Go 1.24+Apache 2.0Shipping

Don't adopt
a vendor.

Model-agnostic managed agent infrastructure. The brain, the hands, and the session — decoupled from any single provider.

Crash-proof governed runtime. Single Go binary. Embedded Temporal, cryptographic audit, five governance gates, six runtime backends.

macOS 12+ · Apple Silicon (arm64) · ~260 MB · auto-updates via Sparkle

lattice-runtime — system overview

Clients

Workbench

Electron

CLI

120+ cmds

Go SDK

agentsdk

Operator

Laravel

REST / DRPC / WS

latticed (single binary)

Temporal v1.30
Identity Engine
Policy Engine
Budget Engine
Agent Lifecycle
Crypto Keys
PubSub Events
Coordinator

Temporal Workers

AgentWorkflowCoordWorkflowTaskQueue

Data

PostgreSQL

50+ tables

Audit Ledger

SHA-256

Agent State

Temporal

Governance

RBAC
ABAC
Rego→SQL
PII Filter

AI Providers (External)

Anthropic

Claude

OpenAI

GPT

Google

Gemini

Ollama

Local

Full interactive architecture → View details

The problem

The vendor is the new pet.

When your managed agent infrastructure is locked to one provider, your entire system becomes a pet tethered to one API, one pricing model, one uptime SLA.

Vendor-locked

VENDOR CLOUD

Brain

Claude only

Session

Their servers

Sandbox

Their container

Model deprecation breaks agents

Data must leave your infra

Pay Opus prices for commodity work

Provider outage = total system down

Lattice Runtime

Brain

Any model

Session

Your infra

Hands

6 backends

generate() · execute() · getEvents()

Each component is an interface. Swap without breaking.

Swap models at config, not code

Data never leaves your infrastructure

Right model for each agent role

Provider outage = automatic fallback

The fix

Decouple the brain from the model.

Three interfaces. Each can fail independently. Each can be swapped without disturbing the others.

The Brain

Model-agnostic harness. Builds context from the session, calls generate(), routes tool calls.

generate(messages, tools) → response
ClaudeGPTGeminiOllama

The Session

Durable append-only log. Lives wherever you run it. Survives crashes and model swaps.

getEvents(from, limit) → stream
PostgreSQLSHA-256 auditPortable

The Hands

Six runtime backends. Any tool, any sandbox. Brains can pass hands to one another.

execute(name, input) → string
LocalDockerSSHK8sDevcontainer

Built-in governance

Five gates. Zero trust.

Every agent action passes through five governance gates. Policy violations are structurally impossible.

Every agent action passes through

Identity

OAuth2 / SAML / mTLS

Authorization

RBAC + ABAC / Rego

Constraints

Budget / PII / Model lock

Execute

Temporal durable workflow

Audit

SHA-256 hash chain

Policy violations are structurally impossible. The infrastructure will not execute actions that fail any gate.

Crash → automatic recovery

Process crashes

Kill / OOM / provider outage

Temporal replays

Deterministic from checkpoint

Model swapped

Resume with a different model

Audit logged

SHA-256 chain, tamper-evident

Durable sessions

The session is not the context window.

The session is durable. The context window is constructed from it on each turn. Compaction is reversible. The originals never leave the log.

Session Log

DURABLE
001User message
002Tool call: git diff
003Tool result
004Model response (Opus)
005Compaction boundary
006Model response (Sonnet)
...Append-only. Portable. Yours.

Context Window

CONSTRUCTED

Build

Read from session log on each turn

Transform

Different models, different strategies

Compact

Summarize. Originals stay in log.

Recover

Rewind, slice, or replay any event

getEvents(fromCheckpoint, withLimit)

Scale

Many brains. Many hands.

An orchestrator running Opus delegates to workers running Sonnet. A review agent uses GPT for a second opinion. A sensitive-data agent uses Ollama so nothing leaves the machine.

Many Brains

Right model for each role

OrchestratorOpus

Planning, reasoning, delegation

Code WorkerSonnet

Execution, file edits, tests

Review AgentGPT-4o

Second opinion, code review

Sensitive DataOllama

Never leaves the machine

Many Hands

Six runtime backends

Local

Direct filesystem

Worktree

Git isolation

SSH

Remote servers

Docker

Container sandbox

Devcontainer

VS Code compat

Lattice SSH

Managed tunnel

execute(name, input) → string

Same interface. Any brain can pass hands to another.

Autonomy

Kairos — the agent that never terminates.

