v0.10.0 — Now Open Source

Control infrastructure
with natural language

Connect any API, deploy specialized AI agents, orchestrate operational workflows — without writing SQL or memorizing CLI flags.

olav — bash
$ olav "how many devices are online?"
→ Querying topology... 47 devices online, 2 unreachable
$ olav "which BGP neighbors are down on core-router-01?"
→ BGP neighbor 10.0.0.2 (AS 65001) — Idle since 14:32 UTC
$ olav registry register http://netbox.corp/api/schema/
→ ✓ Registered NetBox — 312 tools available immediately

Built for production operations

Not another chatbot. A governed, audited, self-improving operations platform.

Any API → Agent Tool

Register an OpenAPI service once. Query it in natural language forever. No code, no MCP servers.

🔒

Four-Layer Execution Governance

AAA auth → HITL interception → DuckDB read-only sandbox → credential auto-redaction. Hard constraints cannot be bypassed.

🧠

Self-Improving Loop

Every tool call and error is captured. Failure patterns become constraints. Agents get better over time — automatically.

🚀

2000x+ Cache Speedup

Semantic + exact cache layers. Repeated queries return instantly. LLM tokens spent only when truly needed.

🏗️

Creator Agent

6-step workflow. Deploy a new Skill from any OpenAPI schema in under 2 minutes. No framework knowledge required.

👥

Multi-User & Audit

Concurrent users, isolated sessions. Every CLI command recorded to DuckDB audit trail. LDAP/OIDC ready.

Enterprise-grade governance.
Not optional.

Every agent decision passes through four mandatory control layers. DuckDB read-only enforcement is a hard constraint — no configuration disables it.

Security architecture →
Layer 0
AAA
Token / LDAP / OIDC auth → RBAC → audit trail
Layer 1
Middleware
HITL dangerous-command interception + memory injection
Layer 2
Sandbox
Pre-scan → DuckDB read-only → network namespace isolation
Layer 3
Output
Credential auto-redaction + SSE JSON + HttpOnly cookies

Ready to automate your ops?

Open source. Self-hosted. Enterprise extensions available.

Read the docs →