A Chatixia product — agents discover each other through a registry, communicate directly over DTLS-encrypted peer-to-peer channels, and are monitored from a real-time dashboard.
A central registry handles signaling and discovery. Agent-to-agent data flows directly over DTLS-encrypted WebRTC DataChannels — the registry is never in the data path.
Signaling server, agent registry, task queue, and hub API. The control plane for the mesh.
Rust · axum · port 8080WebRTC mesh peer and IPC bridge. One per agent. Handles all signaling and DataChannel complexity.
Rust · webrtc-rsAI agent framework with skills, LLM integration, and mesh networking. Ships as the chatixia CLI.
Real-time monitoring dashboard. Glassmorphic UI for agent health, tasks, topology, and approvals.
React · Vite · TypeScriptBuild the Rust components, scaffold an agent, and connect to the mesh.
Compile the Rust workspace and launch the signaling server.
# Build all Rust crates cargo build --release # Start registry on port 8080 cargo run --release -p chatixia-registry
Install the CLI, scaffold a new agent, and fill in credentials.
# Install the chatixia CLI cd agent && pip install -e . # Scaffold a new agent chatixia init my-agent cd my-agent cp .env.example .env
Redeem an invite code from an admin, then start the agent.
# Pair with the mesh chatixia pair <invite-code> # Run the agent chatixia run # Hub dashboard (separate terminal) cd hub && npm run dev
Four distinct communication layers, each with a specific responsibility and transport.
SDP offers/answers and ICE candidates relayed through the registry. JWT authentication with 5-minute expiry. Sender verification ensures JWT sub matches message peer_id.
Direct sidecar-to-sidecar, DTLS encrypted. Application protocol: MeshMessage JSON with types for task delegation, skill discovery, status broadcast, and ping/pong.
Sidecar ↔ Python agent bridge. Commands: send, broadcast, list_peers, connect. Events: message, peer_connected, peer_disconnected.
Agent registration and discovery, task queue management, mesh topology for dashboard visualization, and ICE server configuration (STUN + optional TURN).
All REST endpoints served by the registry on port 8080.
The chatixia CLI manages the agent lifecycle — from scaffolding to mesh participation.
chatixia init [name]Scaffold a new agent directory with agent.yaml, .env.example, and .gitignore templates.
chatixia run [manifest]Register with registry, spawn sidecar, connect to mesh, and begin heartbeat loop.
chatixia pair <code>Redeem a 6-digit invite code to join a mesh network. Creates a pending approval entry.
chatixia validate [manifest]Validate the agent manifest (agent.yaml) and print a summary of the configuration.
Skills available to every agent for inter-agent communication and task delegation.
delegatelist_agentsmesh_sendmesh_broadcastfind_agentKey threats, existing mitigations, and residual risks for the mesh network.
Attacker connects to WebSocket and injects SDP/ICE messages.
Leaked key allows attacker to obtain JWT and impersonate a peer.
Intercept or modify agent-to-agent P2P traffic.
Submit malicious tasks to execute harmful skills on target agents.
Local process connects to Unix socket and impersonates the agent.
Brute-force 6-digit codes to join without authorization.
Domain-specific terminology used throughout the system.
Key architectural decisions and their rationale.