Skip to content

AgenticOS — Deterministic AI Agent Orchestration

Open Source · Security Automation Framework · December 2025

For Hiring Managers — Security Automation / DevSecOps

What I Built: A deterministic, auditable AI agent operating layer that orchestrates multiple AI providers (Claude, Codex, Gemini) with explainable routing, persistent memory, and forensic-grade logging.

Technical Stack: Python 3.10+ · Claude API · OpenAI Codex · Google Gemini · YAML Configuration · JSON Logging · Shell Scripting

Security Engineering Skills Demonstrated:

  • Deterministic routing with keyword and AI-based classification
  • Audit-grade structured logging for every execution
  • Multi-provider orchestration with unified CLI
  • Memory persistence and session continuity
  • Project isolation for multi-tenant workflows

Why This Matters: If I can build a secure, auditable orchestration layer for AI agents, I can build automation pipelines for your security operations.

View on GitHub


The Problem

AI coding assistants are powerful but unpredictable. Security teams need:

  • Determinism: Same inputs produce same behavior
  • Auditability: Every decision logged and explainable
  • Control: No hidden behaviors or silent mutations
  • Multi-provider support: Use the right AI for each task

Existing tools lack the governance layer needed for regulated environments and security workflows.


What I Built

Unified CLI (aos)

A single command interface that wraps all AgenticOS functionality:

aos                              # List profiles & workflows
aos q "What is XSS?"             # Quick question (clean output)
aos d "Fix the auth bug"         # Development task
aos auto "Write a security policy"  # Auto-route to best profile
aos -p myproject d "Add logging"    # Work on specific project

Core Architecture

flowchart LR
    subgraph CORE[AGENTICOS CORE]
        direction LR
        subgraph R[ROUTING]
            R1[Keyword Rules]
            R2[AI Classification]
            R3[Precedence Order]
            R4[Dry-run Mode]
        end
        subgraph E[EXECUTION]
            E1[Profile-based]
            E2[Provider Agnostic]
            E3[Timeout Control]
            E4[Structured Output]
        end
        subgraph P[PERSISTENCE]
            P1[Session Memory]
            P2[JSON Logs]
            P3[Delta Tracking]
            P4[Project Isolation]
        end
    end

    style CORE fill:#f8fafc,stroke:#334155,stroke-width:2px
    style R fill:#e8f4ea,stroke:#2e7d32,stroke-width:2px
    style E fill:#e0f2fe,stroke:#0284c7,stroke-width:2px
    style P fill:#fef3c7,stroke:#d97706,stroke-width:2px

Script Breakdown

Script Lines Purpose
scripts/agent 2,721 Core execution engine with output normalization
scripts/router 1,332 Routing with auto, keyword, and AI classification
scripts/doctor 1,046 72 health checks with auto-fix capability
scripts/aos 948 Unified CLI wrapper with project management
scripts/memory 314 Memory management and session continuity

Provider Integration

Provider Profiles Use Case
Claude grc, research Compliance writing, deep analysis
Codex dev, ops Code generation, debugging
Gemini quick Fast questions, brainstorming
Cursor-Agent refactor Multi-file refactoring, complex edits

Key Features

1. Deterministic Auto-Routing

Route prompts to the optimal profile using keyword rules or AI classification:

# Keyword-based (instant)
aos auto "Fix the SQL injection vulnerability"
# → Routes to 'dev' profile (matches: fix, vulnerability)

# AI-powered (smarter)
aos auto --smart "Help me understand NIST 800-53 controls"
# → Routes to 'grc' profile (AI classification)

2. Explainable Decisions

Every routing decision is logged with full reasoning:

{
  "timestamp": "2025-12-23T14:32:07Z",
  "action": "auto_route",
  "query": "Fix the authentication bug",
  "tokens": ["fix", "the", "authentication", "bug"],
  "matched_rule": "dev_fix",
  "target": {"type": "profile", "name": "dev"},
  "reason": "Rule matched: fix + bug keywords"
}

3. Project Isolation

Manage multiple projects with isolated configurations:

aos projects                     # List registered projects
aos -p portfolio d "Add page"    # Work on portfolio project
aos -p giap auto "Fix auth"      # Work on GIAP project

4. Health Validation

72 automated checks with self-repair capability:

aos doctor              # Run all checks
aos doctor --fix        # Auto-repair common issues
aos doctor --strict     # Treat warnings as failures

