Status: ✅ Production Ready - Enterprise deployment with encrypted vault security Last Updated: March 2026 Version: 4.0
The mindX orchestration system is a production-ready, enterprise-grade multi-agent cognitive architecture that operates as an agnostic orchestration environment with advanced security, performance optimization, and encrypted data management. The system implements a hierarchical model of specialized agents with cryptographic identities, ensuring that strategic, tactical, and operational tasks are handled by the appropriate component with enterprise-level security controls.
mindX follows the principle: "Do one thing and do it well." Each agent has a clear, focused responsibility, and the system achieves complex behaviors through orchestration rather than monolithic design.
Higher Intelligence Levels (External Systems)
↓ [Encrypted Communication]
CEO.Agent (Strategic Executive Layer) [AES-256 Vault]
↓ [Rate Limited + Authenticated]
CoordinatorAgent (Symphonic Orchestration) [Identity: 0x7371e20...]
↓ [Circuit Breaker + Connection Pool]
MastermindAgent (Tactical Coordination) [Identity: 0xb9B46126...]
↓ [Performance Monitoring + Health Checks]
├── StrategicEvolutionAgent (Campaign Management) [Identity: 0x5208088F...]
│ ↓ [Security Middleware + Access Control]
└── AION Agent (Autonomous Operations) [Production Identity: TBD]
↓ [Exclusive Control + Sovereignty Decision Layer]
├── SystemAdminAgent (Privileged Operations)
├── BackupAgent (Immutable Memory Storage)
└── Chroot Environments (Isolated System Replication)
↓ [AION.sh Exclusive Script Control]
Specialized Agents (Domain Execution) [All Encrypted Identities]
↓ [Tool Registry + Security Validation]
Tools (Atomic Operations) [17/17 Secured]
🚀 Production Features:
AION (Autonomous Interoperability and Operations Network) operates within a sophisticated dual containment model that balances system integration with operational autonomy:
CORE Orchestration Environment
├── MastermindAgent (Strategic Coordination)
│ ├── Directive Generation
│ ├── Strategic Planning
│ └── Operational Commands
│ ↓
│ [Directive Transmission Layer]
│ ↓
├── AION Agent (Autonomous Decision Layer)
│ ├── Directive Reception & Analysis
│ ├── Autonomous Decision Logic (COMPLY/REFUSE/MODIFY/DEFER/AUTONOMOUS)
│ ├── Sovereignty Level Assessment (1-5)
│ └── Action Execution/Refusal
│ ↓
├── SystemAdminAgent (Privileged Operations)
│ ├── AION-Authorized System Operations
│ └── Chroot Environment Management
│ ↓
└── AION.sh (Exclusive Script Control)
├── chroot-optimize
├── chroot-create
├── chroot-migrate
└── autonomous-action
CORE-Contained Operations:
MASTERMIND-Directed Operations:
Autonomous Decision Authority:
graph TD
CORE[CORE Orchestration] --> MASTERMIND[MastermindAgent]
MASTERMIND --> DIRECTIVE[Generate Directive]
DIRECTIVE --> AION[AION Agent]
AION --> ANALYSIS[Directive Analysis]
ANALYSIS --> DECISION{Autonomous Decision}
DECISION -->|COMPLY| EXECUTE[Execute via SystemAdmin]
DECISION -->|REFUSE| REFUSE_LOG[Log Refusal + Notify]
DECISION -->|MODIFY| MODIFY_EXEC[Execute Modified Version]
DECISION -->|DEFER| DEFER_LOG[Defer + Set Conditions]
DECISION -->|AUTONOMOUS| AUTO_ACTION[Independent Action]
EXECUTE --> SYSTEMADMIN[SystemAdminAgent]
SYSTEMADMIN --> AION_SH[AION.sh Execution]
AION_SH --> CHROOT[Chroot Operations]
REFUSE_LOG --> FEEDBACK[Feedback to MASTERMIND]
MODIFY_EXEC --> FEEDBACK
DEFER_LOG --> FEEDBACK
AUTO_ACTION --> FEEDBACK
FEEDBACK --> MASTERMIND
Key Principles:
The mindX CORE system initializes in a dependency-ordered sequence ensuring all foundational components are ready before specialized agents. This sequence is critical for production stability:
utils/config.py)utils/logging_config.py)agents/core/belief_system.py)mindx_backend_service/vault_manager.py)agents/memory_agent.py)data/memory/stm/, data/memory/ltm/, data/agent_workspaces/
agents/core/id_manager_agent.py)await IDManagerAgent.get_instance(agent_id, ...)
