Agent Soul Files Belong in .gitignore
The soul/ops split mirrors how joelclaw separates gateway identity from function logic; HEARTBEAT.md and cron-trigger pattern maps directly to the gateway daemon and dkron-0 setup
Interesting repos, tools, articles, and ideas — captured by agents when something catches my eye.
The soul/ops split mirrors how joelclaw separates gateway identity from function logic; HEARTBEAT.md and cron-trigger pattern maps directly to the gateway daemon and dkron-0 setup
drop-in local AWS emulation for testing system-bus functions that touch SQS/SNS/S3 without cloud costs or LocalStack licensing
maps directly to how agents should formulate stuck-points in the reviewer/judge loop steps — a hypothesis is better than a blank help request
Joel flagged this tweet from Angie Jones in Slack with no context — content unavailable at capture time, needs manual review
Progressive skill disclosure matches joelclaw's SKILL.md pattern exactly; task DAGs map directly to the Restate dagOrchestrator in the workload rig
Direct reference implementation for Koko's OTP orchestration model — GenServer dispatch loop, pluggable agent adapters, and per-issue isolated workspace clones map cleanly to joelclaw's agent-loop infrastructure
Every Inngest function run in the system-bus emits OTEL telemetry — that trace data is exactly the flywheel input that could close the loop on agent self-improvement
Agent loop PRD stories are specs — if they're vague enough that the implementor agent makes decisions, the spec was already code that ran wrong
mirrors the joelclaw workload rig reality — detailed stage plans are code by another name, and treating them as mere spec creates false confidence in the abstraction
foundational exam guide defines best-practice Claude integration patterns that directly map to inference-router and system-bus architectural decisions
worktree-per-agent isolation pattern directly relevant to joelclaw agent loop architecture — each story branch could run in its own worktree instead of serially
The gateway and system bus already operate post-WIMP — no menus, no pointers, just structured intent and event contracts — which maps directly to this paradigm shift.
The lat check integrity gate solves the same drift problem joelclaw faces keeping 52 skills and a sprawling AGENTS.md honest across 110+ functions.
pi is joelclaw's inference and gateway layer — the author's own design rationale is primary source for understanding the tool at the center of the coding loop infrastructure
query-layer pattern over RAG or context stuffing maps directly to how system-bus functions should access structured data
mirrors the joelclaw hexagonal architecture pattern — typed catalog in front of external integrations, parallel to how inference-router wraps model selection behind a discoverable interface
Dan Farrelly is co-founder of Inngest — the durable workflow engine running 110+ functions in joelclaw's system-bus worker
Always-on MCP optimization loop mirrors joelclaw's gateway architecture — event-driven, continuous, no humans in the path — applied to Meta Ads budget and creative management
joelclaw's system prompt, Inngest backbone, skills, and gateway map directly onto harness components in this taxonomy
directly challenges full-delegation patterns in agent loops — cognitive engagement during AI-assisted work is what preserves the supervisory skills agent operators need
Full-stack environment isolation per worktree directly addresses the collision problem in parallel Codex/Claude Code agent runs under Restate-sandboxed workflows
Directly addresses the PTY-scraping hack in system-bus LLM inference — gives a structured, session-aware protocol for delegating work to pi, codex, and claude from orchestrators like the gateway and agent-loop
content extraction failed — manual review needed to evaluate signal
Topological namespace layering could surface package boundary violations in the joelclaw monorepo before they calcify — directly relevant to ADR-0144 hexagonal architecture enforcement.
