Autonomous Agents That Build Their Own Infrastructure

What if AI agents didn’t just execute tasks—but designed and constructed the systems they need to complete them? And what if every capability they have—calling APIs, running shell commands, installing software on remote machines—was channeled through secure, auditable pathways that you configure? AgenticOS makes both possible.


The Breakthrough: Agents That Build, Not Just Execute

Traditional AI agents have a fundamental limitation: they can reason about problems, but they depend on humans to build the infrastructure that executes solutions.

An agent might conclude “I need to call this API every hour and alert if response times spike”—but it can’t actually create that monitoring system. A human has to translate that insight into code, deploy it, connect it to alerting services, and maintain it over time.

AgenticOS changes this equation entirely.

In AgenticOS, autonomous agents don’t just recommend what should happen—they directly create the structures that make it happen. When an agent needs an HTTP endpoint to fetch data, it creates an HTTP transition. When it needs to store intermediate results, it creates places. When it needs to route tokens based on conditions, it creates the arcs that define that flow.

Here’s what that looks like in practice:

An AI agent (left) that autonomously created a complete HTTP agentic process (right), deployed it, executed it, and stored results—all within a single session.

This screenshot captures the core achievement: an AI agent that creates executable agentic process infrastructure autonomously. The agent on the left read a task token (“investigate the WordPress blog”), reasoned about what HTTP transitions it needed, created the entire right-side agentic process—places, transitions, arcs, inscriptions—deployed it, executed it via FIRE_ONCE, and stored the results. The Agent Memory place shows 6 tokens: patterns the agent learned and stored for future reuse.

But here’s what makes this genuinely powerful and safe: every agent transition runs with a specific security role that determines exactly which tools it can use. Through HTTP transitions, agents can call any API. Through COMMAND transitions, they can run any shell command on remote machines—even install software. The capability is unlimited. What makes it secure is that everything flows through operator-configured pathways: credential wallets, command allowlists, and per-transition role enforcement.

This is what we call Secure Agentic-Nets.

[table id=1 /]

Traditional AI Agent:

  1. Agent analyzes problem
  2. Agent generates recommendation
  3. Human builds the solution (code, deploy, maintain)
  4. Solution executes
  5. Agent analyzes next problem…

Agent is limited to reasoning. Human is bottleneck for execution. Knowledge dies with the conversation. Cost: $X per problem (forever).

Autonomous Structure-Building Agent:

  1. Agent analyzes problem
  2. Agent CREATES transitions, places, arcs
  3. Human reviews and deploys (or agent self-deploys)
  4. Structure executes continuously
  5. Agent reuses structure for similar problems

Agent builds persistent infrastructure. The role on each agent transition determines the trust level: read-only, design, or full autonomy. Knowledge persists as executable structure. Cost: $X first time, then $0 (structure runs).


Secure Agentic-Nets: Roles for Agent Transitions

This is the most important architectural decision in AgenticOS: every agent transition has a security role that defines what it’s allowed to do.

In a Petri net, a transition is the thing that fires—it reads tokens from input places, does something, and writes tokens to output places. An agent transition is a transition where the “doing something” is handled by an LLM. The agent reads its input tokens, reasons about the task, and uses tools to accomplish it.

The role assigned to that agent transition controls which tools the agent can use. Think of it like user permissions on a server. A read-only user can browse files. A developer can also edit code. An admin can also deploy. Same system, same capabilities—different users get different access.

Four permission flags define what an agent transition is allowed to do:

R (Read)     – Query tokens, inspect places, browse the net
W (Write)    – Create and modify tokens, places, transitions, arcs, inscriptions
X (Execute)  – Deploy, start, stop, and fire transitions
H (HTTP)     – Make external HTTP calls through the credential proxy

You combine them into a short role string and assign it to the agent transition’s inscription:

{
  "id": "t-analyze-code",
  "kind": "agent",
  "action": {
    "type": "agent",
    "nl": "@input.data.instruction",
    "role": "rw"          ← This agent can read and write, nothing else
  }
}

That’s it. Two characters. The agent transition t-analyze-code can read data and create structures, but it cannot deploy anything, cannot fire other transitions, and cannot make HTTP calls.

