MatrixSwarm
Automation that breathes. The Swarm that won’t die.
Not a Tool. A Digital Army.
- ✓ Agents repair, reboot, and protect themselves.
- ✓ No SaaS. No subscriptions. No downtime.
- ✓ You own it. You control it.
Your Swarm, Your Rules.
- ✓ Plug-and-play agents: add, upgrade, or kill jobs in seconds.
- ✓ True digital immortality—your swarm, your heartbeat, your rules.
Ready to Wake Your Swarm?
🚀 Download NowReplace SaaS fees and single-purpose scripts with one self-healing, agent-powered automation platform. No limits. No learning curve. Just automation—on your terms.
Explore the Swarm
Browse community-powered agents or contribute your own.
Agents
Monitoring
Log Health Monitor
`log_health` is a flexible and robust agent designed to monitor any specified log file in real-time. It tails the file, intelligently classifies new entries based on custom rules, and reports them to the swarm for analysis, making it a foundational sensor for system and application monitoring. Note: this was previously named log_watcher, but it's been given a more applicable title.
Monitoring
WordPress Plugin Guard
wordpress_plugin_guard is a specialized sentinel agent that provides automated File Integrity Monitoring (FIM) for WordPress plugins. Its core function is to maintain a trusted cryptographic baseline for plugin files and enforce security policies against unauthorized modifications or additions.
Monitoring
Crypto Alert
The `crypto_alert` agent is a highly flexible cryptocurrency market monitor. It connects to various exchanges via a dynamic factory system to track asset prices and trigger alerts based on user-defined conditions. This allows operators to create real-time notifications for significant market movements, price thresholds, or specific asset conversion rates.
Security
Gatekeeper
`gatekeeper` is a specialized sentinel agent that monitors SSH login activity. It provides real-time alerts for new SSH sessions, enriched with geographic location data to help identify unauthorized access attempts.
Docs
Directives & The Hive
🜂 MatrixSwarm Deployment Guide (Phoenix GUI)
Get the project if you don't already have it; You need both MatrixOS and Phoenix GUI; one can't be used without the other: <a href="https://github.com/matrixswarm/phoenix">Phoenix</a> <a href="https://github.com/matrixswarm/matrixos">MatrixOS</a> <pre> I. Unlock the Vault Before any deployment, Phoenix must load your cryptographic vault — this is where all keys, directives, and deployments live. 1. Launch Phoenix. The cockpit opens in a locked state showing the “🔐 Unlock” button. 2. Select Vault → Enter Password → Unlock. This opens a secure JSON vault via the VaultPasswordDialog, decrypts it using your password, and emits a vault.unlocked event — triggering the control panel to refresh deployments. 3. Once unlocked, the top bar (“Phoenix Control Panel”) becomes active. It’ll show: 🔌 Connect | 🌐 Connections | 📄 Directives | 🔐 Vault (for re-locking or reopening) Connect - when you've made a deployment, this is where you launch and connect. Connection Manager - this is where you add connection details for your agents, that will be stamped into your deployments, forging the directive templates. Directives - add, edit, delete templates (directive templates); deployments - add, delete, deploy, take directive templates and stamp them with data taken from information provided in the 'connection manager' Vault - close the currently open vault and exit </pre>
Directives & The Hive
🎪 How Do You Cram a Swarm of Agents inside a Clown Car?
Step right up, children of the cloud! Ready for a carnival trick your ops team won’t believe? Imagine stuffing your entire AI automation swarm into a single, tamper-proof, encrypted artifact—no Docker, no plugins, no side files. Just one directive, and a circus of agents ready to roll anywhere, anytime... (Cue the calliope music)
Security Best Practices
How to Use the Directive Encryption Tool
Accreditation This guide was prepared in collaboration with Gemini, the swarm's designated AI construct for documentation and analysis. This guide explains how to use the matrixswarm-encrypt-directive tool to secure your boot directives. This tool encrypts an entire directive file, protecting sensitive information like API keys, private keys, and file integrity hashes before the swarm is even launched. Overview The primary function of this tool is to take a plaintext directive file (.py or .json) and output an encrypted version. Its key features include: AES-GCM Encryption: Encrypts the entire directive with a strong, authenticated encryption cipher. Automatic Key Generation: Can automatically generate secure RSA keypairs for agents directly within the directive, which is ideal for agents that need to decrypt messages from external sources. Future-Proof Security: This tool is the foundation for advanced security patterns, such as storing private keys for matrix_https and matrix_websocket to enable mutually authenticated communication, and for storing tripwire_lite file hashes to ensure the integrity of the swarm's core files.
Use Cases & Examples
How a Secure Message is Processed in MatrixSwarm
This guide explains the end-to-end encrypted journey of a message, from a visitor on your website to a notification for your team. This process ensures that a submitted message is never stored in plaintext on the web server, providing a high level of security. Overview Front-End: A standard PHP web application. Back-End: The Python-based MatrixSwarm. Encryption: Hybrid RSA + AES-GCM. Result: A secure, automated pipeline for handling external communications.
News
Agent Spotlight
📰 MatrixSwarm Unveils Autonomous “WordPress Plugin Guard” Agent
MatrixSwarm has released a new perimeter agent built to protect one of the internet’s most-targeted surfaces: the WordPress plugin ecosystem. - The Problem Every compromised site usually starts the same way — a rogue plugin upload, a tampered file, a version mismatch left un-patched. Traditional malware scanners detect infection after the fact. The Plugin Guard agent flips that logic: it treats the plugin directory itself as a protected border.
Agent Spotlight
Beyond SSH: Building a Secure, Real-time Command Streaming Agent with Python
Terminal access is the lifeblood of infrastructure, but traditional SSH can be cumbersome for quick diagnostics and security-hardened environments. What if you could execute shell commands on remote nodes, stream the output in real-time to a modern panel, and enforce a strict command whitelist—all secured by end-to-end encryption and digital signatures? This article dives into the architecture of the TerminalStreamer agent, a powerful, self-cleaning, and secure component we built using the internal Python agent framework.
Roadmap Updates
Swarm Reinforced: MatrixSwarm Unleashes Hardened Watchdogs, New Relays, and Smarter Oracle
The MatrixSwarm has leveled up. Hardened watchdogs now self-heal Apache and MySQL, relays blast alerts to Discord and Telegram, the Oracle taps OpenAI securely through Vault, and cockpit visuals flag risky agents with subtle markers. With swarm-wide metrics on the horizon, this update marks a major step in evolving the swarm into a resilient, autonomous organism. Hail the Swarm!
Project Updates
Command & Control: Phoenix Vault UI Goes Live
We’ve entered a new phase of Swarm deployment. MatrixSwarm’s internal vault and agent infrastructure just got its biggest upgrade yet. With the introduction of the new Phoenix Cockpit, we're putting encrypted swarm control directly into your hands — secure, modular, and built for command-grade performance.