Always-on, multiplayer dev-assistant for eng teams - write code, act on alerts, and more
Baudbot runs a persistent AI control agent on Linux, connected to Slack, with worker agents that take tasks from request to PR. It works on real repositories with real tools (git, test runners, Docker wrapper, cloud browser automation), keeps persistent memory, and reports progress back in-thread.
Built for teams that want autonomous execution speed without giving up operational control.
- Shared Slack interface for the whole team. Anyone in allowed channels can hand work to the same agent system.
- Always-on response and fast handoffs. The control agent stays live, triages work instantly, and spins up task-scoped coding agents.
- End-to-end coding loop. Branch, code, run tests, open PR, watch CI, push fixes, report status.
- Linux-native execution. Agents can run the same project commands your engineers run (including guarded container workflows).
- Persistent team memory. The system learns repo quirks, recurring fixes, and collaboration preferences across restarts.
- Self-improving operations. Agents can update non-security skills/extensions and propose upstream improvements via PRs.
Baudbot is designed as shared engineering infrastructure, not a single-user desktop assistant:
- multiplayer by default (Slack threads, shared todos, multiple sessions)
- persistent service, not one-shot chat
- autonomous task execution with humans in review loops
- admin-managed runtime with deployment + rollback controls
| Minimum | Recommended | |
|---|---|---|
| OS | Ubuntu 24.04 or Arch Linux | Any systemd-based Linux |
| RAM | 4 GB (3 agents) | 8 GB (6 agents + builds/tests) |
| CPU | 2 vCPU | 4 vCPU |
| Disk | 20 GB | 40 GB+ (repos, dependencies, Docker images) |
System package dependencies (installed by baudbot install): git, curl, tmux, iptables, docker, gh, jq, sudo.
curl -fsSL https://raw.githubusercontent.com/modem-dev/baudbot/main/bootstrap.sh | bash
baudbot installbaudbot install has a guided config flow: pick an LLM provider, choose Slack integration mode (managed broker vs custom app), then opt into optional integrations (Kernel/Sentry).
After install:
# deploy latest source/config to runtime
sudo baudbot deploy
# start the service
sudo baudbot start
# check health (includes deployed version + broker connection/health status)
sudo baudbot status
sudo baudbot doctorUpgrade later:
sudo baudbot updateConnect/talk to the control agent:
sudo baudbot attach
Install with a specific pi version (optional):
BAUDBOT_PI_VERSION=0.52.12 baudbot installSlack broker registration:
sudo baudbot broker registerNeed to rotate/update a key later?
sudo baudbot env set ANTHROPIC_API_KEY
# or: sudo baudbot env set OPENAI_API_KEY sk-... --restartSee CONFIGURATION.md for required environment variables and secret setup.
The primary way to talk to Baudbot remotely is through Slack.
You have two choices:
- Create/manage your own Slack app (hard)
- Use our hosted Slack broker + control plane at https://baudbot.ai (easy) [ALPHA]
What the Slack broker does:
- One-click install to connect your Slack workspace to your Baudbot instance
- Broker forwards messages to your Baudbot instance (encrypted)
- Broker strips PII and sensitive values
- Broker tool-restricts access to individual Slack users, channels, etc (COMING SOON)
The broker does not have access to your Baudbot instance. Baudbot is pull-only; it doesn't expose additional ports or host a control plane.
| Role | Purpose |
|---|---|
| control-agent | Owns intake, triage, delegation, Slack comms, and lifecycle supervision |
| dev-agent | Ephemeral coding worker that executes branch β code β PR β CI loops |
| sentry-agent | On-demand incident investigator for Sentry alerts and triage support |
Slack
β
control-agent (always-on)
ββ todo + routing
ββ dev-agent(s) in isolated worktrees
ββ sentry-agent for incident triage
β
git commits, PRs, CI feedback, thread updates
Baudbot uses source/runtime separation: admin-managed source and immutable releases are deployed into an unprivileged agent runtime.
Baudbot is built for utility and containment:
- isolated
baudbot_agentUnix user (no general sudo) - per-UID firewall controls + process isolation
- source/runtime separation with deploy manifests
- startup deploy-manifest integrity verification (
warn/strictmodes) - read-only protection for security-critical files
- session log hygiene (startup redaction + retention pruning)
- layered tool and shell guardrails (policy/guidance layer, not sole containment)
See SECURITY.md for full threat model, trust boundaries, and known risks. In particular: many controls here are defense-in-depth (helpful for drift prevention/detection and keeping healthy agents on-task), while hard containment comes from OS/runtime boundaries.
- docs/team-workflow.md β request lifecycle and orchestration model
- docs/agents.md β agent roles, responsibilities, and session model
- docs/memory.md β persistent memory design and operating rules
- docs/linux-runtime.md β Linux execution model, tools, and constraints
- docs/operations.md β day-2 operations (start/stop/update/rollback/audit)
- docs/architecture.md β source/runtime/release architecture
- CONFIGURATION.md β full env var reference
- SECURITY.md β deep security model and vulnerability reporting
- CONTRIBUTING.md β contribution workflow
# All tests (unified Vitest runner)
npm test
# JS/TS suites only
npm run test:js
# Shell/security script suites only
npm run test:shell
# JS/TS coverage
npm run test:coverage
# Lint (Biome + ShellCheck) + typecheck
npm run lint && npm run typecheck
# ShellCheck only
npm run lint:shellMIT
Brought to you by the team at Modem, your dev team's auto-triage product manager.