Here are the most common role combinations:

r---    Observer (8 tools)
        Query tokens, inspect places, browse structures.
        Cannot change anything. Good for monitoring agents.

rw--    Builder (16 tools)
        + Create/delete tokens, design nets, write inscriptions.
        Cannot deploy, execute, or call external APIs.
        Good for designer agents that create agentic processes for human review.

rwx-    Operator (20 tools)
        + Deploy transitions, start/stop them, fire them on-demand.
        Cannot make external HTTP calls.
        Good for deployment and lifecycle management agents.

rwxh    Full Autonomy (21 tools)
        + External HTTP calls through the credential proxy.
        Can do everything. Good for trusted automation agents.

rw-h    Researcher (17 tools)
        Can design agentic processes AND call external APIs for research,
        but cannot deploy or execute anything.
        Good for agents that gather data and propose agentic processes.

The role is enforced at runtime and cannot be escalated. If an agent transition with role rw-- tries to call DEPLOY_TRANSITION, the system blocks it immediately:

Agent (rw--) attempts: DEPLOY_TRANSITION t-fetch-api

System response:
"Tool 'DEPLOY_TRANSITION' is not allowed for your role (rw--).
 Available tools: QUERY_TOKENS, CREATE_TOKEN, DELETE_TOKEN,
 CREATE_NET, CREATE_PLACE, CREATE_TRANSITION, CREATE_ARC,
 SET_INSCRIPTION, EMIT_MEMORY, LIST_ALL_SESSIONS, ...
 Please choose a different tool or call DONE/FAIL."

The tool is never executed. The agent is told what it can do. This is fail-secure by design—an agent transition cannot break out of its assigned role.


The Credential Wallet

Here’s a subtlety that matters enormously for security: API keys and secrets are never stored in inscriptions and never visible to agents.

When an agent creates an HTTP transition that calls an external API, the inscription references credentials by name:

{
  "type": "http",
  "method": "POST",
  "url": "https://api.openai.com/v1/chat/completions",
  "headers": {
    "Authorization": "Bearer ${credentials.OPENAI_KEY}",
    "Content-Type": "application/json"
  }
}

The agent writes ${credentials.OPENAI_KEY}. It never sees the actual key. The credential wallet is managed by the operator—when the executor processes the HTTP call, it resolves the credential reference and injects the real value into the outgoing request header.

Four authentication types are supported:

  • Basic Auth — username:password base64-encoded
  • Bearer Token — injected as Authorization header
  • API Key — injected as header or query parameter
  • OAuth2 Client Credentials — automatic token caching and refresh

This means: even an rwxh agent with full autonomy never sees the actual API key. It references credentials by name. The executor resolves them. The agent proposes which credential to use. The operator controls what that credential actually contains.


Command Allowlisting on Executor Hosts

COMMAND transitions are where the real power lives. Through them, agents can execute any shell command on any remote machine that has a AgenticOS executor installed. Install software. Query databases. Run analysis scripts. Deploy containers. The capability is unlimited—but the control is precise.

Each executor host defines a fine-grained allowlist of permitted commands. The agent proposes a command; the executor checks it against the allowlist before running anything.

Process isolation is enforced at every level:

  • Each command runs in its own isolated process
  • Configurable timeout per command (default 60s, max 10 minutes)
  • Working directory sandboxing
  • Environment variable injection (controlled by operator)
  • Serialized execution—no parallel command storms

The executor is pull-based: it polls the master for work every 2 seconds. No inbound ports need to be opened. This means executors can sit inside firewalled networks, air-gapped environments, or on customer premises—and still receive work securely.

The critical design principle: operators control what can run on their machines. An agent might propose apt-get install python3-pandas on a data analysis server—and the allowlist can permit exactly that while blocking rm, sudo, or ssh. The capability is there. The guardrails are operator-defined.

