Repo-native governance kernel for ExoProtocol
Project description
(/)(°,,°)(/)
ExoProtocol
Governance kernel for multi-agent development. Treats AI-agent sessions the way an OS treats processes — with enforceable scope, lifecycle control, audit trails, and crash recovery. Everything lives in your git repo.
Why
When multiple AI agents vibe-code on the same repo, things go wrong silently: scope collisions, forgotten context, ungoverned commits, duplicated work. ExoProtocol gives each agent session a ticket, a scope fence, and a paper trail — without leaving git.
Install
pip install exoprotocol
Quickstart
# 1. One-shot setup (init + compile + adapters + hooks + gitignore)
exo install
# 2. Dispatch a ticket
exo next --owner your-name
# 3. Start a governed session
EXO_ACTOR=agent:claude exo session-start \
--ticket-id TICKET-001 \
--vendor anthropic --model claude-code \
--context-window 200000 \
--task "implement the feature described in the ticket"
# 4. Finish the session
EXO_ACTOR=agent:claude exo session-finish \
--summary "implemented feature, added tests" \
--set-status review
Session start generates a bootstrap prompt with governance rules, scope constraints, sibling awareness, and operational learnings from prior sessions. Session finish runs drift detection (scope compliance, file budget, boundary violations), feature tracing, and writes a closeout memento.
Spec-to-gates traceability
# .exo/requirements.yaml
requirements:
- id: REQ-AUTH-01
title: "User authentication"
acceptance:
- ACC-AUTH-LOGIN # User can log in with email/password
- ACC-AUTH-LOCKOUT # Account locks after 5 failed attempts
# tests/test_auth.py
# @acc: ACC-AUTH-LOGIN
def test_login_with_valid_credentials():
...
exo trace-reqs --check-tests # verifies every acceptance criteria has a test
Requirements declare acceptance criteria. Tests annotate which criteria they verify with @acc: comments (language-agnostic). trace-reqs --check-tests cross-references the manifest against test annotations — untested criteria and orphan annotations are flagged as errors. The spec becomes the gate.
Agent handoff
# Agent A hands off to Agent B
EXO_ACTOR=agent:claude-opus exo session-handoff \
--to agent:claude-sonnet --ticket-id TICKET-001 \
--summary "Built API endpoints" --next-step "Write tests"
# Agent B starts — handoff context auto-injected into bootstrap
EXO_ACTOR=agent:claude-sonnet exo session-start --ticket-id TICKET-001 ...
Claude Code hooks
exo hook-install --all # session lifecycle + enforcement + git pre-commit
Installs all six hook types:
- SessionStart/SessionEnd — auto-start/finish governed sessions with bootstrap injection
- PreToolUse (Bash) — gate
git commit/git pushonexo check - PreToolUse (Write|Edit) — block writes outside ticket scope (real enforcement, not advisory)
- PostToolUse (Write|Edit) — auto-format Python files + budget tracking with warnings
- Notification — audit trail logging to
.exo/audit/notifications.jsonl - Stop — session hygiene warning before agent stops
- Git pre-commit — runs
exo checkbefore every commit
Parallel instances get unique actor IDs via CLAUDE_ENV_FILE, so multiple Claude Code windows can work on different tickets without session clashes. Auto-branch creates exo/<ticket-id> branches on session-start.
Agent adapters
exo adapter-generate # all targets
exo adapter-generate --target codex # OpenAI Codex
exo adapter-generate --target claude # CLAUDE.md
exo adapter-generate --target ci # GitHub Actions workflow
Generates governance-aware config for Claude Code (CLAUDE.md), Cursor (.cursorrules), AGENTS.md, OpenAI Codex (codex.md), and CI (.github/workflows/exo-governance.yml). All adapters reflect the current governance state — deny patterns, budgets, checks, lifecycle commands, and active intent provenance with scope boundaries.
SDK integrations
# OpenAI Agents SDK
from exo.integrations.openai_agents import ExoRunHooks
hooks = ExoRunHooks(repo=".", ticket_id="TKT-...", actor="agent:openai")
result = await Runner.run(agent, hooks=hooks)
pip install exoprotocol[openai-agents] # OpenAI Agents SDK
pip install exoprotocol[claude] # Claude Code hooks (auto-installed)
What session-start does
When an agent session starts, ExoProtocol:
- Compiles governance rules from the repo constitution
- Loads the ticket's scope, budget, and constraints
- Scans for sibling sessions and warns about scope conflicts
- Checks for unmerged work on other branches that overlaps your scope
- Injects operational learnings from prior sessions
- Produces a bootstrap prompt that the agent sees first
The agent works within these boundaries. At session-finish, drift detection scores how well the work stayed in scope.
Architecture
CLI / MCP → Orchestrator → Stdlib → Control → Kernel (frozen, 10 functions)
The kernel is intentionally small and frozen — governance compilation, ticket locks, audit log, rule checks. Everything else (session lifecycle, drift detection, feature tracing, dispatch, GC) lives in the stdlib. See docs/architecture.md.
MCP server
pip install exoprotocol[mcp]
exo-mcp
{
"mcpServers": {
"exo": {
"command": "exo-mcp",
"args": [],
"env": { "EXO_ACTOR": "agent:claude" }
}
}
}
Works with Claude Code, Cursor, and any MCP-compatible client. Every CLI command has a matching MCP tool.
Documentation
Guides (for humans)
- Getting Started — install, init, connect your agents
- Workflow Patterns — solo, multi-agent, code review, CI
- FAQ — common questions and quick fixes
Agent Reference
- Agent Quickstart — zero to first governed session
- Session Lifecycle — state machine, bootstrap anatomy, handoff, audit mode
- Governance Rules — rule types, budgets, scope, traceability
- Config Reference — complete
.exo/config.yamlschema - Error Reference — every ExoError code with resolution steps
- MCP Tool Reference — all 70 MCP tool signatures
Shared
- CLI Reference — all commands at a glance
- Architecture — layer model, key concepts, module map
- exoprotocol.dev — project site
License
MIT License. See LICENSE.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file exoprotocol-0.2.3.tar.gz.
File metadata
- Download URL: exoprotocol-0.2.3.tar.gz
- Upload date:
- Size: 379.1 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.5
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
e7c5f069f6c3bcfc86cc53e9a26013d870a324424a6d4bf5bb3f0b5710f48189
|
|
| MD5 |
96c3459a1b199563d0dba950c6570770
|
|
| BLAKE2b-256 |
570be735598f9e3bc9ef7bc99e3328af73e0ca33bda2ef76d03cef39ee68b569
|
File details
Details for the file exoprotocol-0.2.3-py3-none-any.whl.
File metadata
- Download URL: exoprotocol-0.2.3-py3-none-any.whl
- Upload date:
- Size: 260.6 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.5
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
506044536ce8176a6e86921a92fc789f94c524b29e612eeb270dec99c6ab1195
|
|
| MD5 |
3d0d817924c7400d4007389d37693286
|
|
| BLAKE2b-256 |
82216eb8d33e3c76df5c074cf0d29017a1b2bd239d679fa8c1d43e53736f39eb
|