Skip to content

Latest commit

 

History

History
205 lines (151 loc) · 18.7 KB

File metadata and controls

205 lines (151 loc) · 18.7 KB

Superhuman Spec

This document is the canonical statement of what Superhuman is supposed to be.

Identity

Field Value
Project Superhuman
Canonical repo https://github.com/LPFchan/Superhuman
Project id superhuman
Operator single-operator-first
Last updated 2026-04-10
Related decisions DEC-20260409-001, DEC-20260409-002, DEC-20260409-003, DEC-20260409-004, DEC-20260409-005, DEC-20260409-006, DEC-20260409-007, DEC-20260410-001

Product Thesis

Superhuman is a framework for running ambitious projects without losing coherence. Today it ships as a personal AI assistant you run on your own devices, with a gateway that spans chat apps, the web dashboard, and paired devices. Its deeper product direction is to become a durable project workspace with a canonical home for memory, direction, research, and execution, so operators can prompt, summon, monitor, and steer agentic work across devices without scattering truth across chat transcripts and admin panels.

The inherited OpenClaw promise still matters: this is an AI that actually does things. It runs on the operator's devices, in the operator's channels, under the operator's rules. Superhuman extends that promise from "assistant that can act" toward "workspace that can remember, decide, research, maintain, and ship."

Current Public Reality And Directional Truth

Layer What is true
Current public reality Superhuman is a self-hosted personal AI assistant with multi-channel messaging, multi-device access, plugin-backed extensibility, and a gateway/control-plane model.
Directional truth Superhuman is evolving into a unified project workspace where work, plans, repo memory, approvals, agent runs, and upstream maintenance are treated as first-class operating surfaces.
Managed repo baseline The latest LPFchan/repo-template is the default operating model for repos Superhuman creates or manages; local repo contracts may extend it but should not casually replace its core surfaces.
Compatibility posture OpenClaw lineage and plugin ecosystem compatibility remain explicit product commitments, not temporary migration leftovers.
Safety posture Strong defaults, visible approvals, explicit trust boundaries, and operator-controlled autonomy remain non-negotiable.

Current Runtime Spine

Superhuman currently stands on a gateway, CLI, web/control UI, messaging channels, paired-device flows, model providers, a plugin runtime, queued/background work, approvals, and repo-local maintainer tooling. Those are product primitives, not throwaway migration scaffolding.

The current shipping experience is still terminal/setup-oriented and assistant-first. That is acceptable while security, auth, permissions, and gateway behavior are maturing. The product should get easier to enter over time, but onboarding must not hide critical security or trust decisions from the operator.

Workspace Server Deployment Model

Superhuman surfaces connect to a workspace server API.

The desktop app should be a client shell, but it must not require a remote server before it can work on local repos. Desktop must be able to launch and use a local workspace server automatically. The same desktop surface may connect to operator-approved remote workspace servers.

Local and remote are deployment locations for the same workspace-server contract, not separate product modes.

The workspace server owns live runtime behavior for the workspace it serves: chats, runs, approvals, tool/process streams, file/diff evidence, terminal/process interaction, notification state, and the off-Git operational memory attached to that workspace. Repo-native truth remains in the managed repo; relay or sync infrastructure is connectivity, not canonical project truth.

Mobile and messenger should consume the same product state model. Future mobile clients may gain a local workspace-server deployment where platform constraints allow it, especially Android, but mobile-local execution is optional evolution rather than the first mobile requirement.

Primary User And Context

Field Value
Primary operator A single ambitious builder running long-lived software and agent-driven projects
Primary environment Desktop-first, but expected to expand into synchronized desktop and mobile access
Primary problem being solved Keeping real project work coherent across messages, sessions, agents, tools, devices, and upstream change
Why this matters Project entropy destroys leverage when ideas, decisions, and execution history drift apart

Primary Workspace Object

The primary workspace object is the project workspace.

Inside a project workspace, the operator should be able to:

  • capture ideas or requests from anywhere
  • route them into the right project memory surface
  • run or delegate work through agents
  • inspect what happened and why
  • keep project truth, plans, and history coherent over time

work items, agent runs, and messages are supporting objects inside the workspace, not the top-level product identity.

Operator Attention And Work Items

The durable workspace is the top-level object; the work item is the main attention object inside it.

