Orchestrate remote servers with cryptographic authority. Ed25519-signed command execution, real-time telemetry, and AI-powered triage — from a single desktop pane.
Security-first remote orchestration, built for operators who don't compromise.
Every command sent to a Satellite is cryptographically signed. The edge worker verifies the signature before executing — no trust assumptions, no MITM risk.
Memory-safe edge workers with 28-pattern command blocklists, 15s execution timeouts, WebSocket rate limiting, and OOM-proof frame size caps.
Critical log entries are intercepted and evaluated by an LLM for automated remediation. Secrets are scrubbed before reaching the model.
Live CPU and memory stats streamed every 5 seconds from every connected Satellite via authenticated WebSocket portals.
SSH bootstrapper builds the Satellite, uploads via SCP, launches with nohup, and captures the pairing code — all from the GUI.
Push binary updates to remote Satellites over the authenticated Portal channel. No manual SSH required after initial deployment.
Three components cooperate to provide secure, resilient remote orchestration.
From install to full orchestration in under five minutes.
Download the MXE desktop app for your platform. It's an Electron application with a hardened security model: nodeIntegration: false, contextIsolation: true, strict CSP, and all API keys encrypted in the main process. The renderer never touches Node.js directly.
Click "Slide Satellite" in the dashboard. Enter your VPS hostname, SSH user, and key path. MXE compiles the Rust Satellite binary (if needed), uploads it via SCP, and launches it with nohup. A 6-digit pairing code is printed to the remote terminal.
The Hub connects over WebSocket and sends the pairing code along with its Ed25519 public key. The Satellite verifies the code, stores the Hub's key, and returns its own public key plus an auth token — all signed with NaCl crypto_sign. The Hub verifies the signature. Trust is now mutual and cryptographic.
Once paired, the Satellite streams CPU and memory stats every 5 seconds. The Hub can dispatch bash commands — each one is Ed25519-signed before transmission. The Satellite verifies the signature, checks against a 28-pattern blocklist, and executes with a 15-second timeout. Results stream back in real-time.
Critical log entries are automatically intercepted by the Hub's triage engine. The log message is scrubbed of secrets (API keys, tokens, private keys), then sent to an LLM for analysis. The model returns a JSON verdict: human intervention required or auto-fixable, plus a safe bash command. One click to execute the fix.
If the connection drops, the Hub reconnects with exponential backoff (1s, 2s, 4s... up to 30s cap). A 30-second Ping/Pong heartbeat detects half-open connections. Satellites run under systemd with privilege dropping, memory limits, and crash telemetry. OTA updates push new binaries without manual SSH access.
Private beta builds. Auto-updater checks this server on every launch.