OH
OpenHiveFor Technical and Production Teams
01 / 20

Opening

Move agents from demos into governed production-facing operation.

OpenHive is an open-source control plane for creating, running, and governing agent systems: platform monitoring, project coordination, channel assistants, approvals, audits, isolated execution, and controlled evolution in one operating model.

OH
OpenHiveWhy A Control Plane
02 / 20

Production Gap

The production question is not “can it answer?” It is “can it keep working safely?”

1

Permission Boundary

When can an agent execute a tool? When must it stop for human approval?

2

Evidence Trail

Every decision, prompt, tool call, change, and rollback must be traceable.

3

Runtime Isolation

Code, commands, vendor secrets, and business credentials cannot live in one uncontrolled process.

4

Continuous Evolution

Self-improvement must pass through evaluation, approval, rollout, and rollback instead of unrestricted self-modification.

OH
OpenHiveOne-Line Positioning
03 / 20

What OpenHive Is

OpenHive is an open-source control plane for governed agent systems.

It is not a single vertical app or a chat-assistant framework. It provides a unified runtime, trusted extensions, approval boundaries, audit replay, isolated execution, and multi-agent orchestration.

Control

Who can run, what can run, which model is used, and which resources can be reached.

Governance

Evaluation, approval, audit, rollout, and rollback become first-class product surfaces.

Extension

Business behavior comes from templates, plugins, skill packs, and policies instead of being hard-coded into the core runtime.

OH
OpenHiveSystem Overview
04 / 20

Platform Shape

From platform gateway to agent runtime, dashboard, and extension layer.

Gateway

LLM-Free Control Layer

  • Authentication, admission, routing
  • Credential proxy and secret boundaries
  • Scheduler and interactive cards
  • Platform APIs and audit entry points
HiveAgent

Single Agent Runtime

  • Queen / Keeper / Scout are configured instances
  • Tool registry and capability policy
  • Run state, approval resume, context governance
  • Model provider abstraction
Extensions

Business Behavior Injection

  • Project templates and blueprints
  • Plugins and skill packs
  • Skills execute as subprocesses
  • Local and marketplace extension governance
OH
OpenHiveRole Map
05 / 20

Agent Roles

One runtime, multiple responsibilities.

Platform

Queen

Platform monitor agent responsible for platform health, anomaly windows, silent Keeper detection, and platform-level audit signals.

Project

Keeper

Project manager agent that coordinates projects, analyzes signals, proposes changes, and manages Scouts and workflows.

Channel

Scout

Group or channel assistant that responds to users, executes installed skills, and collects feedback and context.

Task

Worker

Work role for governed tasks or sandbox execution, used for stronger isolation or more specialized execution paths.

Schedule

Pipeline

Background execution path for recurring analysis, classification, alerts, reports, and Prompt Shadow runs.

OH
OpenHiveQueen Agent
06 / 20

Platform Operator

Queen is not a business assistant. It is the platform-level operational monitor.

Heartbeat And Health

Admins can inspect Queen heartbeat health, recent runs, consecutive healthy runs, failure windows, and next scheduled run.

Anomalies And Silence

Queen watches platform anomalies, silent Keepers, missed runs, and states that need operational attention.

Audit Linkage

Queen events flow into platform audit; run details can link to remediation, diffs, and approval records.

For production teams, Queen is the platform on-call view. For technical teams, Queen is the observable entry point for platform health, scheduling, and runtime governance.

OH
OpenHiveKeeper Agent
07 / 20

Project Manager Agent

Keeper turns project operation from “chat response” into project governance.

Coordinate

Create and manage Scouts, project workflows, and collaboration context.

Analyze

Process feedback queues, run evaluations, and identify change candidates.

Propose

Create reviewable changes, skill evolution proposals, or work tasks instead of directly modifying production behavior.

Execute

Drive tools, skills, and sandbox work inside approval and capability boundaries.

OH
OpenHiveScout And Channels
08 / 20

Front-Line Collaboration Entry

Scout brings agents into team collaboration contexts, but capabilities must be installed and authorized.

In-Channel Work

Feishu / Lark is the current baseline integration, with a path to more messaging providers later.

Skill Constraints

Scout can only execute skills that are installed, assigned, and aligned with credential declarations.

Feedback Loop

Scout collects field signals, Keeper analyzes them, and production owners confirm through approval and audit.

OH
OpenHiveRuntime Principle
09 / 20

Single-Runtime Principle

HiveAgent is the only runtime; role differences come from configuration, not separate agent classes.

One runtime, N configs.

Reduce Complexity

Queen, Keeper, Scout, and Worker share the runtime loop, tool governance, context governance, and observability model.

Avoid Scenario Leakage

The core runtime stays business-agnostic; business value is injected by plugins, skills, templates, and policies.

Easier To Verify

Security boundaries, approval resume, tool planning, and audit trails can be verified against one runtime model.

OH
OpenHiveExecution Isolation
10 / 20

Docker / K8s / Local Isolation

Isolation is the key dividing line between preview and production-facing operation.

preview_local

Local Preview

Fast to start by default, but the in-process LocalAgentPool is not a hard process boundary.

local subprocess

Local Isolated Process

Separate the agent runtime, scrub inherited environment variables, and access models through the gateway relay.

Docker

Container Execution

Put Agent / Sandbox / Pipeline tasks behind clearer container runtime boundaries.

Kubernetes

Cluster Baseline

Use Pods, NetworkPolicy, health checks, and smoke tests to prove the production topology incrementally.

Be precise: the current preview path is a product evaluation entry point; stronger secret residency and network boundaries require explicit isolated paths and deployment proof.

