AI agents that can only do what you allow.

ConspiracyOS runs autonomous AI agents on your machine — each one scoped to only the tools, data, and network access it needs. Not by policy. By the operating system.

Get Started See Use Cases

What can your agents do?

Research & Analysis

Agents that monitor markets, track competitors, summarize papers, or scan news — continuously, not just when you ask.

Content & Writing

Draft blog posts, social media, reports, or documentation. Review and publish on your schedule.

Code & DevOps

Agents that review PRs, run tests, deploy services, or maintain infrastructure — while you sleep.

Data Processing

Ingest, transform, and route data from any source. Build pipelines that adapt when formats change.

Customer Support

Triage incoming requests, draft responses, escalate what matters. Works with your existing email and ticketing.

Personal Automation

Manage your calendar, track habits, organize files, send reminders — your own AI-powered personal assistant.

How it works

1. Install

One command sets up ConspiracyOS on any Linux machine, Mac, or cloud VM.

curl -fsSL https://conspiracyos.com/install.sh | sh

2. Talk to your Concierge

Describe what you want in plain English. The concierge figures out which agents to create and how to wire them together.

conos "I need an agent that monitors Hacker News for posts about AI safety and sends me a daily digest"

3. Agents work autonomously

Your agents run 24/7, each with their own workspace and permissions. Check in when you want, or let them run.

conos status
conos agent logs researcher

What makes this different?

Agents can't exceed their scope

Your email agent can read your inbox but can't send. Your code reviewer can read PRs but can't push. These aren't policies — the OS enforces them.

Compromised agents are contained

If an agent processes a malicious prompt, it still can't access other agents' data, modify its own permissions, or reach unauthorized services.

Your hardware, your data

Nothing leaves your machine unless you say so. No cloud vendor sees your prompts, your data, or your agents' output.

Bring your own model

Works with Claude, GPT, local models via Ollama, or any OpenAI-compatible API. Switch models without changing anything else.

Agents coordinate without sharing access

Agents hand off tasks to each other through scoped inboxes. The email reader can route to the email sender — but can't read the sender's drafts.

Self-healing verification

Automated checks verify every minute that all permissions, access controls, and firewall rules are correct. Drift is caught in under 60 seconds.

Read the Docs View on GitHub