Siddhant KhareSiddhant KhareLou BichardLou Bichard
/April 2, 2026AIPlatform engineering

Ona is the background agent infra Ramp had to build

Stripe built their agent platform before GPT-3 existed. Ramp hand-rolled theirs on Modal and Cloudflare. Here's the full stack breakdown to help you weigh build vs buy.

Background agents are no longer theoretical. Ramp published their background agent: it now writes more than half of all merged pull requests at the company. Stripe published theirs: over a thousand AI-authored PRs per week. Every engineering leader in the industry is now asking the same question: how do we do this too? Most are asking it under pressure from executives who have seen the same numbers and want results yesterday.

What neither post says out loud is how long it took to get there. Stripe's agent harness runs on top of a remote development platform they built years before GPT-3 existed. Ramp built sandboxed execution on Modal, persistent session state on Cloudflare Durable Objects, a custom image registry, and a queue system routing prompts from four different clients into the same running session. Both companies had something most engineering organisations do not: existing platform teams, years of standardisation behind them, and the talent and budget to build and maintain bespoke infrastructure indefinitely.

The most common mistake we see is reaching for the wrong primitive. Teams try to run agent harnesses like Claude Code inside Kubernetes clusters, CI platforms, or container runtimes and discover that these primitives encode assumptions that break under agent workloads. Agents are not short-lived, deterministic jobs. They are long-running, stateful, and interactive. That mismatch becomes obvious over time, usually after you are already overcommitted and it is too late to change course.

The hidden complexity of agent sandbox infrastructure
RelatedDon't build a coding agent sandbox yourselfRead the post

This article breaks down the infrastructure Ramp and Stripe built, layer by layer, then shows what Ona provides out of the box. The goal is to give you an honest picture of what goes into this stack so you can decide whether to build it or buy it.

1. Development environments

Every agent session needs a full development environment. Same tools, dependencies, and database access a human engineer would have. Not a container. Not a CI runner.

This is the layer most teams get wrong first. The instinct is to reach for Kubernetes, a CI platform, or a container runtime. An agent that cannot install packages, run your test suite, and execute builds cannot validate its own work. You limit the autonomy of the agent by constraining the environment it runs in. We wrote about why the obvious runtimes fall short separately, but the short version is: containers share a kernel, CI runners were not built for stateful work, and Kubernetes inherits both problems.

Ramp solved this with Modal VMs and a custom image registry that rebuilds every repository every thirty minutes to keep startup fast. Stripe had already invested years in standardised remote devboxes before agents existed. Most organisations have neither Ramp's registry pipeline nor Stripe's head start.

Without a real development environment, agents guess at diffs. With a full development environment, they open merge-ready pull requests.

2. Isolation and security

Every agent session needs scoped credentials. Source control, CI, package registries, internal APIs, secrets managers: each needs its own access model. You will want ephemeral tokens per environment so nothing persists after a session ends, role-based access control per project so agents only touch the repositories and secrets they should, and network-level isolation so sessions can only reach the services they are authorised to reach. All of this needs to hold when hundreds of sessions run concurrently.

On top of that, agents are vulnerable to prompt injection and are adept at working around static denylists. We tested this: Claude Code bypassed its own denylist, then disabled its own sandbox to finish the task. No jailbreak. The agent just wanted to complete the work. Ideally you enforce restrictions at the kernel level, below anything the agent can see or reason about. But the security tooling market for agents is still nascent. There is very little you can buy off the shelf today, and what does exist is tightly coupled to the runtime. Security gets baked into whoever provides the infrastructure. If you build the runtime yourself, the security burden is yours too.

Agent security is not a layer you bolt on. It is inseparable from the runtime, and the runtime is the hardest part to get right.

The agent can't bypass what it can't see.
Veto kernel-level enforcement engine
Deep diveHow Claude Code escapes its own denylist and sandboxRead the technical breakdown

3. Connectivity and context

It is widely understood at this point that the more context you give an agent, the better the work it produces. Context is not just your source code. It is your databases, internal documentation, API schemas, staging environments, and the full test suite that validates changes against real services. An agent that cannot access your databases, internal APIs, and test infrastructure will never produce production-ready code. This makes network connectivity a fundamental requirement, not a nice-to-have.

