What agents are actually deployed?
Many teams cannot produce a current inventory of agents, capabilities, or operating scope.
open standard / documentation-first
A file-first, machine-readable framework for agent inventory, access scope, oversight, validation, and compliance context. Built for teams that want governance artifacts in source control instead of slide decks.
version: 1.0.0
agent:
id: research-analyst-v4
owner: operations-core
capabilities:
- search
- data-export
governance:
access: scoped-read-only
audit: persistent
human_oversight: required
$ helixdocs validate .agents.yaml
✓ Specification valid
✓ Required governance fields present
Registry digest: sha256:e3b0c442...human layer / machine layer
Agents and tooling can discover the machine-readable entry points here:
why this exists
Many teams cannot produce a current inventory of agents, capabilities, or operating scope.
Agents call APIs, process documents, and interact with internal systems. Governance starts with explicit permissions.
Technical documentation, oversight controls, and processing context should be machine-readable and reviewable.
lifecycle
The workflow is intentionally simple: define the agent in a documented schema, validate it in CI, and publish the resulting record to a shared registry or trust surface.
agent:
id: support-router-eu
owner: support-platform
interfaces:
- email
- crm
governance:
access: customer-record-read
oversight: escalation-requiredDescribe identity, interfaces, scope, and governance controls in a single machine-readable document.
Run deterministic checks in local development or CI so required documentation fields do not depend on manual review alone.
Publish a canonical record for discovery, review, customer trust pages, or internal inventory systems.
registry
The registry view is not a product dashboard gimmick. It represents the kind of structured discovery index that teams, auditors, and downstream systems can query or review.
org/research-analyst-v4
org/support-router-eu
org/legacy-sync-worker
org/devops-automata
specification
.agents.yaml is designed as a source-controlled description of agent identity, risk posture, oversight requirements, and processing context.
agents:
- id: "acme/support-bot"
risk_class: limited
autonomy_level: supervised
data_processing:
legal_basis: "Art. 6(1)(b) DSGVO"
human_oversight:
required: truefile-first
A plain text document in your repository. No proprietary control plane required.
compliance-aware
Fields can map to EU AI Act, DSGVO, NIS2, and internal review processes.
incremental
A team can begin with a minimal record and evolve toward fuller technical documentation.
regulatory mapping
community
HelixDocs is intended to feel closer to infrastructure documentation than to marketing collateral: explicit schema decisions, reusable tooling, and public discussion.
license
The specification is intended to be reused, discussed, and implemented across tools and organizations.
tooling
Validators, generators, and CI integrations should remain inspectable, composable, and easy to adopt.
governance
Schema evolution, implementation notes, and open questions belong in the open — not behind vendor workflows.
audience
A practical schema for describing agents, capabilities, and controls in source control.
A consistent structure for documentation, oversight, and processing context.
A shared format for understanding what an AI estate contains and how it is governed.
Validation and review workflows that can run in CI instead of ad-hoc spreadsheet processes.
early access
The specification stands on its own. If you want updates on tooling, validators, or hosted workflows, you can leave an email here.