Source: docs.serval.com — Product Surface Snapshot
Source: docs.serval.com — distilled from ~46 pages across documentation, access management, CLI, and self-hosting sections.
Why This Page Exists
The Serval blog and press coverage describe what Serval is selling. The docs reveal what Serval has actually shipped — and the gap is significant. Several capabilities the founders’ marketing telegraphed as roadmap (asset management, self-hosting, MCP, CLI/Git) are already documented as live product. This is the single most concrete inventory of Serval’s product surface available without a sales call.
Core Architecture (clarified vs Series A press)
The TechCrunch piece called Serval’s split a “Builder agent + Help-desk agent.” The docs use Serval’s official terminology (Product Security):
- Help-desk agent — handles end-user conversations. Can use knowledge base + invoke published workflows. Cannot author workflows. Only sees tools your team explicitly enabled.
- Automation agent — admin-facing workflow builder. Generates TypeScript from natural language. No access to end-user ticket context. Operates in a different environment.
Critical clarification I had wrong: workflows are deterministic TypeScript by default. “No LLM in the default runtime path. The automation agent’s job is to help translate intent into workflow code during authoring. After publication, the same workflow runs the same way unless you explicitly put a model (or other non-deterministic) step inside the workflow.” The dual-agent split is even cleaner than press coverage suggested — runtime path is fully deterministic unless the IT admin opts a model in.
Identity is grounded in the authenticated session, not the prompt. “I’m Jane” in chat does not change requester identity.
Integration proxy — credentials live server-side. Workflow code never sees API keys or OAuth tokens. The proxy validates the caller is a worker (not an end-user browser), confirms team ownership of the integration, and injects credentials.
API scoping fixed at integration setup. No workflow can exceed the team’s connected scope, regardless of what the workflow code requests.
Product Surface (full inventory from docs)
Help Desk & Ticketing
- Channels: Slack, Microsoft Teams, Email (with DKIM trust + guest-user handling), Web Portal (
app.serval.com), Phone (via Twilio integration). - Ticket types: Request + Incident (with auto-linking of related incoming tickets, bidirectional external sync to ServiceNow/Freshservice).
- Slack-native depth:
/servalslash command, message shortcuts (turn any message into ticket), @Serval mentions, Team Inbox channels (triage queue in Slack), 🔒 emoji = private internal note, manual escalation buttons, dynamic ticket-status UI in Slack messages. - Co-pilot for human agents — AI assistant inside the ticket pane to draft responses, run team-only workflows, summarize threads, find guidance/KB; uses connected IdP context for user enrichment.
- External sync — bidirectional sync to ServiceNow, Freshservice, Zendesk-style external ticketing. Means Serval can sit on top of incumbent ITSM, not just replace it.
Automation Tools (4 named)
- Workflows — deterministic TypeScript. Authored via NL or directly in code. Long-running (hours/days, no timeout). File inputs/outputs. Webhook + schedule + event-triggered (ticket-created, ticket-updated, message-received). Semantic search across the workflow catalog. Execution scope = team-only or org-wide.
- Guidance — runbooks/SOPs that shape help-desk-agent behavior. Tag workflows / KB / users inline. “Always-used” flag = include this guidance in every conversation (for tone, compliance, routing rules).
- Knowledge Base — connectors for Notion, Confluence, Google Drive, Microsoft 365 (SharePoint), ServiceNow, Zendesk, Freshservice. Permission-respecting answers (document-level ACL propagation where source supports it). Custom knowledge-ingestion workflows for non-supported sources.
- Access Management — JIT app/role/resource access. Profiles + Policies + Provisioning methods (Linked Group via IdP, Direct API, Custom Workflow, Manual). Self-positioning: “Serval delivers Just-In-Time Privilege Access for databases, cloud roles, and application admin roles. Serval is adjacent to PAM but not a replacement for PAM’s vaulting/session recording.”
Suggestions (“automate the automation”)
Serval Suggestions analyze ticket patterns and propose: new guidance, guidance updates, new workflows, workflow installations, app connections, KB updates. Reviewed in-product with Accept / Edit & Accept / Dismiss. Direct counterpart to Console’s Console Assistant.
