Core feature matrix
Core platform specifications and operational capabilities
Core feature matrix
1. User management and authentication
- Tiered authentication:
- Standard users: access to ready-made templates.
- Developer accounts: permissions to create, customize, and extend agents and teams.
- Role-based access control (RBAC):
AdminDeveloperUser
2. Agent templates
- Pre-built agents: 50+ ready-to-use agents across categories.
- Agent categories:
- Data processing and analytics
- Customer service and support
- Content creation and marketing
- Sales and lead generation
- HR and recruiting
- Finance and accounting
- Project management
- Research and comparisons
3. Agent management system
- Agent configuration: Custom prompts, parameters, and behaviors.
- Performance monitoring: Real-time metrics and analytics.
- Version control: Agent versions and rollback.
- Scheduling: Automated runs and trigger-based execution.
4. Team templates
- Team templates: Pre-built multi-agent teams for common use cases.
- Collaboration patterns:
- Sequential: Agent A → Agent B → Agent C
- Hierarchical: A lead agent coordinates sub-agents
- Conditional: Dynamic routing based on outcomes
5. Knowledge base integration — MCP connections
- Native MCP support: Connectors for public MCP integrations.
- Data source connections:
- CRMs: Salesforce, HubSpot
- Databases: PostgreSQL, MySQL, MongoDB
- Cloud storage: Google Drive, OneDrive, Dropbox
- Collaboration: Slack, Teams, Discord
- Project management: Asana, Trello, Notion
- Email: Gmail, Outlook
- Analytics: Google Analytics, Mixpanel
6. Custom agent development (developer accounts)
- Agent builder: Visual agent creation.
- Code editor: Advanced programming workflows.
- API integration: Custom APIs and webhooks.
- Sandbox: Isolated environment to build and test agents.
7. External API keys (agents and teams)
- Issue dedicated API keys per agent or team for use outside the platform.
- Fine-grained scopes such as:
run:agent,run:team,read:logs. - Expiry and rotation to improve security posture.
- Audit logs for external key usage.
- Instant revocation when misuse is suspected or access is no longer needed.
For full details and setup steps, see External API keys.