Skip to content

Maturity Roadmap

OrgLoop’s aspirational launch story: “You can install my engineering organization. Here’s the YAML. Run this CLI.”

The manifesto ends with that promise. Everything below is the path to making it real.

Scaffolding, core runtime, CLI.

  • Monorepo setup (pnpm workspaces, Turborepo, Biome)
  • @orgloop/core — event bus (in-memory + file WAL), router, transform pipeline, logger fan-out
  • @orgloop/sdk — plugin interfaces, base classes, test harnesses for connectors, transforms, loggers
  • @orgloop/cliinit, validate, plan, start, stop, status, logs, test, add, env, doctor, routes, hook, inspect, install-service, service, version
  • YAML schema + JSON Schema validation
  • Checkpoint persistence (file-based)
  • Built-in transforms: filter (jq-based), dedup, shell script executor
  • Built-in loggers: file (JSONL), console

Exit criteria: orgloop init && orgloop validate && orgloop start works end-to-end with a mock connector.

Build GitHub, Linear, Claude Code, OpenClaw connectors.

  • @orgloop/connector-github — poll-based, PR activity, CI status
  • @orgloop/connector-linear — poll-based, ticket state changes
  • @orgloop/connector-claude-code — hook-based, exit notifications
  • @orgloop/connector-openclaw — webhook target, agent wake
  • @orgloop/connector-webhook — generic inbound/outbound
  • Migrate each script one at a time: build -> test -> hard cut over -> clean up
  • Launch prompt delivery (with.prompt_file) working end-to-end

Exit criteria: Every existing bespoke script has been replaced by an OrgLoop connector. The old LaunchAgent plists are deleted.

Run OrgLoop on its own org. Validate.

  • Dog-food the system: run your actual engineering org entirely on OrgLoop
  • Harden based on real-world failure modes (crash recovery, checkpoint drift, delivery retries)
  • Tune transforms, refine SOPs, iterate on the route configuration
  • Validate the success criteria: parity, latency, reliability, recovery, developer experience
  • Build observability: orgloop status tells the full story of the org’s operational health
  • Publish @orgloop/cli to npm — the first public release

Exit criteria: 30 days of stable, unattended operation. Zero dropped events. Recovery from process crashes without manual intervention.

Module system implemented in the MVP:

  • kind: Module manifest with orgloop-module.yaml, validated via AJV against moduleManifestSchema
  • orgloop add module <name> installs and wires up modules
  • Module composition: namespaced routes, parameter substitution ({{ params.X }}, {{ module.name }}, {{ module.path }})
  • Module resolution: local paths (./) and npm packages
  • modules/engineering/ — the reference module (GitHub, Linear, Claude Code, OpenClaw)
  • modules/minimal/ — simplest possible module (webhook -> webhook)

Exit criteria: Met. orgloop add module engineering scaffolds a working engineering org.

“Install my engineering organization right now.”

The killer demo: the manifesto ends with a live demonstration. You read the manifesto. You’re convinced. Then:

Terminal window
npm install -g @orgloop/cli
orgloop init --name my-org --connectors github,linear,openclaw,claude-code --no-interactive
orgloop add module engineering
# Set env vars: GITHUB_TOKEN, LINEAR_API_KEY, OPENCLAW_WEBHOOK_TOKEN
orgloop env # Verify credentials
orgloop validate # Check config
orgloop start

Your engineering organization is running. GitHub events route to your agent. CI failures wake your supervisor. PR reviews trigger focused SOPs. Linear tickets flow through transforms. Everything is auditable, deterministic, and version-controlled.

That’s the launch. That’s what we’re racing toward.

Launch artifacts:

  • Published npm packages: @orgloop/cli, @orgloop/core, @orgloop/sdk, all first-party connectors and transforms
  • Published modules: @orgloop/module-engineering, @orgloop/module-code-review
  • Documentation site at orgloop.ai
  • The manifesto, updated with the live demo
  • Content series: blog posts, social, community launch

Beyond Launch: Connector Maturity & the Orchestrator

Section titled “Beyond Launch: Connector Maturity & the Orchestrator”

After launch, DX deepens through two independent tracks:

Track A: Connector Maturity (organic)

Connectors progress through stages (see Scope Boundaries):

StageCapabilityUser experience
1. Functionalsource/target works”Set GITHUB_TOKEN and run start”
2. Discoverablesetup metadata, validators”GITHUB_TOKEN — create at github.com/settings/tokens”
3. Self-servicecredential acquisition”Authenticate via browser? (Y/n)”

Each first-party connector matures at its own pace. GitHub (well-established OAuth) may reach Stage 3 before OpenClaw (local service, evolving API).

Track B: Environment Orchestrator (sister project)

orgctl reads the same module manifest and handles what OrgLoop doesn’t: service installation, credential brokering, cross-system configuration.

Terminal window
orgctl bootstrap @orgloop/module-engineering --github-repo my-org/my-repo
# Blank machine → running autonomous engineering org

See the orgctl RFP for the full project specification. orgctl depends on OrgLoop’s stable interfaces (manifest schema, orgloop doctor --json, --non-interactive flags) but has its own release cadence and project scope.