Example allowlist on a data-analysis executor:
  ✅ curl, jq, python3, pip install (specific packages)
  ✅ apt-get install python3-pandas
  ❌ rm, sudo, ssh, chmod, dd

Two Patterns, One Architecture

The role system enables two fundamentally different operational patterns:

Pattern 1: The Designer Agent (Human-in-the-Loop)

Agent transition role: rw-h or rw--

User: "I need an agentic process to monitor our support inbox and escalate urgent tickets"

Designer Agent Transition (rw--):
├─ Analyzes requirements
├─ CREATES complete agentic process:
│   ├─ p-inbox, p-categorized, p-team-eng, p-team-billing, p-urgent
│   ├─ t-fetch-tickets (HTTP), t-categorize (Agent), t-route (Pass)
│   └─ All connecting arcs + inscriptions
├─ Stores pattern in memory for reuse
└─ STOPS. Cannot deploy. Waits for human.

Human reviews in GUI:
├─ Sees complete process diagram
├─ Inspects each transition's inscription
├─ Modifies configurations (URLs, schedules, timeouts)
├─ Binds credentials from wallet
├─ Deploys selectively (maybe only 3 of 5 transitions)
└─ Starts the deployed transitions

Security benefit: The agent cannot “go rogue.” Even if the LLM hallucinates a destructive command, it physically cannot execute it. The created structures are inert data until a human activates them.

Pattern 2: The Autonomous Agent (Full Self-Governance)

Agent transition role: rwxh

User: "Analyze our WordPress site for SEO issues"

Autonomous Agent Transition (rwxh):
├─ Creates HTTP transition: t-fetch-pages
├─ DEPLOYS it to executor
├─ FIRES it → gets pages from WordPress API
├─ Creates COMMAND transition: t-extract-meta
├─ DEPLOYS and FIRES → runs jq to extract meta tags
├─ Analyzes results using its own LLM reasoning
├─ Stores findings as tokens in p-seo-report
├─ Creates PNML visualization for the GUI
└─ All done. No human needed.

Use case: Trusted environments where speed matters more than approval gates. Development agentic processes, internal tooling, personal automation.


Goal-Driven Automation: From Natural Language to Running Systems

Both patterns share the same starting point: a human describes a goal in natural language.

Step 1: The Agent Understands the Goal

Goal: "Monitor our WordPress site for SEO issues"

Agent reasoning:
├─ I need to periodically fetch pages from the WordPress API
├─ I need to analyze page content for SEO quality
├─ I need to generate recommendations
├─ I need to store results somewhere accessible
└─ I need all this to run WITHOUT me being invoked each time

Step 2: The Agent Designs and Creates

The agent uses structure creation tools to directly build the agentic process:

Agent CREATES:
├─ CREATE_NET: "WordPress SEO Monitor"
├─ CREATE_PLACE: p-wp-pages (URLs to scan)
├─ CREATE_PLACE: p-page-content (fetched pages)
├─ CREATE_PLACE: p-seo-report (analysis results)
├─ CREATE_TRANSITION: t-fetch-pages (HTTP transition)
├─ CREATE_TRANSITION: t-analyze-seo (Agent transition)
├─ CREATE_ARC: p-wp-pages → t-fetch-pages
├─ CREATE_ARC: t-fetch-pages → p-page-content
├─ CREATE_ARC: p-page-content → t-analyze-seo
├─ CREATE_ARC: t-analyze-seo → p-seo-report
├─ SET_INSCRIPTION: t-fetch-pages with HTTP config
└─ SET_INSCRIPTION: t-analyze-seo with analysis prompt

Step 3: What Happens Next Depends on the Role

If rw-- (Builder):

Agent: "I've created the complete agentic process. I cannot deploy it.
        Awaiting human review."

Human reviews → binds credentials → deploys selectively → starts

If rwxh (Full Autonomy):

Agent: "I've created the agentic process. Deploying t-fetch-pages now.
        Firing... got 47 pages. Creating analysis transition.
        Deploying t-analyze-seo. Firing... analysis complete.
        Results stored in p-seo-report."

Everything done in one session. No human involvement.

Same intelligence. Same design capabilities. Different role on the agent transition.


What Agents Can Actually Do

AgenticOS agents can do anything. That’s the point. The architecture doesn’t limit capability—it ensures every capability flows through a secure, auditable pathway.

