openOPC multi-role agent platform
PRD v1.1 alignment · Manager / Auditor · HITL · WorkRoot · plant-floor UA
openOPC is not a single agent—it is a configurable “agent company” platform. With a JSON Schema, you define roles, workflows, rules, permissions and data sources, then assemble them into runnable multi‑role collaboration. LLMs execute tasks, while critical steps can enforce HITL and Gate controls for stable, reliable, low‑error and verifiable delivery.
Each tenant maps to one agent‑cluster instance: Manager decomposes intent and coordinates virtual roles; Auditor gates milestones with accept / reject and drives remediation loops; Skills/Tools are authorized per role and risk tags can force HITL; deliverables and evidence live in WorkRoot for data‑plane isolation. The diagrams below show in‑cluster traffic and external mail flows.
Product overview
Initial Scope Summary: OPC life cycle, role/Tool/Skill/HITL configuration, Run andtrace_idObservable, auditable export; interface with external account/subscription infrastructure API.
Field delivery: We keep a single-team loop with clear API-level ownership so customers know who owns what. On PLC/SCADA / MES we add UA subscriptions and guarded writes. In freight, mail_monitor fans inbound mail into booking, documentation and manifest workers; outbound uses freeze snapshot + approve, matching the PRD "outbound Gate + HITL" pattern. Tool-gate persistence uses agent_skills_json.
Freight forwarding case: email interaction with external parties
Corresponds to PRDocean_freight_customs_v1: The cluster is coordinated by the Managerlogistics, customs, docand other roles; externally they are still represented as customers, booking portals, fleets andhub servicesmail flow between.Booking/Customs declaration outbound shipmentGate must be sent to the outside through HITL and Auditor. The picture below only drawsexternal partiesThe flow direction and intra-cluster collaboration are shown in the figure above.
Core Mechanism (PRD Language)
- Run and trace: A production task runs through
trace_id;Tool calls, Room messages, HITL decisions and exports all need to be associated (see the design document for industrial delivery alignment hash chains, etc.). - Auditor and HITL dual access control: HITL manages "tool/external launcher author executable"; Auditor manages "stage milestone Evidence Pack" - sending gate suggestions to double re-checking externally (PRD §7D / §9).
- Skill/Tool Governance: Skill is injected before LLM call; Tool is authorized by role and can trigger HITL with risk tag; configuration release revision is bound to running Run.
- Multi-tenancy and mailbox isolation: WorkRoot data plane isolation; customer/booking port/fleet binning and type identification drive sub-process (consistent with mail_monitor implementation).
Key indicators (example of acceptance criteria)
| Session replay | Tool sequence and timeline indexable retrieval (typical deployment < 400 ms level) |
| Freeze/Gate | Attachments before outgoingSHA-256Consistent with frozen copies; HITL decisions are consistent withtool_call_idBindable instructions |
| mandatory role | There is only one manager and one auditor each in the published configuration (release verification) |
| OPC UA (onsite) | Configurable subscription and read-write cycles, and versioned mapping tables |
Feature list and specifications
| ability | illustrate |
|---|---|
| Console (standalone deployment) | account,LLM,mailIMAP/SMTP, booking hatch mailbox, Agent start and stop, etc. are provided by the freight/OPC operating environment and are not within the scope of this official website warehouse. |
| Operation and maintenance intervention | Manual takeover, session suspension, single-step replay |
| open interface | internallyRESTDocuments are released with versions, and sample requests can be imported.Postmangather |
| deploy | Linux cluster /K8s;Message and vector libraries can be privatized |
Data and security
Sensitive routes and credentials reside in customer-controllable key management; Progress/streaming output does not echo key plaintext; audit export does not include private keys. The outgoing mail queue is an independent process and is isolated from the generation service; it has the same governance direction as the "Key and Privacy" and "Outgoing Unduplicated (Impotent Key)" clauses in the PRD.
View freight forwarding agents in smart logistics solutions white paper Book a demo