, doctor.
  • docs/PROFILES.md — per-profile identity, isolation, state, memory, skills, peers, services.
  • docs/ALP.md — wire protocol, identity, signatures, transports, methods, errors, workgroups.
  • docs/SECURITY.md — threat model, approval gate, sandbox, injection/SSRF/path guards, dependency posture.
  • docs/ARCHITECTURE.md — implementation reference for contributors and agents reading the codebase.
  • docs/CONFIG.md — every YAML key and when it takes effect.
  • docs/SKILLS.md — skill directory contract, frontmatter, secrets, scanner, validation.
  • docs/MODELS.md — model recommendations for tool-heavy agent use.
  • docs/DEPLOYMENTS.md — laptop, home server, multi-profile, multi-device, family/team, enterprise shapes.
  • docs/OPERATIONS.md — services, logs, upgrades, backup/restore, monitoring, disaster recovery.
  • docs/ROADMAP.md — open work and rejected ideas.

Tests

uv run --with pytest pytest -q
uv run --with pytest pytest --llm

License

alpi is source-available from day one. The agent core is published by Satoshi Ltd. under the Business Source Licence 1.1, with a scheduled conversion to Apache 2.0 on 2030-04-23, or four years after each version's first public release, whichever comes first.

Personal use, research, evaluation, and non-production deployments are free. Commercial production deployments, or offering alpi as a hosted, embedded, or managed service, are covered by a Satoshi Ltd. commercial licence.

Commercial enquiries: info@satoshi-ltd.com.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

alpi_agent-0.3.4.tar.gz (453.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

alpi_agent-0.3.4-py3-none-any.whl (406.0 kB view details)

Uploaded Python 3

File details

Details for the file alpi_agent-0.3.4.tar.gz.

File metadata

  • Download URL: alpi_agent-0.3.4.tar.gz
  • Upload date:
  • Size: 453.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for alpi_agent-0.3.4.tar.gz
Algorithm Hash digest
SHA256 275050daf7f16b81630e7a14ae82ab7bb14da8b468959949eddd02b8aa2cfcac
MD5 d055b7695aa9b15a5f6889d1326a520f
BLAKE2b-256 0ef8e4b17e57e17de8e8393201c192c705bedcb83604d5783d65e43febc9682c

See more details on using hashes here.

Provenance

The following attestation bundles were made for alpi_agent-0.3.4.tar.gz:

Publisher: publish.yml on satoshi-ltd/alpi

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file alpi_agent-0.3.4-py3-none-any.whl.

File metadata

  • Download URL: alpi_agent-0.3.4-py3-none-any.whl
  • Upload date:
  • Size: 406.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for alpi_agent-0.3.4-py3-none-any.whl
Algorithm Hash digest
SHA256 63f3784c6855bc5b59c4d782c9328d0bd9ef8c6e7411226a1a7954ad8efb9e91
MD5 d5962c469fb9cf377087414d592d027a
BLAKE2b-256 6c065b886af7f126bc9495d7dc76816905ddbcaaa1499ec4c97913341056ed72

See more details on using hashes here.

Provenance

The following attestation bundles were made for alpi_agent-0.3.4-py3-none-any.whl:

Publisher: publish.yml on satoshi-ltd/alpi

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page