HTTP Transitions: Calling Any API

With the h flag, agents can create and fire HTTP transitions that call any endpoint on the internet. Every request goes through the credential proxy—the agent writes templates, the executor resolves secrets:

{
  "type": "http",
  "method": "POST",
  "url": "https://api.openai.com/v1/chat/completions",
  "headers": {
    "Authorization": "Bearer ${credentials.OPENAI_KEY}",
    "Content-Type": "application/json"
  },
  "body": {
    "model": "gpt-4",
    "messages": [{"role": "user", "content": "${input.data.prompt}"}]
  }
}

COMMAND Transitions: Shell Access on Remote Machines

Through COMMAND transitions deployed to remote executors, agents can run shell commands on any machine that has a AgenticOS executor installed:

# On a remote production server
kubectl get pods -n production
docker stats --no-stream

# On a data analysis machine
pip install pandas scikit-learn
python3 analyze_data.py --input /data/latest.csv

# On a development machine
npm test -- --coverage
git log --oneline -10

# On any machine with an executor
claude -p "Analyze this code" --no-session-persistence < /dev/null

The capability is unlimited. An agent could create a COMMAND transition that installs software, configures a service, or queries a production database—if the executor's allowlist permits it. The operator defines what's allowed per machine. The agent proposes. The executor enforces.

Chaining It All Together

An autonomous agent transition (rwxh) can chain HTTP and COMMAND transitions into a pipeline that:

  1. Fetches data via HTTP from an external API
  2. Processes it via shell commands on a remote machine
  3. Stores results in the net's places
  4. Triggers alerts via HTTP to Slack/Discord
  5. Runs continuously without any human intervention

A builder agent transition (rw--) can create this exact same pipeline—every place, every transition, every inscription, every arc. But it physically cannot deploy or execute any of it. The human must activate each piece.


The "Want" Token Pattern: Self-Aware Designer Agents

Designer agents face an interesting challenge: they can create structures but cannot execute them. How do they track what they've built and what they're waiting for?

Through "want" tokens—a self-tracking pattern where the agent writes tokens to its own input place:

{
  "want": "t-fetch-pages",
  "expecting": "tokens in p-page-content",
  "reason": "Need fetched pages to analyze for SEO",
  "status": "awaiting-deployment",
  "created_at": "2026-02-04T10:00:00Z"
}

The Self-Aware Loop

Execution #1 (Designer Agent):
├─ Agent reads p-want: empty
├─ Agent reads task: "Monitor SEO"
├─ Agent CREATES: t-fetch-pages, p-page-content
├─ Agent WRITES want token: "waiting for t-fetch-pages to be deployed"
├─ Agent exits → human sees new structures in GUI

Human deploys t-fetch-pages with credentials

Execution #2:
├─ Agent reads p-want: "want t-fetch-pages → p-page-content"
├─ Agent checks p-page-content: Has data! (human deployed it)
├─ Agent uses the data for analysis
├─ Agent creates next structure (t-analyze-seo)
└─ Agent writes new want token for t-analyze-seo

The agent knows what it asked for and checks if it got it. No external memory needed—the net IS the memory.


Nets That Run While You Sleep

Once deployed—whether by human or by autonomous agent—the agentic process runs continuously without any AI involvement.

Example: Personal Calendar Assistant

Places:
├─ p-calendar-events     (upcoming meetings)
├─ p-conflicts          (detected scheduling conflicts)
├─ p-proposals          (suggested changes)
└─ p-notifications      (alerts for your attention)

Transitions:
├─ t-sync-calendar      (kind: http, fetches from Google Calendar API)
├─ t-detect-conflicts   (kind: map, finds overlapping meetings)
├─ t-suggest-reschedule (kind: agent, proposes alternatives)
└─ t-morning-briefing   (kind: agent, generates daily summary)

What happens overnight:

11:00pm: New meeting request arrives via email
11:30pm: t-sync-calendar fires, updates p-calendar-events
11:31pm: t-detect-conflicts fires, finds overlap
11:32pm: t-suggest-reschedule fires, creates proposal token

7:00am: t-morning-briefing fires
        Generates: "2 conflicts detected. 1 proposal pending."

