Skip to main content

Persistent Python runtime with MCP channel push. Dev shell and autonomous-agent substrate in one package.

Project description

repld

Persistent Python runtime with MCP channel push. Dev shell and autonomous-agent substrate in one package.

uv tool install repld-tool

What it does

  • Stateful kernel — auth once, hold the client, query across turns. State persists across cells.
  • Async-native — top-level await, defer() for fire-and-forget, @every() for periodic tasks. Long jobs never block the turn.
  • Channel push — task completion, webhooks, file changes, and timers arrive as <channel> injections. The agent reacts; it doesn't poll.
  • Shared namespace — human and agent operate on the same __main__. Stage data in one, use it in the other.
  • Browser integration — attach to your logged-in Chrome tabs via CDP. No API keys, no OAuth dance. The agent discovers the API surface from your traffic.
  • Gists — reusable Python modules that wrap any web app's API. The browser supplies auth; the gist captures the pattern.

Install

# install globally
uv tool install repld-tool

# in any project:
cd path/to/project
repld init               # writes .mcp.json + updates .gitignore
repld                    # starts the kernel

Project-local alternative: uv add --dev repld-tool, then point .mcp.json at uv run repld bridge.

repld init produces this .mcp.json:

{
  "mcpServers": {
    "repld": { "type": "stdio", "command": "repld", "args": ["bridge"] }
  }
}

Quick example

The agent calls exec to run Python in the kernel:

# runs inline — result returned immediately
import httpx
httpx.get("https://api.example.com/status").json()

# long-running — returns task_id, pushes channel notification on completion
await asyncio.sleep(30)
notify("done", kind="migration")

Autonomous worker — five lines:

@every(300)
async def check_overdue():
    for inv in await po.get_overdue():
        notify(f"Overdue: {inv.customer} {inv.amount} NOK",
               kind="overdue", invoice_id=inv.id)

The kernel runs the watcher; the agent reacts to each <channel> injection.

With an existing app

repld inherits your project's environment. A repl.py at the project root:

from myapp.main import app
from myapp.db import async_session_maker
import asyncio, uvicorn

asyncio.create_task(uvicorn.Server(
    uvicorn.Config(app, host="127.0.0.1", port=8000, log_level="warning")
).serve())

session = async_session_maker()
print("FastAPI on :8000, db session ready")
repld --init repl.py

The agent now has a live handle on your running app: inspect routes, query the ORM, call handlers bypassing HTTP.

Tools

Core:

Tool What it does
exec Execute Python. Returns inline within timeout (default 2s); otherwise returns task_id and pushes channel on completion.
get_task Status + head/tail preview of a running task's output.
cancel Cancel a running task by id.

Browser (requires uv tool install repld-tool[browser]):

Tool What it does
browser_attach Watch URL pattern, auto-attach matching tabs.
browser_tabs List attached tabs.
browser_pages List all Chrome targets.
browser_js Evaluate JavaScript in a tab.
browser_network Query captured traffic (HAR-style, DuckDB).
browser_body Response body for a captured request.
browser_request Request headers/postData for a captured request.
browser_fetch In-page fetch (inherits auth/cookies).
browser_click Click element (trusted dispatch).
browser_type Type into element (trusted dispatch).
browser_key Send key press (Enter, Escape, etc).
browser_navigate Navigate tab to URL.
browser_open Open new tab.
browser_console Query console logs and exceptions.
browser_screenshot Capture page screenshot.
browser_cdp Raw CDP passthrough.
browser_clear Reset captured network/console.
browser_detach Remove watch pattern, detach tabs.

Output from every cell spills to $XDG_RUNTIME_DIR/repld/ — the inline response carries a head/tail preview plus the spill path. Use standard Read/Grep tools for full output.