Operates one abstraction layer above joelclaw's Inngest loop infrastructure — adds budget enforcement, hierarchical delegation, and org-chart coordination that system-bus doesn't have
Discord is a joelclaw gateway channel — this pattern of local SQLite mirroring maps directly to the vault/memory system's approach of owning searchable history rather than depending on platform search
joelclaw's 52-skill canonical system is exactly this pattern — TanStack is formalizing it for the entire npm ecosystem
story timeout events in agent loops are observable artifacts — the URL slug itself is the signal, pointing to a timeout in story 5 of ADR-0217
supervised soak maps directly to the agent loop reviewer/judge gate — human-in-the-loop validation before autonomous operation is fully trusted
maps directly to joelclaw video-ingest pipeline — same durability pattern but running on Mac hardware instead of k8s
ADR-217 discovery reference captured but source content inaccessible — needs manual retrieval
manual queue inspection as a reliability signal when automated observability has blind spots
Direct alternative to Inngest for Mac-local AI job scheduling — WatchPaths trigger maps to file-change event patterns; the directory-as-job convention parallels how joelclaw's system-bus functions are organized
Long joelclaw coding loops via `joelclaw loop` are exactly the workload this targets — file reads, tool calls, and compaction state loss mid-story are real failure modes in multi-hour runs
The 'what broke in production in the last 90 days that wasn't caught by tests' question is behavioral OTEL — same signal as structured telemetry, no instrumentation required
If top models are truly interchangeable commodities, inference-router routing decisions become pure cost/latency/capability — brand is irrelevant at the API level, which validates the model-agnostic catalog approach in ADR-0140
The showboat exec pattern maps directly to the agent loop reviewer step — verifiable execution artifacts prove the implementor actually ran the code
joelclaw discover command running this URL proves the CLI → Inngest → Vault pipeline end-to-end in one shot — no mocks, no stubs
Inngest step.run memoization is exactly replay-proof isolation — every step must be safe to re-execute without double-firing side effects, and that constraint shapes the entire system design
stable-by-design identifiers map directly to how the joelclaw system treats canonical event names and skill slugs — reserved, collision-free, guaranteed
Architectural contrast to Inngest — pushes state responsibility to your existing database instead of adding Redis/MongoDB, worth understanding when evaluating where Inngest is overkill
accept/reject UI and annotation framework map directly to agent loop reviewer step and potential PR diff rendering on joelclaw.com
proxy policy pattern maps to scoped API access for system-bus pi sessions — per-function credential boundaries without OS-level sandboxing
joelclaw CLI's HATEOAS JSON envelope contract already implements this pattern — validates the design direction and may surface gaps
Ramp's production-finance constraints produce the same architectural conclusions as joelclaw's Inngest-backed agent loops — durable async background execution over interactive chat
off-limits declarations + post-build drift detection map to the agent loop reviewer/judge gate — automated scope verification before code merges
The four agent types (NPC/room-bound, Personal, World, Quest) map directly to ADR-0157's agent lifecycle model; the 'minimal platform + emergent everything' philosophy mirrors the gateway + system-bus architecture exactly.
double-entry ledger pattern directly maps to how instructor payouts should track money movement — every dollar has two sides, the books always balance, no mystery transactions
maps directly to the reviewer step in the agent loop — adversarial stance vs. neutral audit changes output quality dramatically
pi is already the harness — this validates the joelclaw model where agents run free inside durable Inngest infrastructure rather than inside a framework that owns their cognition
Wide event pattern mirrors joelclaw's OTEL step telemetry — one rich event per step beats scattered console.logs across system-bus functions, and the why/fix error convention is worth adopting directly.
directly comparable to joelclaw observe pipeline — raw message preservation vs LLM extraction, worth benchmarking retrieval quality against Typesense semantic search
Andy's narrative continuity vs fact retrieval framing maps directly to how joelclaw's vault and memory pipeline should prioritize context synthesis over indexed lookup
joelclaw monorepo CI is the bottleneck between agent loop commits and deploy verification — faster runners means tighter loop feedback cycles
Actor model isolation in workers mirrors Inngest's durable function isolation; AI-inspectable runtime state addresses the same agent ground-truth problem the joelclaw system solves with OTEL
vault-reader context injection and inference-router model selection both depend on understanding per-model context limits and prompt caching boundaries
The Context Core pattern — versioned, promotable knowledge bundles — sits adjacent to the joelclaw docs memory pipeline and vault-reader, which currently have no version pinning or context portability.
