The infrastructure layer for AI agents

ADAMAS is an adaptive, decentralized architecture for multi-agent systems. It provides the isolation, memory, orchestration, and accountability that agents need to operate in the real world.

Most agent frameworks give agents tools and hope for the best. ADAMAS enriches their context with domain knowledge, execution history, and policy constraints — then records what worked so the next agent is smarter.

From Greek adamas — unconquerable. The origin of diamond.

From tool access to informed judgment

Finding tools isn't enough. Agents need context about when to use them, how they relate to the task, and what happened last time.

ADAMAS doesn't just help agents find tools. It enriches their context with related code, requirements, policies, and execution history — then records what worked so the next run is smarter.

"Agent completed the task. Knowledge lost. Next agent starts from zero."
"Agent completed the task. Outcome recorded, patterns extracted, routing weights updated. Next agent starts smarter."

What if your next hire was worth ten?

ADAMAS doesn't replace developers — it elevates them to Architect-Orchestrators, where each person commands 10–50x the development capacity they could produce alone.

Cumulative intelligence

Every execution makes the system smarter. ADAMAS records what tools agents used, what succeeded, what failed — and feeds that back into future discovery and routing.

Semantic Discovery

Agents describe what they need; ADAMAS surfaces relevant capabilities via vector embeddings and graph traversal. Not just tool names — related code patterns, requirements they satisfy, and policies that constrain them.

Thinking-Guided Injection

ADAMAS observes agent reasoning in real-time and injects relevant context mid-execution. When an agent starts thinking about authentication, authentication-related atoms appear in context — without the agent asking.

Graph Traversal

Discovering a tool means discovering its neighborhood: the code that implements it, the requirements it satisfies, related patterns from similar tasks. Context flows through the knowledge graph, not from static schemas.

Progressive Disclosure

Agents don't receive a catalogue of every available capability upfront. They discover what's relevant as their understanding of the task deepens — matching the natural rhythm of reasoning.

The ExecutionAtom Flywheel
Discover Enrich Execute Record Learn Discover (smarter)
Atomic KG
Core knowledge representation. Code, data, models, workflows, and decisions organized into discoverable atoms across five AEONS domains.
Ops KG
System observability as a knowledge graph. Agent health, telemetry, distributed traces, and spec drift detection across the network.
Chat KG
Conversational memory as structured knowledge. Threads, context, user preferences, and interaction patterns accumulated over time.

Accountable autonomy

Autonomy without accountability is a liability. ADAMAS gives agents independence while maintaining the audit trail that real-world deployment requires.

Policy-Constrained Tools

Dynamic permissions scope tools per-task based on intent. A "summarize this document" task gets read capabilities only — no shell, no network, no file writes. Constraints live in the graph and are enforced at discovery time.

Forensic Audit Trail

Every tool call, policy decision, and approval request logs with cryptographic agent attribution. ExecutionAtoms record what tools were used, what the agent was thinking, what changed, and why policies allowed it.

Human Approval Workflows

High-risk actions pause for confirmation via real-time NATS messaging. Configurable per tenant, per action type, or triggered by causal patterns like "read email then execute code."

Compliance-Ready

The same ExecutionAtom that powers learning also serves auditors. Answer "what did agent X do on task Y?" with a single query. The audit trail and the intelligence layer are the same system.

Secure isolation

Prompt injection will succeed. Security isn't about perfect prevention — it's about limiting blast radius when attacks land.

"Assume every agent is already compromised. Then design the architecture so it doesn't matter."
01

Machine & Process Isolation

Each tenant's agents run on dedicated infrastructure — machine boundaries between tenants, process boundaries between agents. Within each machine, agents run as supervised OTP processes under DynamicSupervisors with fail-fast crash semantics. A failing agent is terminated, not restarted. Process memory is isolated by the BEAM runtime. Two levels of isolation before the policy engine even applies.

02

Policy Engine

A dedicated subsystem with three components: ActionRegistry maps every tool to a risk level. CausalTracker records per-session action chains and detects compound threat patterns — "read email then execute code" is flagged before the second action fires. BudgetEnforcer caps spend per task, not per time. Deterministic rules that can't be prompt-injected.