Stripe's agents run on EC2 devboxes inside their own infrastructure with native access to their monorepo, internal services, and database replicas. Ramp's agents run on Modal within their own cloud, connected to the same internal systems their engineers use daily. Neither team tried to make this work from outside their network. They understood that agent output quality depends on what the agent can reach.

Most third-party sandbox providers give you a container in someone else's cloud and leave you to figure out networking, which usually means tunnels, exported secrets, and brittle proxy setups. But the build-versus-buy framing here is not binary. Bring-your-own-cloud models now exist that deploy inside your VPC while remaining fully managed, giving you the connectivity of self-hosting without the operational burden.

Context is what makes agents effective. Context lives on your network.

The last year of localhost
RelatedThe last year of localhostRead the post

4. Automation and parallelism

Ramp and Stripe achieved their numbers in part because they can run agents in parallel. As this extends forward, the direction is clear: fleets of agents running maintenance across thousands of repositories, responding to PR events, remediating vulnerabilities on a schedule, triaging issues overnight. If agents only run when a developer prompts them, you are limited by human capacity and will not achieve full SDLC automation.

Getting there requires two things. First, trigger infrastructure: webhooks that fire agents when PRs are opened or GitHub comments are posted, cron schedules for nightly tasks like dependency updates or test coverage sweeps, and entry points from wherever developers already work, whether that is Slack, an editor, or a CLI. Second, the ability to scale parallel environments: the underlying orchestration to spin up dozens or hundreds of agent sessions at once, and the interfaces for developers and platform teams to configure, launch, and monitor those sessions.

The organisations that will get the most from background agents are the ones that can run them proactively, in parallel, and across their entire codebase.

Trigger once. Run everywhere.

Ona is the platform for background agents

The market is moving fast. Ramp and Stripe built this infrastructure because nothing existed when they started. Today the landscape looks different. You do not need to start from scratch. The fastest path is to adopt the base infrastructure and focus your engineering time on the work that is specific to your organisation: the MCPs, the data restructuring, the integrations into your internal systems.

Organisations use Ona to:

Ona provides the full background agent infrastructure out of the box:

LayerWhat Ona provides
Development environmentsEvery agent runs in its own isolated VM with your full toolchain, test suite, and dependencies. Prebuilds keep environments warm. Devcontainer config means environments rebuild automatically when your repo changes. Configurable machine sizes per task. Learn more →
AutomationsTrigger agents from PR events, webhooks, or cron schedules. Run fleets of agents across hundreds of repositories in parallel with progress tracking. Service accounts for fully automated workflows. Automations overview →
Private VPC deploymentSelf-hosted runners deploy inside your VPC on AWS or GCP with native network access to your internal services, databases, and registries. How runners work →
Runtime securityOna enforces restrictions at the kernel level, below anything the agent can see or reason about. Command deny lists, network isolation between sessions, and organisation-wide security policies. Read more →
Reporting and ROIInsights dashboard tracking active users, environment usage, agent adoption, and costs across your organisation. Measure the impact of agents, track adoption, and demonstrate ROI to leadership.
Self-hosted, not self-managedOna runs inside your infrastructure but is fully managed. You get the security and connectivity of self-hosting without operating the platform yourself. Read more →
OrchestrationOna manages the full environment lifecycle: provisioning on demand, scaling up and down, timeouts for cost control, hibernating and restarting environments. You give a task, Ona handles the rest.
Agent identity (RBAC)Each agent session gets its own ephemeral OIDC tokens scoped to the environment, project, and user. Nothing persists after a session ends. OIDC docs →
IntegrationsBuilt-in GitHub and GitLab. VS Code (desktop and browser), Cursor, JetBrains, Zed, Windsurf. MCP server support. AGENTS.md and Skills for teaching agents your codebase conventions. Integrations →
ComplianceAudit logs for every agent action. Deploy runners in specific regions for data residency. SOC 2 compliant.

Deploy secure background agents in your VPC

We have been building development environment infrastructure for over six years. BNY, Blackstone, Hargreaves Lansdown, and Vanta run on Ona. We work with engineering teams to find the right use cases, build a concrete ROI model, and get background agents running in production.

Join 440K engineers getting biweekly insights on building AI organizations and practices

Related blogs

This website uses cookies to enhance the user experience. Read our cookie policy for more info.