Helpers

Available in the kernel namespace:

notify(content, **meta)              # channel push to the agent
ask(prompt)                          # block on free-form human input
confirm(prompt)                      # block on yes/no
choose(prompt, options)              # block on pick-one
defer(coro, label=None)              # fire-and-forget, channel push on completion
@every(seconds)                      # periodic ticker, fn.cancel() to stop

Browser builtins (when repld[browser] is installed):

tab = await browser.get("*example.com*")  # find tab by URL glob
tab = await browser.open("https://...")   # open new tab
await browser.watch("*pattern*")          # auto-attach matching tabs

await tab.js("document.title")            # eval JS
await tab.fetch("/api/data")              # in-page fetch (inherits session)
await tab.click("#submit")                # trusted click
await tab.type_text("#search", "query")   # trusted typing
tab.network(url="*api*")                  # query captured traffic

Gists

Gists are Python modules in ./gists/ (project) or ~/.repld/gists/ (global) that wrap anything into a callable API — web apps via the browser, databases, graph stores, embedding indexes, internal services.

# gists/myapp.py
"""MyApp — accounts and transactions."""

class MyApp:
    def __init__(self, tab): self._tab = tab

    @classmethod
    async def connect(cls):
        from __main__ import browser
        tab = await browser.get("*myapp.com*")
        return cls(tab)

    async def accounts(self):
        return (await self._tab.fetch("/api/accounts"))["body"]
import myapp
app = await myapp.MyApp.connect()
await app.accounts()

Re-importing after edits auto-reloads. Gists can register MCP tools via __repld_tools__ — scaffold with repld gist <name>. Run repld help gists for details.

Browser

repld[browser] attaches to Chrome via CDP (--remote-debugging-port=9222). You log in normally; the agent sees your traffic, discovers the API surface, and works with your authenticated sessions.

tab = await browser.get("*salesforce*")
reqs = tab.network(url="*/api/*")           # discover API calls
auth = reqs[0].request_headers["Authorization"]  # extract auth

Body capture via Fetch interception means login flows, redirects, and CSRF exchanges are never lost. See docs/browser.md for the full design.

Scope

repld executes arbitrary Python in your project environment. It is a dev-time tool — never a runtime dependency. The IPC socket is localhost-only with user-only permissions.

Channels are a research-preview feature of Claude Code. The current integration uses --dangerously-load-development-channels server:repld.

License

MIT

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

repld_tool-0.0.3.tar.gz (82.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

repld_tool-0.0.3-py3-none-any.whl (93.0 kB view details)

Uploaded Python 3

File details

Details for the file repld_tool-0.0.3.tar.gz.

File metadata

  • Download URL: repld_tool-0.0.3.tar.gz
  • Upload date:
  • Size: 82.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.11.7 {"installer":{"name":"uv","version":"0.11.7","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"EndeavourOS","version":null,"id":null,"libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for repld_tool-0.0.3.tar.gz
Algorithm Hash digest
SHA256 b5240af439ca8c61d0411aeba45f32ebfc3fc36739f23f6a2ce3d71573cd42a6
MD5 63f385b9ca859bb58cc34bcc7573e60b
BLAKE2b-256 60ef390945fc9666a47f7040324f4f694a96ae38f5c5fcb713fd249e8f60095c

See more details on using hashes here.

File details

Details for the file repld_tool-0.0.3-py3-none-any.whl.

File metadata

  • Download URL: repld_tool-0.0.3-py3-none-any.whl
  • Upload date:
  • Size: 93.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.11.7 {"installer":{"name":"uv","version":"0.11.7","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"EndeavourOS","version":null,"id":null,"libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for repld_tool-0.0.3-py3-none-any.whl
Algorithm Hash digest
SHA256 af9b23e085fe0ccb51c351ae59864c477968ed98b976d51d59adc4863774a8d7
MD5 1a04fd6ffd97eb22930874e2535804d2
BLAKE2b-256 1714a812d2d18776f7f3624f12fa3639b6844eb74ec573dcb730c53e5060c85d

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page