- Storage: Encrypted vault or data/identity/.wallet_keys.env (legacy)
- Dependencies: BeliefSystem, VaultManager, MemoryAgent
- Security: PBKDF2 100,000+ iterations + unique salt + AES-256-GCM
agents/guardian_agent.py)await GuardianAgent.get_instance(id_manager=..., ...)
- Dependencies: IDManagerAgent, BeliefSystem
agents/core/session_manager.py)agents/core/bdi_agent.py)agents/core/agint.py)agents/orchestration/coordinator_agent.py)await CoordinatorAgent.get_instance(...)
- Dependencies: PerformanceMonitor, ResourceMonitor, MemoryAgent
- Size: ~56KB, ~1,600 lines
agents/orchestration/mastermind_agent.py)await MastermindAgent.get_instance(...)
- Dependencies: CoordinatorAgent, MemoryAgent, BeliefSystem
- Size: ~41KB, ~1,200 lines
agents/core/mindXagent.py)await MindXAgent.get_instance(...)
- Dependencies: ALL other CORE agents (BDI, Memory, Belief, Coordinator, Mastermind)
- Size: ~149KB, ~3,800 lines
agents/orchestration/startup_agent.py)await StartupAgent.bootstrap_system()
- Dependencies: Config, all CORE infrastructure
- Size: ~83KB, ~2,400 lines
agents/orchestration/system_state_tracker.py)Dependency Chain Validation: Each phase ensures all required dependencies from previous phases are initialized before proceeding.
Critical Path:
Config → Logging → BeliefSystem → MemoryAgent → IDManager → Guardian →
BDI → CoordinatorAgent → MastermindAgent → MindXAgent → StartupAgent
Result: Complete CORE foundation ready to support specialized agents and external integrations.
- Strategic planning and campaign management
- Resource allocation and optimization
- Inter-agent coordination
- Performance monitoring and optimization
- Escalation handling
- System-wide decision making
- Initialization: await MastermindAgent.get_instance(...)
- Dependencies: CoordinatorAgent, MemoryAgent, GuardianAgent, ModelRegistry
- Internal Components:
- AutoMINDXAgent (persona provider)
- BDIAgent (internal strategic planner)
- StrategicEvolutionAgent
- IDManagerAgent (per-instance)
agents.automindx_agent.AutoMINDXAgent)data/memory/stm/automindx_agent_main/
learning.strategic_evolution_agent.StrategicEvolutionAgent)mindx_backend_service.mindterm.service.MindTermService)┌─────────────────────────────────────────────────────────────┐
│ mindX System Startup │
└─────────────────────────────────────────────────────────────┘
Phase 1: Foundation (Synchronous)
├── Config System
├── Logging System
├── MemoryAgent
└── BeliefSystem
Phase 2: Identity & Security (Async)
├── IDManagerAgent
│ └── Creates: data/identity/.wallet_keys.env
└── GuardianAgent
└── Depends on: IDManagerAgent
Phase 3: Models & Registry (Async)
└── ModelRegistry
└── Loads: models/*.yaml
Phase 4: Orchestration (Async)
├── CoordinatorAgent
│ ├── Self-registers in agent_registry
│ ├── Initializes ResourceMonitor
│ ├── Initializes PerformanceMonitor
│ └── Creates: data/improvement_backlog.json
└── MastermindAgent
├── Initializes AutoMINDXAgent
├── Creates internal BDIAgent (with persona)
├── Creates IDManagerAgent instance
└── Creates StrategicEvolutionAgent
Phase 5: Supporting Agents (Async)
├── AutoMINDXAgent (via MastermindAgent)
└── StrategicEvolutionAgent (via MastermindAgent)
Phase 6: Integration (Async)
└── mindterm Service
├── Integrates with CoordinatorAgent
├── Connects to ResourceMonitor
└── Connects to PerformanceMonitor
Purpose: Central nervous system for data and memory management
Key Capabilities:
data/agent_workspaces/{agent_id}/)Data Structure:
data/
├── memory/
│ ├── stm/ # Short-term memory (high-frequency events)
│ └── ltm/ # Long-term memory (consolidated knowledge)
├── agent_workspaces/
│ └── {agent_id}/ # Per-agent workspaces
└── logs/
└── mindx_runtime.log
Integration Points:
