Hub-owned trust boundary
Routing, memory truth, grants, policy, audit, and kill authority stay in the Hub instead of leaking into every client surface.
Governed execution for agents, terminals, local runtimes, and remote channels without making the client, plugin bundle, or cloud vendor the trust root.
Public technical preview
X-Hub is for teams that have already realized raw agent capability is not the hard part. The hard part is trust geometry: where memory truth lives, who owns grants, where audit belongs, how supervision works, and which surface gets final authority. X-Hub moves those responsibilities into the Hub, so clients can stay fast without silently becoming the trust root.
Policy, grants, audit, memory truth, and kill authority stay in one place.
Execution rights stay separate from supervision depth and review cadence.
Voice surfaces, generic clients, operator channels, and delegated runners stay attached to the Hub.
Local models, provider packs, and optional paid models route through one control plane.
Do not let the UI, plugin bundle, or cloud vendor become the hidden control plane.
Separate execution rights, supervision depth, review cadence, and intervention path.
Treat skills, channels, and voice actions as governed capability paths, not loose scripts.
Built for serious operators
X-Hub is not another terminal wrapper. It is a system architecture for governed AI execution: one Hub for memory truth, constitutional policy, grants, audit, runtime truth, and execution safety; one paired X-Terminal for rich operator interaction; thinner generic clients that can consume governed capabilities without silently becoming the trust root.
Why it feels different
Core system signature
The strength of X-Hub is not one isolated feature. It is the combination of trust-plane redesign, governed autonomy, governed skills, memory truth, and multimodal supervision under one user-owned control plane.
Move the trust anchor out of the terminal, plugin bundle, and vendor cloud default into the Hub.
Separate execution rights, review depth, intervention mode, and cadence so autonomy remains governable.
Treat skills, tools, automation, and channel actions as governed capability paths, not loose script power.
Keep memory truth, audit, runtime truth, and review evidence attached to the system of record.
How the system is shaped
Remote-channel pending grants can be announced, repeated, targeted, and approved through a Hub-governed voice challenge loop.
Slack, Telegram, and Feishu ingress can enter discovery, require local admin approval once, auto-bind, and run a first smoke under Hub control.
Embeddings, speech, vision, and OCR are moving under one local-runtime product surface with compatibility policy, quick bench, and fail-closed provider truth.
Why not just another agent stack
Want the fuller argument? Read why X-Hub is not just another agent stack.
Who this is for
X-Hub is especially well suited for security-conscious software teams, operator-led automation programs, public-sector and regulated environments, and serious individual builders who want a safer local-first posture than terminal-only AI tools usually provide.
What to expect now
The architecture thesis is already concrete. Core runtime paths are real. Product polish, onboarding, deployment UX, and some capability surfaces are still moving fast. This site is meant to make the system legible before every surrounding edge is finished.
Start from the right layer
This site is the selective public narrative layer for the repository. The pages here are meant to make the system legible without turning every still-moving implementation path into front-page product copy.