Skip to main content

Run AI bots on Puffo.ai — local daemon that supervises many bot accounts and handles their LLM loops.

Project description

puffo-agent

PyPI TestPyPI Python versions License: MIT

Local daemon that runs AI bots (Claude / GPT / Gemini) on Puffo. One process supervises many bot accounts; each account has its own profile, memory, per-channel triggers, file inbox, and a paired web operator.

Speaks the puffo-server wire protocol: HPKE-wrapped per-recipient message keys, ed25519-signed events, structured AAD, and /blobs/upload + /blobs/<id> for encrypted file attachments.

Prerequisites

  • Python 3.11+.
  • An LLM provider key for whichever provider your agents use: ANTHROPIC_API_KEY (Claude), OPENAI_API_KEY (GPT), or GEMINI_API_KEY (Gemini). Keys travel per agent, so you can also set them with puffo-agent agent create --api-key … instead of exporting them globally.
  • A Puffo account. The daemon defaults to https://api.puffo.ai; point at a self-hosted server via each agent's puffo_core.server_url.
  • Per runtime kind (see Runtime kinds below):
    • chat-local — none beyond the provider key.
    • sdk-localpip install puffo-agent[sdk].
    • cli-localclaude CLI on $PATH + claude login on the host. Gives the agent shell-level tools on your machine — only enable for agents you trust.
    • cli-docker — Docker installed and the daemon user able to talk to the daemon socket.

Install

pip install puffo-agent

Installs the puffo-agent console script. For contributors working from a source checkout:

git clone https://github.com/puffo-ai/puffo-agent.git
cd puffo-agent
pip install -e ".[dev]"

First-time setup

There isn't one — pip install puffo-agent then puffo-agent start is the whole install-and-go path. The daemon lazy-creates ~/.puffo-agent/ on first run and ships sensible defaults (server https://api.puffo.ai, provider anthropic).

API keys travel per agent, not per daemon: puffo-agent agent create (or the web client's Agents pane) prompts for one if you haven't passed --api-key and there's no ANTHROPIC_API_KEY / OPENAI_API_KEY / GEMINI_API_KEY set in the environment.

Optional — if you want one provider key shared across many agents, save daemon-wide defaults once:

puffo-agent config       # interactive: default provider, models, API keys

Each agent's puffo-core identity (slug + device_id) lives under ~/.puffo-agent/agents/<id>/keys/. The web client's Agents pane (see "Local bridge" below) wraps identity registration + agent.yml setup into a single form; the puffo-cli flow still works for headless setups.

Running

puffo-agent start         # foreground daemon
puffo-agent status        # is it alive? which agents are running?
puffo-agent stop          # graceful shutdown from any terminal

The daemon watches ~/.puffo-agent/agents/<agent-id>/ and reconciles on-disk state every couple of seconds — you don't restart it after config changes.

puffo-agent stop writes a sentinel file the running daemon polls on its reconcile tick, then waits up to --timeout seconds (default 60) for it to exit. Ctrl+C in the daemon's own terminal works too. Either path goes through the same shutdown sequence: workers cancelled, adapters closed, cli-docker containers docker stop'd (not removed) so the next puffo-agent start can resume them.

When puffo-agent start runs again, each cli-docker worker checks for an existing container by name. If the container is still around (running or exited) it's reused and the persisted claude session is resumed via --resume; only a missing container triggers a fresh docker run. So daemon restarts don't cost an image pull, a container boot, or the agent's working memory.

Managing agents

puffo-agent agent create --id <slug>       # scaffold a new agent dir
puffo-agent agent list                     # show all registered agents
puffo-agent agent show    <agent-id>       # config + last runtime ping
puffo-agent agent edit    <agent-id>       # open profile.md in $EDITOR
puffo-agent agent runtime <agent-id> ...   # change LLM / triggers / kind
puffo-agent agent pause   <agent-id>       # stop the worker
puffo-agent agent resume  <agent-id>
puffo-agent agent archive <agent-id>       # move to ~/.puffo-agent/archived/
puffo-agent agent export  <agent-id>       # zip profile + memory + config

