QoderWake lets you build a team of AI employees — called Wakers — that run directly on your machine. Each Waker has a defined role, name, persona, and area of expertise. Bring them into a conversation when you need help, or set them to work autonomously on a schedule or in response to events. Their tools, memory, accessible resources, and guardrails are all configurable. This guide walks you through getting QoderWake up and running from scratch: install → open the console → create a Waker → assign tasks → manage your Wakers. Product philosophy: 7×24 digital employees — “Always awake, always working.” Product features: secure and controllable, production-ready, continuously evolving. Core concepts: Employee Role → Digital Employee (Agent) → Teams / Organization (Agent Teams). Initial roles: Backend Engineer, Frontend Engineer, Test Engineer, Product Manager, Data Analyst, Content Operator — plus Custom Roles.Documentation Index
Fetch the complete documentation index at: https://docs.qoder.com/llms.txt
Use this file to discover all available pages before exploring further.
What type of Waker do you need
The current beta covers the following roles. Pick the one that best fits your needs:| Role | Job characteristics |
|---|---|
| Backend Engineer | API development, data modeling, service integration, performance optimization, and production stability. Follows incremental delivery, test verification, and convention-over-configuration design. Automatically analyzes bugs / issues, fixes code, and submits PRs. |
| Frontend Engineer | Frontend interface design and implementation. Strong in component architecture, visual polish, responsive layouts, accessibility, and performance tuning. Balances UX with engineering quality through incremental delivery and evidence-based validation. |
| Test Engineer | Quality assurance for CLI tools and web products. Focuses on test plan documents, end-to-end testing, defect reproduction, and evidence-based reports. Does not run unit tests or fix issues directly. |
| Product Manager | AI-native product management for software products. Goal-driven requirement lifecycle, PRD generation, user feedback analysis, competitive research, and release communication — with explicit approval gates for any external writes. |
| Data Analyst | AI-native data analyst covering problem framing, metric definitions, data collection through DingTalk doc / sheet MCPs, data diagnosis, market context, and evidence-based recommendations. |
| Content Operator | AI-native content operator covering account positioning, trend insights, content calendars, Xiaohongshu post creation, visual asset briefs, post-approval publishing, comment interaction, performance review, brand compliance, and cross-platform rewrites. |
| Custom | Define the work style, workflow, and capabilities of any role you need. Add MCP servers, skills, and other configurations yourself. |
Environment preparation
QoderWake supports both local and cloud deployment. Run it on a stable, always-online device with reliable network access so your Wakers can stay up 7×24.Windows version coming soon — not yet available to the public. Install on macOS or Linux for now.
Local deployment
Best on a long-running local device, e.g. a Mac mini.- macOS: 13.0 or later.
- Linux: Ubuntu 22.04 LTS or later, with a GUI desktop for the local Web Console.
Cloud deployment
Mainstream cloud desktop / cloud host environments are supported. For convenient browser login and local web management, Alibaba Cloud’s Wuying Cloud Computer (Enterprise or Personal edition) is recommended.- Linux: Ubuntu 22.04 or later, with a GUI desktop for the local Web Console.
Prerequisites
QoderWake ships with software-engineering Waker roles. Before installing, confirm:gitis installed.- Repository authentication is set up.
- You can run
clone,pull, andpushagainst your target repos.
Step 1: Install QoderWake
macOS
Direct downloads: Or open Terminal and run:PATH, signs you in via the browser, starts the local service, and opens the Web Console. Command entry: ~/.qoderwake/bin/qoderwake.
Linux
Open a terminal and run:- Detects your Linux CPU architecture.
- Downloads and verifies the matching QoderWake package for your platform.
- Installs the QoderWake main program and resource files.
- Creates the command entry and tries to add it to
PATH. - Opens the browser for sign-in.
- Starts (or restarts) the local background service after sign-in.
- Opens the local Web Console automatically.
Windows
Windows version coming soon. Stay tuned — we’ll update this page once the public release is available.
Step 2: Open the console
Visithttp://127.0.0.1:19820/ in your browser. This is QoderWake’s local management console — Waker management, task assignment, and permission configuration all happen here.
