Skip to content

Kaze vs OpenFang — Complete Comparison

Part of Project Kaze ArchitectureDate: 2026-02-27


At a Glance

DimensionKazeOpenFang
What it isAgent OS for SME clients (venture studio platform)Agent OS for autonomous agents (single-binary runtime)
StageArchitecture & design docs complete, entering implementationProduction codebase — 137K LOC Rust, 1,767+ tests
LanguageTypeScriptRust
BinaryDistributed system (K8s, Postgres, NATS, Vault)Single ~32MB binary, SQLite embedded
Built bySpeedrun Ventures (venture studio)RightNow AI (Jaber / @Akashi203)
LicensePrivateMIT / Apache 2.0

1. Architecture Philosophy

AspectKazeOpenFang
PatternAgent-Oriented (Actor + EDA + Cell hybrid)Kernel-centric monolith in a single binary
Layers5 explicit layers (Infra → Interaction → Execution → Orchestration → Governance)Flat crate structure (14 crates, kernel coordinates all)
Deployment unitCells (isolated per-tenant K8s namespaces)Single process per node
MessagingDirect calls MVP → NATS Phase 2In-process channels + OFP P2P protocol
Multi-tenancyCore design — ABAC, cell isolation, data sovereigntyNot a primary concern — single-user/single-org focus
Self-improvementLayer 3 governance agents (supervisors, quality monitors, improvement agents)Not present — no self-modification loop

Key difference: Kaze is designed as a multi-tenant platform for operating agent fleets across many clients. OpenFang is a single-deployment runtime where one operator runs their own agents.


2. Agent Model

AspectKazeOpenFang
DefinitionYAML + TypeScript hybrid (skills + agent templates)TOML config + system prompts per template
Pre-built agents0 (design phase)30 templates + 7 "Hands" (autonomous agents)
CompositionAgents = skills + role + context + knowledge depsAgents = model + system prompt + capabilities + tools
SupervisionPer-skill ramp (supervised → sampling → autonomous)Capability-based RBAC (static, declared at creation)
LifecycleActor model: initializing → ready → executing → idle → shutdownspawn → running → paused → killed
AutonomyGraduated trust per skillFull autonomy within declared capabilities

Key difference: Kaze has a supervision ramp — agents earn autonomy over time per skill. OpenFang gives agents full autonomy within their capability set from the start.


3. Knowledge & Memory

AspectKazeOpenFang
Memory types4 explicit types: episodic, semantic, procedural, reflective4-layer: short-term, long-term, vector, metadata
StoragePostgreSQL + pgvector (shared) + Mem0 (per-agent)SQLite + embedded vector embeddings
Shared knowledgeCore feature — cross-agent knowledge graph with quality gates, provenance, ABACPer-agent only — no shared knowledge layer
RetrievalTri-factor scoring (recency × importance × relevance) + graph traversalVector similarity + memory decay
VersioningGit-inspired commits with provenance chainNo versioning — append/overwrite
Quality gatesLLM-as-judge + cross-reference + source verification before shared writesNone — direct writes
Graphpgvector Phase 1, Apache AGE Phase 2Basic entity/relation storage (knowledge_add_entity)

Key difference: Kaze's knowledge system is designed for cross-agent, cross-vertical knowledge sharing with heavy governance. OpenFang's memory is per-agent, pragmatic, and lightweight.


4. LLM Integration

AspectKazeOpenFang
AbstractionLLM Gateway service (centralized)Per-agent driver (3 native drivers)
ProvidersMulti-provider via gateway (Anthropic, OpenAI, Google, Ollama)27 providers, 51+ models via OpenAI-compatible routing
Key managementDual-key model (Speedrun keys + client BYOK), Vault-managedEnvironment variables, per-agent override
Budget enforcementPer-tenant, per-agent token budgets with hard stopsMetering and cost tracking in kernel
Model selectionModel hints (fast/balanced/best/embed/judge) → per-tenant mappingPer-agent model config, manual selection
FallbackAutomatic provider fallback chainFallback to alternative providers

Key difference: Kaze centralizes all LLM access through a gateway with budget enforcement and dual-key BYOK. OpenFang gives each agent direct driver access with lighter-weight metering.


5. Tool & Skill System

AspectKazeOpenFang
Built-in tools5 MVP integrations (GitHub, Calendar, SEMrush, GSC, Toddle DB)53+ built-in tools (file, web, shell, memory, scheduling, messaging)
SkillsYAML-defined, composable, vertical-specific60 bundled skills (DevOps, cloud, languages, DBs, security, writing)
Skill runtimesTypeScript handlersPython, WASM, Node.js, prompt-only (Markdown)
AuthVault-managed credentials, per-tenant scopedCapability declarations + credential vault
MCPNot presentFull MCP client + server mode
SandboxNot detailed yetWASM dual-metered sandbox (fuel + epoch)

Key difference: OpenFang ships with massive breadth (53 tools, 60 skills, 4 runtimes). Kaze is focused on vertical-specific integrations with deeper auth and tenant isolation.


6. Communication Channels

AspectKazeOpenFang
ChannelsCLI/chat MVP, multi-channel Phase 2 (Slack, Email, WhatsApp, Telegram)40 adapters (Telegram, Discord, Slack, WhatsApp, Email, Matrix, Signal, IRC, etc.)
Conversation layerOpenClaw (delegated)Built-in per-channel adapters
Cross-channel contextUnified thread model (designed, not built)Per-channel sessions

Key difference: OpenFang ships with 40 channel adapters today. Kaze delegates conversation management to OpenClaw and plans multi-channel for Phase 2.


