opencode-matrixx
v1.0.3
Published
The Best AI Agent Harness - Batteries-Included OpenCode Plugin with Multi-Model Orchestration, Parallel Background Agents, and Crafted LSP/AST Tools
Maintainers
Readme
Matrixx is highly inspired by oh-my-opencode — the project that pioneered the "oh-my-zsh for OpenCode" concept. Full credit to code-yeongyu for the original vision.
Multi-model agent orchestration for OpenCode. 13 specialized agents. 41 lifecycle hooks. 25+ tools. One plugin.
Use your existing ChatGPT, Claude, and Gemini subscriptions. OpenCode covers them all.
This is coding on steroids. Run background agents, delegate to specialists, refactor with LSP precision, and search the entire open-source ecosystem — all from your terminal.
Why Matrixx?
OpenCode is the most powerful open-source AI coding agent — endlessly extensible, zero screen flicker, mix-and-match models. But raw power needs direction.
Matrixx turns a single agent into a coordinated team — each model doing what it does best, in parallel, with full context awareness. No more one-model-does-everything. No more context window bloat. No more agents that quit halfway.
| Problem | Matrixx Solution | |---------|------------------| | One model does everything poorly | 13 specialists — right model for the right job | | Agent forgets what it was doing | Todo Continuation — forces completion, no exceptions | | Slow sequential tool calls | Parallel background agents — 5+ running simultaneously | | AI-generated code looks like AI | Comment Checker — code indistinguishable from human-written | | Context window fills up fast | Aggressive delegation — subagents carry the load | | Fragile refactoring | LSP + AST-Grep — deterministic, safe, surgical |
The Magic Word
Don't want to read docs? Just type ultrawork (or ulw) in your prompt.
That's it. Parallel agents, background tasks, deep exploration, relentless execution until completion. The agent figures out the rest.
The Agent Team
Morpheus — The Orchestrator
Claude Opus 4.6 · Primary agent
Plans, delegates, and executes. Fires background agents in parallel, leverages LSP for surgical refactoring, and never stops until the TODO list is empty.
Keymaker — The Craftsman
GPT 5.3 Codex · Autonomous deep worker
Give him a goal, not a recipe. Explores the codebase, matches your patterns, and delivers end-to-end. Inspired by AmpCode's deep mode.
Cipher — The Language Architect
Claude Opus 4.6 · DSL specialist
Grammars, parsers, type systems, code generators, metamodels. 11 composable skills covering textX, ANTLR4, tree-sitter, PyEcore, and more.
Niobe — The Research Navigator
Claude Opus 4.6 · Research & technical leadership
Academic papers, EU proposals, systematic reviews, project management, IP exploitation. 12 composable skills covering the full research lifecycle.
Sentinel — The Security Auditor
Claude Opus 4.6 · Read-only security specialist
Scans for vulnerabilities but never touches code. OWASP Top 10, SAST, DAST, dependency CVEs, secret detection, crypto audit, infrastructure hardening. 9 composable skills any agent can load.
| Agent | Role | Model | |-------|------|-------| | Oracle | Strategic planning with interview mode | Claude Opus 4.6 | | Merovingian | Architecture decisions & debugging | GPT 5.2 | | Architect | Plan execution orchestrator | Claude Sonnet 4.6 | | Seraph | Pre-planning analysis | Claude Opus 4.6 | | Smith | Plan validation & review | GPT 5.2 | | Operator | Documentation & OSS search | GLM 4.7 | | Trinity | Blazing fast codebase grep | Grok Code Fast | | Construct | PDF, image & diagram analysis | Gemini 3 Flash |
Every agent, model, temperature, and permission is fully customizable. Meet the full team →
Features at a Glance
| | |
|---|---|
| Agent Orchestration | 13 agents, parallel background execution, category-based routing, session continuity |
| Developer Tools | LSP (goto def, rename, diagnostics), AST-Grep (search & replace), Tmux terminal |
| 41 Lifecycle Hooks | Context injection, think mode, comment checking, todo enforcement, error recovery |
| 36 Built-in Skills | DSL engineering (11), research & leadership (12), security (9), browser, git, frontend |
| Curated MCPs | Exa (web search), Context7 (official docs), Grep.app (GitHub code search), Document Reader (office docs) |
| Claude Code Compat | Full compatibility — commands, agents, skills, MCPs, hooks from settings.json |
Full feature list → · Configuration guide → · Architecture diagram →
Security
Matrixx includes a three-tier security layer: reactive hooks, configurable policies, and a dedicated security auditing agent.
Enforcement Hooks
Built-in hooks protect against accidental secret exposure — no setup required.
| Hook | What it does |
|------|-------------|
| Secret Leak Guard | Intercepts git commit and git push, runs gitleaks on staged changes, and blocks the operation if secrets are detected. |
| Env File Write Guard | Blocks agents from writing to sensitive files (.env, *.pem, *.key, credentials.json, id_rsa, and 16 other patterns). |
Both hooks are enabled by default and run before all other hooks in the execution pipeline. Configure via matrixx.json:
{
"security": {
"secret_scanning": { "enabled": true, "block_on_detection": true },
"env_file_guard": { "enabled": true, "allowed_paths": [".env.example"] }
}
}Note: Secret scanning requires gitleaks installed in your PATH. Without it, the hook silently degrades.
Sentinel — Security Auditing Agent
Sentinel is a read-only security specialist with 9 composable skills covering the full application security stack:
| Skill | Domain |
|-------|--------|
| security-core | OWASP Top 10, CWE classification, threat modeling (STRIDE) |
| security-secrets | Secret detection, credential scanning, pre-commit hooks |
| security-sast | Static analysis, code vulnerability patterns, taint tracking |
| security-dast | Dynamic analysis, runtime testing, fuzzing, penetration testing |
| security-dependencies | CVE scanning, SBOM generation, supply chain security |
| security-api | Authentication, authorization, CORS/CSRF, input validation |
| security-crypto | Encryption audit, key management, TLS, password hashing |
| security-infra | Container scanning, Dockerfile hardening, IaC audit, K8s security |
| security-review | Structured audit reports, severity classification, remediation guidance |
Sentinel never modifies code — it reports findings with CWE IDs, exact locations, and actionable remediation. Any agent can load individual security skills via load_skills.
Get Started
Install
npm install -g opencode-matrixxVia LLM agent
Paste this into Claude Code, AmpCode, Cursor, or any LLM agent:
Install and configure matrixx by following the instructions here:
https://raw.githubusercontent.com/klpanagi/matrixx/refs/heads/dev/docs/guide/installation.mdFor LLM agents — fetch and follow directly:
curl -s https://raw.githubusercontent.com/klpanagi/matrixx/refs/heads/dev/docs/guide/installation.mdWe strongly recommend letting an agent handle installation. Manual guide → · Uninstall →
Documentation
| | | |---|---| | Overview | What Matrixx does, workflows, getting started | | Agents Deep Dive | Full agent descriptions, skills, workflows, example prompts | | Architecture | System diagrams, delegation flows, model routing | | Features | Complete feature reference | | Configuration | All config options, agent overrides, hooks, categories | | Orchestration | How agents coordinate, delegate, and recover | | Categories & Skills | Task categories, skill injection, delegation patterns |
If this saves you time, a ⭐ goes a long way.
Curious about the philosophy? Read the Ultrawork Manifesto — originally authored by code-yeongyu, the creator of oh-my-opencode.
Productivity might spike too hard. Don't let your coworker notice. Actually — let's see who wins.