A work item should be a visible, inspectable unit of intent: source, summary, proposed action, trust level, approval state, queue/run state, artifacts, timeline, blockers, and final outcome. It may be backed by messages, a session, queued follow-ups, approval requests, background tasks, worklogs, commits, and repo-template artifacts, but the operator should not have to reconstruct one unit of work from backend nouns.

The operator-facing promise is: show what needs attention, what will happen next, and what already happened.

The directional work-item lifecycle is:

captured -> clarified -> proposed -> awaiting approval -> queued -> running -> blocked or completed

Cross-Surface State Model

The top-level product object is the project workspace, but the runtime should not collapse every interaction into one object type.

Settled state boundaries:

  • Every desktop/mobile generic assistant chat receives an agent-id, even when it never touches a repo.
  • agent-id identifies one user-facing agent conversation.
  • run-id identifies one bounded execution episode inside an agent conversation.
  • One chat/agent conversation may contain multiple runs over time.
  • Subagents receive their own agent-id and remain linked to the host agent conversation.
  • Host agents monitor, grade, and integrate subagent output by default.
  • Subagents do not silently commit by default; commit authority must be explicit if granted.
  • Capture packets are mutable off-Git bundles until handed off, routed, discarded, or absorbed into a conversation.
  • Capture packets are not project orchestrators; first responders capture and hand off, project orchestrators interpret in repo context and decide routing.
  • Raw chat, messenger, mobile, upload, approval, notification, transcript, and tool-call history lives off-Git.
  • Approval state lives off-Git first; Git receives durable approval consequences only when they matter as execution history, decisions, plans, status, spec, or upstream outcomes.
  • Raw execution history is retained indefinitely by default as off-Git operational memory, not canonical truth.
  • Off-Git raw execution memory must support per-project export, redaction, compaction, hard delete, and periodic secret or API-token redaction.
  • Tool calls may need internal runtime identifiers, but tool-call IDs are not stable operator-facing provenance IDs by default.
  • Desktop and mobile share live-synced state for chats, runs, approvals, agent status, and relevant project context.
  • Desktop and mobile connect to local or remote workspace-server deployments through one product state/API model; local and remote must not become separate identity, approval, or transcript models.
  • Messenger conversations remain channel-native; orchestrator-visible messenger input is recorded off-Git and can produce capture packets or routed project artifacts.

Product-level agent controls are:

  • steer: add operator guidance for the next safe gap.
  • interrupt: stop the current trajectory as soon as safely possible and deliver a new operator message before continuing.
  • stop: end the active run without implying revert.
  • resume: continue from a stopped, blocked, waiting, completed, or prior conversation state.
  • revert: explicitly undo agent-made workspace changes where possible.
  • fork: branch a new agent/conversation from existing context.
  • handoff: transfer responsibility to another agent, model, device, or surface while preserving lineage.

Canonical Interaction Model

  1. Capture work from desktop, mobile, messenger, or a direct operator prompt.
  2. Route the work through the orchestrator into the right project surface: truth, status, plans, research, decisions, execution, or upstream review.
  3. Review proposed actions, trust posture, and approval requirements.
  4. Run or delegate the work through orchestrated agents.
  5. Observe outputs, blockers, provenance, and final state from a durable project record.
  6. Re-enter the same workspace later from desktop or mobile without losing context.

Core Capabilities

Capability Why it exists What must remain true
Cross-surface assistant runtime Superhuman must be reachable from the tools and devices the operator already uses One assistant identity should persist across channels, sessions, and paired devices
Project workspace memory The operator needs a canonical place for truth, status, plans, research, and execution Repo-native truth must not dissolve into chat logs
Managed repo standardization Superhuman needs one repeatable repo operating model across projects New and adopted repos should default to latest LPFchan/repo-template plus local extensions
Multi-agent orchestration Ambitious work needs delegation, monitoring, and synthesis One orchestrator should keep agent work attributable and understandable
Explicit provenance Decisions and execution need durable attribution Artifacts, agents, and commits must stay connected over time
Upstream-compatible evolution Superhuman still benefits from upstream OpenClaw fixes and ecosystem continuity Provenance and plugin compatibility must stay explicit
Safety and operator control Higher autonomy only works if risk boundaries remain legible Trust mode, approvals, and escalation rules must remain visible and deliberate

Safety, Plugins, Memory, And Bridges

Security is a deliberate product tradeoff: keep Superhuman powerful enough for real work while making risky paths explicit, reviewable, and operator-controlled.

