Agent v0 오픈 소스 다중 에이전트 AI 오케스트레이션 터미널
hackernews
|
|
📦 오픈소스
#ai 딜
#ai 에이전트
#ai 오케스트레이션
#anthropic
#claude
#gemini
#openai
#멀티 에이전트
#오픈소스
원문 출처: hackernews · Genesis Park에서 요약 및 분석
요약
Agent v0는 보안 연구원과 개발자를 위해 최적화된 오픈소스 다중 에이전트 AI 오케스트레이션 터미널입니다. 중앙 오케스트레이터가 자연어 의도를 파악해 하위 에이전트들에게 작업을 분산시키며, 모델에 구애받지 않고 Anthropic, OpenAI, Google Gemini 등 다양한 AI 모델을 라우팅할 수 있습니다. Rust로 구축된 핵심 보안 인프라를 통해 운영체제 수준의 샌드박스 격리, 변조 방지용 SHA-256 해시 체인 감사 로그, Argon2id 기반 암호화 키 저장소 등 다층적인 보안을 제공합니다. CLI 환경을 기본으로 작동하며 텔레그램 및 디스코드 봇 연동과 웹 대시보드를 통한 실시간 모니터링 및 에이전트별 토큰 사용량 추적도 지원합니다.
본문
The universal multi-agent AI orchestration terminal. Coordinated intelligence for any desire. Agent v0 is a powerful framework for deploying fleets of specialized AI agents. While optimized for security researchers and developers, its modular architecture allows anyone to orchestrate complex, parallel workflows — from creative content creation and data analysis to automated research and technical troubleshooting — all from a single, secure terminal interface. Current version: v1.4.4 | Security Architecture | Releases - Features - Architecture - Security Implementation - Supported AI Providers - Installation - Configuration - Usage - Self-Updater - Agent Roles - Tool Integration - Skill System - Bot Integrations - Project Structure - License - CLI-first — Full terminal interface with interactive REPL, no GUI required - Multi-agent orchestration — A central "Agentic" orchestrator decomposes tasks, delegates to specialized subordinate agents, and synthesizes results - Model-agnostic — Route tasks to Anthropic Claude, OpenAI GPT, or Google Gemini - OS-level sandboxing — Agents are confined to assigned workspaces using bubblewrap (Linux) or sandbox-exec (macOS) - Hash-chained audit logs — Tamper-evident, append-only SHA-256 chained audit trail for every agent action - Encrypted keystore — API keys and secrets encrypted at rest with Argon2id key derivation - Permission enforcement — Fine-grained per-agent policies for filesystem, network, API access, and inter-agent messaging - Real tool execution — Agents use Bash, Grep, Glob, FileRead/Write/Edit, and WebFetch with iterative tool-call loops - YAML-based skills — Modular, extensible skill definitions for recon, code analysis, forensics, threat intel, and reporting - Persistent daemon — Background daemon with Unix socket IPC; tasks survive CLI disconnection - Bot integrations — Telegram, Discord, and WhatsApp adapters for remote task submission - Smart self-updater — agent-v0 update checks GitHub releases, diffs files, and rebuilds only what changed - Web dashboard — HTTPS web UI with Socket.IO for real-time task monitoring - Cost tracking — Per-agent, per-session token usage and cost breakdown +------------------+ | CLI / REPL | | (commander.js) | +--------+---------+ | Unix Domain Socket | +--------+---------+ | Daemon | | (process manager | | heartbeat, IPC) | +--------+---------+ | +--------+---------+ | Agentic | | (orchestrator) | | intent parsing | | task decompose | | result synthesis | +--------+---------+ | +--------------------+--------------------+ | | | | | +----+----+ +---+---+ +--+---+ +---+---+ +---+---+ | Recon | | Code | |Forens| |OSINT | |Report | | Agent | | Agent | |Agent | |Agent | |Agent | +---------+ +-------+ +------+ +------+ +-------+ | | | | | +----------+---------+---------+----------+ | +--------+---------+ | AgentToolkit | | per-agent tools | | workspace sandbox| | audit logging | +--------+---------+ | +--------+---------+ | Gateway Router | | rate limiting | | cost tracking | | fallback routing | +--------+---------+ | +--------------------+--------------------+ | | | Anthropic OpenAI Gemini - User submits a task via CLI, REPL, web dashboard, or bot message - Agentic (the orchestrator) parses intent from natural language - Tasks are decomposed into discrete subtasks with dependency ordering - Subtasks are delegated to specialized agents running concurrently - Each agent executes within its sandbox using assigned tools and skills - Agents make iterative tool calls (Bash, Grep, FileRead, WebFetch, etc.) with results fed back to the model - The Gateway Router handles all model API calls with rate limiting and fallback - Results are aggregated and synthesized back to the user - Every action is recorded in the hash-chained audit log Agent v0 implements defense-in-depth security across multiple layers. The core security infrastructure is built in Rust for memory safety and performance, with additional hardening in the TypeScript and Python layers. - Linux: Bubblewrap — Each agent runs in isolated PID, mount, network, and user namespaces via bwrap - macOS: Sandbox.framework — Each agent runs in an Apple sandbox profile via sandbox-exec with deny-by-default policy - Seccomp Filtering (Linux) — Restricts syscalls to a minimal allowlist per agent role - Path Guards (all platforms) — Filesystem access confined to the agent's workspace; all traversal attempts blocked - Auto-detection — The runtime selects the best available sandbox backend automatically - SHA-256 Hash Chain — Each log entry includes the hash of the previous entry, creating a tamper-evident chain - Constant-Time Verification — Hash comparisons use subtle::ConstantTimeEq to prevent timing side-channels - Append-Only Writer — Log files are opened in append mode; entries cannot be modified - Sensitive Data Redaction — Secrets are automatically masked before logging - Argon2id Key Derivation — Master key derived from user passphrase (memory-hard, GPU/ASIC resistant) - AES-256-GCM E
Genesis Park 편집팀이 AI를 활용하여 작성한 분석입니다. 원문은 출처 링크를 통해 확인할 수 있습니다.
공유