Specification

Normative Definitions.

FemtoClaw defines a universal, deterministic specification for agentic communication. Our spec governs how generative reasoning systems talk to hardware and software, ensuring that all tool calls are unambiguous, secure and reproducible.

Protocol Definition

Structured Calls

Tool calls are defined as strict JSON objects. Each call specifies the program binary to execute and the arguments to pass. The runtime validates these structures before execution—natural language instructions are never accepted【254469092789682†L3-L29】.

// Example tool call
{
"bin": "bash",
"argv": ["-c", "ls -la"]
}
Tiered Specifications

Enterprise & Reference

Enterprise Tier

The normative implementation for critical deployments. Includes advanced policy enforcement, persistent memory and clustering. Designed for production systems that require strict determinism and operational robustness【254469092789682†L21-L23】.

Reference Tier

A simplified, educational implementation for experimentation and research. Implements the same protocol but omits some production features. Perfect for understanding the spec before adopting the enterprise tier【254469092789682†L21-L23】.

Compliance Invariants

Always Safe

JSON Gate

Only structured JSON calls are accepted. No unstructured human‑language commands or arbitrary strings can reach the execution layer【254469092789682†L25-L29】.

No Implicit Execution

The runtime does not attempt to interpret or transform arbitrary text. If a call is invalid, it is rejected. This removes an entire class of injection and prompt‑hijacking vulnerabilities【254469092789682†L25-L29】.

Deny‑by‑Default

Capabilities must be explicitly allowed by configuration. Any attempt to call an unregistered tool or binary is refused, protecting your infrastructure from unintended actions【254469092789682†L25-L29】.

Additional Resources

Explore Further

The specification is more than a document—it is a living suite of repositories and tools. Explore our compliance tests, documentation and benchmarks to fully understand and verify your implementation.

Further Reading

Learn More about the Specification

Delve into the formal protocol definition, explore the tiered enterprise and reference specifications and understand the strict compliance invariants that ensure deterministic execution【254469092789682†L3-L29】.

Protocol & Tier Details arrow_outward