AutoLoop is a Rust autonomous runtime built on SpacetimeDB.
It combines:
- requirement clarification
- CEO-led swarm orchestration
- forged MCP capability management
- GraphRAG and learning memory
- verifier-gated execution
- observability and deployment assets
- a Vue 3 + TypeScript + Vite operations dashboard
The goal is to turn a user request into a governed execution loop:
requirement-agent -> CEO -> planner/critic/judge -> capability catalog -> execution-agent -> verifier -> learning -> observability
- Current planned release:
v0.1.0-alpha - Release notes: RELEASE_NOTES_v0.1.0-alpha.md
- Architecture guide: ARCHITECTURE.md
- API summary: API.md
- Issue backlog for public tracking: ISSUE_BACKLOG_v0.1.0-alpha.md
Core Differentiator: Solves critical flaws of traditional AI systems (forgetting, drifting, degrading) by focusing on memory, verification, and continuous improvement
| Core Advantage | AutoLoop | AutoGPT / LangChain / Flowise / Rasa X |
|---|---|---|
| Autonomy | Fully autonomous closed-loop with cognitive anchors | Manual prompts/coding/config (no true autonomy) |
| Self-Evolution | Built-in learning + verifier-gated improvement | Static workflows (no self-updates) |
| Memory | Unified GraphRAG (vector + graph + text) | Fragmented/temporary memory (no persistence) |
| Efficiency | Sublinear scaling (faster with larger datasets) | Linear scaling (slower at scale) |
| Deployment | Single binary/container (edge-ready) | Python-dependent/multi-component (complex deployment) |
| Real-Time Tuning | MicroLoRA + index optimization (<1ms) | No native fine-tuning (manual triggers only) |
Every iteration of AutoLoop drives meaningful system improvement:
Understand → Plan → Execute → Verify → Learn → Evolve → Repeat
- Better routing decisions
- Refined capability utilization
- Improved memory structures
- Updated execution strategies
- ⚡ No repetition — only evolution
AutoLoop's modular design prioritizes governance, learning, and persistence
- Core Responsibilities: Manage capabilities, enforce constraints, adapt based on real-time feedback
- Core Feature:
Control logic evolves synchronously with the system
- Core Responsibilities: CEO-led orchestration + planner/critic/judge collaborative reasoning
- Core Feature:
Decision quality continuously improves over time
- Core Responsibilities: Risk-aware execution, capability boundary constraints, verifier-gated execution
- Core Feature:
Accuracy improves with every run
- Core Responsibilities: Unified vector+graph+structured storage, incremental merging
- Core Feature:
Memory transforms into actionable intelligence
- Core Responsibilities: Convert execution episodes into reusable skills and causal relationships
- Core Feature:
Experience solidifies into core capabilities
- Core Responsibilities: Validate execution correctness, detect regressions, control evolution direction
- Core Feature:
Only valid improvements are retained
- Core Responsibilities: Track system behavior, failure patterns, and learning outcomes
- Core Feature:
Full transparency into the evolution process
- Windows demo script: e2e-5min.ps1
- Linux demo script: e2e-5min.sh
- Recording checklist: RECORDING_CHECKLIST.md
This repository is now in a reasonable state to open source as an engineering prototype.
That means:
- the core architecture is implemented
- the main runtime path compiles and tests pass
- the repo already includes config, deployment, and operational scaffolding
It does not mean:
- all behaviors are production-hardened
- all MCP integrations are fully real-world complete
- the verifier, GraphRAG, and learning logic are final
Current validation:
cargo check --workspacepassescargo test --workspacepasses
AutoLoop currently supports:
- multi-turn requirement clarification with frozen scope and confirmation signals
- CEO-driven swarm planning
- planner / critic / judge deliberation artifacts
- forged MCP capability catalog with governance
- execution constrained to
active + verifiedcatalog capabilities - runtime guard checks for risk, approval, and bounded execution
- GraphRAG snapshot generation and incremental merge
- task-to-capability graph mapping
- learning consolidation from episodes, witness logs, causal edges, and skills
- verifier gating with task judgement, route correctness, and capability regression
- observability records for route analytics, failure forensics, dashboard snapshots, and operations reports
- deployment assets for local containers and Kubernetes
requirement-agentclarifies the request and freezes scope.CEOcreates the high-level route.planner / critic / judgeproduce a bounded deliberation artifact.cli-agentforges or updates MCP capabilities.execution-agentselects only from the governed capability catalog.GraphRAGstores graph state and capability edges.learningconsolidates outcomes into reusable evidence.verifierdecides pass / needs-iteration / reject.observabilityrecords how and why the system behaved.
