Stop babysitting local AI agents in isolation.Bring your team in on decisions with the agents.

Make existing AI agents accessible from anywhere so you and your team can see, interact with, and collaborate on what the agents are building.

Dev Machine
Cursor
https://buildautomaton.com/session/7f3a9c2d/transcript

Rate limit middleware for public API

In progress · Started 1/15/2025, 10:00:00 AM

Add token-bucket rate limiter per API key and a simple usage dashboard.

I'll add rate limiting middleware and wire it to Redis. I'll create a new middleware file that implements token-bucket per API key, then update the API routes to use it. I'll also add a simple usage dashboard so you can see request counts per key.

edit_file

Middleware file is in place. Now I need to check the existing API structure and apply the middleware to the v1 items routes. I'll look at how other middleware is applied in this codebase so the pattern is consistent.

search_replace

Routes are updated. I'll add the retry-after header to the 429 response so clients know when to retry, and double-check that the Redis key TTL is set correctly for the sliding window.

search_replace

Summary of what was done:

  1. New middleware (api/src/middleware/rate-limit.ts): Token-bucket rate limiter keyed by API key. Uses Redis in production and in-memory in dev. Default 100 requests per minute per key; 429 responses include a Retry-After header.

  2. API integration (app/api/v1/items/route.ts): The v1 items routes (GET, POST, DELETE) now run through the rate limit middleware. Unauthenticated or missing-key requests skip limiting.

  3. Dashboard: A minimal usage view was added so you can see request counts per key over the last 24h. You can expand this later with charts or export.

If you want to tweak limits, Redis key prefix, or add more routes, say what you’d like changed.

Sign up for an account to get started.
We'll walk you through installing the CLI bridge.

Terminal
$ npx @buildautomaton/cli
Signing in… linked workspace
Bridge connected
Secure WebSocket tunnel

Run a secure bridge to your local machine

Install and run the CLI on any machine to create a secure WebSocket tunnel to it. Your agent and your local dev environment stay on your private machine or infrastructure but BuildAutomaton can reach them through the tunnel.

Your machine
Claude CodeCursorCodexOpenCodeCline+ more
Agent Client Protocol (ACP)
Slack workspace
BuildAutomaton in cloud

Work with any existing agent

BuildAutomaton uses the Agent Client Protocol (ACP) so that you can use any agent you prefer. BuildAutomaton is agent-agnostic, and works with Cursor, Claude Code, Codex, Kiro, and other ACP-capable agents..

The local dev environment available anywhere

Agent sessions, files, dev servers, and admin tools, accessible from anywhere, on any device, and by the whole team

Agent sessions available securely on any device

One secure link—any device. Follow live, review changes, steer the agent, keep prompting. Do it together with your team.

đź”’buildautomaton.com/session/demo

Rate limit middleware for public API

In progress · Started 1/15/2025, 10:00:00 AM

Add token-bucket rate limiter per API key and a simple usage dashboard.

I'll add rate limiting middleware and wire it to Redis. I'll create a new middleware file that implements token-bucket per API key, then update the API routes to use it. I'll also add a simple usage dashboard so you can see request counts per key.

edit_file

Middleware file is in place. Now I need to check the existing API structure and apply the middleware to the v1 items routes. I'll look at how other middleware is applied in this codebase so the pattern is consistent.

search_replace

Routes are updated. I'll add the retry-after header to the 429 response so clients know when to retry, and double-check that the Redis key TTL is set correctly for the sliding window.

search_replace

Summary of what was done:

  1. New middleware (api/src/middleware/rate-limit.ts): Token-bucket rate limiter keyed by API key. Uses Redis in production and in-memory in dev. Default 100 requests per minute per key; 429 responses include a Retry-After header.

  2. API integration (app/api/v1/items/route.ts): The v1 items routes (GET, POST, DELETE) now run through the rate limit middleware. Unauthenticated or missing-key requests skip limiting.

  3. Dashboard: A minimal usage view was added so you can see request counts per key over the last 24h. You can expand this later with charts or export.

If you want to tweak limits, Redis key prefix, or add more routes, say what you’d like changed.

Preview from local dev servers, prior to deploys, from anywhere

Teammates open a secure URL to dev servers running on machines in your network, so they can preview work in progress without a PR or a deploy

npm run dev
Running
Ports
Env
NODE_ENV=developmentPORT=3000
https://p-7k2m9n1.buildautomaton.com/

Proxied from localhost

A live tunnel—not a screenshot. What you run locally is what opens here.

Pull stakeholders in without a deploy

Anyone in your workspace can try the live running on your local dev server on any device without a staging deploy

Shape the product before the PR

Get reactions to the WIP while it's still in iteration with the agent, instead of a rush of conflicting opinions after you've backed in decisions

Skip the Figma design, the PRD, the Notion doc

Give feedback on the real WIP draft app, instead of a design mockup or a PRD

Bring your team into the agentic lifecycle

One secure link to the live session or preview—collaborate while the agent is still iterating, not after decisions are baked in.

Weigh in while the agent iterates

Steer direction and surface issues during the live iteration-before the approach hardens and you’re arguing in a PR.

Everyone on the same page

Product, design, and engineering collaborate on actual code changes and product drafts: not intermediate artifacts.

Thread to next prompt

What people say in the thread becomes the next prompt—or a stop—not a ticket, handoff, or “I’ll sync with eng later.”

Tool blocks for admin tools with access to local data

Give everyone internal tools with access to local data for fast diagnostics and troubleshooting

Dev machine

Local database

Bridge reaches your dev DB

https://tb-lookup.buildautomaton.com/

Request lookup

Query rows on the bridge’s dev database

Bridge-local data

Hit the bridge machine’s DBs, logs, and APIs—no dashboards, no pasted queries.

Pick the environment

Run on local, staging, or prod—right data for the ticket, fast diagnostics.

Internal dev & support tools

Seed test data, confirm local DB changes, run admin scripts—tool blocks give your team quick internal utilities without building a separate admin app.

Work with your local agent anywhere. And keep your team in the loop.

Work with your local agent from any device, and bring your team directly into the iteration loop—reviewing and guiding decisions as the code evolves

Frequently asked questions

What types of agents are supported?
BuildAutomaton uses the Agent Client Protocol (ACP), so it supports any agent that implements ACP—including Cursor, Claude Code, Codex CLI, Kiro, and more. See our Supported agents docs for the full list and compatibility notes.
How do I set up a bridge?
Run the CLI on the machine you want to make accessible. After installing Node.js, run npx @buildautomaton/cli (or install the CLI globally). The bridge stays connected until you stop the CLI. See our Getting started guide for full steps.
What does it cost?
We have a flat subscription fee for BuildAutomaton—see our Pricing page. Your local agents (Cursor, Claude Code, etc.) are priced separately by their providers; you’ll need a subscription for those separately.
How is the local bridge secured?
The bridge requires authentication. Only authenticated users can access the resources that the bridge makes available.