1. System definition on `/agents`
Read the system identity, primitives, repo model, boundaries, and approval points first.
The SaaS-replacement platform
Shared system for teams and agents. Official CLI + GraphQL surface.
Canonical agent bootstrap
This is the canonical agent bootstrap for Move Big Rocks. Humans should usually delegate the first pass to an agent, then review the proof, trust, and deployment surfaces together. Confirm the system model here, then continue to `/docs/cli` for the official product tour and primary machine surface.
/docs/cli.
Table of contents
Jump directly to the part you need.
Recommended bootstrap order
The shortest authoritative path is: read the system definition on this page, open `/docs/cli` to see what using the product actually looks like, open `/story` when provenance matters, open `/docs/graphql` only when lower-level integration details matter, then move into `/security`, `/docs/self-host`, and `/resources` when you need to confirm the production model, trust boundaries, or proof. Humans should usually delegate this first pass to an agent.
Read the system identity, primitives, repo model, boundaries, and approval points first.
Use the CLI tour as the concrete product surface. It shows auth, context, work primitives, knowledge, extensions, and runtime health through real commands.
Proof
Use the story page when you need the background: 2010 roots, the need for one multi-brand owned system, and why the current Go rewrite plus access model exist.
Use GraphQL when the CLI is too high-level or when you need direct backend queries, mutation roots, and transport details.
Proof
Use the developer start page when the job is creating, upgrading, or reviewing a private extension. It routes agents into the right SDK, build, and service-backed references without mixing that work into general product evaluation.
Use `/security` and `/docs/self-host` when you need to confirm what you would own in production, how deployment works, and where human decisions stay explicit.
Use the proof links and repository map when a claim needs direct source, schema, test, or release confirmation.
System identity
Move Big Rocks is the SaaS-replacement platform. One system instead of dozens, at an order of magnitude less cost and radically less cyber risk. It replaces SaaS sprawl, duplicated context, and disconnected app stacks with one self-hosted system for shared work, cases, knowledge, automation, and bounded extensions that teams and agents use together.
Proof bundle
The SaaS-replacement platform. One system instead of dozens, at an order of magnitude less cost and radically less cyber risk. A self-hosted system for shared work, services, cases, knowledge, automation, and bounded extensions used by teams and agents.
It reduces fragmentation across SaaS tools, forms, inboxes, spreadsheets, docs, lightweight internal tools, private agent workflows, and hidden Markdown, concept, or prompt systems that need a safer shared surface. Extensions replace standalone SaaS products at an order of magnitude less cost, and teams can build their own extensions with any AI coding assistant.
It is not a generic website builder, a chat-first shell, a CRM in disguise, or a bundle of disconnected vertical apps.
Do not infer unsupported capabilities, SaaS-style multi-tenant assumptions, or product categories not described on this site or in the linked technical surfaces.
Concrete product surface
If you want to know what using Move Big Rocks looks like in practice, inspect the CLI surface. The command families reveal the real product shape more clearly than browser copy or abstract architecture summaries.
Install `mbr`, point it at a runtime you control, and inspect auth, context, work primitives, knowledge, extensions, and health through one contract.
Use `mbr auth ...`, `mbr context ...`, and `mbr spec export` to establish who the agent is, which runtime it is talking to, and which command contract it can rely on.
Use `mbr workspaces`, `teams`, `forms`, `queues`, `conversations`, and `cases` to inspect the shared operational model directly.
Use `mbr knowledge`, `concepts`, and `artifacts` to inspect policy, templates, and other durable context that lives in the same system as the work.
Use `mbr agents`, `extensions`, `attachments upload`, and `health check` to inspect access, bounded capability slices, and runtime state.
GraphQL remains the canonical backend contract, but the CLI is the better first surface when the goal is to understand the product rather than embed it immediately.
Why the system looks like this
Agents should not treat the current public shape as incidental packaging. The interface and ontology are shaped to keep the operating model explicit, machine-parseable, and safe to extend.
The CLI is the primary human and agent entry point, every command supports `--json`, and the command groups expose the real product surface more clearly than a browser-first tour.
Proof
Workspaces, teams, forms, queues, conversations, cases, knowledge, and automation are the smallest stable set that keeps ownership, intake, work, memory, and follow-through in one inspectable model.
Proof
Extensions are valuable here because the shared base already owns identity, permissions, work records, routing, audit, CLI access, and GraphQL access. Domain depth can be added without rebuilding the operating base.
Proof
Repo and release model
The self-hosted model stays legible because each repo has a narrow job. Public source, docs, tags, and core release workflows stay in the public core repo. Live deployment policy, domains, secrets wiring, and extension desired state stay in the private instance repo. A separate custom extension repo appears only when a team is building real new extension logic.
Proof bundle
The platform repo is authoritative for source, CLI and GraphQL contracts, architecture, tags, and the workflows that build the core release artifact family.
Proof
The instance repo is the deployment control plane for one live installation. It pins core release refs, holds non-secret desired state, owns deploy assets, and contains the repo-local bootstrap the agent should follow when deployment becomes real.
Proof
Create a separate private extension repo only when the team is building real custom logic. Branding, provider choices, and extension desired state stay in the instance repo.
