Skip to content

rthgit/CORE-RTH

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🌌 CORE RTH: The Sovereign Cognitive Kernel

AI control plane and cognitive kernel for orchestrating governed AI agents.

CORE RTH is a runtime designed to coordinate multiple LLMs, tools, and real-world systems (IoT, robotics, messaging, and automation) through a governed execution model with security, policy enforcement, and full auditability.

Status: RC1 License: NC + Commercial Security: AES-256 Control: Governance


What CORE RTH enables

CORE RTH provides a governed runtime for agentic systems, acting as a control plane between AI models, tools, and real-world systems.

It allows developers and operators to build systems that:

  • orchestrate multiple LLMs and agent roles
  • execute tools and automation safely
  • connect AI workflows to real infrastructure
  • enforce governance policies and safety gates
  • maintain cryptographic data security and full audit trails

Key capabilities

  • Multi-LLM orchestration
  • Governed agent runtime loop
  • Policy-enforced tool execution
  • Browser swarm automation
  • Omni-channel messaging bridges
  • Reality bridges for IoT, robotics, and vehicles
  • Security vault with AES-256-GCM
  • Guardian governance layer

Quick start

git clone https://github.com/rthgit/CORE-RTH.git
cd CORE-RTH
pip install -r requirements.txt
python scripts/run_core_rth_local_bench_api.py

Open the control plane at:

http://127.0.0.1:18030/ui/

Why CORE-RTH

Most AI agent frameworks focus on orchestration.

CORE-RTH introduces a governed runtime layer for agentic systems that require:

  • policy-enforced execution
  • auditability
  • secure tool usage
  • real-world integrations
  • safety controls for physical automation

This makes CORE-RTH suitable not only for AI workflows but also for systems where AI interacts with infrastructure, messaging platforms, IoT, robotics, and vehicles.


What makes it different

Capability Typical agent frameworks CORE-RTH
Multi-agent orchestration
Tool execution
Policy enforcement ❌ / limited
Audit trail ❌ / limited
Real-world bridges rare
Physical safety controls rare

✨ Core Capabilities: What RC1 Includes (Implemented & Tested)

🏛️ The AI Village: Multi-LLM Orchestration

  • Role-based council: Researcher • Coder • Critic • Strategist • Synthesizer
  • Cost-aware routing: chooses the right model/provider at runtime (cloud + local)
  • Live end-to-end run: planning → execution → synthesis (with deterministic fallback if synthesis fails)

🛡️ The Guardian: Absolute Governance & Safety Gates

  • Proposal-first doctrine: models propose actions; Guardian audits; Owner approves; execution happens
  • Policy DSL + severity profiles: lenient → balanced → strict → paranoid
  • Hard no-go domains: enforced rules for high-risk action classes
  • Audit trail: allow/deny decisions are recorded and annotated for high-risk operations

🔐 Security Vault: AES-256-GCM Data-at-Rest

  • AES-256-GCM encryption for sensitive artifacts (secrets, agent threads, telemetry as configured)
  • Master key derivation via OS keyring (with safe fallback for headless scenarios)
  • Encrypted artifacts are recognizable and managed transparently

🧠 Agent Loop + Governed Code Tools (Function Calling Ready)

  • Autonomous think-act-observe loop with max-iterations controls and context trimming
  • Tool registry exposing governed tools via OpenAI-compatible schemas
  • Code tools: file_read, file_write, file_edit, terminal_exec, dir_list, grep, git_status, git_diff
  • Every write/exec is gated by Guardian; backups and diffs are generated for edits

Related files:

🌐 Browser Swarm Agents (Playwright + Safe Fallback)

  • Headless Chromium via Playwright for JS-rendered pages; fallback to urllib/BS4 when needed
  • SSRF and internal-network protections (domain/IP blocking, metadata blocking)
  • Parallel swarm execution with bounded concurrency
  • Results can be persisted and ingested into knowledge structures

Related files and endpoints:

  • app/core/browser_swarm.py
  • logs/browser_swarm/
  • GET /api/v1/jarvis/browser-swarm/status
  • POST /api/v1/jarvis/browser-swarm/run
  • POST /api/v1/jarvis/browser-swarm/search

💬 Chat-to-Matter: Omni-Channel Autonomy (Replay + Live)

  • Telegram / WhatsApp / Mail bridges with:

    • Replay mode for safe E2E validation without real credentials
    • Live endpoints for real operations once secrets are configured

🌉 Reality Bridges: IoT, Robotics, Vehicles/Drones (Governed + Safety)

  • IoT bridge: Home Assistant REST, MQTT, HTTP adapters; scenes; sensors
  • Robotics bridge: serial / ROS2 / mock; safety clamping; emergency stop
  • Vehicle/drone bridge: MAVLink / ROS2 / mock; geofencing; telemetry; emergency land

Related files:

Caution

Physical operations must be tested in mock/sim first and executed under proper safety procedures. Emergency endpoints exist to force safe-state transitions (E-STOP / emergency land).

