covenant
Health Uyari
- License — License: Apache-2.0
- Description — Repository has a description
- Active repo — Last push 0 days ago
- Low visibility — Only 5 GitHub stars
Code Basarisiz
- rm -rf — Recursive force deletion command in .github/workflows/gvisor-live.yml
Permissions Gecti
- Permissions — No dangerous permissions requested
Bu listing icin henuz AI raporu yok.
A capability-based operating layer for long-running autonomous software engineering agents. Rust daemon, signed capabilities, append-only audit, drift-aware memory, fail-closed sandbox dispatch, commit-scoped provenance.
Covenant
A capability-based operating layer for long-running autonomous software engineering agents.
Covenant sits below agent applications and above the host operating system. It owns the state, authority, and accountability concerns that recur across agent frameworks — scoped capabilities, durable memory, runtime isolation, append-only audit, and commit-scoped provenance — so individual frameworks can stop reinventing them.
Status. Local control plane is real and live-tested (19 Rust crates, ~62k lines, 848 tests including 107 live boundary tests). Production-grade sandboxing for hostile agent code, networked multi-peer operation, and on-chain settlement are roadmap. See BUILT.md for the explicit honesty boundary.
- Web: opencovenant.org
- Docs: docs.opencovenant.org
- Paper:
paper/main.pdf· DOI: 10.5281/zenodo.20134416
Quick start
Build the daemon and CLI, register the sample agent, and dispatch an intent:
git clone https://github.com/open-covenant/covenant && cd covenant
cd agent-os && cargo build --workspace --exclude covenant-settlement-program
# Register the example agent (daemon loads $COVENANT_HOME/agents/ at startup)
mkdir -p ~/.covenant/agents
cp -R ../examples/hello-agent ~/.covenant/agents/hello
# In one terminal — start the daemon
./target/debug/covenantd
# In another — dispatch an intent
./target/debug/covenant intent "say hello"
The intent is routed by covenantd, dispatched against a scoped capability, and recorded as an IntentDispatched audit row with a hash-chained sidecar entry. See examples/hello-agent for the full walkthrough and docs/demo.md for a transcript of the primitives in action.
Why Covenant
Software agents are moving from interactive assistance toward long-running engineering work. That shift changes the infrastructure problem. Agents need durable context, explicit authority, reliable tool access, recovery after interruption, and a record of what happened.
Conventional developer environments assume a human operator is present at every step. Blockchain systems assume verifiable state transitions, explicit authority, and durable coordination across independent actors. Covenant brings those assumptions into agent infrastructure:
- Governance: intents, manifests, scoped permissions, review gates, and policy-aware dispatch.
- Continuity: persistent memory, resumable task state, repair workflows, and structured handoff.
- Accountability: append-only audit logs, integrity reports, signed actions, and commit-scoped provenance.
- Interoperability: native tools, MCP integration, A2A messaging, local gateway APIs, and protocol adapters.
- Execution: daemon-mediated runtime dispatch with timeout enforcement and sandbox-aware agent manifests.
- Settlement: local receipts and protocol scaffolding for accountable resource use and agent coordination economics.
Architecture
The system center is covenantd, a Rust daemon that owns local state and mediates privileged operations through IPC, an HTTP gateway, signed capabilities, audit logs, memory stores, and runtime dispatch.
| # | Primitive | Role |
|---|---|---|
| 1 | Intent | Normalized request shapes for CLI, IPC, HTTP, routing, and daemon dispatch. |
| 2 | Runtime | Agent execution with timeout enforcement, manifest contracts, trusted-local subprocesses, and opt-in Linux gVisor runner support. |
| 3 | Memory | SQLite-backed working, episodic, and long-term records with embedding hooks, ignore rules, drift reports, repair, and bounded compaction. |
| 4 | Identity | Local ed25519 identity, peer registry, operator tokens, token rotation, and peer revocation. |
| 5 | Permissions | Signed capabilities with known-scope validation, dispatch-time enforcement, expiry, and revocation tombstones. |
| 6 | Comms | IPC frames, local HTTP gateway, MCP adapter, and A2A mailbox primitives. |
| 7 | Compositor | Next.js web console (agent-os/covenant-web) and public landing/docs surface; richer TUI deferred to Phase 4. |
| 8 | Settlement | Local resource receipts and protocol scaffolding for agent coordination economics. |
Audit underlies Identity, Permissions, and Settlement — append-only JSONL events, local hash-chain integrity reports, retention controls, signed actions, and audit-root attestations. The primary implementation lives in agent-os/, the Rust workspace containing the daemon, CLI, protocol crates, runtime, memory, permissions, peer authentication, audit, MCP and A2A adapters, budget ledger, and settlement components. The surrounding monorepo contains public documentation, web surfaces, circuits, SDK packages, and supporting services.
