Skip to content
Home
GitHub

Perstack Documentation

Perstack is an open-source harness for micro-agents — purpose-specific agents with a single responsibility.

Instead of one monolithic agent on a frontier model, you define a team of small, focused agents in TOML, and the runtime handles orchestration, isolation, and state. The result: agentic apps that are cheaper to run and easier to operate.

Use the built-in create-expert expert to scaffold a micro-agent team, then run it:

Terminal window
# Scaffold a micro-agent team
docker run --pull always --rm -it \
-e FIREWORKS_API_KEY \
-v ./my-project:/workspace \
perstack/perstack start create-expert \
--provider fireworks \
--model accounts/fireworks/models/kimi-k2p5 \
"Form a team to build a CLI app."
# Run the generated expert
docker run --pull always --rm -it \
-e FIREWORKS_API_KEY \
-v ./my-project:/workspace \
perstack/perstack start my-expert \
--provider fireworks \
--model accounts/fireworks/models/kimi-k2p5 \
"Build me a CLI todo app with priorities and due dates."

See Getting Started for a full walkthrough.

Cost-effectivePurpose-specific agents run on affordable models. A focused agent on a cheap model outperforms a generalist on an expensive one.
FastSmaller models generate faster. Fine-grained tasks run concurrently via parallel delegation.
ReusableDelegates are dependency management for agents — like npm packages or crates. Compose purpose-built experts across projects.
MaintainableSingle-responsibility experts are independently testable. Test each one, then compose them.
  • Getting Started — create your first expert and walk through the core workflow
  • Concepts — understand the architecture behind experts, runtime, isolation, and the boundary model
  • Making Experts — defining experts with skills, delegation, testing, and best practices
  • Guides — task-oriented walkthroughs from rapid prototyping to production deployment
  • Deployment — container images, serverless integration, and perstack install
  • Isolation & Security — sandbox design, workspace boundaries, and secret management