Computer
Each operator runs in its own contained environment — typically a container with the minimum toolchain the workflow requires. The container is the agent's blast radius. A misfired command can break the container; it cannot reach the host filesystem, another operator's memory, or a production cluster. The boundary is enforced at the runtime, not at the prompt.
Memory
A persistent store that holds the operator's knowledge of accounts, conversation history, and learned preferences. Memory is what makes the operator behave like an employee across runs rather than a stateless function. We use Supabase or MongoDB depending on the access pattern, fronted by a small typed API the operator calls through its tool gateway.
Tools
The set of actions the operator is allowed to take in the world. Tools are explicitly enumerated: opening a Stripe payment intent, updating a Linear ticket, sending an outbound SMS through Hermes, querying a Datadog dashboard. Each tool is registered with its minimum scope. The operator cannot synthesise new tools at runtime; it can only compose the ones it already has.
Guardrails
The signed authority bar. A written specification of what the operator is allowed to do without human approval for this workflow at this tier. The authority bar lives in code, not in the prompt — the model can be jailbroken, asked to forget its instructions, or simply hallucinate. The authority bar is enforced by the tool gateway, which refuses calls outside the bar and routes them to escalation.
Escalation
The path the operator takes when it cannot or should not act on its own. Escalation is a feature, not a failure. A trustworthy operator escalates often early in deployment and progressively less as the workflow scope tightens. Escalations carry the full conversation context, the operator's stated reasoning, and a recommended next step, so the human picks up where the operator left off.
Audit log
An immutable, append-only record of every action the operator took and the reasoning that produced it. The audit log is the only artifact that justifies trust over time. It must be queryable by finance, legal, security, and the workflow owner; it must be retained per the customer's jurisdiction; it must be impossible for the operator itself to edit. The log is the difference between an opaque automation and an accountable employee.