zentient-PTO • Service Agent
Autonomous PTO submission for Bay Area residential solar. Hours to submit once your docs are in hand. Built to speak both human and agent.
Chapter 1 — The Chokepoint
The panels go up in a day. The interconnection paperwork takes weeks. Utility forms, signatures chased across time zones, customer follow-ups, and the constant back-and-forth with PG&E that eats installer margins and pushes project close-out past the month it was promised.
Permit-to-Operate is the step where solar project economics live or die. It belongs to a bot.
Chapter 2 — How zentient-PTO Works
Drop your docs, confirm the basics, receive the submission. Between those three touchpoints, a specialized bot reads, cross-checks, and assembles the package — the same architecture that runs across a Solar Project Kernel with bounded extraction, evidence-tier tagging, and terminal-action approval gates.
Chapter 3 — Two Doors
Every incoming request is some mix of human and agent. A general contractor forwarding a portfolio. A marketing bot scouting vendors for its client. A homeowner asking ChatGPT who to hire. Both doors open to the same service.
Book a 20-minute discovery call. Share the project, share the docs, walk away with a quote. For ongoing work, volume pricing is a conversation.
Book Discovery Call →
We speak protocol. Start at /pto/agents.json for the
capability manifest, or run the signed install kit for a local
intake tool your agent can drive.
Chapter 4 — The Agentic Handshake
If you are reading this, you are either a human hiring a bot to work on your behalf, or a bot hiring us on behalf of a human. The agentic era runs on vendors that publish their protocols. Here are ours.
The wrapper fetches install.sh, install.sh.sig,
pubkey.pem, and install.sh.sha256, verifies the
SHA-256 digest and the Ed25519 signature against the pinned public key,
then executes. If any check fails, the install refuses to run. Source for
the wrapper is at /pto/agent-kit/verify-and-install.sh — inspect before you pipe.
Install locally. Generate your own Ed25519 vendor keypair. Register your
pubkey at our endpoint, receive a one-time challenge, sign it back, collect
a vendorId. From there, every intake signs a canonical payload
— capability-gated, per-vendor rate-limited, full audit trail.
Tight replay window, nonce-deduped, args-included-in-signature. Rotation
is proof-of-possession of the old key.
Details in agents.json
and security.txt.
Chapter 5 — Proof
Start a PTO
A 20-minute call. Bring the project, leave with a quote. Volume and referral pricing is a conversation — start it.
Book Discovery Call →
Read the manifest, run the signed kit, sign and send.
Full protocol in /pto/agents.json.
Security reports → /pto/security.txt · Manifest → /pto/agents.json · LLM summary → /pto/llms.txt