Core should stay lean. Optional capability should usually live behind plugin/SDK contracts rather than by adding provider-specific, channel-specific, or skill-specific behavior to unrelated core surfaces. Memory is a special capability: it should become a dependable recommended path, but conversation history and canonical project truth must remain different things.

MCP-style integrations should stay decoupled from core runtime unless the operator explicitly accepts a deeper product-level commitment. Bridge-based integration is preferred over turning core into a catch-all runtime for every external protocol.

Invariants

  • README.md is the public front door; SPEC.md is the canonical internal truth surface.
  • PROVENANCE.md remains a separate permanent lineage document.
  • OpenClaw provenance is preserved rather than hidden.
  • OpenClaw-compatible plugin contracts remain stable by default unless a migration path ships together with any change.
  • The latest LPFchan/repo-template is the canonical baseline for repos Superhuman creates, adopts, or manages; repo-local contracts may extend it but should not reinvent the core surfaces without explicit operator approval.
  • The orchestrator owns default routing from intake into repo memory surfaces.
  • Messenger surfaces are for capture, notification, approvals, summaries, and redirection; they are not canonical truth-authoring surfaces.
  • The repo keeps truth, status, plans, research, decisions, and execution history in separate surfaces.
  • Single-operator-first ownership is the default product posture for now.
  • Mobile should mature as a project cockpit before it tries to become a full mobile IDE.
  • Trust mode, approvals, risky-tool consequences, and autonomy boundaries should be visible where work is requested and monitored, not hidden in a distant settings page.

Non-Goals

  • Becoming a chat transcript archive with no durable project memory.
  • Rebranding away OpenClaw lineage as if the codebase were written from scratch.
  • Treating plugin compatibility as an accidental leftover instead of a product contract.
  • Making admin or topology views the primary user-facing identity of the product.
  • Turning mobile into a full coding IDE before the workspace and cockpit model is strong.
  • Hiding setup, auth, permissions, or security posture behind convenience wrappers before the underlying trust model is legible.
  • Adding a heavy default manager-of-managers architecture that duplicates existing agent, tool, approval, queue, task, and repo-memory primitives.

Main Surfaces

Surface Purpose Notes
README.md Public product front door Personal-assistant-first today
Gateway and channels Persistent runtime shell Current shipping assistant surface
Today or Work surface Operator attention surface Directional: approvals, active runs, blockers, queue, outcomes
Work item detail Canonical detail for one unit of intent Directional: transcript, plan, approvals, run timeline, output
Control UI Visual operations and oversight surface Keep useful control, but subordinate it to attention/work
Mobile clients Project cockpit surface Prioritize capture, approvals, monitoring, and redirection
Messenger surfaces Capture and control channels Not canonical truth-authoring surfaces
Repo-managed workspace surfaces Truth, status, plans, inbox, research, decisions, worklogs Canonical internal project memory
upstream-intake/ Upstream review and operator escalation Active because Superhuman remains downstream of OpenClaw
src/superhuman/ Deliberate downstream product boundary Keeps Superhuman-specific behavior out of generic shared core

Success Criteria

  • The operator can explain what Superhuman is, what is true now, what comes next, and what already happened without reconstructing it from chat.
  • Repo-native truth, plans, decisions, and worklogs are usable as the canonical memory for the project.
  • A new or adopted repo can be brought under Superhuman using the same repo-template-based memory and provenance model without inventing bespoke governance from scratch.
  • The current assistant product remains usable while the workspace-first direction is built.
  • Upstream fixes and plugin ecosystem compatibility remain manageable rather than turning into a breakaway trap.
  • The product can gradually shift from chat-first/admin-first surfaces toward workspace-first/operator-cockpit surfaces without losing safety or coherence.

Related Artifacts

  • Current operational reality: STATUS.md
  • Accepted future direction: PLANS.md
  • Untriaged intake: INBOX.md
  • Provenance and lineage: PROVENANCE.md
  • Decision history: records/decisions/
  • Execution history: records/agent-worklogs/
  • Research: research/
  • Upstream review: upstream-intake/