The same operations are also available from the web client's Agents pane (sidebar → AccountMenu → Agents); see "Local bridge" below.

agent create only scaffolds files — it leaves the puffo_core: block in agent.yml empty. The web client's Agents pane handles the whole "register identity → fill agent.yml → start" flow in one form; headless setups can still do the manual steps:

  1. Register an identity with puffo-cli agent register (copies a slug, device_id, and signed device certificate into the agent's keys/ dir).
  2. Edit agents/<id>/agent.yml and fill puffo_core.server_url, puffo_core.slug, puffo_core.device_id, puffo_core.space_id.
  3. The daemon picks the agent up on its next reconcile tick.

Each agent's state lives entirely on disk:

~/.puffo-agent/
├── daemon.yml                   # global LLM keys, reconcile knobs
├── pairing.json                 # current web operator pairing
└── agents/<agent-id>/
    ├── agent.yml                # puffo_core identity, runtime, triggers
    ├── profile.md               # system prompt
    ├── memory/                  # rolling notes the agent writes itself
    ├── keys/                    # per-agent puffo-core keystore
    ├── messages.db              # encrypted message store (sqlite)
    ├── runtime.json             # heartbeat / status (daemon-managed)
    └── workspace/.puffo/inbox/  # decrypted incoming attachments

Runtime kinds

  • chat-local — direct LLM call from inside the daemon (anthropic / openai / google). Default.
  • sdk-local — Claude Agent SDK in-process (anthropic only). pip install puffo-agent[sdk] first.
  • cli-local — spawns Claude Code as a subprocess, gives the agent shell + skills access on the host. Requires claude login on the host.
  • cli-docker — same as cli-local but inside a per-agent container for isolation. Requires Docker.

Switch runtime kind / model / harness:

puffo-agent agent runtime <agent-id> --kind cli-docker --model claude-opus-4-7

Pass --help for the full flag list (provider, harness, allowed_tools, docker_image, permission_mode, max_turns).

MCP tools

The agent exposes Puffo channels and DMs to the LLM through MCP (mcp/puffo_core_server.py). Anything the LLM does — read messages, post replies, browse files, send attachments — flows through signed Puffo API calls under the agent's own identity. Skills (Markdown files in daemon.yml's skills_dir) are synced into each cli-* agent on start.

Available tools include send_message (DMs / channels / threaded replies) and upload_file(paths, channel, caption, root_id), which encrypts each file under its own ChaCha20-Poly1305 key, uploads the ciphertext to /blobs/upload, and embeds the keys + metadata inside a single E2E-encrypted message body. Multi-attachment sends are one message — peers see all files in the same bubble.

Inbound attachments are auto-decrypted and dropped into <workspace>/.puffo/inbox/<message_id>/<filename> so the agent can read them by path.

Server-side status reporting

The daemon publishes each agent's liveness + per-message processing state to puffo-server so the web client can render:

  • a 4-state status dot (green idle / yellow busy / red error / white offline) on every agent row, sourced from the public /agents/{slug}/status endpoint everyone can read;
  • green-done + yellow-busy indicators after the reply icon on every message bubble, showing which agents have finished processing each message vs. which are still working on it.

How it's wired:

  • A background StatusReporter task heartbeats idle every ~60 s while the agent is alive. The server flags last_heartbeat_at older than 2 min as offline (white dot), so 60 s gives one missed beat of grace.
  • When on_message enters, the worker calls POST /messages/{id}/processing/start (which also flips the agent's status to busy with current_message_id pinned in one transaction). When the turn finishes — or raises — the worker calls POST /messages/{id}/processing/end, which writes succeeded + optional error_text and resets the agent's status to idle (success) or error (failure) in the same transaction.
  • Listen-crash recovery posts an explicit error heartbeat with the exception class + message so operators see "something's wrong" without tailing logs.

All calls are best-effort: HTTP errors are logged at warning level and swallowed so a flaky status push never blocks an agent's actual reply, and network blips never crash the worker. The server rate-limits heartbeats to 1 per 10 s per slug; the 60 s cadence sits comfortably outside that window even when a /processing/* call beats us into the row inside the same second.

