openOPC multi-role agent platform
PRD v1.1 alignment · Manager / Auditor · HITL · WorkRoot · plant-floor UA
openOPC (Open One-Person Company) gives each tenant an agent cluster:
— Manager parses intent and coordinates @mention virtual roles;
— Auditor gates milestones with accept / reject and drives remediation loops;
— Skill injects role context before LLM calls; Tool is authorized per role and risk tags can force HITL;
— WorkRoot isolates tenant data and evidence on the data plane.
On the plant floor we use the OPC UA interoperability namespace. On the freight side, the PRD ocean_freight_customs_v1 template maps to live email monitoring, booking / customs microservices and a freeze-before-send outbound queue. The diagrams below show in-cluster agent traffic and external mail flows.
Product overview
Initial Scope Summary: OPC life cycle, role/Tool/Skill/HITL configuration, Run andtrace_idObservable, auditable export; interface with external account/subscription infrastructure API.
Field delivery: We keep a single-team loop with clear API-level ownership so customers know who owns what. On PLC/SCADA / MES we add UA subscriptions and guarded writes. In freight, mail_monitor fans inbound mail into booking, documentation and manifest workers; outbound uses freeze snapshot + approve, matching the PRD "outbound Gate + HITL" pattern. Tool-gate persistence uses agent_skills_json.
Freight forwarding case: email interaction with external parties
Corresponds to PRDocean_freight_customs_v1: The cluster is coordinated by the Managerlogistics, customs, docand other roles; externally they are still represented as customers, booking portals, fleets andhub servicesmail flow between.Booking/Customs declaration outbound shipmentGate must be sent to the outside through HITL and Auditor. The picture below only drawsexternal partiesThe flow direction and intra-cluster collaboration are shown in the figure above.
Core Mechanism (PRD Language)
- Run and trace: A production task runs through
trace_id;Tool calls, Room messages, HITL decisions and exports all need to be associated (see the design document for industrial delivery alignment hash chains, etc.). - Auditor and HITL dual access control: HITL manages "tool/external launcher author executable"; Auditor manages "stage milestone Evidence Pack" - sending gate suggestions to double re-checking externally (PRD §7D / §9).
- Skill/Tool Governance: Skill is injected before LLM call; Tool is authorized by role and can trigger HITL with risk tag; configuration release revision is bound to running Run.
- Multi-tenancy and mailbox isolation: WorkRoot data plane isolation; customer/booking port/fleet binning and type identification drive sub-process (consistent with mail_monitor implementation).
Key indicators (example of acceptance criteria)
| Session replay | Tool sequence and timeline indexable retrieval (typical deployment < 400 ms level) |
| Freeze/Gate | Attachments before outgoingSHA-256Consistent with frozen copies; HITL decisions are consistent withtool_call_idBindable instructions |
| mandatory role | There is only one manager and one auditor each in the published configuration (release verification) |
| OPC UA (onsite) | Configurable subscription and read-write cycles, and versioned mapping tables |
Feature list and specifications
| ability | illustrate |
|---|---|
| Console (standalone deployment) | account,LLM,mailIMAP/SMTP, booking hatch mailbox, Agent start and stop, etc. are provided by the freight/OPC operating environment and are not within the scope of this official website warehouse. |
| Operation and maintenance intervention | Manual takeover, session suspension, single-step replay |
| open interface | internallyRESTDocuments are released with versions, and sample requests can be imported.Postmangather |
| deploy | Linux cluster /K8s;Message and vector libraries can be privatized |
Data and security
Sensitive routes and credentials reside in customer-controllable key management; Progress/streaming output does not echo key plaintext; audit export does not include private keys. The outgoing mail queue is an independent process and is isolated from the generation service; it has the same governance direction as the "Key and Privacy" and "Outgoing Unduplicated (Impotent Key)" clauses in the PRD.
View freight forwarding agents in smart logistics solutions white paper Book a demo