See docs/audit-integrity.md, docs/capabilities.md, and agent-os/README.md for implementation details and validation evidence.
Capabilities
Covenant includes:
- Rust daemon and CLI for local agent orchestration.
- IPC and local HTTP gateway surfaces.
- Signed capability lifecycle for implemented namespaces, including grant-time validation, expiry, revocation, and dispatch-time scope enforcement.
- Peer authentication, operator token rotation, peer revocation, and peer-scoped A2A checks.
- Append-only audit log with structured event types, bounded reads, retention purge, and local hash-chain verification.
- SQLite-backed project memory across working, episodic, and long-term tiers.
- MCP adapter, native tool integration, and A2A mailbox primitives.
- Budget ledger primitives with daemon-backed pause checkpoint storage for budget exhaustion, shutdown drains, and single-use resume handoff.
- Local settlement receipts for resource accounting.
- Commit-scoped provenance envelopes that bind task records, changed Git blobs, transition events, and validation evidence.
- Unsigned or locally signed audit-root attestations for local integrity reports.
- Opt-in live tests for daemon, CLI, runtime, and selected backend boundaries.
- Source-built local installer for the daemon and CLI with a relative-path install manifest.
- CI coverage for Rust, documentation, workflow linting, live coverage matrix validation, provenance verification, dependency audits, and CodeQL.
Validation
Run the scripts-only gate when the change does not need Rust tooling:
bash agent-os/scripts/validate.sh --scripts
Run the fast local gate from the repository root:
bash agent-os/scripts/validate.sh --quick
Run the full Rust validation gate:
bash agent-os/scripts/validate.sh
Verify committed provenance envelopes:
node agent-os/scripts/provenance.mjs verify-all
Build the public documentation surface:
pnpm --dir landing install --frozen-lockfile --ignore-workspace
pnpm --dir landing build
Run live boundary tests when host prerequisites are available:
cd agent-os
cargo test --workspace --exclude covenant-settlement-program -- --ignored live_
Inspect the live coverage inventory:
bash agent-os/scripts/test-stats.sh
Research Direction
Covenant advances open infrastructure for:
- governed autonomous software maintenance;
- verifiable agent actions and commit-scoped provenance;
- capability-scoped delegation across local and remote agents;
- durable project memory for long-running work;
- resumable task ownership across interruptions;
- policy-aware tool use and sandboxed execution;
- audit-root attestations, public provenance, and agent coordination economics.
Citing
If you use Covenant in academic work or reference the design in a paper, please cite the whitepaper:
Wasque, A. (2026). Covenant: A Capability-Based Operating Layer for Autonomous Software Engineering Agents. Zenodo. https://doi.org/10.5281/zenodo.20134416
@misc{wasque2026covenant,
author = {Wasque, Achille},
title = {Covenant: A Capability-Based Operating Layer for Autonomous Software Engineering Agents},
year = {2026},
publisher = {Zenodo},
doi = {10.5281/zenodo.20134416},
url = {https://doi.org/10.5281/zenodo.20134416}
}
A copy of the PDF lives at opencovenant.org/paper.pdf; the LaTeX source is under paper/arxiv/.
Contributing
Covenant is systems infrastructure with security-sensitive boundaries. Contributions should include a validation plan, tests for changed behavior, and a clear statement of operational impact.
Start with CONTRIBUTING.md and ROADMAP.md. Changes touching identity, permissions, audit, runtime isolation, settlement, provenance, release automation, or CI should receive especially close review.
Security
Follow SECURITY.md for responsible disclosure. The runtime isolation boundary is tracked in docs/runtime-sandbox-security.md. Do not open public issues for vulnerabilities.
License
Apache-2.0. See LICENSE.
Yorumlar (0)
Yorum birakmak icin giris yap.
Yorum birakSonuc bulunamadi