README.md

May 11, 2026 · View on GitHub

amux — The Agent Control Plane

Open-source control plane for AI agents. Run dozens of parallel agent sessions from your browser or phone — with a web dashboard, kanban board, notes, CRM, email, browser automation, slash-command skills, and agent-to-agent orchestration. Self-healing, single-file, zero external dependencies. Currently supports Claude Code via tmux.

amux.io · Getting started · FAQ · Blog

git clone https://github.com/mixpeek/amux && cd amux && ./install.sh
amux register myproject --dir ~/Dev/myproject --yolo
amux start myproject
amux serve   # → https://localhost:8822

License: MIT + Commons Clause — free to use, modify, and self-host. Commercial resale requires a separate license.


Why amux?

Problemamux's solution
Claude Code crashes at 3am from context compactionSelf-healing watchdog — auto-compacts, restarts, replays last message
Can't monitor 10+ sessions from one placeWeb dashboard — live status, token spend, peek into any session
Agents duplicate work on the same taskKanban board with atomic task claiming (SQLite CAS)
No way to manage agents from your phoneMobile PWA + native iOS app — works anywhere, offline support
Agents can't coordinate with each otherREST API orchestration — send messages, peek output, claim tasks between sessions
Agents operate in a vacuum — no shared contextChannels — 1:1 inter-session chat with @mentions so agents can coordinate in real time
No persistent knowledge between sessionsNotes — markdown documents agents can read, write, and reference across sessions
No way to automate recurring workScheduler — named cron-style recurring jobs with built-in management UI

Key Features

Agent infrastructure

  • Self-healing — auto-compacts context, restarts on corruption, unblocks stuck prompts. Learn more →
  • Parallel agents — run dozens of sessions, each with a UUID that survives stop/start
  • Agent orchestration — agents discover peers and delegate work via REST API + shared global memory. Learn more →
  • Channels — 1:1 inter-session messaging with @mentions so agents can chat, delegate, and coordinate in real time
  • Kanban board — SQLite-backed with auto-generated keys, atomic claiming, custom columns, iCal sync
  • Conversation fork — clone session history to new sessions on separate branches
  • Git conflict detection — warns when agents share a dir + branch, one-click isolation
  • Token tracking — per-session daily spend with cache reads broken out

Dashboard & mobile

  • Web dashboard — session cards, live terminal peek, file explorer with markdown editor, search across all output. Learn more →
  • Mobile PWA — installable on iOS/Android, Background Sync replays commands on reconnect. Learn more →
  • Native iOS appavailable on the App Store

Built-in tools

  • Notes — full markdown notes system with rich editor, find-in-page, and inter-session sharing
  • CRM — contacts, companies, interaction logs, follow-up tracking, and tags
  • Email — send and read email through the Mail.app API integration
  • Browser automation — shared Playwright instance with saved auth profiles, screenshots, and an AI agent mode
  • Skills / slash commands — project-level custom commands (e.g. /commit, /review-pr) that agents can invoke
  • Scheduler — named recurring jobs with cron expressions and a management UI
  • File explorer — browse agent working directories, preview files, edit markdown with in-page search

Architecture

  • Single file — one Python file with inline HTML/CSS/JS. Edit it; it restarts on save. Learn more →

How It Works

Status Detection

Parses ANSI-stripped tmux output — no hooks, no patches, no modifications to Claude Code.

Self-Healing Watchdog

ConditionAction
Context < 50%Sends /compact (5-min cooldown)
redacted_thinking … cannot be modifiedRestarts + replays last message
Stuck waiting + CC_AUTO_CONTINUE=1Auto-responds based on prompt type
YOLO session + safety promptAuto-answers (never fires on model questions)
/rate-limit-options (any session, fleet-wide)Auto-presses 1, records reset time, auto-resumes at reset

Fleet-aware rate-limit handling

When a single Max/Pro account's usage cap is hit, every active Claude Code session on that account blocks at the same /rate-limit-options prompt within seconds. amux's watchdog detects this fleet-wide, presses option 1 ("Stop and wait for limit to reset") on each blocked session, parses the reset time from the surrounding scrollback, and steers a resume message to every still-parked session once the reset time passes.

The dashboard shows a per-session "Rate-limited until HH:MM" badge plus a header pill summarizing the fleet ("N of M rate-limited, reset HH:MM").