7. Security

AspectKazeOpenFang
ApproachDefense-in-depth per component (11 controls across 6 components)16 independent security layers
Tenant isolationCell-based architecture, ABAC, data sovereigntyCapability-based RBAC per agent
SecretsHashiCorp Vault, automated rotation, anomaly detectionCredential vault, zeroization
AuditAppend-only observation logger, secret redactionMerkle hash-chain audit trail (tamper-proof)
Prompt injectionInstruction hierarchy + output validationPrompt injection scanner
SandboxNot detailedWASM dual-metered sandbox, subprocess sandbox
NetworkEgress whitelist per tenant/verticalSSRF protection, capability-scoped network access
Threat modelFull documented threat model (10 attack surfaces)SECURITY.md with 16 systems documented

Key difference: Kaze's security is tenant-oriented (isolating client data across a multi-tenant platform). OpenFang's security is execution-oriented (preventing agents from escaping their sandbox).


8. Deployment & Operations

AspectKazeOpenFang
DeploymentK8s clusters, OpenTofu IaC, Kustomize overlays, ArgoCD/Flux GitOpsSingle binary, Docker, Tauri desktop app
DependenciesK8s, Postgres, Vault, NATS, Prometheus, Grafana, LokiZero external deps (SQLite embedded)
ModesAgency (multi-tenant SaaS) + Customer VPC (single-tenant)Local daemon, Docker container, desktop app
Cold startNot measured (distributed system)<200ms
Idle memoryNot measured40MB
ObservabilityOTel + Prometheus + Grafana + Lokitracing + JSON logs
ScalingHorizontal via cells, metric-triggeredSingle-node (P2P via OFP for future distribution)

Key difference: Kaze is a distributed system requiring infrastructure orchestration. OpenFang is a self-contained binary that runs anywhere with zero deps.


9. Business Model & Positioning

AspectKazeOpenFang
TargetSpeedrun's SME clients (agency model)Individual developers, small teams, self-hosters
RevenueBYOK-first + tiered subscription (Starter/Growth/Enterprise)Open source (MIT/Apache 2.0)
DifferentiationCross-agent knowledge flywheel, vertical depth, supervision rampPerformance, security layers, zero-dep simplicity, breadth
VerticalsSEO, Activity Discovery (Toddle), Internal OpsGeneral-purpose (30 templates cover many domains)
Knowledge moatCompounding vertical knowledge across clients (with consent)No cross-agent knowledge sharing

10. Maturity & Readiness

AspectKazeOpenFang
Code0 LOC (design docs only)137,728 LOC Rust
TestsNone1,767+ tests
Docs8 architecture docs + 6 research docs + 5 project notes17 documentation files
Pre-built agents030 templates + 7 Hands
Tools/Skills5 planned53 tools + 60 skills
Channels0 (OpenClaw planned)40 adapters

Where Kaze Has an Edge (by design)

  1. Multi-tenant isolation — Cell architecture, ABAC, data sovereignty per client
  2. Shared knowledge with governance — Quality-gated, versioned, provenance-tracked cross-agent knowledge
  3. Supervision ramp — Graduated trust model (supervised → sampling → autonomous) per skill
  4. Vertical depth — Domain-specific knowledge compounding across clients
  5. Client BYOK + budget enforcement — Enterprise-grade LLM cost management
  6. Self-improvement loop — Layer 3 governance agents (supervisor, quality monitor, improvement)

Where OpenFang Has an Edge (shipped today)

  1. Exists as working software — 137K LOC, 1,767 tests, production-ready
  2. Zero dependencies — Single binary, SQLite, runs anywhere in <200ms
  3. Breadth — 53 tools, 60 skills, 40 channels, 27 providers, 30 agent templates, 7 autonomous Hands
  4. Performance — Rust, 40MB idle, <200ms cold start
  5. Security depth — 16 independent security layers including WASM sandbox, Merkle audit, taint tracking
  6. Desktop app — Tauri native app for Windows/macOS/Linux

Strategic Assessment

Kaze and OpenFang solve different problems:

  • OpenFang = "Run powerful autonomous agents locally with zero setup." Individual/small-team tool.
  • Kaze = "Operate fleets of AI agents across many clients with shared knowledge and governance." Platform/agency infrastructure.

They could be complementary rather than competitive — OpenFang as a lightweight agent runtime, Kaze as the multi-tenant orchestration and knowledge layer on top. The key question is whether Kaze should build its own runtime from scratch or consider adopting/adapting something like OpenFang's runtime as a foundation.

Potential Synergies

ScenarioWhat it looks like
OpenFang as Kaze's agent runtimeKaze wraps OpenFang binary per cell, adds multi-tenancy, knowledge graph, and supervision ramp on top
Kaze as OpenFang's enterprise layerOpenFang handles execution, Kaze provides the SaaS/VPC multi-tenant wrapper with billing, BYOK, and knowledge sharing
Independent with shared toolsBoth projects contribute to a shared MCP tool ecosystem, remain architecturally separate
CompetitiveBuild Kaze's runtime from scratch in TypeScript, compete on vertical depth and knowledge moat