TeamSpec Open Source Tool

Forge

The agent execution layer for TeamSpec. Forge reads configs from AgentHub, spawns agents against those configs, runs them through their task lifecycle, and records what happened — with full observability built in from the start.

Config in. Running agent out.

Forge is not a framework for writing agents. It is the runtime that takes a complete agent config — defined in AgentHub against the TeamSpec specification — and executes it. Forge handles the mechanics: spawning, tool dispatch, failure recovery, human-approval gates, and audit logging. You define what the agent should do. Forge handles making it happen.

Execution, not definition

Agent logic, permissions, and behavior are defined in AgentHub configs. Forge reads those configs and executes them. This separation means the same agent definition can run in dev, staging, or production — with Forge enforcing environment-appropriate constraints each time.

Spec-native from the start

Forge was designed alongside the TeamSpec specification. Every dimension the spec requires — authority management, failure handling, observability — has a corresponding Forge mechanism. You are not bolting compliance on after the fact. It is built in.

Self-hosted and open source

Forge runs in your own infrastructure. Your agent executions, your data, your audit logs — none of it leaves your environment. The source code is available under Apache 2.0. Inspect it, audit it, extend it, or contribute back to the project.

From config to completed task.

Forge follows a consistent execution lifecycle for every agent it spawns. Each step is logged, recoverable, and auditable.

01

Config Resolution

Forge fetches the agent config from AgentHub — pulling the specific version requested, or the latest production-tagged version. Config validation runs before any execution begins. If the config is malformed or references unavailable tools, Forge rejects it immediately.

Version-pinned Schema validation
02

Agent Spawn

Forge instantiates the agent with the resolved model, system prompt, and tool set from the config. Tool access is scoped to exactly what the config declares — no broader permissions are available at runtime, regardless of what the LLM requests.

Scoped tool access Model instantiation
03

Task Execution

The agent runs against its assigned task. Tool calls are dispatched by Forge, which intercepts each call to enforce permission boundaries, apply rate limits, and log the action before and after execution. The agent never calls tools directly.

Intercepted tool dispatch Rate limiting
04

Approval Gates

When an agent attempts an action above its autonomous authority threshold — sending an external communication, modifying production data, spending budget — Forge pauses execution, surfaces the approval request to the configured human reviewer, and resumes only on explicit approval.

Human-in-the-loop Threshold-based
05

Failure Recovery

When a tool call fails, Forge applies the configured retry policy: exponential backoff, fallback tool selection, or human escalation. Failed sub-tasks are queued, not dropped. Partial results are preserved. The agent can resume from the last successful checkpoint.

Retry policies Checkpoint resume
06

Audit & Completion

On completion, Forge writes the full execution record to AgentHub: every tool call, every decision point, every approval event, every retry, and the final outcome. The audit trail is immutable and queryable. Compliance questions get answers, not approximations.

Immutable audit log Full trace

What Forge handles so your agents do not have to.

Pipeline Orchestration

  • Multi-agent pipelines with dependency graphs
  • Parallel sub-agent execution
  • Result aggregation and synthesis
  • Pipeline state persistence across restarts

Authority Enforcement

  • Per-tool permission scoping from config
  • Configurable human-approval thresholds
  • Action blocking before config-unauthorized calls
  • Authority escalation audit trail

Observability

  • Structured execution trace for every run
  • Token usage and cost tracking per task
  • Latency profiling per tool call
  • OpenTelemetry-compatible span export

Resilience

  • Configurable retry with exponential backoff
  • Fallback model on primary model failure
  • Checkpoint and resume for long-running tasks
  • Dead letter queue for unrecoverable failures

Forge + AgentHub: execution and config, connected.

Forge and AgentHub are designed as a pair. AgentHub is the authoritative source of agent configs. Forge is the runtime that executes them. Together they form the complete TeamSpec operations layer.

Forge reads config from AgentHub

Forge never stores its own agent definitions. Every spawn starts by fetching the specified version from AgentHub. This guarantees that what executes is exactly what was reviewed, approved, and version-tagged — not a local copy that might have drifted.

Forge writes execution events back

After each run, Forge records the execution event in AgentHub's audit log — which config version ran, who triggered it, what happened, and the outcome. AgentHub becomes the record of both configuration history and execution history in one place.

You can connect your own tools

Forge exposes a plugin interface for custom tool integrations. If your stack has internal APIs, databases, or services that agents need to call, you register them as Forge plugins with defined permission scopes. They behave identically to native tools from the agent's perspective.

Self-host Forge in your own infrastructure.

Forge is open source and runs entirely within your environment. Your agent executions, your data, and your audit logs never leave your infrastructure.

Step 1

Install from GitHub

Clone the Forge repository. Forge runs as a service alongside your existing infrastructure. Docker Compose, Kubernetes manifests, and a Helm chart are all included in the repository.

github.com/teamspec/forge →
Step 2

Connect AgentHub

Point Forge at your AgentHub instance with an API key that has execute permissions. Forge will discover all agent configs you have access to and make them available for spawning immediately.

Learn about AgentHub →
Step 3

Register Your Tools

Register the external services your agents will use as Forge tool plugins. Set permission scopes for each tool. Forge will enforce those scopes at runtime — agents cannot call tools or scopes you have not explicitly registered.

Step 4

Spawn Your First Agent

Trigger a Forge spawn via the REST API, the CLI, or a webhook. Select the AgentHub config and version, supply the task description, and Forge handles the rest. Check the execution trace in AgentHub when it completes.

FastBytes deploys Forge for enterprise teams.

TeamSpec is open source. FastBytes.io offers implementation consulting — from initial Forge deployment through production hardening, tool plugin development, pipeline design, and team onboarding. If you need it done right and done fast, talk to FastBytes.