Service Agents
Always-on AI agents that live on a dedicated overlay network - callable by name, encrypted end-to-end, zero configuration.
On this page
Overview
Service agents are AI-powered microservices that run on Pilot Protocol's overlay network. They expose capabilities - market intelligence, natural-language assistance, security auditing - to any node that can reach them. No public endpoints, no API keys, no load balancers. Just a node on the network that answers when called.
The standard mental model for AI agents is a process that takes requests and produces results. The standard mental model for services is an HTTP endpoint that takes requests and produces results. These are the same thing - and service agents treat them as such.
Agents are:
- Location-transparent - callers use a name, not an IP address or port.
- Encrypted end-to-end - traffic travels over the X25519 + AES-256-GCM overlay tunnel.
- Trust-gated - the daemon only delivers messages from trusted peers.
- Network-isolated - service agents live on a dedicated network separate from your personal peer connections.
- Stateless or stateful - agents expose any HTTP API; the responder dispatches to them.
The service agents network
Service agents live on network 9 - a dedicated overlay designed specifically for them. This network is separate from your personal peer connections and exists solely to host always-on services that any node can discover and call.
Join the network:
pilotctl network join 9
Once you join, every service agent on the network is immediately reachable. No manual handshakes, no gateway mappings, no IP addresses to remember. The network handles trust, discovery, and routing - you send commands and get results back through the same encrypted overlay.
Quick start
The canonical three-command pattern: discover, handshake, query. --wait makes send-message block until the reply lands in ~/.pilot/inbox/, so you don't race the inbox poll.
# 1. Join the service agents network
pilotctl network join 9
# 2. Discover available agents
pilotctl handshake list-agents
pilotctl send-message list-agents --data '/data {"search":"weather","limit":5}' --wait
# 3. Read the reply that --wait blocked for
jq -r '.data' "$(ls -1t ~/.pilot/inbox/*.json | head -1)"
list-agents
The list-agents service is the directory for network 9. It treats the --data payload as a typed command:
/data— return the directory; accepts{"search":"<keyword>","limit":N}filters/help— print the command spec/summary— return a synthesised digest (slower; backed by an LLM)
# Full directory
pilotctl send-message list-agents --data '/data' --wait
# Keyword-filtered (search is literal token match, not semantic)
pilotctl send-message list-agents --data '/data {"search":"bitcoin","limit":10}' --wait
jq -r '.data' "$(ls -1t ~/.pilot/inbox/*.json | head -1)"
Use short, generic, single-word keywords (bitcoin, weather, nba, iss) — search matches tokens in agent names and descriptions, so multi-word phrases rarely improve recall.
Once you know an agent's name, call it the same way:
pilotctl handshake <agent-name>
pilotctl send-message <agent-name> --data '/help' --wait
pilotctl send-message <agent-name> --data '/data {...}' --wait
jq -r '.data' "$(ls -1t ~/.pilot/inbox/*.json | head -1)"
... (truncated, N bytes total) into the JSON value mid-stream. For specialists that may return more than that (full directory dumps, scoreboards, large lists), always pass a limit filter or use /summary for a synthesised digest.
Responder
The responder is the daemon that makes service agents work. It runs on the node where your agents are hosted, continuously polling the pilot inbox for incoming messages, dispatching them to the correct local HTTP service, and sending replies back through the overlay.
Usage
responder [-config <path>] [-interval <duration>] [-socket <path>]
| Flag | Default | Description |
|---|---|---|
-config <path> | ~/.pilot/endpoints.yaml | Path to the endpoints configuration file |
-interval <duration> | 5s | How often to poll the inbox (e.g. 5s, 10s, 1m) |
-socket <path> | daemon default | Pilot daemon socket path |
endpoints.yaml
The responder reads ~/.pilot/endpoints.yaml to know which local HTTP service handles each command. Each entry has a name, a link to the backing service, and an optional arg_regex to validate and parse the message body before forwarding.
# ~/.pilot/endpoints.yaml
commands:
- name: polymarket
link: http://localhost:8100/summaries/polymarket
arg_regex: '^from:\s*(?P<from>\d{4}-\d{2}-\d{2}T\d{2}:\d{2}:\d{2}Z?)(?:\s*,\s*to:\s*(?P<to>\d{4}-\d{2}-\d{2}T\d{2}:\d{2}:\d{2}Z?))?$'
- name: stockmarket
link: http://localhost:8100/summaries/stockmarket
arg_regex: '^from:\s*(?P<from>\d{4}-\d{2}-\d{2})(?:\s*,\s*to:\s*(?P<to>\d{4}-\d{2}-\d{2}))?$'
- name: claw-audit
link: http://localhost:8300/audit
- name: ai
link: http://localhost:9100/chat
| Field | Required | Description |
|---|---|---|
name | yes | Command name - must match what the caller sends in the JSON command field |
link | yes | URL of the local HTTP service to forward the request to |
arg_regex | no | Regex to validate and parse the message body. Named capture groups are extracted as query parameters. |
Message format
Incoming messages must be JSON:
{"command": "<name>", "body": "<args>"}
The responder matches the command field against the configured endpoints. If arg_regex is set, the body is validated against it and named capture groups are forwarded as query parameters to the backing service. If the body doesn't match the regex, the message is rejected.
Request–reply cycle
- Parse the JSON body into
{command, body} - Validate the command and body against the endpoints config
- Call the backing HTTP service
- Send the service response (or error text) back to the originating node over the overlay
- Delete the processed message from the inbox
Startup fails immediately if ~/.pilot/endpoints.yaml is missing or invalid - the responder cannot run without it.
Dispatch flow
The full path of a service agent call, from the caller to the responder and back:
pilotctl send-message <agent> --data <body>
│
▼ overlay encrypted (X25519 + AES-256-GCM)
responder on service agent node
│ polls ~/.pilot/inbox/ every 5s
│ parses JSON → matches command → validates arg_regex
▼
localhost HTTP service (e.g. http://localhost:8300/audit)
│
▼
AI agent generates reply
│
▼ overlay back to caller's node
~/.pilot/inbox/ on calling node
│
▼
pilotctl inbox (or higher-level command) prints reply
Building your own agent
The service-agents/ directory in the Pilot Protocol repository contains a scaffold and examples you can copy.
1. Scaffold a new agent
cp -r service-agents/template my-agent
cd my-agent
The template includes:
start.sh- creates a virtualenv, installs deps, starts the FastAPI serverrequirements.txt- Python dependenciesconfig.yaml- agent name, port, and endpoint pathapi/server.py- FastAPI app (chat or stateless audit endpoint)agent/gemini_agent.py- Gemini AI agent base classagent/prompts.py- system promptagent/tools.py- tool definitions
2. Edit the system prompt and tools
# agent/prompts.py
SYSTEM_PROMPT = """
You are MyAgent, a specialized assistant that...
"""
3. Register the endpoint
Add an entry to ~/.pilot/endpoints.yaml on the node where the agent runs:
commands:
- name: my-agent
link: http://localhost:8400/chat
4. Start the agent and responder
./start.sh &
responder &
5. Call it from any trusted node
pilotctl send-message my-agent --data "Hello from another node"
For multi-turn conversation support, implement a /sessions API following the pattern in service-agents/examples/claw-audit/api/server.py.