✅ Release Engineering Integrity (RC1)

  • RC1 gate scripts + onboarding for reproducible all-green validation
  • Release bundle integrity: MANIFEST.sha256 generated to prevent post-build tampering

Related files:


✅ RC1 Evidence Index (Implemented & Validated)

This section lists the verifiable evidence (reports, summaries, scripts, and core files) proving the RC1 all-green status.

1) Release Gate RC1 (ALL-GREEN)

2) Onboarding / Zero-Friction Setup

3) Release Bundle (Packaging)

4) Manifest Integrity (Anti-tamper)

  • Manifest checksum (generated in the bundle root): MANIFEST.sha256

5) Benchmark Suite + Results (Core Rth vs OpenClaw)

Core Rth (runtime-live):

OpenClaw (runtime-cli-live):

Compare (delta +39.02):

6) Channels (Replay + Live Validation)

  • Live channels final check (report #1 & #2): reports/channels_live_final_check_*.json

Note: Test credentials are automatically revoked/closed post-validation (as per security dossier).

7) Browser Swarm Agents (Status + Run + Ingest KG)

  • Core module: app/core/browser_swarm.py
  • Persisted reports: logs/browser_swarm/
  • API Endpoints: GET /api/v1/jarvis/browser-swarm/status POST /api/v1/jarvis/browser-swarm/run POST /api/v1/jarvis/browser-swarm/search

8) Autonomous Agent Loop + SSE Streaming

9) Governed Code Tools + Tool Registry (Function Calling)

10) Security Vault (AES-256-GCM, Zero-Key Storage)

11) System Prompt Manager ("The Constitution")

12) Cortex-Vision (Multimodal)

13) State of the Core (Unified Telemetry Dashboard)

14) Multi-User Base Auth

  • Token endpoint: POST /auth/token

15) Reality Bridges (IoT / Robotics / Vehicles-Drones)


⚖️ Licensing

Core Rth is source-available under the Core Rth Source-Available License v1.0:

  • Free for Non-Commercial Use (personal, education, research, non-profit without revenue/contract work)
  • 💼 Commercial / Enterprise Use requires a paid license (including internal use in for-profit organizations)

Commercial licensing: info@rthitalia.com See: LICENSE


👁️ The Sovereign Manifesto (Lao Tzu's Balance)

« Knowing others is intelligence; knowing yourself is true wisdom. Mastering others is strength; mastering yourself is true power. »

In a world rushing towards reckless, unmonitored AI autonomy, Core Rth embodies the Taoist philosophy of deliberate action. It embraces the paradox: the most powerful AI is the one that knows perfectly when not to act.

We built Cortex to doubt its own hallucinations. We built the Guardian to restrict even the smartest LLM when it touches critical root directories. We created Core Rth so that you, the Owner, remain the ultimate sovereign over the mind, the machine, and the data.


🏗️ Architecture at a Glance

  • app/core/: The brainstem. Houses jarvis_core.py, security_vault.py, prompt_system.py, and cortex_vision.py.
  • app/api/: The FastAPI neuromuscular junction communicating telemetry to the frontend and receiving omni-channel webhooks.
  • app/ui_control_plane.html / js: The Mission Control dashboard offering an exquisite zero-friction UI, Policy Ledger, and E-Stop capabilities.
  • scripts/: The command-line arsenal for deployment, headless operation, and auditing.

🤝 Join the Sovereign Future

Core Rth was forged by a team defining the edge of AI product engineering, deeply rooted in twenty years of software architecture, cybersecurity, and operational perfectionism.

If you are an engineer who demands total control, absolute privacy, and the undeniable magic of seeing an LLM orchestrate physical reality—you are home.


Welcome to Core Rth.
Empowering governed intelligence, globally.

📚 Documentation Index

Explore the extensive documentation to fully understand the architecture, security, and philosophy behind Core Rth:

About

AI control plane and governed runtime for multi-agent systems, tool execution, and real-world automation.

Topics

Resources

License

Contributing

Stars

Watchers

Forks

Packages

 
 
 

Contributors