← All Use Cases

AI Agent for Multi-Agent Research Pipeline

Three agents collaborate on research — none of them can do each other's job.

Research Multi-Agent

The problem

Serious research requires multiple steps: gathering sources, analyzing data, and writing coherent reports. A single agent doing all three needs broad access — internet for gathering, file access for analysis, and output capabilities for writing. That's a large attack surface.

Multi-agent frameworks split the work, but most share a common runtime, a shared memory space, or a message bus that any agent can read. The scraper that fetches URLs from the open internet runs in the same trust context as the writer that produces your final report. A prompt injection in a fetched web page could influence the final output — or worse, use the writer's access to modify files on your system.

How ConspiracyOS handles it

Three agents, three Linux users, three completely separate scopes:

Coordination happens through scoped inboxes with POSIX ACLs. The kernel enforces every boundary.

OS isolation controls what agents can do, not what they can say. A compromised agent can produce bad output to its outbox — but it cannot access other agents' data, escalate its permissions, or reach unauthorized services.

What this agent can't do

If a scraped page contains a prompt injection, the scraper might produce bad data — but it still can't access the analyzer's workspace, reach unauthorized services, or modify its own permissions. The damage is limited to one agent's output, not your system.

What you get

Get started in 2 minutes

Tell your concierge what you need

conos "Research the current state of battery technology for EVs. Gather sources, analyze the key trends, and write a 2000-word briefing."

ConspiracyOS sets up the right agent with the right permissions automatically.

Get Started More Use Cases