Research-Grade Multi-Agent Hotel Chain Operating System designed to flawlessly integrate cutting-edge AI agency, deep operational tooling, and human-in-the-loop security into a single, cohesive pane of glass. Originally developed as an advanced Hackathon project.
Luniaris brings the power of hierarchical LLM-agnostic agents to hospitality management. It operates through various phases of technological evolution:
- Phase 3: Core backend foundation with Auth0 integration, Rate Limiting, Audit Middlewares, and Background Task Orchestrator.
- Phase 4: Hierarchical Agent System. An "Executive" agent delegates to Domain agents (Security, Operations, Finance), backed by a pluggable LLM "Brain" supporting OpenAI, Gemini, Mistral, Ollama, and Mock providers.
- Phase 5: Real-world integrations connecting AHOS to Gmail, Notion, Twilio, and an internal IoT Simulator.
- Phase 6: Human-in-the-Loop (HITL) & Security. Ensures critical agent actions require human consent, complete with attack simulations and anomaly detection.
- Phase 8: Advanced interactive features surfaced in our highly advanced 3D frontend UI.
- ποΈ 3D Interactive UI: A Next-generation React frontend utilizing
@react-three/fiberfor an immersive data management experience. - π§ Pluggable LLM Brain: Zero vendor lock-in. Switch via
.envbetween OpenAI, Google Gemini, local Ollama models, or a fallback Mock Brain for consistent latency testing. - π€ Hierarchical Agents: Complex operations are digested by the Executive Agent, fragmented to Domain Agents, and executed by specialized Sub-Agents.
- π‘οΈ Zero-Trust HITL: Sensitive automated operations generate "Consent Requests." The AI will pause execution via asynchronous polling until a human operator signs off.
- π Cross-Platform Integrations: Out-of-the-box automated tooling for Slack, Gmail (Email routing), Twilio (SMS), Notion (Database replication).
graph TD
classDef frontend fill:#3b82f6,stroke:#1d4ed8,stroke-width:2px,color:#fff
classDef api fill:#10b981,stroke:#047857,stroke-width:2px,color:#fff
classDef agent fill:#8b5cf6,stroke:#6d28d9,stroke-width:2px,color:#fff
classDef external fill:#f59e0b,stroke:#b45309,stroke-width:2px,color:#fff
classDef db fill:#64748b,stroke:#334155,stroke-width:2px,color:#fff
User((User Operator)) -->|Action| UI[React / Vite 3D UI]:::frontend
UI -->|REST API| Gateway[FastAPI Gateway/Middlewares]:::api
Gateway -->|Auth0 JWT| Auth[Auth0 Verification]:::external
Gateway -->|Tasks| ExecAgent[Executive Agent]:::agent
ExecAgent <--> AgentRegistry[Agent Registry]:::agent
ExecAgent <--> Brain[LLM Brain - Pluggable]:::agent
AgentRegistry -->|Spawns| DomainAgents[Domain Agents]:::agent
DomainAgents -->|Trigger| Integrations[External Integrations]:::external
Integrations --> IoT(IoT Devices/Simulators):::external
Integrations --> Tools(Gmail / Notion / Twilio):::external
DomainAgents -->|Query/Mutation| DB[(Local Hotel DB)]:::db
The "Brain" orchestration ensures that context isn't lost. High-level requests from operations are systematically broken down.
graph TD
classDef exec fill:#ef4444,stroke:#b91c1c,stroke-width:2px,color:#fff
classDef domain fill:#f59e0b,stroke:#b45309,stroke-width:2px,color:#fff
classDef sub fill:#3b82f6,stroke:#1d4ed8,stroke-width:2px,color:#fff
EA{Executive Agent}:::exec
SA[Security Domain Agent]:::domain
OA[Operations Domain Agent]:::domain
FA[Finance Domain Agent]:::domain
EA -->|Delegates Security| SA
EA -->|Delegates Ops| OA
EA -->|Delegates Finance| FA
SA -->|Access Control| Sub1(Access Sub-Agent):::sub
SA -->|Anomaly Scanning| Sub2(Threat Monitor Sub-Agent):::sub
OA -->|Room Servicing| Sub3(Housekeeping Sub-Agent):::sub
OA -->|HVAC/IoT| Sub4(IoT Control Sub-Agent):::sub
FA -->|Ledger/Billing| Sub5(Billing Sub-Agent):::sub
FA -->|Forecasting| Sub6(Analytics Sub-Agent):::sub
When an AI Agent attempts an operation that alters secure states (e.g., unlocking a secure door, processing a large refund), AHOS pauses and routes through the HITL framework.
sequenceDiagram
participant U as User / Operator
participant API as FastAPI Backend
participant A as Autonomous Agent
participant Sec as HITL Security Module
U->>API: Initiates High-Risk Prompt
API->>A: Evaluate Request
Note over A: Identifies "Risk Scope" > Threshold
A->>Sec: Pause & Create Consent Request
Sec-->>API: 202 Accepted (Pending HITL)
API-->>U: Show Pending Approval UI
U->>API: Approves / Denies Request
API->>Sec: Resolve Consent Ledger
alt is Approved
Sec->>A: Unblock Execution Queue
A->>API: Execute Payload
API-->>U: 200 OK (Task Completed)
else is Denied
Sec->>A: Drop Context / Log Failure
API-->>U: 403 Forbidden (Blocked)
end
Lunaris/
βββ backend/
β βββ agents/ # Multi-agent AI core (Executive, Domain, Sub-agents)
β βββ auth/ # Auth0 integrations and JWT validation
β βββ database/ # Mock/Local DB connections
β βββ integrations/ # Connectivity for IoT, Gmail, Notion, Twilio
β βββ middleware/ # Rate-limiting, Error Handlers, Audit flows
β βββ monitoring/ # System vitals and logs
β βββ routes/ # RESTful endpoints grouped chronologically/logically
β βββ services/ # Service mesh & background task queue
β
βββ frontend/
β βββ public/ # Static assets
β βββ src/
β βββ assets/ # 3d models / image assets
β βββ components/ # React reusable components
β βββ pages/ # Route-based views
β βββ services/ # Frontend API integrations
β βββ App.jsx
β
βββ main.py # Root ASGI entry point targeting /backend
βββ requirements.txt # Python Dependencies
βββ .env.example # Template for environment variables
Python 3.10+Node.js 18+&npmoryarn- Auth0 Account for authentication routing
- Copy the example
.env:cp .env.example .env
- Populate the
.envwith your secure variables.LLM_PROVIDERcan be left asmockfor testing without API keys, or switch toopenai/geminiif you supply anLLM_API_KEY.
# Create and activate a Virtual Environment
python3 -m venv venv
source venv/bin/activate # On Windows use `venv\Scripts\activate`
# Install Backend requirements
pip install -r requirements.txt
# Run Uvicorn Server
uvicorn main:app --reload --port 8000The API Docs will be available at http://localhost:8000/docs.
# Navigate to frontend
cd frontend
# Install Node modules
npm install
# Start Vite hot-reload server
npm run devThe Interactive OS will surface gracefully on https://hotel-auth0.vercel.app/.