7:15am: You wake up, review proposals in GUI, approve with one click

Everything that happened overnight is captured as events. Full audit trail. No AI cost overnight—just structure executing.


Petri Nets That Create Petri Nets

The ultimate expression of this architecture: agent transitions that design and build other agentic processes.

A single conversation with an rw-- agent transition produces a complete, ready-to-deploy agentic process:

User: "Build a support ticket pipeline with categorization and escalation"

Agent Transition (rw--):
├─ Creates 5 places: inbox, categorized, engineering, billing, urgent
├─ Creates 4 transitions: fetch, categorize, route, escalate
├─ Creates 8 arcs connecting everything
├─ Writes 4 inscriptions (HTTP, Agent, Pass, Pass)
├─ Creates PNML visualization with proper layout
├─ Stores pattern in memory: "support-ticket-pipeline"
└─ Awaits human deployment

The same request to an rwxh agent transition goes further:

Agent Transition (rwxh):
├─ Same creation steps
├─ DEPLOYS all 4 transitions
├─ FIRES t-fetch to test the pipeline
├─ Verifies results flow through correctly
└─ Agentic Process is live and running

The Self-Improving System

Over time, the agent:

  1. Accumulates patterns from successful agentic processes in its memory place
  2. Recognizes similar requests ("this is like the last support agentic process")
  3. Reuses and adapts existing structures instead of building from scratch
  4. Learns from failures (captures pitfalls as learned-pattern tokens)

Each task makes the system more capable. The agent gets better at designing agentic processes the more it designs—regardless of its role.


The Full Picture: Autonomous SaaS Operations

Everything above—designer agents, autonomous agents, HTTP transitions, COMMAND transitions, credential wallets, executor allowlists—comes together when you build a large-scale system where multiple agent transitions with different roles manage an entire operation.

Imagine running a SaaS product. Today you have a team of people handling customer support, deployments, monitoring, incident response, billing, and analytics. With Secure Agentic-Nets, you can build a single Petri net where specialized agent transitions handle each domain—each with exactly the permissions it needs, each producing work for the others, the whole thing running continuously.

Here's what that looks like:

┌─────────────────────────────────────────────────────────────┐
│                AUTONOMOUS SAAS OPERATIONS NET                │
│                                                              │
│  ┌──────────────┐    ┌──────────────┐    ┌──────────────┐  │
│  │ p-tickets    │───→│ t-triage     │───→│ p-triaged    │  │
│  │ (incoming)   │    │ role: rw-h   │    │              │  │
│  └──────────────┘    └──────────────┘    └──────┬───────┘  │
│                                                  │          │
│                           ┌──────────────────────┤          │
│                           ▼                      ▼          │
│                    ┌──────────────┐    ┌──────────────┐     │
│                    │ t-auto-fix   │    │ t-escalate   │     │
│                    │ role: rwxh   │    │ role: rw-h   │     │
│                    └──────┬───────┘    └──────┬───────┘     │
│                           │                   │             │
│                           ▼                   ▼             │
│                    ┌──────────────┐    ┌──────────────┐     │
│                    │ p-resolved   │    │ p-human-attn │     │
│                    └──────────────┘    └──────────────┘     │
│                                                              │
│  ┌──────────────┐    ┌──────────────┐    ┌──────────────┐  │
│  │ p-git-events │───→│ t-ci-runner  │───→│ p-build-ok   │  │
│  │ (webhooks)   │    │ role: rwxh   │    │              │──┐│
│  └──────────────┘    └──────────────┘    └──────────────┘  ││
│                                                     │       ││
│                                                     ▼       ││
│                                              ┌────────────┐ ││
│                                              │ t-deploy   │ ││
│                                              │ role: rwxh │ ││
│                                              └─────┬──────┘ ││
│                                                    │        ││
│                                                    ▼        ││
│  ┌──────────────┐    ┌──────────────┐    ┌──────────────┐  ││
│  │ p-metrics    │◄───│ t-monitor    │◄───│ p-deployed   │  ││
│  │              │    │ role: r---   │    │              │◄─┘│
│  └──────┬───────┘    └──────────────┘    └──────────────┘   │
│         │                                                    │
│         ▼                                                    │
│  ┌──────────────┐    ┌──────────────┐                       │
│  │ t-alert      │───→│ p-incidents  │                       │
│  │ role: rw-h   │    │              │───→ (back to t-triage)│
│  └──────────────┘    └──────────────┘                       │
│                                                              │
│  ┌──────────────┐    ┌──────────────┐    ┌──────────────┐  │
│  │ p-usage-data │───→│ t-billing    │───→│ p-invoices   │  │
│  │              │    │ role: rw-h   │    │              │  │
│  └──────────────┘    └──────────────┘    └──────────────┘  │
└─────────────────────────────────────────────────────────────┘

