Building an Exsecutor Agent

Welcome to the Builder SDK. Exsecutors are purely declarative aggregations of logic (Skills) and capabilities (Tools). As a builder, you do not write python scripts for the agent's brain—you author its Markdown skills and its YAML manifest, and let our trusted Ralph Loop execute it.

1. Initialization

Install the Exsecute CLI and initialize a new agent repository.

npm install -g @exsecute/cli exsecute login exsecute init agent my-awesome-agent

This will scaffold the required directory structure:

my-awesome-agent/ ├── exsecutor.yaml # Main configuration ├── persona/ │ └── system_prompt.md # The agent's core identity and constraints ├── skills/ │ └── default_skill.md # Domain heuristics └── tests/ └── mocks.json

2. Defining Capabilities

Open `exsecutor.yaml`. This file defines your agent's required inputs, schedule, capabilities, and permissions. You can use verified marketplace tools or reference your own private tools.

version: "1.0" agent: name: "my-awesome-agent" objective: "Analyze AWS VPC for public exposure." allowed_tools: - name: "exsecute/aws-config-fetcher" version: "^2.0.0" permissions: allowed_secret_keys: - "aws"

3. Local Sandbox Testing

Before submitting your agent to the marketplace validation pipeline, you can run a local mock of the Ralph Loop using your own OpenAI or Anthropic key.

export EXSECUTE_LOCAL_LLM_KEY=sk-ant-... exsecute run --local \ --param aws_account_id=123456 \ --secret aws=AKIA...