Documentation

How we build.

XCOM.DEV ships infrastructure that runs unattended. Methodology is therefore not optional.

Last updated 2026-04-27
Version 1.0
Owner XCOM.DEV

1. Agent design

2. Contracts as tests

Each contract between two agents has a typed input, typed output, and a property-based test suite. Pipelines cannot run unless every contract passes.

3. Supervised rollout

  1. Shadow mode — new agent runs alongside production, output compared offline.
  2. Canary — 5% of traffic, supervisor enforces strict timeouts and budgets.
  3. Promotion — circuit-breaker thresholds locked in before full rollout.

4. Continuous evaluation

METR-style task suites run nightly. Regressions block the next deployment. The audit chain provides a complete forensic record of every decision.

5. Risk methodology

See also Security & Compliance (NIS2). We model threats per OWASP LLM Top 10 and run table-top exercises monthly.