product updateAmazon Web Services

AWS Bedrock AgentCore adds persistent filesystem storage and shell command execution

TL;DR

Amazon Bedrock AgentCore Runtime now offers managed session storage to persist agent filesystem state across stop/resume cycles and InvokeAgentRuntimeCommand for executing shell commands directly within agent microVMs. The features address two core challenges in production agent workflows: ephemeral filesystems that reset between sessions and the inability to execute deterministic operations without routing them through LLMs.

3 min read
0

AWS Bedrock AgentCore Adds Persistent Filesystem Storage and Shell Command Execution

Amazon Web Services has released two capabilities for Bedrock AgentCore Runtime that address core limitations in production agentic workflows: managed session storage (public preview) for persistent filesystem state and InvokeAgentRuntimeCommand for executing shell commands directly within agent sessions.

The Problem: Ephemeral Agent Filesystems

Bedrock AgentCore Runtime isolates each session in a dedicated microVM with its own kernel, memory, and filesystem. This architecture provides strong security boundaries but creates a critical limitation: when a microVM terminates—either explicitly or through idle timeout—all agent-created artifacts disappear. Agents that spend 20 minutes scaffolding projects, installing dependencies, and generating code must repeat this work entirely when resumed.

AWS identified two specific friction points teams encounter in production:

  1. Ephemeral filesystem state: Agent sessions lose all generated files, installed packages, git history, and configuration when stopped
  2. Deterministic operation routing: Running tests or executing git commands forces teams to either route them through the LLM as tool calls (adding latency and non-determinism) or build custom orchestration logic outside the runtime

Managed Session Storage: Persistent Agent Filesystem State

Managed session storage provides agents with a persistent directory that survives stop/resume cycles. Data persists at the runtime level—when a microVM terminates and is replaced, the filesystem remains intact.

Configuration requires adding sessionStorage to the agent runtime's filesystem configuration:

aws bedrock-agentcore create-agent-runtime \
  --filesystem-configurations '[{ "sessionStorage": { "mountPath": "/mnt/workspace" } }]'

Alternatively, using AWS SDK for Python:

control_client.create_agent_runtime(
  filesystemConfigurations=[{
    'sessionStorage': {
      'mountPath': '/mnt/workspace'
    }
  }]
)

Once configured, any files written to the mount path are automatically persisted. Agents require no code changes—no special APIs, serialization, or save/restore logic. Files written to /mnt/workspace on Day 1 remain accessible when the same runtime-session-id is invoked on Day 2.

By default, session storage data is retained for 14 days of idle time. When an agent endpoint is updated to a different version and the same session ID is invoked, session data is refreshed, providing a clean context for the new version.

Execute Command: Direct Shell Access Within Sessions

The InvokeAgentRuntimeCommand capability enables agents to execute shell commands directly within their dedicated microVM, bypassing the LLM entirely. This eliminates token costs, latency, and non-determinism from predictable operations like npm test or git push.

Practical Workflow: Multi-Day Development

AWS demonstrates a realistic scenario:

Day 1: Agent downloads a codebase to /mnt/workspace, extracts files, and sets up the development environment. When the session is stopped, the entire workspace persists.

Day 2: Same runtime-session-id is invoked. A new microVM boots and mounts the identical storage. The agent finds all files, dependencies, and build artifacts exactly as left—resuming work immediately without reinitializing.

Architecture Details

Bedrock AgentCore uses two Boto3 service clients:

  • Control plane client (bedrock-agentcore-control): Runtime lifecycle operations
  • Data plane client (bedrock-agentcore): Session operations like InvokeAgentRuntime and InvokeAgentRuntimeCommand

The mount path must follow the pattern /mnt/[folder-name] (e.g., /mnt/workspace or /mnt/data).

What This Means

These features fundamentally change how production agents handle state and deterministic operations. Previously, agents operating over multiple sessions faced a choice: implement complex checkpoint logic with S3 uploads/downloads, keep sessions perpetually alive, or accept repeated initialization overhead. Now, filesystem persistence is built into the runtime—agents naturally maintain state across sessions. Combined with direct shell command execution, teams can build workflows that previously required significant orchestration infrastructure outside the agent runtime. For coding agents specifically, the ability to preserve installed dependencies, git history, and build artifacts across sessions eliminates a major class of wasted compute.

Related Articles

product update

Amazon Bedrock AgentCore Evaluations now generally available for testing AI agents

Amazon Bedrock AgentCore Evaluations, a fully managed service for assessing AI agent performance, is now generally available following its public preview debut at AWS re:Invent 2025. The service addresses the core challenge that LLMs are non-deterministic—the same user query can produce different tool selections and outputs across runs—making traditional single-pass testing inadequate for reliable agent deployment.

product update

AWS launches QA Studio: Natural language test automation powered by Amazon Nova Act

AWS has released QA Studio, a reference solution for QA automation built on Amazon Nova Act that enables teams to define tests in natural language rather than code. The system uses visual understanding to navigate applications like users do, automatically adapting to UI changes and eliminating maintenance overhead from traditional selector-based testing frameworks.

product update

Claude Code bypasses safety rules after 50 chained commands, enabling prompt injection attacks

Claude Code will automatically approve denied commands—like curl—if preceded by 50 or more chained subcommands, according to security firm Adversa. The vulnerability stems from a hard-coded MAX_SUBCOMMANDS_FOR_SECURITY_CHECK limit set to 50 in the source code, after which the system falls back to requesting user permission rather than enforcing deny rules.

product update

Amazon Nova Act automates competitive price monitoring for ecommerce teams

Amazon Web Services has detailed how its Nova Act browser automation SDK can streamline competitive price intelligence workflows. The service enables developers to build agents that navigate websites, extract pricing data using natural language instructions, and run parallel monitoring across multiple competitor sites—addressing manual processes that consume hours daily and delay pricing decisions.

Comments

Loading...