TeamCopilot is a multi-user AI agent platform for teams that want the power of coding agents without giving up control, visibility, or shared operational context.
It combines:
- a web UI for chatting with an agent from anywhere
- a shared workspace of custom skills and workflows
- approval and permission controls for risky automation
- auditability for chat sessions and file changes
- profile and global secret management for agent-assisted execution
The result is a setup where teams can centralize agent capabilities once, reuse them across users, and still keep strong guardrails around what the agent is allowed to see and do.
It's like Claude Code / Codex-style local agents, but adapted for team use:
- Shared environment: everyone works against the same workspace, skills, workflows, and guardrails.
- Permission-aware automation: decide who can view, edit, approve, and run specific skills and workflows.
- Approval gates: engineers can require approval before custom skills or workflows become executable.
- Auditable operation: chat sessions, tracked file diffs, and approval diffs are stored on your server.
- Remote access to a local agent: users can interact through the web UI even when they are not physically at the machine hosting TeamCopilot.
- Filesystem-first extensibility: workflows and skills live as real files and folders, not opaque database blobs.
TeamCopilot is designed for organizations where AI should be useful, but not ungoverned.
Typical use cases:
- internal engineering copilots with shared repo-specific skills
- ops or infra workflows that must be reviewed before use
- support or product teams that need curated agent tools without shell access
- organizations that want reusable automation but still need approval, ownership, and audit trails
- teams that want to package domain knowledge into installable, inspectable skills
TeamCopilot supports two main building blocks:
- Skills: reusable agent capabilities for common team tasks
- Workflows: reusable automations that can be reviewed and run consistently
These can be created, edited, reviewed, approved, and reused across the team.
TeamCopilot adds multiple layers of control around agent execution:
- decide who can view, edit, approve, and run each resource
- review exactly what changed before new automations are trusted
- keep risky or high-impact operations behind approval gates
- inspect file diffs from chat sessions instead of guessing what the agent changed
TeamCopilot includes secret management designed for team use:
- the agent does not need to see plaintext secret values in order to use them
- TeamCopilot uses a secret proxy model so secrets stay outside the LLM context
- teams can store personal and shared credentials in one place without broadly exposing the actual values
- teammates can use approved capabilities that depend on secrets without needing direct access to those raw credentials
This gives teams a safer way to operationalize AI agents without turning the model itself into a secret holder. You can read more about the approach in the secret proxy writeup.
Every team eventually needs to answer:
- who created this automation?
- who approved it?
- what changed?
- what did the agent do?
TeamCopilot is built around those questions. It gives teams a clearer record of ownership, approvals, diffs, and agent activity over time.
Visit the documentation section on our website to see an extensive guide on how to setup and use TeamCopilot.
- Node.js 20+
- npm
- Python 3.10+
npx teamcopilot initThis writes or updates a local .env in the current directory. WORKSPACE_DIR defaults to the current directory as an absolute path, which becomes the shared TeamCopilot workspace root.
npx teamcopilot startOpen: http://localhost:5124
npx teamcopilot create-user
npx teamcopilot change-user-role
npx teamcopilot delete-user
npx teamcopilot reset-password
npx teamcopilot rotate-jwt-secretIf .env is missing or incomplete, TeamCopilot will ask you to run npx teamcopilot init first.
At a high level:
- the backend runs the TeamCopilot server and the embedded OpenCode agent server
- the frontend provides the web UI for chat, browsing skills/workflows, approvals, and admin flows
- the workspace directory stores skills, workflows, and tracked filesystem state
- Prisma + SQLite store users, permissions, approval metadata, sessions, and secrets
This design keeps the platform simple to operate while still making the agent environment shared and inspectable.
| Variable | Description | Default |
|---|---|---|
WORKSPACE_DIR |
Directory where workflows are stored | ./my_workspaces |
TEAMCOPILOT_HOST |
Server host | 0.0.0.0 |
TEAMCOPILOT_PORT |
Server port | 5124 |
OPENCODE_PORT |
Internal OpenCode server port | 4096 |
OPENCODE_MODEL |
Model used by OpenCode | openai/gpt-5.3-codex |
- Multi-user auth with roles for Users and Engineers
- Shared skills and workflows backed by the filesystem
- Approval flows for custom automations
- Permission controls for who can access which resources
- Profile and global secret management
- Chat session history and file-diff inspection
- Browser-based UI for day-to-day use
- Local deployment with simple npm-based setup
Create user:
npx teamcopilot create-userChange user role:
npx teamcopilot change-user-roleDelete user:
npx teamcopilot delete-userReset password:
npx teamcopilot reset-passwordRotate JWT secret (invalidates existing tokens causing everyone to get logged out):
npx teamcopilot rotate-jwt-secretUsers sign in at /login.
See CONTRIBUTING.md.
MIT