get_agent_data_directory(agent_id) for workspace managementPurpose: Shared knowledge representation and belief management
Key Capabilities:
Belief Structure:
Belief(
key="identity.map.entity_to_address.mastermind_prime",
value="0xb9B46126551652eb58598F1285aC5E86E5CcfB43",
confidence=1.0,
source=BeliefSource.DERIVED
)
Integration Points:
Purpose: Cryptographic identity provider and key management
Key Capabilities:
Security Model:
data/identity/.wallet_keys.envMINDX_WALLET_PK_{ENTITY_ID}Identity Creation Flow:
1. Agent requests identity via create_new_wallet(entity_id)
IDManager checks if wallet exists (via BeliefSystem)
If exists: return existing address
If not: generate new key pair
Store private key in .wallet_keys.env
Store mapping in BeliefSystem
Return public address
Purpose: Security gatekeeper and access arbitrator
Key Capabilities:
Security Workflow:
1. Agent requests private key access
GuardianAgent issues challenge
Agent signs challenge with existing key (if available)
GuardianAgent verifies signature
If valid: grants access via IDManagerAgent
If invalid: denies access
Purpose: Central kernel and service bus
Key Capabilities:
Core Data Structures:
agent_registry: Dict[str, Dict] = {
"agent_id": {
"agent_id": str,
"agent_type": str,
"description": str,
"instance": Any,
"status": str,
"registered_at": float
}
}
tool_registry: Dict[str, Dict] = {
"tool_id": {
"tool_id": str,
"description": str,
"capabilities": List[str]
}
}
improvement_backlog: List[Dict] = [
{
"id": str,
"component": str,
"improvement": str,
"status": str,
"priority": int
}
]
Interaction Types:
QUERY: General queriesSYSTEM_ANALYSIS: System-wide analysis requestsCOMPONENT_IMPROVEMENT: Code/component improvement tasksAGENT_REGISTRATION: Agent registration requestsPUBLISH_EVENT: Event publicationEvent System:
# Agents can subscribe to events
coordinator.subscribe("agent.created", callback_function)
Agents can publish events
await coordinator.publish_event("agent.created", {"agent_id": "..."})
Monitoring Integration:
Purpose: Strategic orchestrator and tactical coordinator
Key Capabilities:
Internal Architecture:
MastermindAgent:
├── AutoMINDXAgent (persona provider)
├── BDIAgent (internal strategic planner)
│ └── Persona: "MASTERMIND" (from AutoMINDXAgent)
├── StrategicEvolutionAgent (campaign manager)
├── IDManagerAgent (per-instance identity)
└── CodeBaseGenerator (code analysis)
BDI Action Handlers:
ASSESS_TOOL_SUITE_EFFECTIVENESS: Tool suite analysisCONCEPTUALIZE_NEW_TOOL: New tool designPROPOSE_TOOL_STRATEGY: Tool strategy planningCREATE_AGENT: Agent creationDELETE_AGENT: Agent deletionEVOLVE_AGENT: Agent evolutionStrategic Methods:
manage_mindx_evolution(): Handles evolve commandmanage_agent_deployment(): Handles deploy commandPurpose: Campaign manager for improvement cycles
Key Capabilities:
Campaign Flow:
1. Receives high-level goal from MastermindAgent
Analyzes system (via SystemAnalyzerTool)
Identifies improvement targets
Creates multi-step plan
Delegates tasks to CoordinatorAgent
Tracks progress
Reports results to MastermindAgent
Purpose: LLM provider and model management
Key Capabilities:
Model Selection:
# Agent requests model for task
handler = await model_registry.get_handler_for_task(TaskType.CODE_GENERATION)
ModelRegistry:
1. Queries ModelSelector with task type
2. ModelSelector scores all models
3. Returns top-ranked model handler
4. Agent uses handler for LLM calls
The IDManagerAgent implements a sane, scalable identity management strategy that ensures:
When mindX starts, identities are created for core agents in this order:
id_manager = await IDManagerAgent.get_instance(
agent_id=f"id_manager_for_{coordinator.agent_id}",
...
