Skip to main content

Repo-native governance kernel for ExoProtocol

Project description

(/)(°,,°)(/)

ExoProtocol

PyPI Python License: MIT

Governance kernel for multi-agent development. Treats AI-agent sessions the way an OS treats processes — with enforceable scope, lifecycle control, audit trails, and crash recovery. Everything lives in your git repo.

Why

When multiple AI agents vibe-code on the same repo, things go wrong silently: scope collisions, forgotten context, ungoverned commits, duplicated work. ExoProtocol gives each agent session a ticket, a scope fence, and a paper trail — without leaving git.

Install

pip install exoprotocol

Quickstart

# 1. One-shot setup (init + compile + adapters + hooks + gitignore)
exo install

# 2. Dispatch a ticket
exo next --owner your-name

# 3. Start a governed session
EXO_ACTOR=agent:claude exo session-start \
  --ticket-id TICKET-001 \
  --vendor anthropic --model claude-code \
  --context-window 200000 \
  --task "implement the feature described in the ticket"

# 4. Finish the session
EXO_ACTOR=agent:claude exo session-finish \
  --summary "implemented feature, added tests" \
  --set-status review

Session start generates a bootstrap prompt with governance rules, scope constraints, sibling awareness, and operational learnings from prior sessions. Session finish runs drift detection (scope compliance, file budget, boundary violations), feature tracing, and writes a closeout memento.

Spec-to-gates traceability

# .exo/requirements.yaml
requirements:
  - id: REQ-AUTH-01
    title: "User authentication"
    acceptance:
      - ACC-AUTH-LOGIN     # User can log in with email/password
      - ACC-AUTH-LOCKOUT   # Account locks after 5 failed attempts
# tests/test_auth.py
# @acc: ACC-AUTH-LOGIN
def test_login_with_valid_credentials():
    ...
exo trace-reqs --check-tests  # verifies every acceptance criteria has a test

Requirements declare acceptance criteria. Tests annotate which criteria they verify with @acc: comments (language-agnostic). trace-reqs --check-tests cross-references the manifest against test annotations — untested criteria and orphan annotations are flagged as errors. The spec becomes the gate.

Agent handoff

# Agent A hands off to Agent B
EXO_ACTOR=agent:claude-opus exo session-handoff \
  --to agent:claude-sonnet --ticket-id TICKET-001 \
  --summary "Built API endpoints" --next-step "Write tests"

# Agent B starts — handoff context auto-injected into bootstrap
EXO_ACTOR=agent:claude-sonnet exo session-start --ticket-id TICKET-001 ...

Claude Code hooks

exo hook-install --all   # session lifecycle + enforcement + git pre-commit

Installs all six hook types:

  • SessionStart/SessionEnd — auto-start/finish governed sessions with bootstrap injection
  • PreToolUse (Bash) — gate git commit/git push on exo check
  • PreToolUse (Write|Edit) — block writes outside ticket scope (real enforcement, not advisory)
  • PostToolUse (Write|Edit) — auto-format Python files + budget tracking with warnings
  • Notification — audit trail logging to .exo/audit/notifications.jsonl
  • Stop — session hygiene warning before agent stops
  • Git pre-commit — runs exo check before every commit

Parallel instances get unique actor IDs via CLAUDE_ENV_FILE, so multiple Claude Code windows can work on different tickets without session clashes. Auto-branch creates exo/<ticket-id> branches on session-start.

Agent adapters

exo adapter-generate                    # all targets
exo adapter-generate --target codex     # OpenAI Codex
exo adapter-generate --target claude    # CLAUDE.md
exo adapter-generate --target ci        # GitHub Actions workflow

Generates governance-aware config for Claude Code (CLAUDE.md), Cursor (.cursorrules), AGENTS.md, OpenAI Codex (codex.md), and CI (.github/workflows/exo-governance.yml). All adapters reflect the current governance state — deny patterns, budgets, checks, lifecycle commands, and active intent provenance with scope boundaries.

SDK integrations

# OpenAI Agents SDK
from exo.integrations.openai_agents import ExoRunHooks
hooks = ExoRunHooks(repo=".", ticket_id="TKT-...", actor="agent:openai")
result = await Runner.run(agent, hooks=hooks)
pip install exoprotocol[openai-agents]  # OpenAI Agents SDK
pip install exoprotocol[claude]         # Claude Code hooks (auto-installed)

What session-start does

When an agent session starts, ExoProtocol:

  1. Compiles governance rules from the repo constitution
  2. Loads the ticket's scope, budget, and constraints
  3. Scans for sibling sessions and warns about scope conflicts
  4. Checks for unmerged work on other branches that overlaps your scope
  5. Injects operational learnings from prior sessions
  6. Produces a bootstrap prompt that the agent sees first

The agent works within these boundaries. At session-finish, drift detection scores how well the work stayed in scope.

Architecture

CLI / MCP  →  Orchestrator  →  Stdlib  →  Control  →  Kernel (frozen, 10 functions)

The kernel is intentionally small and frozen — governance compilation, ticket locks, audit log, rule checks. Everything else (session lifecycle, drift detection, feature tracing, dispatch, GC) lives in the stdlib. See docs/architecture.md.

MCP server

pip install exoprotocol[mcp]
exo-mcp
{
  "mcpServers": {
    "exo": {
      "command": "exo-mcp",
      "args": [],
      "env": { "EXO_ACTOR": "agent:claude" }
    }
  }
}

Works with Claude Code, Cursor, and any MCP-compatible client. Every CLI command has a matching MCP tool.

Documentation

Guides (for humans)

Agent Reference

Shared

License

MIT License. See LICENSE.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

exoprotocol-0.2.3.tar.gz (379.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

exoprotocol-0.2.3-py3-none-any.whl (260.6 kB view details)

Uploaded Python 3

File details

Details for the file exoprotocol-0.2.3.tar.gz.

File metadata

  • Download URL: exoprotocol-0.2.3.tar.gz
  • Upload date:
  • Size: 379.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for exoprotocol-0.2.3.tar.gz
Algorithm Hash digest
SHA256 e7c5f069f6c3bcfc86cc53e9a26013d870a324424a6d4bf5bb3f0b5710f48189
MD5 96c3459a1b199563d0dba950c6570770
BLAKE2b-256 570be735598f9e3bc9ef7bc99e3328af73e0ca33bda2ef76d03cef39ee68b569

See more details on using hashes here.

File details

Details for the file exoprotocol-0.2.3-py3-none-any.whl.

File metadata

  • Download URL: exoprotocol-0.2.3-py3-none-any.whl
  • Upload date:
  • Size: 260.6 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for exoprotocol-0.2.3-py3-none-any.whl
Algorithm Hash digest
SHA256 506044536ce8176a6e86921a92fc789f94c524b29e612eeb270dec99c6ab1195
MD5 3d0d817924c7400d4007389d37693286
BLAKE2b-256 82216eb8d33e3c76df5c074cf0d29017a1b2bd239d679fa8c1d43e53736f39eb

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page