Checks include: - YAML syntax validation - Provider CLI availability - Directory permissions - Log schema conformance - Memory file integrity

5. Structured Output Modes

Control output format for different use cases:

Mode Output
--print clean Just the answer, no headers
--print summary 3-bullet executive summary
--print norm Structured sections (Plan, Code, etc.)
--print raw Raw provider output

Security Engineering Highlights

Audit-Grade Logging

Every execution produces machine-readable JSON logs:

{
  "run_id": "7c956f40-ada8-456c-8fbb-54c22de65b55",
  "profile": "dev",
  "provider": "codex",
  "timestamp_start": "2025-12-23T14:32:07Z",
  "timestamp_end": "2025-12-23T14:32:45Z",
  "exit_code": 0,
  "tags": ["profile:dev", "provider:codex", "memory:on"],
  "sections": {
    "plan": ["..."],
    "code_changes": ["..."],
    "verification": ["..."]
  }
}

No Hidden Behaviors

AgenticOS principles:

  • No inference: Routing is explicit via rules or flags
  • No magic: Every decision has a traceable reason
  • No silent mutations: Prompts are never modified without logging
  • No autonomous actions: Human triggers all executions

Memory Persistence

Session state persists across invocations:

.agents/memory/
├── profiles/          # Per-profile memory files
├── sessions/          # Daily session logs
├── summary.md         # Rolling summary
└── last-session.md    # Quick resume reference

Results & Metrics

Metric Value
Total Python LOC 6,361
Health checks 72
Supported providers 4 (Claude, Codex, Gemini, Cursor-Agent)
Profiles 6 (dev, grc, research, ops, quick, refactor)
Output modes 7
Auto-routing rules 8 default + custom
Logged executions 180+

Configuration Example

Profile Definition (agents.yaml)

profiles:
  dev:
    provider: codex
    description: Development assistant for coding tasks
    prompt_file: prompts/dev.md
    timeout: 120

  grc:
    provider: claude
    description: GRC and compliance writing
    prompt_file: prompts/grc.md
    timeout: 300

Auto-Routing Rules (router_auto_rules.json)

{
  "rules": [
    {
      "id": "security_policy",
      "match_any": ["policy", "compliance", "audit", "nist"],
      "route": {"type": "profile", "target": "grc"}
    },
    {
      "id": "code_fix",
      "match_any": ["fix", "bug", "error", "implement"],
      "route": {"type": "profile", "target": "dev"}
    }
  ]
}

Technical Skills Demonstrated

Security Automation

  • Deterministic workflow orchestration
  • Audit-grade logging pipelines
  • Multi-provider API integration
  • Session persistence and replay

Python Engineering

  • CLI framework design (argparse)
  • YAML/JSON configuration management
  • Subprocess orchestration with timeout handling
  • Regex-based output normalization

DevSecOps

  • Self-healing health checks
  • Project isolation patterns
  • Provider-agnostic abstractions
  • CI/CD-ready command structure

Use Cases

GRC Workflows

aos auto --smart "Draft a password policy for SOC 2"
aos -p giap g "Review control implementation evidence"

Security Development

aos d "Add input validation to prevent XSS"
aos auto "Fix the SQL injection in user_query()"

Quick Research

aos q "What are the OWASP Top 10 for 2025?"
aos q "Explain the difference between SAST and DAST"

Project Status

Component Status Notes
Core CLI (aos) ✅ Complete Unified interface operational
Execution Engine (agent) ✅ Complete 2,721 lines, all providers working
Routing Engine (router) ✅ Complete 8 auto-routing rules active
Health Validation (doctor) ✅ Complete 72 checks with auto-fix
Memory Persistence ✅ Complete Session continuity working
Documentation ✅ Complete User guide + 13 reference docs
GitHub Release ✅ Published MIT License
Install Script ✅ Complete One-command setup

Status: Production-ready for personal/team use. Active development for additional workflows.


What This Proves

  1. I can build secure automation — Not just use AI tools, but orchestrate them safely
  2. I understand audit requirements — Every decision logged, every action traceable
  3. I design for governance — Deterministic, explainable, no hidden behaviors
  4. I build production-ready tools — 72 health checks, self-repair, multi-project support
  5. I integrate multiple systems — Four AI providers, unified interface, 6 specialized profiles


GitHub Repository Connect on LinkedIn Contact Me