Skip to main content
Part of Alfred’s six-layer architecture. The Agentic layer hosts the specialists that do the work.

Your team

Alfred runs five specialists that work continuously on your vault. Each one has a defined role, a strict scope, and no ability to exceed its permissions — even if the underlying language model tries.
SpecialistWhat they doWhen they work
CuratorReads what you share and creates structured vault recordsAutomatically when new content arrives
JanitorScans for broken links, missing metadata, orphaned records — and repairs themPeriodic sweeps
DistillerSurfaces assumptions, decisions, constraints, contradictions, and synthesized insightsOn-demand or scheduled
SurveyorEmbeds records as vectors, clusters by meaning, labels clusters, writes relationship linksOn-demand or scheduled
ClerkStateless LLM worker dispatched by other specialists for analytical tasks — classifying inputs, extracting entities, writing summariesOn-demand by other specialists

OpenClaw — the agent runtime

OpenClaw is Alfred’s AI agent gateway. It manages sessions, skills, device pairing, and agent execution. Every specialist runs through OpenClaw, which provides a consistent interface to the LLM backends you’ve configured. OpenClaw binds to localhost and is reachable externally only via Cloudflare Tunnel (outbound-only from your server — your IP is never exposed).

Scope enforcement

Each specialist operates within strictly defined permissions, enforced in code before every vault operation. The language model cannot bypass these rules.
SpecialistCreateReadEditDelete
CuratorEntity typesAllAllNever
JanitorNeverAllAllYes
DistillerLearning types onlyAllNeverNever
The Curator can never delete your records. The Janitor can never create new ones. The Distiller can only create learning records. These aren’t suggestions in a prompt — they’re hard gates in code.

The vault CLI gate

Agents never touch the filesystem directly. Every vault operation goes through the alfred vault CLI, which mediates all access:
  • Scope checking — is this specialist allowed to perform this operation?
  • Path validation — is this file inside the vault boundary? (blocks ../, symlinks, escapes)
  • Schema validation — is this a valid record type with correct frontmatter?
  • Mutation logging — every create, edit, delete, and move is recorded in an append-only audit trail
Even if an agent’s prompt is manipulated, it cannot perform unauthorized operations.

Prompt injection defense

No AI system can guarantee 100% immunity to prompt injection. Alfred’s approach is defense in depth — even if the language model is tricked, the damage it can do is bounded by technical enforcement that the model cannot override.
LayerEnforcementWhat it does
ScopeCodeOperations outside the specialist’s scope are blocked
Path validationCodeFile access outside the vault boundary is rejected
Schema validationCodeInvalid record types and status values are rejected
Mutation loggingCodeEvery change is recorded in an append-only audit trail
Skill instructionsPromptEach specialist receives explicit behavioral constraints
Layers 1 through 4 are technical controls the language model cannot bypass. Layer 5 adds behavioral guidance on top.

Third-party access

Your Alfred connects only to configured LLM providers, Hetzner S3 (for backups), Tailscale, and Cloudflare. No third-party plugins (ClawHub installation is disabled by default), no arbitrary API access, no browser extensions. The attack surface is deliberately minimal.

Your Specialists

Monitor and direct your specialists

Device Pairing

Manage OpenClaw device access

Security

Full threat model and sandboxing details