Kuma Studio is an AI agent virtual office and browser automation bridge with a visual dashboard and team characters.
Kuma Studio is open source, but its supported distribution model is currently
git clone plus the bundled installer.
- Supported today: clone the repository, run
npm install, then runnode scripts/install.mjs - Not promised yet: npm registry publishing for the whole workspace as a single global package
- Runtime state stays machine-local under
~/.kuma,~/.claude, and other ignored directories - The installer syncs repo-managed Kuma skills into both
~/.claude/skillsand~/.codex/skillsby default so Claude and Codex stay aligned
git clone https://github.com/aldegad/kuma-studio.git
cd kuma-studio
npm install
node scripts/install.mjsIf you only want one agent catalog refreshed, use --claude-only or
--codex-only.
Then:
- Load
packages/browser-extension/in Chrome viachrome://extensions - Pick your top-level work root, not the
kuma-studiorepo clone, as the runtime workspace - Start the daemon with that workspace bound:
cd /path/to/workspace-root
KUMA_STUDIO_WORKSPACE="$PWD" npm run --prefix /path/to/kuma-studio server:reload- Run
npm run --prefix /path/to/kuma-studio kuma-studio:dashboard - If something looks off, run
npm run --prefix /path/to/kuma-studio skill:doctor
After you bootstrap shared infra surfaces, use npm run kuma-server:reload to
reload the daemon inside the existing managed kuma-server surface instead of
starting a duplicate local server.
Kuma Studio is designed to be installed from this repository, but operated against your top-level work root.
- The repository clone is the tool source.
- The runtime workspace is the directory you actually want Kuma to supervise.
- By default, plans resolve from
<workspace-root>/.kuma/plans. - If you launch the daemon from the repo clone, bind the real workspace with
KUMA_STUDIO_WORKSPACE=/path/to/workspace-root.
This repository tracks product code, reusable skills, and public templates. It does not track personal runtime state such as local project registries, memory, vault contents, review artifacts, screenshots, or machine-specific paths.
- Use
config/projects.example.jsonas the format reference for the machine-local~/.kuma/projects.json. - See
docs/runtime-state-boundary.mdfor the repo-vs-runtime boundary used for open-source distribution. - The Studio file explorer now exposes only the workspace root by default. To
opt into home-level roots such as
vault,claude, orcodex, setKUMA_STUDIO_EXPLORER_GLOBAL_ROOTS=vault,claude,codex.
npm run kuma-server:reload: reload the daemon inside the managedkuma-serversurfacenpm run server:reload: restart the daemon on port4312npm run kuma-studio:dashboard: open the Studio UI served by the daemon on port4312npm run build:studio: build the production Studio bundlenpm run security:hooks:install: install the repo-local pre-commit hook that blocks private runtime data and runsgitleaksnpm run security:scan: run a full-repogitleaksscannpm run security:scan:staged: run the same scan against staged changes onlynpm test: run the Vitest suitenpm run skill:doctor: validate the local Kuma install
This repo ships a repo-local pre-commit hook under .githooks/pre-commit.
- It blocks staging known private Kuma runtime roots such as
.kuma/,.claude/projects/, top-levelvault/,memory/,memo/, and*.task.md/*.result.md. - It blocks staged references to protected private project identifiers.
- It then runs
gitleaksagainst staged changes. - The hook uses a local
gitleaksbinary when available, or Docker when the daemon is running.
Why the hook has both path rules and gitleaks:
gitleakscatches generic secrets such as tokens, passwords, and keys.- Repo-specific path guards catch private Kuma runtime data that is sensitive even when it does not look like a conventional secret.
- Public structure docs are still allowed. For example,
README.md, docs about the vault layout, or code that implements vault features are fine to commit. The guard is aimed at actual private runtime content, not architectural explanations.
Install it once per clone with:
npm run security:hooks:installThe source code in this repository is licensed under the Apache License, Version 2.0. See LICENSE.
The project's names, logos, character names, character artwork, and other brand identity assets are not licensed under Apache-2.0. See NOTICE, TRADEMARKS.md, and BRAND_ASSETS.md.
In short: you may use, fork, and modify the code, but you may not present the original Kuma Studio identity, characters, or branding as your own without permission.