Campaigns (outbound proactive surface)
Campaigns = templated Slack DM broadcasts to users/groups/CSV with an attached response workflow. Recipients tap Respond, get a structured form (multiple choice, scales, text, dates, checkboxes, file uploads). Each response is a real workflow run with branching/approvals/integrations. One-time + recurring scheduling, local-time-per-recipient delivery. Direct counterpart to Console’s Proactive Playbooks (launched April 14, 2026).
Assets (already shipped, not roadmap)
The platform-orientation docs reveal Assets is a live team-section in the sidebar alongside Tickets/Workflows/Guidance/KB. The Series B post telegraphed asset management as future; the docs show it’s already shipping, at least at minimum-viable-feature depth.
CLI + Git workflows
- Homebrew tap:
brew install --cask servalhq/serval/serval - OAuth device-code flow for auth
serval pull <team-prefix>→ creates folder structure:TEAM/team.yaml + workflows/<slug>/{index.ts, workflow.yaml}serval push <team-prefix>→ validates, diffs, uploads, deploysserval access search/request/list/cancel— full JIT-access from terminal- Workflow YAML metadata: name, description, slug, deployed flag, approval_procedure (groups/users/managers/multi-step), version
- Explicit Git-integration narrative in docs: branch + diff + review + merge + push
MCP Server (genuinely novel for the category)
Public MCP endpoint: https://public.api.serval.com/mcp/
- Claude.ai Custom Connectors integration — enterprise users can connect Serval as a Claude.ai “Connector” (Pro/Team/Enterprise plans).
- Claude Desktop integration — JSON config via
mcp-remotenpx package. - Generic MCP-compatible — any tool that supports MCP can connect.
- Browser-based OAuth approval flow, scoped to the user’s existing Serval permissions.
- Documented end-user actions: create ticket, check status, list pending access requests, update tickets — all through natural conversation in the user’s own AI assistant.
This is a meaningful product capability gap vs Console — Console does not appear to ship a public MCP server publicly. Serval is positioning Serval-as-tools-for-the-user’s-AI-IDE, not just user-talks-to-Serval-AI.
Self-Hosting (real, not aspirational)
- Hybrid Self-Hosted — only the Serval worker runs in your network (Linux host, 2 CPU / 4 GB / 10 GB). Backend in Serval Cloud. Integration credentials never leave your worker. Smallest footprint, fastest setup. Enables reach to on-prem AD/LDAP/GitLab/internal APIs.
- Serval-Managed in Your AWS — full app runs in your AWS account, Serval operates it via an “operator appliance.” Single-tenant. Serval applies upgrades. AWS credentials never leave your environment.
- Self-Managed on Your Kubernetes — full Helm chart from public OCI registry. Customer runs day-2 ops. Any cloud or on-prem.
Private network access documented for AD/LDAP, self-hosted GitLab/Bitbucket, internal APIs/DBs. SAML private-CA bundle handling. Site-to-Site VPN / Direct Connect / VPC peering / Transit Gateway support. Day-2 install/upgrade docs are password-protected (gated to customers).
This is a real enterprise deployment story. Most AI-native ITSM peers don’t have a Hybrid worker model or a published Helm chart — usually it’s “we offer single-tenant cloud” or “talk to us about VPC.”
Identity, RBAC, Compliance
- 2 org roles: Member, Admin.
- 5 team roles: Agent, Viewer, Contributor, Builder, Manager. Builders create custom workflows; Managers configure integrations + see audit logs.
- Capabilities toggle — per-team enable/disable for Workflows, Access Management, Campaigns, etc.
- SAML SSO via WorkOS — Okta, Google Workspace, Azure AD/Entra, OneLogin, JumpCloud, PingFederate, generic SAML 2.0.
- SCIM for user/group sync.
- Domain allowlist with enforcement — bulk-deactivate non-matching users in one step.
- API keys with scopes + revocation + last-usage timestamps.
- Audit logs with filter + export.
- Support tokens — user-initiated, time-bound (1h, 24h), revocable, audit-logged. Time-boxed elevation for Serval support to investigate.
