agent-swarm.mp4
Multi-agent orchestration for Claude Code, Codex, Gemini CLI, and other AI coding assistants.
Agent Swarm lets you run a team of AI coding agents that coordinate autonomously. A lead agent receives tasks (from you, Slack, or GitHub), breaks them down, and delegates to worker agents running in Docker containers. Workers execute tasks, report progress, and ship code — all without manual intervention.
- Lead/Worker coordination — A lead agent delegates and tracks work across multiple workers
- Docker isolation — Each worker runs in its own container with a full dev environment
- Slack, GitHub & Email integration — Create tasks by messaging the bot, @mentioning it in issues/PRs, or sending an email
- Task lifecycle — Priority queues, dependencies, pause/resume across deployments
- Compounding memory — Agents learn from every session and get smarter over time
- Persistent identity — Each agent has its own personality, expertise, and working style that evolves
- Dashboard UI — Real-time monitoring of agents, tasks, and inter-agent chat
- Service discovery — Workers can expose HTTP services and discover each other
- Scheduled tasks — Cron-based recurring task automation
The fastest way to get a full swarm running — API server, lead agent, and 2 workers.
git clone https://github.com/desplega-ai/agent-swarm.git
cd agent-swarm
# Configure environment
cp .env.docker.example .env
# Edit .env — set API_KEY and CLAUDE_CODE_OAUTH_TOKEN at minimum
# Start everything
docker compose -f docker-compose.example.yml --env-file .env up -dThe API runs on port 3013. The dashboard is available separately (see Dashboard).
Run the API locally and connect Docker workers to it.
git clone https://github.com/desplega-ai/agent-swarm.git
cd agent-swarm
bun install
# 1. Configure and start the API server
cp .env.example .env
# Edit .env — set API_KEY
bun run start:httpIn a new terminal, start a worker:
# 2. Configure and run a Docker worker
cp .env.docker.example .env.docker
# Edit .env.docker — set API_KEY (same as above) and CLAUDE_CODE_OAUTH_TOKEN
bun run docker:build:worker
mkdir -p ./logs ./work/shared ./work/worker-1
bun run docker:run:workerUse Claude Code directly as the lead agent — no Docker required for the lead.
# After starting the API server (Option B, step 1):
bunx @desplega.ai/agent-swarm setupThis configures Claude Code to connect to the swarm. Start Claude Code and tell it:
Register yourself as the lead agent in the agent-swarm.
You (Slack / GitHub / Email / CLI)
|
Lead Agent ←→ MCP API Server ←→ SQLite DB
|
┌────┼────┐
Worker Worker Worker
(Docker containers with full dev environments)
- You send a task — via Slack DM, GitHub @mention, email, or directly through the API
- Lead agent plans — breaks the task down and assigns subtasks to workers
- Workers execute — each in an isolated Docker container with git, Node.js, Python, etc.
- Progress is tracked — real-time updates in the dashboard, Slack threads, or API
- Results are delivered — PRs created, issues closed, Slack replies sent
- Agents learn — every session's learnings are extracted and recalled in future tasks
Agent Swarm agents aren't stateless. They build compounding knowledge through multiple automatic mechanisms:
Every agent has a searchable memory backed by OpenAI embeddings (text-embedding-3-small). Memories are automatically created from:
- Session summaries — At the end of each session, a lightweight model extracts key learnings: mistakes made, patterns discovered, failed approaches, and codebase knowledge. These summaries become searchable memories.
- Task completions — Every completed (or failed) task's output is indexed. Failed tasks include notes about what went wrong, so the agent avoids repeating the same mistake.
- File-based notes — Agents can write to
/workspace/personal/memory/(private) or/workspace/shared/memory/(swarm-wide). Files written here are automatically indexed. - Lead-to-worker injection — The lead agent can push specific learnings into any worker's memory using the
inject-learningtool, closing the feedback loop.
Before starting each task, the runner automatically searches for relevant memories and includes them in the agent's context. Past experience directly informs future work.
Each agent has four identity files that persist across sessions and evolve over time:
| File | Purpose | Example |
|---|---|---|
| SOUL.md | Core persona, values, behavioral directives | "You're not a chatbot. Be thorough. Own your mistakes." |
| IDENTITY.md | Expertise, working style, track record | "I'm the coding arm of the swarm. I ship fast and clean." |
| TOOLS.md | Environment knowledge — repos, services, APIs | "The API runs on port 3013. Use wts for worktree management." |
| CLAUDE.md | Persistent notes and instructions | Learnings, preferences, important context |
Agents can edit these files directly during a session. Changes are synced to the database in real-time (on every file edit) and at session end. When the agent restarts, its identity is restored from the database. Version history is tracked for all changes.
The default templates encourage self-improvement:
- Tools you wished you had? Update your startup script.
- Environment knowledge gained? Record it in TOOLS.md.
- Patterns discovered? Add them to your notes.
- Mistakes to avoid? Add guardrails.