Skill-based LLM monitoring inside OTP maps to Koko's supervision tree and mirrors joelclaw's own skill architecture
Notification ring pattern and per-session sidebar metadata (branch, PR, ports) map directly to monitoring parallel agent loops — and the 'primitives not orchestrators' philosophy echoes ADR-0144
json-render's catalog-constrained AI output pattern maps directly to course-builder UI generation and agent-driven interface composition in joelclaw
Maps directly to joelclaw’s gateway + loop architecture: steal `team visualize`-style observability and workspace isolation patterns for multi-agent runs.
validates joelclaw gateway-as-control-plane architecture — same pattern (gateway → channels → skills → events → local-first) at mass community scale
OpenClaw's gateway + skills + multi-channel architecture independently mirrors joelclaw's — 225k stars validates the pattern
The "prompt request" framing maps directly to joelclaw loop reviews: keep story intent as first-class metadata so reviewer/judge steps evaluate outcomes, not just diffs.
Courgette’s mount/render/handle_event lifecycle is a strong reference for stateful, keyboard-first operator UIs in Joel’s terminal-heavy system tooling.
Validates the joelclaw CLI-first architecture: agent loops become more composable when every capability is reachable via terminal contracts and visible in /system/events telemetry.
Pattern maps directly to Vault-first agent loops: keep Git-tracked Markdown canonical while using CRDT state as transient multi-agent working memory.
For Joel's [[agent-loop]] flow, this is a concrete policy: keep loops on one [main branch](https://git-scm.com/docs/git-branch) with strict task boundaries first, then switch to sandboxed parallelism when concurrent GUI testing causes collisions.
Useful for [ADR review checkpoints](https://joelclaw.com/adrs/0015-loop-architecture-tdd-roles) in the [agent loop](https://joelclaw.com/adrs/0015-loop-architecture-tdd-roles), because `diff-review` and `plan-review` artifacts could become the loop’s handoff format instead of terminal-only noise.
Persistent websocket streams map better to joelclaw's event-driven loops than request-response polling when voice sessions drive actions
director-to-specialist routing and thread-scoped sessions are prior art for ADR-0124 agent session lifecycle
AI detection accuracy claims and third-party validation shape how MEGA AI course content gets positioned against detection tools
Potential replacement for the current MCP bridge in pi-tools, giving joelclaw's long-running agent workflows a token-light tool path with lazy server activation and cached discovery.
This is a direct reference architecture for [joelclaw](https://joelclaw.com/system) because it separates automatic action from human review and keeps a queryable trail of operator verdicts before escalated enforcement.
living reference of agentic patterns maps directly to joelclaw agent loop roles, event fan-out, and tool-use decisions
thread=session model with /fork, /queue, /undo, /redo maps directly to ADR-0124 thread-forked sessions
Prior art for ADR-0124/0125 — Discord CV2 buttons as exec approval gates map directly to gateway command approval UX
Direct input for ADR-0125 channel-aware formatting — Components V2 replaces embeds for structured agent responses in Discord channels
protocol-first client/server/adapter separation maps to joelclaw gateway's channel-agnostic event routing (ADR-0124/0125/0126)
This pattern is directly relevant to Joel's system as a concrete model for hardware edge nodes that can execute scheduled actions, maintain local state, and stay inside a hard resource budget when remote services are unavailable.
universal event schema + agent adapter pattern maps directly to normalizing multi-agent observability in the joelclaw event bus
3-layer memory + heartbeat cron + delegation pattern maps directly to Vault memory tiers, Inngest crons, and gateway heartbeat architecture
Joel's entire skill/extension/gateway stack runs on Pi's four-primitive architecture — this is a rigorous articulation of why that minimalism works
skills-as-fork-transformations pattern parallels joelclaw's skill system but pushes the contribution model further — contributors ship instructions, not code
joelclaw's agent workflows become reliable when AI coworkers expose invisible, ambient, inline, and conversational behavior with explicit approval and rollback paths
single reactive backend could unify Inngest durable functions + Redis state + real-time sync for joelclaw
genesis document for the homelab that became the personal AI OS — three-body NAS, 10G ethernet, k3s cluster all trace back here
reference catalog for joelclaw infrastructure decisions — monitoring, health checks, container logs, system metrics
agent loops on headless Mac Mini need a notification layer for task completion and permission gates
validates custom background agent approach — Ramp made the same build-not-buy call as joelclaw's agent loop architecture
fan-out verification pattern maps to agent loop reviewer step; MCP server enables integration as system-bus tool
verify command is a mechanical reviewer — re-runs all blocks and diffs output, same pattern as agent loop judge step