Hub-first trust root
The terminal can execute, but the Hub owns route truth, grants, policy, memory truth, audit, and kill authority.
X-Hub-System centralizes model routing, memory truth, skills, provider accounts, quotas, grants, policy, audit, and terminal execution under one user-owned Hub.
Why it exists
X-Hub-System moves the trust anchor out of terminals, plugins, browser context, and vendor defaults. Clients can still be useful execution surfaces, but authority to route, grant, deny, remember, audit, and stop execution stays in the Hub.
What it solves
The difference is not one feature. It is where the trust root lives and how every higher-risk surface is forced back through a governed boundary.
Governed capability surface
X-Hub-System is designed to govern a growing set of model, memory, skill, quota, terminal, channel, and evidence surfaces without making each one a new control plane.
Identity, pairing, policy, grants, readiness, and kill-switch posture stay centralized.
ModelsLocal + paid routingConfigured route, actual route, fallback, downgrade, and provider readiness stay visible.
SkillsGoverned skill packagesOfficial skills, manifests, trust roots, pins, preflight gates, grants, and revocation.
AutonomySupervisor-grade controlsExecution authority, review depth, heartbeat cadence, guidance, and intervention are separate controls.
IngressChannels and voiceRemote operator surfaces can enter through replay guard, challenge, grant, and audit paths.
EvidenceRuntime truthAudit refs, evidence refs, denial reasons, quota pressure, and recovery signals remain operator-visible.
System shape
These diagrams are the fastest way to see what X-Hub-System is trying to make governable.
Reading path