Skip to content

AgentOS & Agent-Computer Interface SSOT (2026)

AgentOS & Agent-Computer Interface SSOT (2026)

Section titled “AgentOS & Agent-Computer Interface SSOT (2026)”

This document is the architecture SSOT for AgentOS work inside Vox: structured tool I/O (ACI), safety guardrails, semantics-aware checkpoint/replay, and semantic filesystem/intent operations layered on vox-search.

It does not replace:

ArtifactRole
contracts/aci/agent-computer-interface.v1.yamlHuman-readable ACI v1 metadata and enum semantics.
contracts/aci/agent-computer-interface.v1.schema.jsonJSON Schema for MCP tool responses carrying a sibling aci block.

Every MCP tool dispatch SHOULD attach aci.mutation_kind:

KindMeaning
read_onlyObservation-only; safe for fast-forward replay without reverting FS.
local_mutationWorkspace-local writes (files, VCS index, etc.).
external_side_effectNetwork, spend, or host-global effects.
unknownConservative default until classified.

See where-things-live.md — AgentOS rows under orchestrator, MCP, CLI shell, and search.

  • MCP tools: normalized JSON validated against ACI schema when OrchestratorConfig::agentos_aci_envelope_enabled is true (default false until clients opt in).
  • Host shell: adapters live under vox-cli commands/runtime/shell/; policy remains PowerShell-first for AST allowlisting unless a structured backend is explicitly selected.
  • Structured shell data in Vox scripts: std.fs / std.process / std.csv|toml|yaml|io are native Rust builtins — see vox-shell-stdlib-ssot-2026.md. They are unrelated to vox_run_shell except via separate AgentOS probes.
  • aci.shell_backend on vox_run_shell: when envelopes attach, the field reflects the MCP argument backend (powershell default; nu / nushellnushell). See vox-orchestrator-mcp/src/aci/envelope.rs.

When the guardrail kernel denies a tool preflight and VoxDb is connected, MCP dispatch appends a research_metrics row with METRIC_TYPE_AGENTOS_GUARDRAIL_DENY (orch.agentos.guardrail_deny), session mcp:<repository_id>, and JSON metadata matching contracts/telemetry/agentos-guardrail-deny.v1.schema.json.

  • Bump x-vox-version / version when breaking the schema; rename files if breaking.
  • Register new contract paths in contracts/index.yaml.
  • Run cargo test -p vox-orchestrator-mcp aci_ after envelope changes.