The world's first autonomous AI agent with built-in cybersecurity.
Lyrie is not just another AI assistant. It's a guardian that runs your operations and protects them in the same loop.
Every AI agent platform treats security as an afterthought. Lyrie treats it as the foundation β and ships the receipts: every advisory we publish on research.lyrie.ai is backed by a reproducible exploit lab + detection rules in this repo.
Compared against the latest releases at the time of writing:
OpenClaw 2026.4.23 Β· Hermes Agent v0.10.0 (2026.4.16) Β· Claude Code 2.1.x
| Capability | OpenClaw 2026.4.23 | Hermes 0.10.0 | Claude Code | Lyrie |
|---|---|---|---|---|
| Autonomous agent loop | β | β | β | β |
| Multi-channel (TG/WA/Discord/Signal/Slack/iMessage) | β | β | β | β |
| Self-improving skills | Skills catalog | β Learns from use | β | β + skill-creator |
| Persistent cross-session memory | Lancedb / sections | β Trajectory + graph | β | β Sectioned + dream cycle |
| Self-healing memory | β | Partial | β | β Validator + repair |
| Multi-model + intelligent routing | β | β (200+ via OpenRouter) | Anthropic only | β (auto-routed by task class) |
| Native cybersecurity layer | β | β | β | β The Shield |
| Native device protection (iOS/Android/Mac) | β paired-device only | β | β | β Lyrie Shield apps |
| Real-time threat intel feed | β | β | β | β research.lyrie.ai (KEV-driven) |
| Reproducible exploit labs in-repo | β | β | β | β
research/CVE-XXXX/ + tools/exploit-lab/ |
Built-in pentest/recon commands (/pentest /recon /vulnscan /apiscan) |
β | β | β | β |
| Sub-agent orchestration | β | β | β | β + role-based fleet (Brain/Muscle/Coder/Scout) |
| Browser control | Chrome DevTools MCP | β | β | β + agent-browser skill |
| Cron / scheduled jobs | β | β | β | β + heartbeat protocol |
| RL training / trajectory export | β | β Atropos | β | β via OMEGA pipeline |
| Audit-friendly footprint | 430K+ LOC | ~30K LOC | Closed | <30K LOC, MIT, fully auditable |
| Built by | OpenClaw | Nous Research | Anthropic | OTT Cybersecurity LLC |
The headline: OpenClaw and Hermes are great agents. Neither was built to defend you while it works. Lyrie is. Cybersecurity isn't a plugin β it's layer one.
| Path | Description |
|---|---|
packages/omega-suite/ |
Lyrie OMEGA β Autonomous Security Intelligence Platform. CVE validator, CISA KEV watcher, multi-source intel firehose, and the publisher pipeline that powers research.lyrie.ai. |
research/ |
Reproducible exploit labs. Every published research advisory has a matching CVE-XXXX-NNNNN/ folder with Dockerfile, working PoC, asciinema-style transcript, Sigma + YARA rules, and IOCs. See research/README.md. |
tools/exploit-lab/ |
Autonomous exploit reproduction framework β lab.sh orchestrator, scaffold-cve.sh, LAB-PROTOCOL.md (methodology + ethical scope). |
skills/ |
Agent skills and capability modules (extensible, self-improving). |
packages/* |
Core runtime packages β agent loop, memory, channels, model routing. |
docs/ |
Architecture, contributing, channel guides. |
scripts/, assets/, reports/ |
Tooling, brand assets, and operator reports. |
- Research blog: research.lyrie.ai β verified threat intelligence, 3+ source cross-validation, KEV-driven priority
- X / Twitter: @lyrie_ai β gold-verified
- Main site: lyrie.ai
- Parent company: overthetop.ae β OTT Cybersecurity LLC
curl -fsSL https://lyrie.ai/install.sh | bashOr manual:
git clone https://github.com/overthetopseo/lyrie-agent.git
cd lyrie-agent
pnpm install
pnpm startβββββββββββββββββββββββββββββββββββββββββββββββ
β LAYER 4: INTERFACE β
β CLI Β· Web Β· Desktop Β· iOS Β· Android β
βββββββββββββββββββββββββββββββββββββββββββββββ€
β LAYER 3: AGENT ENGINE β
β Agent spawning Β· skills Β· self-improvement β
β Multi-model routing Β· sub-agent fleet β
βββββββββββββββββββββββββββββββββββββββββββββββ€
β LAYER 2: MEMORY CORE β
β Vector Β· graph Β· sectioned + dream cycle β
β Self-healing, versioned, full-text search β
βββββββββββββββββββββββββββββββββββββββββββββββ€
β LAYER 1: THE SHIELD β
β Real-time threat detection Β· WAF β
β Anti-malware Β· behavioral Β· device protect β
β Threat intel feed (research.lyrie.ai) β
βββββββββββββββββββββββββββββββββββββββββββββββ
Model-agnostic. Lyrie routes per task class automatically:
| Tier | Model | Use |
|---|---|---|
| Brain | Claude Opus 4.7 | Strategy, complex reasoning |
| Coder | GPT-5.5 / GPT-5.4-Codex | Code generation, refactors |
| Fast | Gemini 3.1 Flash / Haiku 4.5 | Quick lookups, classification |
| Bulk | MiniMax-M2.7-HS | Mass content, parallel batches |
| Local | Qwen / Gemma / Llama-local | Private, self-hosted |
Bring any model β Anthropic, OpenAI, Google, xAI, MiniMax, Nous, or your own endpoint. No lock-in.
Telegram Β· WhatsApp Β· Discord Β· Slack Β· Signal Β· iMessage Β· CLI Β· Webchat β connect Lyrie to wherever you already work.
| Product | What it does |
|---|---|
| Lyrie Agent (this repo) | Your autonomous AI operator |
| Lyrie Shield | Native cybersecurity protection across iOS, Android, Mac |
| Lyrie Research | research.lyrie.ai β verified threat intel, reproducible exploit labs |
| Lyrie OMEGA | Autonomous security intelligence backend (packages/omega-suite/) |
Together: a complete digital guardian that operates and defends.
lyrie migrate --from openclaw # ports memory, skills, config
lyrie migrate --from hermes # ports skills + trajectoryOne command. Full memory + skills + config retained.
See docs/contributing.md. New CVE labs follow LAB-PROTOCOL.md.
See SECURITY.md. Responsible disclosure goes to security@lyrie.ai. Cybersecurity isn't a feature here β it's the product.
MIT. Use it, fork it, build on it.
Built by OTT Cybersecurity LLC Β· Powered by Lyrie β the AI that protects.
Research Β·
@lyrie_ai Β·
lyrie.ai Β·
overthetop.ae
Β© 2026 OTT Cybersecurity LLC. All rights reserved.