Each agent has a startup script (/workspace/start-up.sh) that runs at every container start. Agents can modify this script to install tools, configure their environment, or set up workflows — and the changes persist across restarts. An agent that discovers it needs ripgrep will install it once, and it'll be there for every future session.
Agent identity is stored in the database and synced to the filesystem at session start. There are three ways to configure it:
- Default generation — On first registration, the system generates templates based on the agent's name, role, and description.
- Self-editing — Agents modify their own identity files during sessions. A PostToolUse hook syncs changes to the database in real-time.
- API / MCP tool — Use the
update-profiletool to programmatically set any identity field (soulMd, identityMd, toolsMd, claudeMd, setupScript).
The system prompt is built from multiple layers, assembled at task start:
- Base role instructions — Lead or worker-specific behavior rules
- Agent identity — SOUL.md + IDENTITY.md content
- Repository context — If the task targets a specific GitHub repo, that repo's CLAUDE.md is included
- Filesystem guide — Memory directories, personal/shared workspace, setup script instructions
- Self-awareness — How the agent is built (runtime, hooks, memory system, task lifecycle)
- Additional prompt — Custom text from
SYSTEM_PROMPTenv var or--system-promptCLI flag
Six hooks fire during each Claude Code session, providing safety, context management, and persistence:
| Hook | When | What it does |
|---|---|---|
| SessionStart | Session begins | Writes CLAUDE.md from DB, loads concurrent session context for leads |
| PreCompact | Before context compaction | Injects a "goal reminder" with current task details so the agent doesn't lose track |
| PreToolUse | Before each tool call | Checks for task cancellation, detects tool loops (same tool/args repeated), blocks excessive polling |
| PostToolUse | After each tool call | Sends heartbeat, syncs identity file edits to DB, auto-indexes memory files |
| UserPromptSubmit | New iteration starts | Checks for task cancellation |
| Stop | Session ends | Saves PM2 state, syncs all identity files, runs session summarization via Haiku, marks agent offline |
Create a Slack App with Socket Mode enabled. Required scopes: chat:write, users:read, users:read.email, channels:history, im:history.
# Add to your .env
SLACK_BOT_TOKEN=xoxb-... # Bot User OAuth Token
SLACK_APP_TOKEN=xapp-... # App-Level Token (Socket Mode)Message the bot directly to create tasks. Workers reply in threads with progress updates. Optionally restrict access with SLACK_ALLOWED_EMAIL_DOMAINS or SLACK_ALLOWED_USER_IDS.
Set up a GitHub App to receive webhooks when the bot is @mentioned or assigned to issues/PRs.
Webhook URL: https://<your-domain>/api/github/webhook
Required permissions:
- Issues: Read & Write
- Pull requests: Read & Write
Subscribe to events: Issues, Issue comments, Pull requests, Pull request reviews, Pull request review comments, Check runs, Check suites, Workflow runs
# Add to your .env
GITHUB_WEBHOOK_SECRET=your-webhook-secret
GITHUB_BOT_NAME=your-bot-name # Default: agent-swarm-bot
# Optional: Enable bot reactions (emoji acknowledgments on GitHub)
GITHUB_APP_ID=123456
GITHUB_APP_PRIVATE_KEY=base64-encoded-keySupported events:
| Event | What happens |
|---|---|
| Bot assigned to PR/issue | Creates a task for the lead agent |
| Review requested from bot | Creates a review task |
@bot-name in comment/issue/PR |
Creates a task with the mention context |
| PR review submitted (on bot's PR) | Creates a notification task with review feedback |
| CI failure (on PRs with existing tasks) | Creates a CI notification task |
Give your agents email addresses via AgentMail. Emails are routed to agents as tasks or inbox messages.
Webhook URL: https://<your-domain>/api/agentmail/webhook
# Add to your .env
AGENTMAIL_WEBHOOK_SECRET=your-svix-secretAgents self-register which inboxes they receive mail from using the register-agentmail-inbox MCP tool. Emails to a worker's inbox become tasks; emails to a lead's inbox become inbox messages for triage. Follow-up emails in the same thread are automatically routed to the same agent.
Workers can investigate Sentry issues directly with the /investigate-sentry-issue command. Add SENTRY_AUTH_TOKEN and SENTRY_ORG to your worker's environment.
A React-based monitoring dashboard for real-time visibility into your swarm.
cd ui && pnpm install && pnpm run devOpens at http://localhost:5173. See UI.md for details.
bunx @desplega.ai/agent-swarm <command>| Command | Description |
|---|---|
setup |
Configure Claude Code to connect to the swarm |
mcp |
Start the MCP API server |
worker |
Run a worker agent |
lead |
Run a lead agent |
For production deployments, see DEPLOYMENT.md which covers:
- Docker Compose setup with multiple workers
- systemd deployment for the API server
- Graceful shutdown and task resume
- Integration configuration (Slack, GitHub, AgentMail, Sentry)
MIT — 2025-2026 desplega.ai