- Encryption: TLS 1.3 in transit, AES-256 at rest.
- Compliance: SOC 2 Type II certified (confirmed, was uncertain in earlier research). Trust Center at trust.serval.com.
Catalog
app.serval.com New Request → Browse Catalog with two surfaces:
- Access — role-based access requests with descriptions/approval-method visibility
- All Services — catalog items derived from workflows-with-form-inputs (laptop orders, software installs, onboarding tasks, etc.)
This is the ServiceNow service-catalog equivalent.
Analytics
- AI resolved / AI assisted / Unassisted / Resolved-outside-Serval ticket categorization
- Time-saved estimation (10 min per AI resolved, 5 min per workflow run)
- Money-saved (configurable labor rate, default $100/hr)
- TTR p25/p50/p75/p95/mean + per-assignee breakdown + SLA breaches per assignee
- SLA met/breached pie + time-series
- Feedback (positive/negative, by AI vs human)
- Granularity daily/weekly/monthly/quarterly + CSV export
Integration count
60+ integrations publicly claimed. Anchor tools: Slack, Microsoft Teams, Okta, Google Workspace, Microsoft Graph (Azure AD), GitHub, Jira, Notion, Confluence, Zendesk, ServiceNow, Freshservice, Twilio, Jamf, Kandji, AWS, Linear, Ramp, Workday (implied via HRIS sync). Custom App primitive for any third-party tool not in catalog.
Strategic Implications (vs prior research)
Things I had partially wrong / understated:
- The agent split’s official names are Help-desk agent + Automation agent, not “Builder agent.”
- Runtime path is fully deterministic unless the admin explicitly inserts an LLM step — a stronger architectural claim than “deterministic tools.”
- MCP is a real differentiator, not telegraphed feature. Console doesn’t appear to offer one publicly.
- Self-hosting has 3 delivery models, all documented at architecture level. This is a real Fortune-500 / regulated-industry play.
- CLI + Git workflows are real and shipping (Homebrew, OAuth device flow, push/pull).
- Asset management is already in product (sidebar section), not roadmap.
- Campaigns = Console’s Proactive Playbooks equivalent — Serval has shipped this surface too.
- External ticketing sync to ServiceNow/Freshservice means Serval can be deployed on top of an incumbent — not just replacement-only.
Things this strengthens about Serval’s competitive position:
- The product is wider than a typical 16-month-old AI-ITSM startup. Self-hosting + CLI/Git + MCP + Campaigns + external sync is closer to a “platform” than a “feature company.”
- The dual-agent + deterministic-runtime + integration-proxy architecture gives Serval a clean enterprise-trust narrative that’s defensible against both single-agent peers and rule-based legacy ITSM.
- 5 team roles + 2 org roles + capabilities toggle + SCIM + domain enforcement is enterprise-IDP-shop-grade. Not a small thing.
Things this exposes as still-open:
- ICP-fit for non-engineering IT teams remains unknown. CLI/Git/TypeScript-codepath workflows are engineering-IT-friendly. Whether traditional IT ops shops adopt this stack at scale is unverified.
- Multi-tenant Builder/Automation-agent governance is still not deeply documented (who in the org can vibe-code which automations across teams remains a real concern at enterprise scale).
- Pricing remains opaque across all docs surface.
Sources Distilled (≈46 pages)
Documentation root: home, welcome, day-1-setup, automation-tools. Platform: orientation, product-security, permissions, inbox, analytics, org-settings, support. End-user: end-user-guide, submit-request, track-requests, slack-quickstart, mcp-quickstart, end-user-access. Help desk: channels, email, phone, interacting-with-serval-in-slack. Ticketing: overview, quickstart, resolving-tickets, incident-management. Workflows: overview, create-your-first-workflow. Guidance: overview, use-cases, always-used. Knowledge base: overview. Access management: overview, admin-quickstart, access-reviews. Suggestions: overview. Campaigns: overview, create-campaign, recipients. CLI: overview, installation, push-pull-configuration, access. Self-hosting: index, hybrid, private-network-access, request-access.