03

Intent-Based Permissions

Before any agent executes, PermissionScoper classifies the prompt's intent and grants only the tools it requires. A "summarize this document" task gets read capabilities only — no shell, no network, no file writes. Scope is determined before execution begins, not negotiated during it.

04

Credential Isolation

Agents never see API keys. A credential proxy resolves agent identity and injects auth headers on their behalf. Secrets are fetched from Vault and held in process memory — a compromised agent cannot exfiltrate credentials it never had access to. All external communication routes through this proxy, enforcing domain allowlists at the network layer.

05

Cryptographic Identity

Every agent receives a unique Ed25519 keypair at dispatch time. Identity is derived from the public key, stored in Vault, and embedded in every event the agent produces. Attribution is cryptographic and unforgeable — every tool call, every outcome, every audit entry traces to a specific agent instance. Events are immutably recorded via event sourcing, producing a tamper-proof execution history.

06

Input Boundaries

Structured prompts differentiate trusted instructions from untrusted data. Content from emails, URLs, and webhooks is tagged at ingestion, with elevated scrutiny for actions following untrusted input — the CausalTracker's pattern detection applies specifically here.

What works

Intent-based scoping — tools granted per-task based on what the prompt actually needs

Deterministic policy — risk levels and causal patterns enforced in code, not prompts

Budget as boundary — agents run until budget exhausted, not arbitrary time limits

Monitoring for forensics — understand incidents, don't pretend to block them

Blast radius limitation — assume breach, contain damage, attribute everything

What doesn't

Prompt-based defenses — bypassed trivially, can't be patched

AI guardrails — another model to attack; fails at scale

Perfect prevention — attack surface is infinite

Architecture

Beyond the three pillars, ADAMAS provides the execution substrate for multi-agent systems.

Durable Workflows

Long-running agent tasks survive process restarts and network failures. The BEAM runtime provides fault tolerance through OTP supervision trees, with event-sourced state that recovers automatically. Multi-step workflows are checkpointed and resumable.

Multi-Model Routing

Default to fast, cost-effective models and escalate to larger models for complex reasoning. Automatic routing based on task complexity reduces cost significantly for routine operations.

Orchestration Patterns

Sequential pipelines, parallel fan-out, iterative refinement, hierarchical delegation, self-modifying workflows. Patterns combine automatically — describe goals, ADAMAS selects coordination strategy.

Cost Transparency

Token accounting, operation costs, and execution time tracked at every layer. Full provenance through ExecutionAtom audit trails. Every action is attributable and budgetable.

Built on open protocols

ADAMAS is powered by open specifications that can be adopted independently.

DGP
Domain Graph Protocol

An agent-first protocol for exposing business domains as unified, queryable graphs. Cost-transparent operations with semantic filtering and relationship traversal designed for LLM consumption.

TURN
Temporal Unified Resource Notation

A notation system for multi-agent orchestration — the equivalent of musical scores for agent systems. The orchestration patterns above are expressed and composed through TURN.

Agents in the world

ADAMAS is the brain of AI agents that operate in real domains. These are the first two — each backed by its own knowledge graph, each getting smarter with every interaction.

Satya
सत्य — Truth, what is real
Business Intelligence

Competitive analysis, market trend synthesis, customer intelligence, and due diligence. Satya accumulates and connects knowledge across time — the cumulative intelligence model in action. Every research session makes the next one deeper.

satya.ai →
Nishchinta
निश्चिंत — Worry-free, at ease
User Support

Contextual support with long-term user memory, knowledge base integration, and intelligent escalation. Nishchinta tracks user history, preferences, and past interactions — creating ease through understanding, not scripts.

nishchinta.ai →

Build on ADAMAS

ADAMAS handles the hard parts of AI application infrastructure: intelligent context enrichment, security isolation, policy enforcement, and execution learning. Your application talks to ADAMAS via DGP; ADAMAS handles everything else.

We're currently in private beta. If you're building AI-native products and need infrastructure where agents get smarter over time — not just safer — we'd like to talk.