Skip to main content

Repo-native governance kernel for ExoProtocol

Project description

(/)(°,,°)(/)

ExoProtocol

PyPI Python License: MIT

Governance kernel for multi-agent development. Treats AI-agent sessions the way an OS treats processes — with enforceable scope, lifecycle control, audit trails, and crash recovery. Everything lives in your git repo.

Why

When multiple AI agents vibe-code on the same repo, things go wrong silently: scope collisions, forgotten context, ungoverned commits, duplicated work. ExoProtocol gives each agent session a ticket, a scope fence, and a paper trail — without leaving git.

Install

pip install exoprotocol

Quickstart

# 1. One-shot setup (init + compile + adapters + hooks + gitignore)
exo install

# 2. Dispatch a ticket
exo next --owner your-name

# 3. Start a governed session
EXO_ACTOR=agent:claude exo session-start \
  --ticket-id TICKET-001 \
  --vendor anthropic --model claude-code \
  --context-window 200000 \
  --task "implement the feature described in the ticket"

# 4. Finish the session
EXO_ACTOR=agent:claude exo session-finish \
  --summary "implemented feature, added tests" \
  --set-status review

Session start generates a bootstrap prompt with governance rules, scope constraints, sibling awareness, and operational learnings from prior sessions. Session finish runs drift detection (scope compliance, file budget, boundary violations), feature tracing, and writes a closeout memento.

Spec-to-gates traceability

# .exo/requirements.yaml
requirements:
  - id: REQ-AUTH-01
    title: "User authentication"
    acceptance:
      - ACC-AUTH-LOGIN     # User can log in with email/password
      - ACC-AUTH-LOCKOUT   # Account locks after 5 failed attempts
# tests/test_auth.py
# @acc: ACC-AUTH-LOGIN
def test_login_with_valid_credentials():
    ...
exo trace-reqs --check-tests  # verifies every acceptance criteria has a test

Requirements declare acceptance criteria. Tests annotate which criteria they verify with @acc: comments (language-agnostic). trace-reqs --check-tests cross-references the manifest against test annotations — untested criteria and orphan annotations are flagged as errors. The spec becomes the gate.

Agent handoff

# Agent A hands off to Agent B
EXO_ACTOR=agent:claude-opus exo session-handoff \
  --to agent:claude-sonnet --ticket-id TICKET-001 \
  --summary "Built API endpoints" --next-step "Write tests"

# Agent B starts — handoff context auto-injected into bootstrap
EXO_ACTOR=agent:claude-sonnet exo session-start --ticket-id TICKET-001 ...

Claude Code hooks

exo hook-install --all   # session lifecycle + enforcement + git pre-commit

Installs all six hook types:

  • SessionStart/SessionEnd — auto-start/finish governed sessions with bootstrap injection
  • PreToolUse (Bash) — gate git commit/git push on exo check
  • PreToolUse (Write|Edit) — block writes outside ticket scope (real enforcement, not advisory)
  • PostToolUse (Write|Edit) — auto-format Python files + budget tracking with warnings
  • Notification — audit trail logging to .exo/audit/notifications.jsonl
  • Stop — session hygiene warning before agent stops
  • Git pre-commit — runs exo check before every commit

Parallel instances get unique actor IDs via CLAUDE_ENV_FILE, so multiple Claude Code windows can work on different tickets without session clashes. Auto-branch creates exo/<ticket-id> branches on session-start.

Agent adapters

exo adapter-generate                    # all targets
exo adapter-generate --target codex     # OpenAI Codex
exo adapter-generate --target claude    # CLAUDE.md
exo adapter-generate --target ci        # GitHub Actions workflow

Generates governance-aware config for Claude Code (CLAUDE.md), Cursor (.cursorrules), AGENTS.md, OpenAI Codex (codex.md), and CI (.github/workflows/exo-governance.yml). All adapters reflect the current governance state — deny patterns, budgets, checks, lifecycle commands, and active intent provenance with scope boundaries.

SDK integrations

# OpenAI Agents SDK
from exo.integrations.openai_agents import ExoRunHooks
hooks = ExoRunHooks(repo=".", ticket_id="TKT-...", actor="agent:openai")
result = await Runner.run(agent, hooks=hooks)
pip install exoprotocol[openai-agents]  # OpenAI Agents SDK
pip install exoprotocol[claude]         # Claude Code hooks (auto-installed)

What session-start does

When an agent session starts, ExoProtocol:

  1. Compiles governance rules from the repo constitution
  2. Loads the ticket's scope, budget, and constraints
  3. Scans for sibling sessions and warns about scope conflicts
  4. Checks for unmerged work on other branches that overlaps your scope
  5. Injects operational learnings from prior sessions
  6. Produces a bootstrap prompt that the agent sees first

The agent works within these boundaries. At session-finish, drift detection scores how well the work stayed in scope.

Architecture

CLI / MCP  →  Orchestrator  →  Stdlib  →  Control  →  Kernel (frozen, 10 functions)

The kernel is intentionally small and frozen — governance compilation, ticket locks, audit log, rule checks. Everything else (session lifecycle, drift detection, feature tracing, dispatch, GC) lives in the stdlib. See docs/architecture.md.

MCP server

pip install exoprotocol[mcp]
exo-mcp
{
  "mcpServers": {
    "exo": {
      "command": "exo-mcp",
      "args": [],
      "env": { "EXO_ACTOR": "agent:claude" }
    }
  }
}

Works with Claude Code, Cursor, and any MCP-compatible client. Every CLI command has a matching MCP tool.

Documentation

Guides (for humans)

Agent Reference

Shared

License

MIT License. See LICENSE.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

exoprotocol-0.2.1.tar.gz (377.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

exoprotocol-0.2.1-py3-none-any.whl (259.9 kB view details)

Uploaded Python 3

File details

Details for the file exoprotocol-0.2.1.tar.gz.

File metadata

  • Download URL: exoprotocol-0.2.1.tar.gz
  • Upload date:
  • Size: 377.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for exoprotocol-0.2.1.tar.gz
Algorithm Hash digest
SHA256 a4d6d1fc4f71d2b6955566f58b5d24afea9f0d20a495ea75159a5139c025ce97
MD5 a9be4102fcca7181629cbba38651d7c1
BLAKE2b-256 81e85ed0ba7999852ee15971da8a91088ab82a801d1599f161e3906f52aa0cfd

See more details on using hashes here.

File details

Details for the file exoprotocol-0.2.1-py3-none-any.whl.

File metadata

  • Download URL: exoprotocol-0.2.1-py3-none-any.whl
  • Upload date:
  • Size: 259.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for exoprotocol-0.2.1-py3-none-any.whl
Algorithm Hash digest
SHA256 dddc66b2b5a4a0c6b5772aa218c6e9c6dadd36f6ceddeedcd143bc29ff761f88
MD5 8eaecd539733af6c2a74673a6b58b8fa
BLAKE2b-256 1c639660dc357f4cddaa960d0510f6a3c7c0106786a7cc98f72da0bef27c15a0

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page