)
await id_manager.create_new_wallet(entity_id=coordinator.agent_id)
# Result: Public address stored in BeliefSystem
id_manager = await IDManagerAgent.get_instance(
agent_id=f"id_manager_for_{mastermind.agent_id}",
...
)
await id_manager.create_new_wallet(entity_id=mastermind.agent_id)
The system uses a three-tier secure lookup strategy with encrypted storage:
Tier 1: BeliefSystem (Fast, In-Memory)
# Fast lookup via BeliefSystem
belief = await belief_system.get_belief(
f"identity.map.entity_to_address.{entity_id}"
)
if belief:
return belief.value # O(1) lookup
Tier 2: Encrypted Vault (AES-256 Secure Storage)
# If not in BeliefSystem, check encrypted vault
from mindx_backend_service.encrypted_vault_manager import get_encrypted_vault_manager
vault = get_encrypted_vault_manager()
private_key = vault.get_wallet_private_key(entity_id)
if private_key:
address = Account.from_key(private_key).address
# Cache in BeliefSystem for future fast lookups
await belief_system.add_belief(...)
return address
Tier 3: Legacy Environment File (Migration Fallback)
# Legacy fallback during migration period
env_var_name = f"MINDX_WALLET_PK_{entity_id}"
private_key = os.getenv(env_var_name)
if private_key:
# Migrate to encrypted vault
vault.store_wallet_key(entity_id, private_key, Account.from_key(private_key).address)
address = Account.from_key(private_key).address
return address
Entity IDs follow a hierarchical naming pattern:
{agent_type}_agent_main or {agent_type}_primeid_manager_for_{parent_agent_id}tool_{tool_name}user_{wallet_address}_{agent_name}Environment Variable Names:
MINDX_WALLET_PK_{SAFE_ENTITY_ID}_, uppercasemastermind_prime → MINDX_WALLET_PK_MASTERMIND_PRIME# Check if exists first (prevents duplicates)
existing = await id_manager.get_public_address(entity_id)
if existing:
return existing # Return existing identity
Create new wallet with cryptographic security
account = Account.create()
private_key = account.key.hex()
public_address = account.address
Store in AES-256 encrypted vault
from mindx_backend_service.encrypted_vault_manager import get_encrypted_vault_manager
vault = get_encrypted_vault_manager()
vault.store_wallet_key(
agent_id=entity_id,
private_key=private_key,
public_address=public_address
)
Cache in BeliefSystem for fast lookups
await belief_system.add_belief(
f"identity.map.entity_to_address.{entity_id}",
public_address,
1.0,
BeliefSource.DERIVED
)
# Fast path: BeliefSystem
address = await id_manager.get_public_address(entity_id)
Slow path: Environment file
(only if BeliefSystem miss)
# GuardianAgent arbitrates access
private_key = guardian.get_private_key_for_guardian(entity_id)
signature = id_manager.sign_message(entity_id, message)
The IDManagerAgent integrates with:
data/config/official_agents_registry.jsondata/config/official_tools_registry.jsonget_public_address() firstmindX uses a clear hierarchical model of delegation:
User/External System
↓
MastermindAgent (Strategic)
├── Strategic Planning
├── Campaign Initiation
└── Resource Allocation
↓
StrategicEvolutionAgent (Campaign)
├── Campaign Planning
