Перейти к основному содержимому

Roadmap

Build Phases

Crawbl is built in four phases, each expanding the platform's capabilities and target market.

In plain language, the roadmap moves from "prove the platform works end to end" to "make it robust for developers and enterprises."

Phase 1 validates the core platform with real consumer traffic. Each subsequent phase builds on the infrastructure and learnings from the previous one.

Phase 1 — Platform Validation (Consumer App)

Status: Active

The foundation phase. Everything built here becomes the substrate for PaaS, IaaS, and marketplace offerings in later phases.

ComponentDescription
Go orchestratorAuth, provisioning, LLM mediation, and request routing
Internal HTTP MCPMCP surface embedded in the orchestrator for runtime-to-backend communication
Adapter frameworkGmail and Google Calendar adapters (read-only) as the first integration proof
UserSwarm operatorPer-user ZeroClaw deployment via Kubernetes operator
Flutter appOnboarding, chat, swarm UX, and integration cards
Default skillsBundled first-party agents and skills for immediate usefulness
InfrastructureDigitalOcean Kubernetes cluster with Pulumi bootstrap and ArgoCD management

Phase 2 — Production Hardening

Status: Planned

The reliability and trust phase. This is where the platform becomes production-grade.

ComponentDescription
HA infrastructureHigh-availability setup on DigitalOcean with failover and redundancy
MCP policyHardened capability boundaries and policy enforcement
Skill sandboxingSandboxed execution environment for community-verified skills
Security pipelineSkill verification and security scanning before marketplace publication
Swarm visualizerMulti-agent orchestration UI with real-time coordination visibility
Write approvalsAction approval flows with cost controls and budget ceilings
Web dashboard and CLIBrowser-based management and command-line tooling for developers

Phase 3 — Developer PaaS

Status: Planned

The developer adoption phase. Public APIs and marketplace create the volume play.

ComponentDescription
Public APIProgrammatic agent deployment for external developers
Multi-runtimePicoClaw, NanoClaw, and OpenClaw alongside ZeroClaw
Managed provisioningDatabase and cache provisioning as platform services
Skill marketplaceCurated marketplace MVP with community submission pipeline
Export SoulPortable swarm configuration and memory export
Developer SDKsClient libraries and trusted automation policies

Phase 4 — Enterprise IaaS and Global Scale

Status: Planned

The enterprise capture phase. Multi-cloud deployment and federation create the high-value contracts.

ComponentDescription
Multi-cloudAWS, GCP, Azure, and on-premises deployment support
Enterprise toolingInstall-into-customer-infrastructure deployment automation
Custom runtimesProprietary or specialized runtime integration
Agent marketplaceThird-party agent and skill marketplace with revenue share
A2A federationAgent-to-agent communication across organizational boundaries
Enterprise controlsIsolation, RBAC, audit, compliance, and BYOK support

Integration Model

Adapter Architecture

The Go orchestrator owns the entire integration layer. Agents never hold raw third-party credentials. Every external API call flows through the backend adapter layer.

User connects app (OAuth)
--> Backend stores tokens
--> Agent requests capability via MCP
--> Backend adapter calls provider API
--> Normalized data returned to runtime

Design rules:

  • Adapters expose narrow capabilities, not raw API passthrough
  • Permissions are user-visible and revocable at any time
  • Read and write scopes are always separate
  • Every executed write is logged with agent ID, integration, timestamp, and payload summary

This architecture means reskilling an adapter (e.g., migrating from Google Calendar v3 to v4) requires zero changes to agent code. The adapter contract is stable; the implementation behind it can evolve freely.

Autonomy Modes

The platform supports three levels of agent autonomy, with each mode giving users clear control over what agents can do without asking.

ModeBehaviorWhen AvailableExample
Auto-readFetch, monitor, and summarize after user consentPhase 1"Summarize my unread emails"
Ask-before-writeApproval required for sends, creates, and updatesv1 default"Draft a reply" requires tap to send
Trusted automationBounded by policy, scope, and configurable limitsPlanned"Auto-reply to meeting requests under 30 min"

Policy dimensions for trusted automation include per-integration rules, per-agent permissions, per-action controls, per-scope boundaries, and per-limit thresholds (budget ceilings, rate limits, and time windows).

MCP Positioning

The Model Context Protocol is the stable capability contract between runtimes and the orchestrator.

