Operations¶
This guide is for running SHADI as an actual agent host instead of treating the repository as a CLI demo. It pulls together the pages you need for execution, troubleshooting, and the example workloads shipped with the repository.
Overview¶
Use this page as the operator entry point. It does not replace the detailed guides. It tells you which page to open next and in what order.
Operating Model¶
In a normal SHADI run, the operator does four things:
- Resolve a sandbox policy and choose the right launcher profile.
- Ensure secrets and identity material are available before launch.
- Start the runtime components in the correct order.
- Verify outputs, reports, and runtime health when an agent action fails.
The detailed references still live in the underlying pages; this guide is the entry point that tells you where to go and in what order.
Note
If you are completely new to the project, start with Getting Started first and come back here once the local launcher path is working.
Choose a Workflow¶
Use Sandbox and Policies when you need to:
- choose between
strict,balanced, andconnected - combine JSON policy with CLI overrides
- broker secrets into the process environment before sandboxing
- reason about the enforcement boundary on macOS and Windows
Use Demo Walkthrough when you want to run the local multi-agent demo. That page covers:
- starting the local SLIM node
- seeding shared secrets into SHADI
- launching SecOps A2A servers
- launching Avatar and sending operator requests
- using the optional 1Password backend safely
Use SecOps Demo when you need a concrete example of a SHADI-hosted workload with GitHub, SLIM/A2A, and remediation logic.
- configure the GitHub allowlist and required SHADI keys
- run scans and remediation mode
- understand the difference between dependency edits and container guidance
- inspect memory, reports, and pending PR artifacts
- run the focused Python test suite and skill scan
Suggested Operator Flow¶
For the current demo workflows, this is the practical order:
- Review Sandbox and Policies and print the resolved policy you intend to run.
- Load secrets and identity material required by the chosen agent.
- Start transport dependencies from Demo Walkthrough.
- Launch the sandboxed agent process.
- Inspect outputs such as policy, Git snapshot artifacts, report files, memory state, and queued PR artifacts.
Info
The most common operator failure mode is not a code bug. It is a mismatch between policy, secret availability, launch order, or shared transport configuration.
Troubleshooting Map¶
Start from the symptom, then jump to the right page:
- Sandbox launch or path access issue: Sandbox and Policies
- Git-backed sandbox snapshot or working-tree audit issue: Sandbox and Policies and CLI Reference
- Avatar or SLIM handshake issue: Demo Walkthrough
- Demo workload or remediation behavior issue: SecOps Demo
- Identity, DID, or secret access issue: API Guide and CLI Reference
Operational References¶
Keep these pages close when running the system:
- CLI Reference for
shadictlflags and memory commands - Sandbox and Policies for snapshot capture, launcher profiles, and enforcement boundaries
- Security Notes for threat-model boundaries and backend caveats
- Architecture for the control-plane versus runtime split
- Telemetry for OpenTelemetry configuration and local collectors
Scope of This Page¶
This page does not repeat every command from the detailed guides. It exists so operators have a stable route through the docs instead of jumping between long, flat pages with no execution order.