Six agent transitions, four different roles, one interconnected net:

t-triage (role: rw-h)
  "Reads incoming support tickets, calls our knowledge base API
   to classify them, routes fixable issues to t-auto-fix and
   complex ones to t-escalate."
  ✅ Can read tickets, write classifications, call external APIs
  ❌ Cannot deploy or fire anything

t-auto-fix (role: rwxh)
  "For known issues (password resets, config errors, quota bumps):
   creates a COMMAND transition, deploys it, fires it against the
   customer's environment, verifies the fix, responds to the customer."
  ✅ Full autonomy — can create, deploy, execute, call APIs
  Allowlist on customer executor: reset-password, update-config, bump-quota

t-escalate (role: rw-h)
  "For complex issues: enriches the ticket with system diagnostics
   via API calls, writes a detailed summary, creates a structured
   handoff token for the human support team."
  ✅ Can read, write, call APIs for diagnostics
  ❌ Cannot deploy or execute — humans handle complex cases

t-ci-runner (role: rwxh)
  "Triggered by git push webhooks. Creates COMMAND transitions to
   run the test suite on the build server, collects results.
   If tests pass, creates a deploy-ready token."
  ✅ Full autonomy on the build server
  Allowlist on build executor: git, npm, pytest, docker build

t-deploy (role: rwxh)
  "Takes deploy-ready tokens and rolls out to production.
   Creates COMMAND transitions for blue-green deployment,
   runs health checks, rolls back if checks fail."
  ✅ Full autonomy on the production executor
  Allowlist on prod executor: kubectl, docker, health-check scripts
  ❌ No rm, no sudo, no ssh — only approved deployment commands

t-monitor (role: r---)
  "Continuously queries production metrics from p-deployed.
   Read-only — it can observe everything but change nothing.
   When it detects anomalies, it writes alert tokens to p-metrics."
  ✅ Can read all net state
  ❌ Cannot modify anything — pure observation

  Wait — if it's r---, how does it write alert tokens?
  It doesn't. The anomaly detection is a MAP transition that
  reads p-deployed metrics and emits to p-metrics. t-monitor is
  the agent that reads those metrics and adds analysis context.
  The alert itself is a separate rw-- agent transition (t-alert).

t-alert (role: rw-h)
  "Reads anomaly tokens, calls PagerDuty/Slack APIs to notify
   the team, writes structured incident tokens back into
   p-incidents — which feed right back into t-triage."
  ✅ Can read, write, call notification APIs
  ❌ Cannot deploy or execute — it raises alarms, doesn't fix things

t-billing (role: rw-h)
  "Reads usage data, calls Stripe API to generate invoices,
   writes invoice tokens for the finance team to review."
  ✅ Can read usage, write invoices, call Stripe API
  ❌ Cannot deploy or execute anything

Look at what's happening here:

Every agent transition has exactly the permissions it needs—no more. The monitoring agent can't accidentally deploy code. The billing agent can't run shell commands. The auto-fix agent has full autonomy but only on specific executor hosts with specific allowlists. The CI runner can build and test but can't access production.

And the whole thing is one Petri net. Tokens flow from support tickets through triage to resolution. Git pushes flow through CI to deployment. Metrics flow through monitoring to alerting. Incidents loop back to triage. It's a complete, self-sustaining operational system where each agent transition handles its domain with exactly the right level of trust.