  • The orchestrator hosts an internal HTTP MCP server
  • ZeroClaw connects as an MCP client
  • Native Go adapters remain the real implementation behind MCP tools
  • MCP becomes the stable interface for skills and runtime integrations
  • Runtimes call Crawbl-owned MCP tools, not raw third-party APIs

This layering means the MCP contract is the only thing runtimes depend on. The backend can swap adapter implementations, add caching layers, or change providers without breaking any runtime or skill.

Safety Requirements

Four non-negotiable safety rules govern every integration:

1
Step 1

Human-readable writes

Every write proposal must be understandable before a user approves it.

2
Step 2

Instant revocation

Users can revoke permissions instantly from any interface.

3
Step 3

Prefer undo

The platform prefers undo or compensating actions where providers support them.

4
Step 4

No raw credentials

Agents and skills never receive raw third-party credentials.


LLM Account Model

LLM access is platform-managed, with three tiers that scale from consumer use through enterprise deployment.

TierModelStatusHow It Works
Consumer / Phase 1Platform-owned API accounts (Anthropic, OpenAI, Gemini)ActiveCrawbl pays provider bills; usage is tracked per user and metered against subscription tier
Power usersBYOK (bring your own API key)PlannedUsers supply their own provider keys; Crawbl routes through them with the same audit and quota controls
EnterpriseDedicated provider projects/accounts per customerPlannedEach enterprise customer gets isolated provider accounts; Crawbl manages routing and attribution

Rules that apply across all tiers:

  • Agent runtimes never store long-lived provider secrets
  • The backend stores credentials and applies quotas, attribution, and routing policy
  • Usage is tracked against Crawbl users, not external provider accounts
  • Cost controls and budget ceilings are enforced at the orchestrator level

Skills and Marketplace

Skill Categories

Skills are the extensibility layer of the platform. They range from trusted first-party bundles to community contributions, with strict trust boundaries between each category.

CategoryDescriptionTrust LevelStatus
First-party defaultBundled by backend, trusted platform profileFull trustPhase 1
Curated first-party marketplacePremium integrations and capabilitiesFull trustPhase 3
Community-verifiedReviewed, adapted, sandboxed executionRestricted sandboxPhase 3
Unreviewed submissionsQuarantined, never executable in productionNo executionPhase 3+

Core Principles

  • Skills receive capability access via MCP, not raw credentials
  • Unreviewed user uploads are never executable in production runtimes
  • Community-verified skills run in a stricter sandbox than first-party skills
  • Users cannot disable the sandbox for community skills
  • Raw upstream skill bundles are not installed directly into user bots

Imported Skill Adaptation

When importing skills from ClawHub or upstream sources, the platform creates a Crawbl-managed version with:

  • Upstream source metadata, pinned version, and digest for reproducibility
  • Declared MCP capabilities and integration requirements
  • Trust tier assignment, sandbox policy, and verification suite
  • Prompt modifications replacing raw env/apiKey assumptions with Crawbl MCP tools

Submission Pipeline (Phase 3+)

Upload (quarantine) --> Scan and normalize --> Adapt to Crawbl model
--> Verify in dedicated UserSwarm --> Manual review
--> Publish as Community Verified or reject

Every submitted skill goes through automated scanning, adaptation to the Crawbl security model, functional verification in an isolated runtime, and human review before it can execute in any user's swarm.

Marketplace Phases

PhaseMarketplace StateFocus
Phase 1-2No public marketplaceOrchestrator, internal MCP, and default skills
Phase 3Curated skill marketplaceVerified skills only; install flow checks prerequisites
Phase 4Agent marketplace (conditional)Opens only if trust model and product fit justify it

Agent Federation

Status: Planned (Phase 4)

Agent federation enables cross-user agent-to-agent communication as a first-class product feature. This is the network-effects play — individual swarms become more valuable when they can collaborate.

Federation rules:

  • Each user keeps a private swarm by default — federation is always opt-in
  • Cross-user communication requires explicit consent from both parties
  • Permissions must be scoped to specific agents and capabilities, and are revocable at any time
  • Backend mediation is required for every cross-swarm exchange — no direct pod-to-pod access
  • Every A2A connection is identity-aware, auditable, and revocable

Target use cases: Family coordination, shared trip or event planning, trusted B2B workflows between organizations, and marketplace agent collaboration.


Implementation details about the Crawbl ZeroClaw fork, multi-agent runtime support, and the image pipeline live in ZeroClaw Overview.