What is P3AK
Platform OverviewBayouClaw — Linux Agent Runtime
What Impressed YouAlpine Docker, per-agent Linux users, Unix domain sockets, seccomp syscall filtering, and a policy engine enforcing the Iron Rule: no agent acts without HITL sign-off. Seven agents. Nine test suites. Fourteen board meetings run in production.
Agent Roster
| Agent | Linux User | Role | Transport | Seccomp |
|---|---|---|---|---|
| amber | p3ak-amber | Kernel — routes all requests, voice interface | Unix sock | Restricted |
| ledger | p3ak-ledger | Financial analysis, AR/AP | Unix sock | Strict |
| counselor | p3ak-counselor | Legal review, contract analysis | Unix sock | Strict |
| signal | p3ak-signal | Email, calendar, communications | Unix sock | Restricted |
| scout | p3ak-scout | Web research, external data | Unix sock | Strict |
| architect | p3ak-architect | Codebase analysis, technical decisions | Unix sock | Strict |
| board | p3ak-board | Multi-agent synthesis, board meeting engine | Unix sock | Restricted |
Request Routing Architecture
/run/bayouclaw/*.sock. No network stack exposed. No open ports between processes. Not interceptable from outside the container — this is the architectural advantage over Claude Code's file-based mailbox approach.Dockerfile Security Model
HITL — Human in the Loop
OS-Level ControlThe agent cannot bypass this. The kernel enforces it. Every external action goes through a staging directory. Agents have WRITE to staging, ZERO access to outbox. The hitl-daemon is the only process that can move files forward. This is file permissions — not an if-statement.
6 Approval Levels
HITL Policy (abbreviated)
Approval Flow
Encryption & Key Management
Passcode CyclingYour question about passcode cycling landed on a real gap. The encryption stack is solid. The rotation pipeline is manual. That's Sprint 1 of hardening.
Current State
Target State
Performance
Real NumbersThese come from dev-environment profiling — not a formal load test. Vault ops are sub-second. Voice latency is network-bound (Deepgram + Cartesia). Agent routing is LLM-bound, not compute-bound. Formal JMeter benchmarks are the gap — Sean's expertise.
| Operation | Median | P99 | Bottleneck | Status |
|---|---|---|---|---|
| Vault ingest (markdown) | 18ms | 45ms | Tantivy indexing | FAST |
| BM25 search | 12ms | 28ms | Index scan | FAST |
| Hybrid search (BM25 + ZVec + PageIndex) | 31ms | 62ms | Three-way merge | FAST |
| Vault create | 8ms | 20ms | Argon2id KDF | FAST |
| Vault ingest (PDF, Tier 2) | ~400ms | ~1.2s | PDF extraction | OK |
| Voice STT (Deepgram) | ~500ms TTFB | ~900ms | Network (cloud) | OK |
| Voice TTS (Cartesia) | ~500ms TTFB | ~800ms | Network (cloud) | OK |
| BayouClaw agent routing | <2s | <5s | LLM inference | LLM-BOUND |
| Board meeting (5 agents) | 30–60s | ~90s | Sequential LLM calls | EXPECTED |
| Room → vault push (full doc) | ~180ms | ~400ms | HTTP + ingest | FAST |
What Needs Measuring
Target SLAs (Proposed)
Amber — Voice AI with OS Access
LiveKit · Deepgram · CartesiaReal-time voice agent with full OS access, connected to BayouClaw's agent network. LiveKit Cloud handles WebRTC. Deepgram for STT. Cartesia TTS (Caroline voice). Nine tools — dangerous ones staged for HITL approval before any execution. The Force Field eliminates AI fingerprint patterns from her speech.
Test Suite
Coverage State413 Rust tests, 9 BayouClaw shell suites, 51 regression tests last session. Score: 88% (45/51). Two failures — both security, both fixed same session. No CI/CD pipeline. Tests run manually. That's the biggest engineering gap before production.
Where Sean Fits
Production Hardening RoadmapP3AK's architecture is correct. The gaps are production readiness, not design. No CI/CD. No formal pen test. No automated key rotation. No load benchmarks. That's a QA and security engineering engagement. Here's the exact work.