SINT Labs ships three conceptual layers: the Protocol (authorization substrate), SINT OS (the runtime that unifies products), and the products themselves (Console, Avatars, Operators, CMO Operator). Each component exists and runs independently. SINT OS is the integration layer that makes them work as one system.Documentation Index
Fetch the complete documentation index at: https://docs.sint.gg/llms.txt
Use this file to discover all available pages before exploring further.
The unified stack
Layer-by-layer
Face — SINT Avatar
3D WebGL avatar with voice I/O, Conversation Compiler, 18 widget types. React Three Fiber.
Brain — SINT Console
31 feature modules, visual workflow builder, real-time agent orchestration.
Hands — SINT Operators
LinkedIn automation, reply classification, CRM routing. Production agentic loops.
Content — CMO Operator
Video-to-content pipeline with 18 skills, multi-channel publishing.
Spine — SINT Protocol
Capability tokens, policy gateway, evidence ledger, 12 transport bridges.
OS — OpenClaw runtime
Agent runtime: WebSocket gateway, channel plugins, MCP router, session manager, sandbox.
The Protocol core
Every product and agent action flows through the same governance core. This is not an optional middleware — it’s the only path to physical actuation.Capability tokens
Ed25519-signed tokens encode resource scope, allowed actions, physical constraints, time bounds, and a delegation chain of max 3 hops. Attenuation-only delegation: a child token’s scope is always a subset of its parent’s.
Policy Gateway
A single
intercept() entry point. Every request validates schema, token, scope, rate limit, physical constraint, and tier assignment before reaching a transport bridge.Evidence Ledger
SHA-256 hash-chained append-only log. Every decision is recorded with a prevHash pointer, providing tamper evidence without requiring blockchain infrastructure.
Cross-system policies
The Protocol’s differentiating feature is cross-system policies — invariants that span multiple transport bridges simultaneously.| Policy | Active when | Denies | Why |
|---|---|---|---|
no-fs-while-moving | robot.moving | File writes, edits | Prevents controller corruption during motion |
no-exec-while-moving | robot.moving | Shell execution | Prevents control-loop interference |
no-deploy-while-active | cmd_vel | Deploys, restarts | Can’t restart while velocity commands are active |
no-network-while-armed | drone.armed | Network, exec | Safety-critical — no external access while drone is armed |
Example: voice command to deploy
What happens when a user says “Jarvis, deploy the staging build”:Policy Gateway
Token scope check passes. Rate limit passes. Physical constraint not applicable. Decision: ALLOW.
Example: voice command to move a robot
“Jarvis, move the robot two meters forward”:Avatar reacts
Surprised expression, thinking animation, action widget (“Approve 2m forward?”, 30s timeout).
During motion
File writes, shell execution, and deploys are automatically denied by cross-system policies.
Where to read more
SINT Protocol overview
Detailed treatment of the Protocol layer.
SINT OS guide
How the products integrate through os-core.
Tiers and escalation
T0–T3 and the Δ-factor escalation function.
Bridges
All twelve transport bridges, per-resource state machines, profiles.