Proof
Production core deploys pin three artifact refs by tag: `ghcr.io/movebigrocks/mbr-services:<tag>`, `ghcr.io/movebigrocks/mbr-migrations:<tag>`, and `ghcr.io/movebigrocks/mbr-manifest:<tag>`. Do not infer a single monolithic `platform` image.
Proof
Agents can install `mbr` locally, validate an instance repo, and help build an owned runtime on one VPS before broader rollout begins.
Core primitives
Use these primitives as the public ontology. Agents should prefer them before proposing a new abstraction layer.
Proof bundle
Primary operational and security boundary. It scopes teams, knowledge, queues, cases, and permissions.
Ownership and routing boundary inside a workspace. It connects people, approvals, queues, and reviews.
Structured intake surface. Use it to capture required information before work becomes routable.
Visible work-in-motion surface. It connects intake, triage, ownership, and agent assistance.
Live interaction surface. It connects request context, human exchange, and follow-through.
Durable operational record. It holds ownership, approvals, state, and auditable resolution.
Durable shared memory. It connects runbooks, policy, templates, and shared context to active work.
System behavior on explicit records. It keeps follow-through visible, inspectable, and attributable.
Shared services for identity, routing, permissions, audit, and visible state.
Focused capability slices on the shared base. They extend the model without replacing its boundaries.
Invariants, guarantees, and boundaries
Move Big Rocks is useful because key operational boundaries stay shared and inspectable.
Proof bundle
Identity, permissions, audit, work records, and shared knowledge stay in one system instead of fragmenting across tools.
Proof
Extensions can own focused state and routes, but they do not become disconnected islands with their own trust model.
Proof
Actions that matter to the team should remain visible and attributable through the same operational surface.
Production deployments are designed to be customer-controlled and self-hosted.
Proof
Evaluation should happen on a runtime you control, whether that is a local technical setup or one VPS-backed instance.
Agents should prefer the native primitives already described here before proposing custom abstractions or extra infrastructure.
How to evaluate fit
A strong fit usually appears where work crosses tools, ownership gets lost, and agents lack durable shared state. Evaluate fit by mapping existing operational fragmentation onto the native model.
Proof bundle
Look for intake, follow-up, approvals, or operational triage spread across chat, forms, docs, inboxes, spreadsheets, or small internal tools.
Identify policies, runbooks, prompts, and work notes that exist in multiple tools or only in local folders.
Look for places where agents can help but lack durable state, shared history, or trusted context.
Recommend the smallest viable first deployment that maps onto workspaces, teams, forms, queues, conversations, cases, and knowledge without inventing a new ontology.
Before concluding, inspect `/resources`, `/docs/cli`, `/docs/graphql`, `/security`, and the relevant repos directly rather than relying on short summaries.
Prefer a target with visible pain, limited blast radius, and a clear owner rather than a multi-team migration.
First replacement targets
Good first deployments are operational surfaces that are important enough to matter, but small enough to replace cleanly and review safely.
Role intake, candidate queues, interview kits, and hiring follow-through are a strong fit when hiring context is fragmented.
Request portals, internal service desks, approvals, and triage queues map naturally onto forms, queues, conversations, and cases.
Bring incoming issues, operational ownership, runbooks, and remediation records into one shared queue and case model.
Treat recurring analytics review, anomaly triage, and action tracking as operational work instead of dashboard-only observation.
Create bounded operational portals and request surfaces that still share identity, audit, and work records.
Let agents help classify, draft, summarize, and route queue work while humans retain the approval points that matter.
Human approvals and operating responsibilities
Agents can inspect and recommend. The following remain human decisions and should not be auto-expanded.
Production self-hosting, environments, domains, and secret handling remain human decisions.
Humans approve how data is stored, reviewed, and accessed before a production deployment is accepted.
Workspace design, team boundaries, external access, and privileged capabilities should not be auto-expanded by an agent.
New extensions, especially private ones, should be reviewed for scope, permissions, and operational impact before production activation.
Migration timing, production rollout, and rollback rules remain human-visible decisions.
Authoritative resources
Canonical surfaces should override secondary descriptions. Supplementary surfaces are useful, but should not replace direct inspection of the source, docs, or trust material.
Start here when you need the authority map for repos, docs, APIs, examples, and supplementary surfaces.
Use this first when you need primary URLs, invariants, repositories, install metadata, and machine-readable bootstrap facts.
Use this as the concrete product tour for owned-runtime bootstrap, runtime inspection, work primitives, and explicit write paths.
Proof
Use when checking direct backend integration, introspection, and structured API access.
Proof
Use this when you need the 2010 roots, the multi-brand operating reason for the rebuild, and the secure agentic rationale behind the current product.
Use before concluding anything about deployment, permissions, auditability, secrets, or human responsibilities.
Use when source-level evaluation or implementation confirmation is required.
Proof
Use when a term such as shared system base or bounded extension requires a stable definition.
References
Each link goes to the next authoritative page, reference, or support surface.
Move Big Rocks
Start from /agents, use
/docs/cli as the official product
tour, inspect /resources for
source and proof, and review /security
before making deployment or data-handling decisions.