Security
Defense-in-depth controls for prompt safety, sandboxing, leak detection, and network boundaries.
Memory
Durable, searchable memory with identity files that persist behavior and context across sessions.
Routines
Scheduled, heartbeat, and reactive execution models for proactive and event-driven automation.
Jobs
Parallel job orchestration with state transitions, retries, and self-repair for stuck execution.
Skills
Context-activated prompt extensions with scoring, gating, and trust-based tool attenuation.
Sandboxed Tools
Wasm-based tool isolation with explicit capabilities, resource limits, and controlled I/O.