Documentation Index
Fetch the complete documentation index at: https://docs.termyte.xyz/llms.txt
Use this file to discover all available pages before exploring further.
Core Concepts
Termyte v0.1 is built on a high-integrity architectural foundation that ensures your agents move from a “Next-Token-Prediction” mindset to a “Causal-Reasoning” execution loop.1. The Termyte Ledger
At the heart of Termyte is a secure Audit Ledger hosted in the cloud. Unlike standard text logs, the Ledger stores:- Trajectories: The sequence of decisions leading to an outcome.
- Parent-Child Links: Every task is linked to its predecessors, allowing the system to perform Root Cause Analysis (RCA).
- Outcome Hashes: Cryptographic proof of what happened, ensuring the memory cannot be hallucinated or altered.
2. The Governance Pipeline
Termyte uses a 3-Tier Pipeline to evaluate agent actions in real-time:- Tier 1: Deterministic Gates: Instant pattern matching against thousands of known dangerous commands. This happens in <1ms.
- Tier 2: Semantic Memory: Termyte looks up similar historical actions in your project. If a command has failed 3 times before, it stops the agent from trying a 4th time.
- Tier 3: LLM Judge: For complex intents, a specialized safety model reviews the action’s implications and provides a reasoned verdict.
3. Invisible Interception
To minimize friction, Termyte implements Invisible Governance.- The agent is given a single
executetool. - Behind the scenes, Termyte handles the Two-Phase Commit (2PC):
- Prepare: Local redaction and cloud verdict check.
- Execution: Sandboxed command run.
- Commit: Finalizing the record in the Ledger.
- This ensures that safety is “on by default” without requiring the agent to be trained on complex safety protocols.
4. Split-Plane Architecture
Governance requires high performance. Termyte separates the system into two planes:- Control Plane: The Termyte Cloud Runtime. High performance (Rust-based), global ledger management, and deterministic evaluation.
- Data Plane: The MCP Bridge (Node.js). Lightweight interception, local privacy redaction, and model-agnostic interaction living locally with your agent.
Why Termyte? | Architecture | Tool Reference