Concept
Perstack is built on a concept called Expert Stack — the harness that enables agentic AI to be more reliable and practically useful.
The name “Perstack” combines the Latin word “perītus” (meaning “expert”) with “stack”. Perstack = Expert Stack.
Expert Stack
Section titled “Expert Stack”An agent harness needs a broad set of capabilities — almost like an operating system. Perstack organizes them into a simple stack with clear separation of concerns:
┌──────────────────────────────────────────────────────────────────-┐│ Interface ││ CLI · Event streaming · Programmatic API │├──────────────────────────────────────────────────────────────────-┤│ Runtime ││ Agentic loop · Event-sourcing · Checkpointing · Tool use │├──────────────────────────────────────────────────────────────────-┤│ Context ││ System prompts · Prompt caching · AgenticRAG · Extended thinking │├──────────────────────────────────────────────────────────────────-┤│ Definition ││ Multi-agent topology · MCP skills · Provider abstraction │├──────────────────────────────────────────────────────────────────-┤│ Infrastructure ││ Sandbox isolation · Workspace boundary · Secret management │└──────────────────────────────────────────────────────────────────-┘Most of the features above are not new ideas. Perstack takes the usual harness building blocks — tool use, delegation, checkpointing, prompt caching, etc. — makes them easy to operate, puts them on top of standards you already know (MCP, TOML, Docker, SSE), and ships them as one runtime. Where cost or operational burden demands it, Perstack introduces its own take — micro-agents being the first example.
Interface
Section titled “Interface”The top layer exposes Perstack to users and applications.
Runtime
Section titled “Runtime”The execution engine that drives the agentic loop.
Context
Section titled “Context”What each expert sees and knows during execution.
Definition
Section titled “Definition”How you declare what experts do and how they collaborate.
Infrastructure
Section titled “Infrastructure”Isolation and security boundaries that make agents safe to operate.