Overview

Oz Cloud Agents are cloud-connected background agents that run from events, schedules, or integrations, giving teams scalable automation with shared observability and centralized configs

Oz Cloud Agents are cloud-connected, background agents that run on the Oz Platform.

What cloud agents are designed for

Cloud agents are designed for situations where:

  • You need agents to react to system events.

    • Examples include crashes, bug reports, Slack interactions, cron timers, or CI steps.

  • You want observability into agent activity across a team or system.

    • This includes being able to see what ran, when it ran, and what it did.

  • You need more parallelism than local execution typically allows.

    • For example, running many agent tasks concurrently in the cloud, sharding a repo-wide task into multiple runs, or fanning out the same task across multiple targets.

  • You want agents to operate continuously as part of engineering infrastructure.

    • This includes scheduled maintenance tasks and integration-driven automation.

Oz use cases across the development lifecycle: Plan, Prototype, Build, Validate, Review + Merge, Deploy + Monitor

What is a cloud agent run?

A cloud agent run is represented as an agent task. A task is created when a trigger fires (for example a webhook event or schedule) or when a user starts a run explicitly.

Each task includes:

  • Inputs: a prompt, and often additional context from the triggering system (for example a Slack message, PR metadata, or CI logs).

  • Execution context (optional): an Environment that defines the repo, image, and startup commands the agent should run with.

  • Lifecycle state: created → running → completed / failed.

  • Persistent record: status, metadata, and a session transcript that can be reviewed after the task completes.

circle-info

If you are evaluating whether something should be a cloud agent, a good test is whether you can define: (1) what triggers it, (2) what context it needs, and (3) how the team will inspect or validate the output.

How cloud agents work

Cloud agents run on the Oz Platform, which provides the primitives for triggering work, orchestrating tasks, executing agents (optionally in environments), injecting secrets, and inspecting results.

  • Something triggers an agent task.

  • The orchestrator creates and tracks the task.

  • The agent executes on a host, optionally inside an environment, with whatever secrets and credentials it needs. The exact way tasks are triggered and executed depends on your deployment model (for example CLI-only, Warp-hosted orchestration, or self-hosted execution). Those options are covered in the Deployment Patterns pages.

What you get by default

Because cloud agents run on the Oz Platform, each run is tracked and produces a persistent record that can be observed, shared, and audited (even if execution happens outside the Warp app).

Observability and steerability

Cloud agent tasks are designed to be inspectable by the team:

  • Agent Session Sharing lets authorized teammates attach to a running task to monitor progress and, where supported, steer the agent while it runs.

  • Each run produces a session transcript and task metadata, which provides a record of what the agent did.

  • A management experience surfaces task status and history.

Centralized configuration

Cloud agent workflows often rely on shared configuration such as MCP serversarrow-up-right, rules, saved prompts, environment variables, and secrets.

Warp supports centralized configuration so the same workflow behaves consistently across triggers (for example Slack + CI + schedules), without duplicating setup in every system.

API access to tasks

The Oz Platform exposes task visibility via the Oz Agent API and SDKsarrow-up-right, so teams can:

  • Query which tasks are running or have run.

  • Fetch task metadata and outcomes.

  • Build internal dashboards or monitoring (for example success rates, runtime, failure reasons).

Using cloud agents with or without the Warp app

Cloud agents do not require the Warp desktop app. Teams can deploy and operate them through the Oz Platform using:

If your team also uses Warp's terminal, you get an additional workflow: tasks launched via the CLI can be handed off into an interactive session for review, edits, or continuation.


Billing and plan requirements

Cloud agents and integrations run on the Oz Platform control plane, and usage is billed using credits.

circle-info

Bring Your Own Key (BYOK)arrow-up-right is not supported for cloud agent runs. BYOK keys are stored locally on your device and are not accessible to cloud-hosted agents. All cloud agent runs consume Warp credits.

For Cloud Agents via CLI/API

Individual users can run cloud agents without being on a team. Requirements:

  • You need at least 20 credits (any type: normal Warp credits, Cloud Agent Creditsarrow-up-right, or Build plan credits)

  • Cloud agents run on Warp-hosted infrastructure

  • Self-hosted agents require a team subscription

For Integrations (Slack/Linear)

Integrations require you to be part of a Warp teamarrow-up-right and additional requirements:

  • Plan requirements

    • Supported plans: Build, Max, Business

    • Not supported: Pro, Turbo, Lightspeed, legacy Business

    • Your plan must support add-on credits.

  • Credit requirements

For more details, please refer to: Access, Billing, and Identity Permissions

circle-exclamation

Learn more

  • Oz Platform — CLI, Oz Agent API/SDK, orchestration, tasks, environments, hosts, integrations, and more.

  • Skills as Agents — run agents based on reusable skill definitions from the CLI, web app, API, or on a schedule.

  • Oz CLIarrow-up-right — shows how to run Oz agents in non-interactive mode from CI, scripts, or remote machines, including auth and common commands.

  • Environments — explains how environments provide the runtime context (repo, image, startup commands) for agent tasks.

  • Oz Agent API and SDKarrow-up-right — documents the REST API for creating, querying, and monitoring agent tasks programmatically.

  • Agent Secrets — covers how to store, scope, and inject credentials into agent runs safely.

  • MCP Servers for Agentsarrow-up-right — describes how to configure MCP servers for agent tool access and how MCP configuration is applied across runs.

  • Deployment Patterns (beta) — compares common ways to deploy cloud agents and when to use each.

  • Access, Billing, and Identity Permissions — explains individual and team-level requirements, credit billing behavior, and the permission model for who can run, view, and steer cloud agent tasks.

Last updated

Was this helpful?