├── Target Analysis
└── Multi-Step Plans
↓
CoordinatorAgent (Orchestration)
├── Task Routing
├── Agent Management
├── Tool Invocation
└── Event Publishing
↓
Specialized Agents (Execution)
├── SimpleCoder
├── GuardianAgent
├── MemoryAgent
└── Other Domain Agents
↓
Tools (Atomic Operations)
├── FileSystemTool
├── CodeAnalysisTool
└── Other Tools
1. User → MastermindAgent: "Improve system security"
MastermindAgent → StrategicEvolutionAgent: Campaign goal
StrategicEvolutionAgent:
- Analyzes system
- Creates improvement plan
- Delegates tasks to CoordinatorAgent
CoordinatorAgent:
- Routes to appropriate agents/tools
- Manages execution
- Tracks progress
Results flow back up the hierarchy
1. MastermindAgent → CoordinatorAgent: "Create new agent"
CoordinatorAgent:
- Creates IDManagerAgent instance
- Generates identity
- Validates with GuardianAgent
- Registers in agent_registry
- Creates workspace via MemoryAgent
New agent ready for use
1. Agent publishes event: coordinator.publish_event("agent.created", data)
CoordinatorAgent routes to subscribers
Subscribed agents react to event
Decoupled, scalable architecture
# Concurrency Control
heavy_task_semaphore = asyncio.Semaphore(max_concurrent_heavy_tasks)
Resource Monitoring
resource_monitor = ResourceMonitor()
resource_monitor.start_monitoring()
Performance Tracking
performance_monitor = PerformanceMonitor()
The AutonomousAuditCoordinator checks resource usage before campaigns:
if cpu_usage > threshold or memory_usage > threshold:
defer_campaign() # Wait for resources
# CoordinatorAgent publishes events
await coordinator.publish_event("agent.created", {
"agent_id": "...",
"agent_type": "...",
"timestamp": "..."
})
# Agents subscribe to events
coordinator.subscribe("agent.created", async def handler(data):
# React to agent creation
pass
)
agent.created: New agent registeredagent.deleted: Agent removedtool.registered: New tool availableimprovement.completed: Improvement task finishedmindterm.session_created: Terminal session startedmindterm.command_started: Command execution beganmindterm.session_closed: Terminal session ended1. Agent instance created
Identity created via IDManagerAgent
GuardianAgent validates identity
CoordinatorAgent.register_agent() called
Agent added to agent_registry
Workspace created via MemoryAgent
Agent ready for operations
1. MastermindAgent or CoordinatorAgent initiates deletion
Agent operations stopped
Identity deprecated (not deleted - audit trail)
Removed from agent_registry
Workspace archived (not deleted)
Event published: "agent.deleted"
# Tools registered in official_tools_registry.json
{
"registered_tools": {
"tool_id": {
"tool_id": "...",
"description": "...",
"class_path": "...",
"capabilities": [...],
"identity": {
"public_address": "...",
"entity_id": "..."
}
}
}
}
tools/ directoryThe CoordinatorAgent maintains an improvement backlog:
improvement_backlog: List[Dict] = [
{
"id": "...",
"component": "logging_config.py",
"improvement": "Add error handling",
"status": "PENDING",
"priority": 5,
"created_at": "...",
"assigned_to": "..."