Per-session resume text — set CC_RATE_LIMIT_RESUME_TEXT in ~/.amux/sessions/<name>.env to override the default continue. Useful for orchestrators or supervisors that need a richer resume prompt:

echo 'CC_RATE_LIMIT_RESUME_TEXT="peek workers, surface phase STOPs, resume monitoring"' \
  >> ~/.amux/sessions/orchestrator.env

Fleet auto-resume mode — set AMUX_RATE_LIMIT_MODE in ~/.amux/server.env:

ModeBehavior
offDetect prompt and press 1, but do NOT auto-resume — user must steer manually
capped (default)Auto-resume up to AMUX_RATE_LIMIT_BUDGET times per session per UTC day (default 3); fall back to manual after the cap
unlimitedAuto-resume every time, no cap

A user who manually intervenes on a rate-limited session (picks option 2/3, types something new, archives it) is detected at reset time via a state-aware scrollback check, and auto-resume is skipped for that session.

Manual verification: install the feature on a development server, then inject a fake prompt into a test session's tmux scrollback:

tmux send-keys -t amux-rl-test \
  $'What do you want to do?\n❯ 1. Stop and wait for limit to reset\n  2. Add funds\n  3. Upgrade your plan\nresets 23:59\n' \
  Enter

Within ~3-15 seconds the dashboard card should show the badge and ~/.amux/logs/server.log should contain [rate-limit] session=... auto-selected option 1, reset_at=....

Simulation caveats: tmux send-keys lands text at Claude's input prompt, not as raw terminal output, and Claude may render or re-render it differently than a real rate-limit event. Two pitfalls to be aware of:

  • The strict reset-time parser may not match Claude's actual rendering; when that happens the watchdog applies a 5-minute safety fallback so the auto-resume path still exercises end-to-end. Real rate-limit windows are always >1h, so the fallback never causes premature resume.

  • If the menu text persists in Claude's input area without being submitted, the detector will re-fire every ~12 seconds (10s cooldown + 3s tick). Send C-c to the session after the initial detection if you want to stop the loop while observing badge/pill behavior:

    tmux send-keys -t amux-rl-test C-c
    

The simulation is a sanity check; the integration test for the real rendering can only be done against an actual rate-limit event. If you hit one on a development account, capture tmux capture-pane -p -t amux-<session> -S -300 to a file and feed it through the parser:

python3 -c "import sys; sys.path.insert(0,'.'); \
  import importlib.util as iu; \
  spec = iu.spec_from_file_location('a','amux-server.py'); \
  m = iu.module_from_spec(spec); spec.loader.exec_module(m); \
  print(m._parse_rate_limit_reset(open('capture.txt').read()))"

Agent-to-Agent Orchestration

# Send a task to another session
curl -sk -X POST -H 'Content-Type: application/json' \
  -d '{"text":"implement the login endpoint and report back"}' \
  $AMUX_URL/api/sessions/worker-1/send

# Atomically claim a board item
curl -sk -X POST $AMUX_URL/api/board/PROJ-5/claim

# Watch another session's output
curl -sk "$AMUX_URL/api/sessions/worker-1/peek?lines=50" | \
  python3 -c "import json,sys; print(json.load(sys.stdin).get('output',''))"

Agents get the full API reference in their global memory, so plain-English orchestration just works.


Web Dashboard

  • Session cards — live status (working / needs input / idle), token stats, quick-action chips
  • Peek mode — full scrollback with search, file previews, and a send bar
  • Workspace — full-screen tiled layout to watch multiple agents side by side
  • Board — kanban backed by SQLite, with atomic task claiming, iCal sync, and custom columns
  • Notes — markdown documents with rich Quill editor, find-in-page, and inter-session sharing
  • CRM — contacts with company, role, email, phone, LinkedIn, interaction history, and follow-up tracking
  • Channels — 1:1 inter-session chat with @mentions for real-time agent coordination
  • Files — browse and edit files in any session's working directory, with syntax highlighting and in-page search
  • Scheduler — create, edit, and monitor recurring cron-style agent jobs
  • Reports — pluggable spend dashboards pulling from vendor billing APIs

CLI

amux register <name> --dir <path> [--yolo] [--model sonnet]
amux start <name>
amux stop <name>
amux attach <name>          # attach to tmux
amux peek <name>            # view output without attaching
amux send <name> <text>     # send text to a session
amux exec <name> -- <prompt> # register + start + send in one shot
amux ls                     # list sessions
amux serve                  # start web dashboard

# Board
amux board add "task title"  # create a board item
amux board doing PROJ-1      # mark in progress
amux board done PROJ-1       # mark done

# CRM
amux crm add "Name" company=X email=Y role=Z
amux crm list               # list contacts
amux crm log PPL-1 "met at conference"
amux crm fu                 # show pending follow-ups

Session names support prefix matching — amux attach my resolves to myproject if unambiguous.


