One autonomous agent. Full execution stack.
Sentinel is a self hosted AI operator that turns intent into execution. It combines an agent runtime, browser automation, scheduling, memory, approvals, and tool access in one product.
Built by ARAIS.
- Run multi step tasks with tool calls and recovery.
- Use a real browser with Playwright and live VNC monitoring.
- Execute scheduled runs with cron or heartbeat triggers.
- Keep persistent hierarchical memory across sessions.
- Delegate bounded work to sub agents.
- Gate risky actions behind human approvals.
- Connect to custom araiOS modules for data and actions.
- Run git operations freely and only gate at push or PR creation, so the agent moves fast without surprise commits to main.
- Authenticate with your existing Claude Code or Codex CLI OAuth token, no extra API subscription needed.
User / Telegram / Trigger
↓
Sentinel UI ↔ araiOS Workspace
↓
Agent Runtime (Python)
├── Context builder (memory + history)
├── LLM provider (Anthropic / OpenAI / failover)
├── Tool adapter (araiOS + browser + runtime + git)
├── Approval gate (pause/resume on sensitive actions)
└── Estop service (freeze or kill execution at any depth)
↓
araiOS Control Plane
├── Custom tool modules (sandboxed Python)
├── Data modules (persistent record stores)
├── Permissions (allow / approval / deny per action)
└── Approval queue (async human review)
↓
Browser + External APIs + Git
git clone https://github.com/arais-labs/sentinel.git
cd sentinelbash ./sentinel-cli.shFor first run:
- Choose
New/Edit Instance - Set instance values or accept defaults
- Let CLI start services and seed auth
Default URLs:
http://localhost:4747/gatewayhttp://localhost:4747/sentinel/Sentinelhttp://localhost:4747/araios/araiOShttp://localhost:4747/vnc/live browser monitor
Use the admin username and password you configured in CLI.
If login fails, run Reset Auth (Managed Instance) from CLI and retry.
- Use
sentinel-cli.shfor instance lifecycle, auth seeding, startup, status, logs, and cleanup.
cp .env.example .env
docker compose up --build -ddocker compose -f docker-compose.dev.yml up --buildapps/backend/sentinelSentinel backendapps/frontend/sentinelSentinel frontendapps/backend/araiosaraiOS backendapps/frontend/araiosaraiOS frontendinfra/gateway and runtime wiringdocs-site/full documentation sourcedocs/project notes and assets
- Live docs: sentinel.arais.us
- Docs site source:
docs-site/ - Intro:
docs-site/docs/introduction.md - Quickstart:
docs-site/docs/quickstart.md - Installation guide:
docs-site/docs/guides/installation.md - CLI reference:
docs-site/docs/guides/cli-reference.md - API reference:
docs-site/docs/reference/api.md
Sentinel uses explicit policy based controls through araiOS:
allowexecutes immediatelyapprovalpauses and requests human reviewdenyblocks action
High risk actions can be reviewed before execution. Emergency stop levels can freeze active execution when needed.
See CONTRIBUTING.md and SECURITY.md.
runtime_exec supports two explicit modes:
privilege=user(default): confined execution with write access limited to the session workspace and runtime temp mountsprivilege=root: unconfined execution, approval-gated before command execution
For long-running commands, use detached=true.
Inline timeout results include a detached-mode hint.
