Topolo Agent
Public overview of the Cloudflare-first agent and automation platform in the Topolo portfolio.
What It Is
Topolo Agent is the platform surface for agent execution, workflow orchestration, approvals, inbox work, workspace-linked automation, and standalone reusable person profiles. Agent also owns reusable public assistant surfaces such as Lois on the TopoloOne marketing site, so public chat behavior, persona selection, source links, and safety policy are managed in one place rather than duplicated across websites.
Architecture
The system combines a Cloudflare-backed backend with a browser application and shared packages, using Topolo Auth for login and request validation. Its connector catalog now references the Developers-owned mobile app catalog for installable Android and iOS app metadata instead of a standalone app-library service. Agent-owned person profiles capture source-backed writing style, speaking style, persona rules, usage policy, preview drafts, and optional Voice profile links without automatically creating an autonomous AI worker. The profile manager is a standalone Agent surface and does not depend on Director workflows or workspace-summary hydration.
Runtime Surfaces
See /systems/topolo-agent for the current repo and deployment inventory.
API Reference
The current contract is curated rather than OpenAPI-backed in the docs platform. Use /systems/topolo-agent and the internal handbook for the active route families and workspace surface.
Public website chat integrations call the same Agent-backed public assistant route through their owning site’s same-origin proxy.
Authenticated products can use /api/person-profiles to manage org-scoped profiles, profile sources, style snapshots, and draft previews for downstream script, social, email, chat, and narration generation.
The subject user can manage their own likeness profile. Organization owners, admins, and super admins can manage profiles for company use. Normal users cannot manage another human user’s likeness profile.
Auth and Permissions
Topolo Agent relies on Topolo Auth for frontend login and backend validation. Workflow, thread, and workspace operations are scoped by the authenticated user and org context.
The browser app now uses the shared Topolo browser auth client contract with cookie-backed refresh, callback-code redemption on auth.topolo.app, and service identity resolved from the topolo-agent Auth service slug at runtime.
Browser SSO callbacks delegate Auth /sso/exchange handling to the shared client, so callback URLs carry one-time sso_code values rather than bearer tokens.
The backend worker validates operator bearer tokens through Topolo Auth and does not retain an Agent-local JWT secret verification path.
Data Ownership
Topolo Agent owns threads, workflow state, inbox items, approvals, reports, monitors, workspace-linked execution state, and source-backed person-profile metadata. Topolo Voice owns actual synthetic voice assets, provider voice IDs, and future voice outreach or inbound call-center voice runtime data. Topolo Auth owns the user identity, organization role, and admin boundary used to authorize company use of a human likeness.
Deployments
Topolo Agent deploys as a Cloudflare-first application with separate frontend and backend surfaces.
Failure Modes
- workspace or workflow state drifts between frontend and backend
- auth service registration is missing or incorrect
- agent route contracts change without corresponding docs updates
- a normal user can access another user’s likeness profile
- a product treats a person profile as an autonomous agent without an Auth-linked
agent_employeeprincipal and accountable human owner
Debugging
Start with /systems/topolo-agent, then verify the backend route family and the frontend auth configuration for the failing flow.
Change Log / Verification
- Removed hardcoded concrete service IDs from Agent runtime on 2026-05-13 so browser auth, backend validation, widgets, seed checks, and connector calls resolve service slugs through Auth.
- Added standalone person-profile UI and preview-route coverage on 2026-05-08 so Agent can manage and test writing/speaking likeness profiles without requiring another app workflow.
- Corrected person-profile authorization on 2026-05-07 so own-likeness and company-admin use are governed by Agent/Auth rather than a separate Consent-style service.
- Added public person-profile coverage on 2026-05-07 so Agent is documented as the owner of reusable writing/speaking profile metadata without collapsing it into an autonomous agent.
- Moved the Agent mobile app catalog connector to the Developers-owned catalog on 2026-04-22.
- Removed the Agent backend local HS256/JWT secret verification path on 2026-04-18
- Delegated Agent browser callback-code redemption to the shared Topolo Auth client on 2026-04-18.
- Promoted Agent browser SSO callbacks to Auth
/sso/exchangeon 2026-04-17 so callback URLs require a one-timesso_codeinstead of bearer tokens - Standardized the Topolo Agent browser auth layer on the shared Topolo browser auth client on 2026-03-31
- Standardized the public product label to
Agent, aligned the frontend launcher/catalog source with Auth-managed metadata, and recorded the frontend Pages target in CloudControl on 2026-04-04 - Added canonical Topolo Agent coverage and retired repo-local product docs on 2026-03-30