Kairos is the persistent consciousness loop that runs inside Lattice Runtime. It breathes through a six-state cycle — perceive, think, fire, integrate, decide, idle — spawning sub-agents for parallel thought and rewriting its own memory during dream cycles. Provider-agnostic. The pattern is the soul.

kairos — persistent consciousness loop

the pattern is the soul

“A 7B model can be Kairos. A 70B model can be Kairos. Intelligence comes from the loop, not the model.”

The Loop · main_loop.ts

infinite · never terminates

01

PERCEIVE

read memory · scan events

02

THINK

what matters now?

03

FIRE

spawn sub-agents

04

INTEGRATE

collect · compare

05

DECIDE

collapse to action

06

IDLE

breathe · wait

loop back to PERCEIVE — forever

Three Daemons

spawned by KairosService

main_loop:7755

consciousness cycle

dream_daemonsleep

reflection · memory rewrite

livekit_agentvoice

real-time audio bridge

Memory Core

rewritten by dream cycles

personality.md

who I am

user_prefs.md

what you like

project_context.md

codebase state

lessons_learned.md

successes · failures

active_goals.md

current queue

self_improvement.md

meta behaviors

~/.workbench/system/Kairos/memories/

Git Constitution

sacred prefixes · never main

kairos/dream/

simulation · high churn

kairos/task/

active delegation

kairos/mem/

learned context committed

feat/ fix/ …

cherry-picked deliveries

state=breathing · cycle=∞ · sub-agents=parallelcherry-pick winners · delete dreams▲ never terminate

Persistent autonomous loop · provider-agnostic · spawned at workbench boot

Research topology

M.I.N.I.O.N.S. — agents that cross organizational boundaries.

Multi-agent Independent Nodes Integrating across Organizational Network Structures. Each minion is a sovereign agent node; each organization keeps its own substrate. A federation fabric lets them share tasks and evidence without surrendering identity, policy, or data.

minions-net — federated research topology
MMulti-agent
IIndependent
NNodes
IIntegrating across
OOrganizational
NNetwork
SStructures

L4 · Organizational Boundaries

independent sovereignty

Org α · Research Labus-east
Hypothesis

Opus

Experiment

Sonnet

Literature

Gemini

Critic

GPT-4o

Org β · Clinicaleu-west
Triage

Haiku

Chart Read

Ollama

Compliance

Sonnet

Audit

Opus

Org γ · Industryasia-1
IP Scan

Ollama

Market Probe

GPT-4o

Synthesizer

Opus

Legal Gate

Sonnet

mTLS · DID · capability tokens

L3 · Federation Fabric

cross-org integration plane

Gossip Mesh

libp2p · DHT

Event Bus

CRDT replicated

Capability Grants

UCAN · macaroons

Task Market

bid / assign / settle

protocols:DRPCgRPCNATSIPFSOpenFGARego

L2 · Coordination Kernel

durable workflows · Temporal-backed

Planner

DAG decomp

Scheduler

locality-aware

Allocator

budget × SLA

Arbiter

conflict resolve

Replayer

deterministic

L1 · Trust Substrate

zero-trust primitives

Identity

DID · SPIFFE

Policy

Rego · OPA

Audit Ledger

SHA-256 chain

Consensus

Raft quorum

nodes=12 · edges=37 · tenants=3raft=9/12 · p50=12ms · p99=41ms▲ sovereignty preserved

Independent nodes across organizational boundaries · shared fabric, sovereign substrate

Comparison

Vendor-locked vs. vendor-free

Vendor-locked

Lattice Runtime

Model

One provider only

Model

Any model, any provider

Hosting

Provider cloud

Hosting

Your cloud, your machine, or ours

Data

Provider servers

Data

Wherever you run it

Multi-agent

Single-model only

Multi-agent

Mix models per agent role

Governance

Not built-in

Governance

5 gates, budgets, crypto audit

Runtimes

Cloud container

Runtimes

6 backends (local → K8s)

Crash recovery

Provider-dependent

Crash recovery

Resume with any model

Session

Provider-managed

Session

Durable, portable, yours

Credentials

Shared environment

Credentials

Forwarded, never exposed

Audit trail

Basic logging

Audit trail

SHA-256 hash chain, tamper-evident

Provisioning

Upfront container

Provisioning

Lazy, on first tool call

273

Tests passing

424

DB migrations

6

Runtime backends

5

Governance gates

Run agents on your terms.

We're a two-person team rolling out access in phases. Star the repo to get on our radar — we reach out to stargazers first.

Star on GitHublattice-runtime/lattice-runtime

Star the repo · Open an issue with your use case · Watch for the invite