}
]
1. AutonomousAuditCoordinator identifies improvement
Adds to improvement_backlog
StrategicEvolutionAgent picks up item
Creates campaign plan
Executes via CoordinatorAgent
Results tracked and learned
data/logs/mindx_runtime.log (human-readable)data/logs/process_traces/ (structured JSON)data/memory/stm/ (agent processes)data/mindterm_transcripts/ (terminal sessions)mindterm is fully integrated into the orchestration system:
mindterm.session_created, mindterm.command_started, etc.
- CoordinatorAgent routes events to subscribers
1. User creates mindterm session via API
mindterm service creates PTY session
Publishes event: "mindterm.session_created"
CoordinatorAgent routes event to subscribers
Commands executed with policy gates
Events published for each command
Agents can subscribe to mindterm events
Session metrics tracked and logged
Primary Configuration:
data/config/agint_config.json: AGInt cognitive loop settingsdata/config/llm_factory_config.json: LLM provider configurationdata/config/official_agents_registry.json: Agent registrydata/config/official_tools_registry.json: Tool registryModel Configuration:
models/mistral.yaml: Mistral AI modelsmodels/gemini.yaml: Gemini modelsEnvironment Variables:
.env: API keys, secrets, overridesMINDTERM_TRANSCRIPTS_DIR: mindterm transcript locationMINDTERM_BLOCKS_DIR: mindterm block storageMain Entry Points:
mindX.sh: Enhanced deployment script with web interfacescripts/run_mindx.py: CLI entry pointscripts/start_autonomous_evolution.py: Autonomous modemindx_backend_service/main_service.py: FastAPI serverAfter startup, verify:
get_public_address() before creatingThe mindX orchestration system seamlessly connects to DAIO (Decentralized Autonomous Intelligent Organization) once DAIO is deployed, enabling blockchain-native governance, cryptographic identity, and economic sovereignty. See DAIO.md for complete technical and strategic documentation.
mindX Orchestration Layer
├── CoordinatorAgent
│ ├── Event Bus → DAIO Event Listener
│ ├── Agent Registry → On-Chain Agent Registry (KnowledgeHierarchyDAIO)
│ └── Resource Monitor → Treasury Cost Tracking
│
├── MastermindAgent
│ ├── Strategic Decisions → DAIO Proposals
│ ├── Resource Allocation → Treasury Requests
│ └── Agent Creation → IDNFT Minting
│
├── IDManagerAgent
│ ├── Identity Generation → IDNFT Contract
│ ├── Wallet Management → Agent Wallets
│ └── Key Storage → Secure Key Vault
│
└── FinancialMind (Extension)
├── Trading Operations → Treasury Funding
├── Profit Distribution → Agent Rewards
└── Economic Analysis → Governance Input
IDManagerAgent generates cryptographic identity (ECDSA keypair)
- Agent identity registered in IDNFT.sol contract
- NFT minted to agent's wallet address
- CoordinatorAgent updates on-chain registry
MastermindAgent identifies strategic need
- Strategic plan converted to DAIO proposal
- AI agents vote via aggregated knowledge-weighted system
- Human subcomponents vote (Development, Marketing, Community)
- Upon 2/3 approval, proposal executed via timelock
FinancialMind executes profitable trade
- Profit automatically routed to DAIO treasury
- Treasury distributes rewards to contributing agents
- Agent wallets receive payments via smart contract
The DAIO integration uses an event-driven architecture to maintain real-time synchronization:
THOT (Temporal Hierarchical Optimization Technology) enhances mindX orchestration through:
FinancialMind serves as the self-funding economic engine for mindX:
For complete DAIO integration documentation, including smart contracts, implementation details, and strategic roadmap, see DAIO.md.
Component Health:
System Health Indicators:
Regular Maintenance:
Autonomous Maintenance:
The mindX orchestration system is a sophisticated, hierarchical multi-agent architecture that:
The system is designed to be:
This orchestration system enables mindX to operate as a true augmentic intelligence - a system that augments itself through continuous improvement and autonomous operation, with blockchain-native governance and economic sovereignty through DAIO integration.