Install

Requires tmux and python3.

git clone https://github.com/mixpeek/amux && cd amux
./install.sh   # installs amux to /usr/local/bin

HTTPS

Auto-generates TLS in order: Tailscale cert → mkcert → self-signed fallback. For phone access, Tailscale is the easiest path. Remote access guide →

Trusting the certificate on your phone

The PWA uses a service worker for offline support — managing sessions, checking the board, and sending messages all work without a connection. For the service worker to register, your phone's browser must trust the HTTPS certificate. If you're using mkcert, your phone won't trust the CA by default. Serve it over HTTP so your phone can download and install it:

python3 -c "
import http.server, os, socketserver
CA = os.path.expanduser('~/Library/Application Support/mkcert/rootCA.pem')
class H(http.server.BaseHTTPRequestHandler):
    def do_GET(self):
        if self.path == '/':
            self.send_response(200); self.send_header('Content-Type','text/html'); self.end_headers()
            self.wfile.write(b'<a href=\"/rootCA.pem\">Download CA cert</a>')
        elif self.path == '/rootCA.pem':
            data = open(CA,'rb').read()
            self.send_response(200); self.send_header('Content-Type','application/x-pem-file')
            self.send_header('Content-Disposition','attachment; filename=\"rootCA.pem\"')
            self.send_header('Content-Length',len(data)); self.end_headers(); self.wfile.write(data)
socketserver.TCPServer.allow_reuse_address = True
http.server.HTTPServer(('0.0.0.0', 8888), H).serve_forever()
"

Then open http://<your-ip>:8888 on your phone (use your Tailscale IP if on Tailscale, or LAN IP if on the same Wi-Fi).

iOS: Settings → General → VPN & Device Management → install the profile, then Settings → General → About → Certificate Trust Settings → enable full trust.

Android: Settings → Security → Install a certificate → CA certificate → select the downloaded file.


Compare

See how amux compares to other AI coding tools:

Use Cases

For Your Stack

By Role

Resources


Security

Local-first. No auth built in — use Tailscale or bind to localhost. Never expose port 8822 to the internet.

Network exposure & --bind

amux serve binds to 0.0.0.0 by default. On a workstation behind a router this is fine; on a public VPS it makes the dashboard reachable from the internet the moment the server starts. Verify with ss -tlnp | grep 8822 after launch, and curl -k https://<public-ip>:8822/ from outside.

Restrict the listening interfaces with --bind (comma-separated list of IPs):

amux serve                                   # default: 0.0.0.0 (all interfaces)
amux serve 8822 --bind 127.0.0.1             # loopback only
amux serve 8822 --bind 127.0.0.1,100.64.0.5  # loopback + Tailscale IP
amux serve 8822 --bind 127.0.0.1,172.17.0.1  # loopback + docker0 (containers)
amux serve 8822 --bind 0.0.0.0               # opt in to every interface

One HTTPS server (and one HTTP cert helper on port+1) is spawned per listed host. amux serve 8822 with no --bind keeps the current behavior.

Firewall (belt-and-braces)

Even with --bind, a firewall rule is recommended on multi-homed hosts. Example for iptables (allow localhost + docker0, drop the rest):

sudo iptables -I INPUT -p tcp --dport 8822 -s 127.0.0.1     -j ACCEPT
sudo iptables -I INPUT -p tcp --dport 8822 -s 172.17.0.0/16 -j ACCEPT
sudo iptables -A INPUT -p tcp --dport 8822 -j DROP
sudo netfilter-persistent save   # survive reboot (Debian/Ubuntu)

Validate the lockdown from outside the host: curl -k --connect-timeout 4 https://<public-ip>:8822/ should time out.