Configuration
The Agent Runtime Pack reads its configuration from the agent_runtime namespace in
workspace.yaml.
Enable The Pack
Section titled “Enable The Pack”Add an agent-runtime pin to the workspace pack list:
This example shows the monorepo or local-pack development path. The same pack manifest contract works with other pack sources once you publish and pin a verifiable integrity hash.
Workspace Config
Section titled “Workspace Config”Model Profiles
Section titled “Model Profiles”Each profile declares:
| Field | Meaning |
|---|---|
provider | Adapter family used for request/response normalization |
model | Provider-specific model identifier carried into the normalized response |
api_key_env | Environment variable that holds the credential for the selected profile |
base_url / base_url_env | Absolute provider base URL used both for outbound requests and network allowlist derivation |
default_model selects the profile a host should use when it does not supply a different
model_profile.
Input URL Matching
Section titled “Input URL Matching”agent:execute-turn still receives a url field on each call. That url must match the resolved
base URL for the selected model profile. This keeps the requested endpoint aligned with the
profile-derived network allowlist and avoids drift between host input and pack config.
Intent Rules
Section titled “Intent Rules”The intents map drives runtime-authored policy rules through the pack policy_factory:
allow_toolsdefines the only tools the classified intent may use.approval_required_toolsis a stricter subset that pauses execution withAPPROVAL_REQUIRED.
At execution time, hosts pass execution_metadata.agent_intent on real tool calls. The kernel then
evaluates the policy-factory rules before the tool executes.
Limits
Section titled “Limits”limits bounds host-driven loops and pack-owned orchestration:
max_turns_per_sessionmax_tool_calls_per_sessionmax_input_bytes
Hosts can pass per-call overrides, but the runtime enforces the configured upper bounds.
Credentials And Network Allowlisting
Section titled “Credentials And Network Allowlisting”The pack uses two separate safeguards:
- Manifest-declared and capability-derived
required_envOnly declared environment variable names are passed into the sandboxed tool process. - Capability-derived network allowlists Provider hosts are derived from the configured model profiles and intersected with workspace and lane policy before the turn runs.
This means a valid profile must declare both:
- how the pack authenticates
- which provider hosts the sandbox may contact