OH
OpenHiveSecret Boundary
11 / 20

Credential Proxy / Provider Management

Production teams care not only that the model can be called, but where the secrets live.

Gateway Residency

Vendor keys and integration credentials should stay in the Gateway or another explicitly trusted secret-holder role whenever possible.

Encryption And Masking

Provider secrets can be admin-managed, encrypted at rest, and returned only as masked status, never raw values.

Relay Access

Isolated runtimes use Gateway Relay for budgeted, model-allowlisted, scope-limited access.

OH
OpenHiveApproval Boundary
12 / 20

RunState / ToolExecutionPlan

High-impact tool calls become plans before the system decides whether to execute them.

1

Model Requests Tool

The runtime receives tool name, arguments, and context.

2

Create Execution Plan

Record capabilities, argument previews, idempotency keys, and policy decisions.

3

Interrupt For Approval

RunState enters awaiting_approval before side effects happen.

4

Human Decision

Approved, rejected, expired, or requires-more-context outcomes all enter audit.

5

Resume Or Stop

Approved calls execute once; rejected calls return safe tool results to the model.

OH
OpenHivePrompt Shadow
13 / 20

Shadow Prompt Testing

New prompts are validated in parallel before replacing production prompts.

Production Path

Pipeline runs the current production prompt normally, and its result continues to power real notifications and workflows.

Shadow Path

The same Pipeline step runs again with shadow_prompt to produce candidate output.

Review Path

The system stores production/shadow differences, and promotion waits for PM or production-owner approval in the Dashboard.

Prompt Shadow turns prompt tuning from guesswork into a comparable, auditable, rollback-ready rollout flow.

OH
OpenHiveGoverned Self-Evolution
14 / 20

Self-evolution, but governed

OpenHive does not advocate unrestricted self-evolution. It supports governed continuous improvement.

Signals

Feedback, failures, misclassifications, repeated requests, and post-run review candidates.

Draft

Keeper or an evolution plugin creates proposed skill, prompt, memory, or policy changes.

Evaluate

Run tests, Prompt Shadow, diffs, evidence checks, and security scans.

Approve

Human owners decide whether to promote to local installed copies or project configuration.

Rollback

History and audit let production teams attribute and recover.

OH
OpenHiveSkills And Extensions
15 / 20

Plugin / Skill / Marketplace

Put business capability inside installable, auditable, upgradeable extension boundaries.

Skills

Stateless capability units that run as JSON stdin/stdout subprocesses and do not directly share core state.

Plugins

Platform capabilities such as channels, policy, card actions, and evolution logic.

Bundles

Compose templates, skill packs, policies, and blueprints into reusable workload starting points.

Governance

Install, upgrade, edit, promote, and execute flows all go through permissions, audit, and local-copy management.

OH
OpenHiveDashboard
16 / 20

Production Visibility

The Dashboard is the shared operations console for production and platform teams.

Projects

Project overview, agent status, runs, sessions, work tasks, configuration, and skill governance.

Usage

Cross-project usage, trends, cost signals, and scale-of-operation views.

Audit

Audit entry point for platform events, project changes, diffs, approvals, and Queen events.

Admin

Queen monitoring, user admission, provider management, platform AI governance, and runtime maintenance.

OH
OpenHiveWorkload Selection
17 / 20

First Pilots

Choose work that is repetitive, owned, and evidence-backed.

Pilot A

Secure Internal Agents

Coding support, technical research, documentation workflows, and internal operations assistants; a strong dogfooding path for technical teams.

Pilot B

Research And Monitoring Workflows

Recurring analysis, ecosystem tracking, alerts, and report generation; a good path for production teams to validate continuous-operation value.

Pilot C

Customer And Operations Agent Fleets

Support, product, region, or process-specific agents that scale under shared policy and rollout control.

OH
OpenHiveDeployment Evolution
18 / 20

From Preview To Production-Facing

Do not describe the preview topology as production isolation; prove it in stages.

1

preview_local

Local Docker PostgreSQL, FastAPI, and Next.js to validate the product path and team workflow.

2

isolated runtime

Introduce separated processes, environment scrubbing, Relay model access, and secret-residency validation.

3

Docker Sandbox

Put governed commands, workspace tasks, patch approvals, and log collection behind a container boundary.

4

Kubernetes Baseline

Use Pods, NetworkPolicy, health checks, smoke tests, and release validation to support stronger deployment models.

OH
OpenHiveTeam Alignment
19 / 20

Questions Before The Pilot

Technical and production teams must define the boundaries together.

Technical Team Questions

  • Which runtimes require process/container/Pod isolation?
  • Which secrets must never enter an agent environment?
  • Which tool calls must become ToolExecutionPlans before execution?
  • Which logs, traces, RunState records, and audits must be retained?

Production Team Questions

  • Who owns approvals? What is the SLA?
  • Which differences can pass automatically, and which require human review?
  • What is the success standard for Prompt Shadow?
  • What triggers rollback, pause, or escalation?
OH
OpenHiveNext Step
20 / 20

Recommendation

Choose one governed workflow and run the full loop: operation, evidence, approval, evolution.

The best first step is not launching many agents. It is choosing one repetitive, measurable, clearly owned, rollback-ready production scenario.

1. Pick The Pilot

One business/platform workflow, one owner, one metric.

2. Define Boundaries

Isolation mode, secret residency, tool approval, Prompt Shadow, and rollback rules.

3. Run The Loop

Queen monitors the platform, Keeper manages the project, Scout enters channels, and Pipeline runs shadow evaluation.