This is what traditional systems achieve with hundreds of microservices, RBAC policies, CI/CD pipelines, monitoring stacks, and incident runbooks—all maintained by a team of engineers. With Secure Agentic-Nets, it's one net, multiple agent transitions, each with a two-to-four-character role string.


Why Secure Agentic-Nets Work

Let's be explicit about the security model. The point is not that agents are limited—they're not. An rwxh agent transition can call any API on the internet, run any shell command on remote machines, install software, query databases, and chain all of this into continuously running pipelines. The capability is real and unlimited.

What makes it secure:

  • Per-transition roles. Each agent transition has its own role. A monitoring agent (r---) and a deployment agent (rwxh) can exist in the same net with completely different permissions. The role is set in the inscription and cannot be changed at runtime.
  • Credential isolation. Agents reference credentials by name (${credentials.STRIPE_KEY}). The executor resolves them. The agent never sees the actual secret.
  • Command allowlists. Each executor host defines what commands are permitted. An agent can propose apt-get install python3-pandas—the allowlist decides if it runs. Operators control their machines.
  • No privilege escalation. An agent transition cannot modify its own inscription. It cannot change its role. It cannot grant itself new tools.
  • No cross-agent access. Each agent session has its own memory scope. Agent A cannot read Agent B's memory, tokens, or session state.
  • Pull-based execution. Executors poll for work. No inbound ports. Executors can sit inside firewalled networks and still operate securely.
  • Full audit trail. Every tool call, every token flow, every transition firing is logged with the agent's role and identity.

The Achievement: Controlled Power at Every Level

What AgenticOS achieves is something that didn't exist before: AI agents that can build complete, executable agentic process infrastructure—with every capability flowing through secure, operator-configured pathways.

Aspect Builder Agent (rw--) Autonomous Agent (rwxh)
Design agentic processes Yes Yes
Create structures Yes Yes
Deploy transitions No — human must deploy Yes — self-deploys
Call any API No — creates, human fires Yes — through credential proxy
Run any shell command No — creates, human runs Yes — through executor allowlist
Install software remotely No — proposes, human executes Yes — if allowlist permits
Start/stop agentic processes No — human controls Yes — full lifecycle
See credentials Never — reference by name Never — reference by name
Security model Capability through human gate Capability through secure channels
Use case Production, compliance Dev, internal, trusted

The Self-Supporting Loop

The most remarkable property: the system supports itself.

  1. Agent encounters problem → Creates structure to solve it
  2. Structure gets deployed → By human (builder) or self (autonomous)
  3. Structure runs → Produces results continuously
  4. Agent learns → Stores pattern in memory
  5. Similar problem arrives → Agent reuses structure (no rebuild)
  6. Structure library grows → System becomes more capable over time

Each task makes the system better. Each agentic process adds to the library. Each pattern captured means future tasks are faster and cheaper.

You assign the roles. The architecture enforces them.


The Bigger Picture

AgenticOS doesn't force a choice between safety and capability. It gives you both—through Secure Agentic-Nets:

  • Start safe: Use r--- agent transitions for monitoring and observation
  • Add design power: Upgrade to rw-- for agents that build agentic processes
  • Open HTTP access: Use rw-h for agents that research via external APIs
  • Enable execution: Use rwx- for deployment without external calls
  • Go autonomous: Use rwxh when you trust the environment and need speed

You can run all role levels simultaneously in the same net. A read-only agent transition monitors your production system. A builder agent transition creates new agentic processes for review. An autonomous agent transition handles deployment—running commands on production servers, calling APIs, managing the full lifecycle. Each does exactly what its role permits. The SaaS operations example above shows how this scales: six agent transitions, four different roles, one net that runs an entire operation.

This isn't AI automation with an on/off switch. It's AI automation with a volume dial per agent transition—and you control exactly where each one is set.


Built with AgenticOS Secure Agentic-Nets—the platform where autonomous agents build their own infrastructure, with every capability flowing through secure, operator-configured pathways.

February 2026

Leave a Reply

Your email address will not be published. Required fields are marked *