Safe Delegation to Heavy Runtimes
A lightweight agent should not always become a full runtime. Good systems escalate deliberately, with clear limits on cost, permissions, and task scope.
Modern agent systems increasingly combine a lightweight tool-using agent with a heavier runtime that can browse, run shell commands, inspect files, or operate more autonomously over many steps. The design question is when delegation is justified, how it is bounded, and how it can be reviewed afterwards.
Key Facts
- Permission tiers
- Read-only, bounded action, high-risk, human-approved
- Escalation concern
- When to delegate to heavier runtimes
- Operational controls
- Budgets, turn caps, approvals, rollback
- Common failure
- Silent overreach through tools or subprocesses
- Observability
- Triggers, tools, outputs, failures, alerts
Design failure containment into the runtime
A production agent runtime earns trust by making tool authority, escalation paths, failures, and budget exhaustion visible before the user has to guess what happened.
Continue through the runtime branch
This branch is meant to work as one library. Use the other guides to complete the operating model beyond the current topic.
Continue through the runtime branch
This branch is meant to work as one library. Use the runtime landing page to recover the full operating picture, then move into principles when you need to reconnect runtime decisions to doctrine.