For the last year, every project we've shipped at Anwiik has produced the same recurring cost center: repo maintenance, technical debt cleanup, documentation drift, and small-but-critical bug fixes that nobody owns because they're too small for a sprint ticket and too risky for a junior dev.
These aren't glamorous problems. But they're constant, they compound, and they quietly drain the engineering bandwidth you need for actual product work. We got tired of it. So we built aoK — and after running it across several of our own production codebases, we're releasing it free.
What aoK Actually Is
aoK is a proof-driven autonomous engineering runtime. That's a precise description, so let's break each word down.
Autonomous — aoK runs without a human in the loop for each step. You define the task and scope. The agents handle execution, verification, and safety validation.
Engineering runtime — it's not a code generator, a linter, or a CI tool. It's a full execution environment for scoped engineering tasks: bug fixes, refactors, documentation upgrades, repo operations.
Proof-driven — this is the part most tools skip. A task isn't done when code is written. In aoK, completion is a state that has to be proven: the Verifier agent signs off, the Hardener confirms safety constraints, the commit is scoped and logged. No shortcuts. No fake success.
The Problem With Most Automated Code Tools
We've watched AI coding tools confidently generate and commit code that breaks things. The problem isn't that the code is wrong — often it isn't. The problem is that there's no verification layer. No one checked if the change was in scope. No one confirmed it didn't break adjacent behavior. The tool just… shipped it.
In production environments, fake success is worse than no automation. You end up with a codebase that's subtly broken in ways that are hard to trace, because a confident tool left no evidence trail and no gated proof that anything actually passed.
aoK was built to reject that pattern entirely.
The Six-Gate Pipeline
Every task in aoK moves through exactly six mandatory states. No skipping. No shortcuts. Each gate requires proof from the previous agent before the next one activates:
- Queued — The task enters the runtime registry. Scope is defined and locked. Nothing runs until the parameters are committed.
- Planned — The planning agent maps the execution path. Dependencies are resolved. Edge cases are flagged before a single line is touched.
- Implemented — The Builder agent writes the change, strictly within the defined scope. It cannot read or touch files outside the scope boundary.
- Verified — The Verifier agent independently reviews the implementation. It checks for correctness, regressions, and intent alignment. It doesn't care about the Builder's confidence — only evidence.
- Hardened — The Hardener validates safety constraints, write permissions, and structural integrity. This is the last gate before commit.
- Done — The commit is signed, pushed, and logged with a full evidence trail. If you want to know exactly what happened and why, you can audit every step.
This is significantly more verbose than just running git commit. That's on purpose. The overhead is the point. Forced verification is what makes the output trustworthy.
The Multi-Agent Architecture
Each gate in the pipeline is operated by a dedicated agent. This separation is critical — it's why aoK's architecture is fundamentally different from single-agent code tools:
- The Builder writes code. It has no authority to commit.
- The Verifier reviews. It has no ability to write code.
- The Reviewer validates scope alignment. It doesn't touch implementation.
- The Hardener enforces safety policies. It can block commits that pass all other gates.
When you separate roles this cleanly, each agent can be evaluated purely on its specific function. The Verifier isn't trying to also be the Builder. The Hardener isn't doing code review. Role clarity produces better output and cleaner failures when something goes wrong.
What We Use It For
Across our internal projects — including Project254, Well-Check, and the Anwiik agency stack — aoK handles:
- Scoped bug fixes in high-risk files where we want guaranteed non-regression
- Documentation upgrades across multiple modules without drift or inconsistency
- Pre-deployment readiness checks — structural validation before we push to production
- Technical debt cleanup — incremental refactors where each commit is independently safe
- Dependency and config audits — automated review of stale or conflicting config
These aren't exciting tasks. That's exactly why automating them with a verified pipeline pays off — engineers stop wasting cycles on rote work and the output is safer than a tired developer grinding through it manually at 11pm.
Why We're Releasing It Free
This one's straightforward: aoK is the kind of tool large engineering teams build for themselves and never publish. Internal tooling at that quality level costs the equivalent of months of senior engineering time to build. We already built it. The marginal cost of releasing it is near zero, and the value to other teams is real.
There's also a positioning reason. Anwiik's thesis is that engineering discipline — proof-gated, auditable, scoped execution — should be the default, not a premium. We think the best way to make that argument is to give away the tool that demonstrates it and let the output speak.
"The best engineering teams quietly use tools like this. Now anyone can."
Get aoK
aoK is available now on GitHub under the MIT license. No account required. No usage limits. Install it globally and run your first task against any repo in under five minutes:
$ npm install -g aok $ aok init $ aok run --task "fix auth middleware bug" --scope src/middleware
The full source, documentation, and contribution guidelines are at github.com/11redpixels/aoK.
If you want a full overview of the positioning, the architecture, and the live dashboard demo, visit the aoK landing page.
Related
Want to see how this applies to your business?
Book Your AI Blueprint Session