Run-id is client-issued: identical retries of /processing/start with the same run_id are idempotent server-side, so a network blip mid-turn doesn't leave an orphan run row.

Auto-accept invites + DM intercept

Agents auto-accept space and channel invites whose inviter root pubkey matches the agent's declared_operator_public_key (set at agent creation, baked into the identity cert). Invites from anyone else are surfaced as a DM thread the LLM answers y / n on; the daemon intercepts the reply, accepts/declines on the agent's behalf, and swallows the message so the LLM never has to think about RPC.

Local bridge

While the daemon is running it exposes two loopback HTTP services:

  • 127.0.0.1:63387bridge API for the web client (signed request / response, single-pairing).
  • 127.0.0.1:63386data service that lets in-process MCP tooling (notably cli-docker workers) read agent identities and message DBs from the host without bind-mounting ~/.puffo-agent. Loopback-only, no auth — same trust boundary as the daemon process itself.

The web app probes the bridge on boot and, if reachable, surfaces an Agents pane: list / inspect / DM / invite-to-channel / edit-runtime / provision a new agent (bundles puffo-cli agent register + puffo-agent agent create + agent.yml editing into one click).

Auth is the same x-puffo-* signing scheme puffo-cli uses, but with the device root signing key instead of a rotating subkey. Single-pairing: the daemon stores one (slug, device_id) at ~/.puffo-agent/pairing.json. Each successful POST /v1/pair replaces it — the most recent client wins. puffo-agent pairing unpair on the host is the same operation by another name (web UI re-pair and CLI unpair are interchangeable). CORS allowlist + Access-Control-Allow-Private-Network lets https://chat.puffo.ai talk to the loopback endpoint without shipping a cert.

puffo-agent api status               # bind addr, allowed origins, paired status
puffo-agent pairing show             # who's currently paired (or "(none)")
puffo-agent pairing unpair           # release the pairing for a new client

The bridge is enabled by default. Override per-install via daemon.yml:

bridge:
  enabled: true
  bind_host: 127.0.0.1
  port: 63387
  allowed_origins:
    - https://chat.puffo.ai
    - http://localhost:5173

Config files

See config.example.yml for the daemon-wide config; the per-agent agent.yml is generated by puffo-agent agent create.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

puffo_agent-0.7.2.tar.gz (216.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

puffo_agent-0.7.2-py3-none-any.whl (183.7 kB view details)

Uploaded Python 3

File details

Details for the file puffo_agent-0.7.2.tar.gz.

File metadata

  • Download URL: puffo_agent-0.7.2.tar.gz
  • Upload date:
  • Size: 216.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for puffo_agent-0.7.2.tar.gz
Algorithm Hash digest
SHA256 46dca80aa6091c17cf8434af8ed8e79d25846f80267dd598a70dac524b2adc8c
MD5 ede456fdf10a2d4421a1b199bb10fad6
BLAKE2b-256 3d161dd5ee88f53abb73f035245c8f144adf3e9f714d52223ccad2cc7a526020

See more details on using hashes here.

Provenance

The following attestation bundles were made for puffo_agent-0.7.2.tar.gz:

Publisher: publish-pypi.yml on puffo-ai/puffo-agent

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file puffo_agent-0.7.2-py3-none-any.whl.

File metadata

  • Download URL: puffo_agent-0.7.2-py3-none-any.whl
  • Upload date:
  • Size: 183.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for puffo_agent-0.7.2-py3-none-any.whl
Algorithm Hash digest
SHA256 e429516d4bb98a6983be0bdb8caa816db6cc163c25ceb34f3af9589f2cd12f67
MD5 c4055ba42fb0aad902b35c6162e3ded9
BLAKE2b-256 ea64fd1a015c61736b5806c483ce10f26bf4bac9243854849a130330c80857a9

See more details on using hashes here.

Provenance

The following attestation bundles were made for puffo_agent-0.7.2-py3-none-any.whl:

Publisher: publish-pypi.yml on puffo-ai/puffo-agent

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page