src/- root application, orchestration, runtime, learning, GraphRAG, tools, providers
src/module_bindings/- generated Rust bindings from SpacetimeDB CLI
autoloop-spacetimedb-adapter/- storage adapter and repository isolation layer
spacetimedb/- server-side SpacetimeDB module crate
deploy/- config, backup/restore, and deployment templates
dashboard-ui/- Vue 3 + TypeScript + Vite dashboard for operations, governance, and research health
src/orchestration/mod.rs- requirement flow, CEO/swarm routing, execution routing, validation
src/runtime/mod.rs- runtime guard, immutable evaluation, verifier, capability regression
src/tools/mod.rs- tool registry, forged capability catalog, governance actions
src/tools/cli_forge.rs- MCP capability forging and catalog mutation tools
src/rag/mod.rs- GraphRAG updates, forged capability graph surfaces, incremental merge
src/memory/mod.rs- memory retrieval, learning persistence, consolidation
src/observability/mod.rs- route analytics, failure forensics, dashboard and operations reports
src/lib.rs- application assembly and end-to-end persistence glue
SpacetimeDB is the primary system-of-record for:
- schedule events
- permissions
- agent state
- knowledge records
- forged capability manifests
- learning assets
- verifier outputs
- observability outputs
The root app uses the official Rust client pattern:
- depends on
spacetimedb-sdk - reserves
src/module_bindings/for generated bindings - uses
build.rsto generate bindings when thespacetimeCLI is available
AutoLoop persists operational records into SpacetimeDB under keys such as:
observability:{session}:route-analyticsobservability:{session}:failure-forensicsobservability:{session}:dashboardobservability:{session}:operations-reportobservability:{session}:trace:*
These records explain:
- why a route was selected
- which tools or capabilities degraded
- whether runtime guards blocked or gated execution
- what the verifier concluded
Research and long-horizon memory also persist:
research:{session}:proxy-forensicsresearch:{session}:reportresearch:{session}:follow-up-statusgraph:global:snapshot
The repository now includes a frontend at dashboard-ui.
It is built with:
- Vue 3
- TypeScript
- Vite
The dashboard is designed around the runtime already exposed by AutoLoop:
- verifier score and readiness
- capability governance health
- route treatment share
- research backend health
- proxy pressure and failure forensics
- graph memory and global graph snapshot summaries
See dashboard-ui/README.md for local run and build steps.
- Rust toolchain
- optional: SpacetimeDB CLI
- optional: Docker / Docker Compose
cargo run --manifest-path D:\AutoLoop\autoloop-app\Cargo.toml -- --message "Build a swarm that uses graph memory and MCP execution" --swarmcargo check --workspace --manifest-path D:\AutoLoop\autoloop-app\Cargo.toml
cargo test --workspace --manifest-path D:\AutoLoop\autoloop-app\Cargo.tomlSupported real research backends:
browser_fetch- use a Browserless-style render endpoint
playwright_cli- use local
node + playwrightfor true browser rendering
- use local
firecrawl- use Firecrawl search/scrape APIs
Recommended health checks:
cargo run --manifest-path D:\AutoLoop\autoloop-app\Cargo.toml -- system health
cargo run --manifest-path D:\AutoLoop\autoloop-app\Cargo.toml -- crawl status --anchor-id cli:focusRecommended config knobs:
research.browser_render_urlresearch.playwright_node_binaryresearch.browser_session_poolresearch.proxy_poolresearch.anti_bot_profileresearch.rotate_proxy_per_request
For local Playwright execution:
node --version
npx playwright install chromiumDeployment assets included:
- browserless-deployment.yaml
- playwright-worker-deployment.yaml
- browserless-secret-template.yaml
- autoloop-external-secret.yaml
docker-compose.yml now includes a local browserless service for external render execution.
deploy/config/autoloop.dev.tomldeploy/config/autoloop.prod.toml
Use dev config locally and prod config for container or cluster deployment.
Included assets:
Dockerfiledocker-compose.ymldeploy/k8s/autoloop-deployment.yamldeploy/k8s/autoloop-secret-template.yamldeploy/k8s/autoloop-external-secret.yamldeploy/k8s/autoloop-servicemonitor.yamldeploy/k8s/browserless-deployment.yamldeploy/k8s/playwright-worker-deployment.yamldeploy/backup/backup.ps1deploy/backup/restore.ps1deploy/monitoring/prometheus.ymldeploy/monitoring/prometheus-rules.yamldeploy/monitoring/alertmanager-config.yaml
These are production-oriented templates, not a complete platform stack.
You will likely still want to add:
- real secret manager wiring
- persistent volume strategy
- CI/CD
- ingress / service manifests
- monitoring backend
- frontend deployment for
dashboard-ui
This repo is strong enough to publish, but these parts are still evolving:
- production-grade MCP interoperability
- deeper verifier policies and regression coverage
- richer dashboard / UI layer
- full backup/export integration with real SpacetimeDB operational tooling
- stronger production isolation and runtime recovery
A Rust + SpacetimeDB autonomous runtime prototype for governed agent execution, capability catalog management, GraphRAG-backed memory, and verifier-driven swarm orchestration.