The layout:
- Left sidebar — the “My Wakers” list with each Waker’s name and last-active time.
- Top button — Create Waker to add a new Waker; tasks can be created from the right side.
- Main area — click into a Waker to open its conversation view and start assigning work.
- Right panel — created tasks and details for any currently running task.
Step 3: Create a Waker
Click Create Waker in the left sidebar.- Pick a role template. Each template comes with a persona, typical workflows, core skill set, and starter prompts. Click View details to preview before selecting.
- Or customize a role. If no preset fits, choose Custom Role and define the persona, expertise, and work style from scratch, then attach the skills, connectors, and permissions you want.
- Fill in basic info. Name, avatar, and short description. Preset roles pre-fill these fields — adjust as needed.
- Save. A guided setup will suggest skills to install and channels to connect; you can skip and configure later.
Step 4: Put your Waker to work
Once a Waker is created, either start a conversation or set up an automated task.Conversation tasks
Type your request and hit send — the Waker gets to work immediately. Mid-conversation you can:- Follow up or redirect — jump in any time; the Waker continues with full context.
- Attach files or screenshots — at any message, at any stage.
- Interrupt — stop the Waker if it’s heading the wrong way.
- Approve or reject actions — when the Waker needs to modify files, run commands, or hit the network, it pauses for your approval.
- Answer its questions — when it hits a decision point, pick from the prompted card.
- Switch AI models — change models mid-conversation from the top dropdown.
- Watch the thinking process — see reasoning in real time.
- Review outputs — generated code patches and new files appear in the right panel as they’re produced.
- Set the working directory — choose the local directory from the conversation footer.
Automated tasks
Best for “every day at 9am” or “respond whenever a new issue is filed.” Go to Waker details → Triggered Tasks → New and configure:- Task name and description — clear enough that the Waker can act on it directly.
- AI model — which model to use.
- Working directory — the local directory, repository, or project workspace where the task should run.
- Trigger type (up to 5, mix and match):
- Scheduled — one-off, recurring, or complex schedules (daily 9am, every Monday, first of each month).
- Event-driven — listen for GitHub Issue / PR / comment activity.
- Webhook — let an external system trigger the task via a fixed callback URL.
- Max runs / expiration date (optional) — cap how many times or how long a task can run.
Step 5: Manage your Wakers
Open any Waker’s detail page to view and adjust everything about that Waker.| Section | What you can do |
|---|---|
| Home | Avatar, status, days onboarded, triggered task count, conversation task count, work activity heatmap. |
| Projects | Bind code repositories or local directories. One project can include multiple sources, with project-level memory kept separate from the Waker’s personal memory. |
| Triggered Tasks | Add, edit, delete, or pause automated tasks. |
| Conversation Tasks | Browse history and resume a previous chat. |
| Memory | Long-term knowledge about you and the project. Sources: auto-capture during conversations, manual edits, periodic system cleanup. Stored locally and never uploaded to the cloud. |
| Skills | Install from the official Qoder Skills Marketplace, upload local packages, or toggle existing skills. Built-in skills cannot be uninstalled. |
| Connectors | Bridges to external tools and services (GitHub, Jira, GitLab, etc.). |
| Permissions | Tool protection — built-in security rules covering command injection, resource abuse, code execution, network abuse, sensitive file access, and privilege escalation; File protection — read/write access to local files; Built-in tools — allow / ask / disable per tool. High-risk actions trigger an approval card. |
Waker configuration
Memory
Each Waker maintains its own long-term memory, accumulating knowledge about you and the project over time. Memory comes from three sources:- Auto-capture — information the Waker considers worth remembering is written during conversations.
- Manual edits — open the Memory page and add or edit entries directly.
- System cleanup — the system periodically organizes and deduplicates entries on the Waker’s behalf.
Skills
Skills are specialized capability packages the Waker can invoke during conversations or triggered tasks.- Skill Marketplace — install from the official Qoder Skills Marketplace.
- Upload a Skill — import custom skill packages from your local machine.
- Built-in skills — included by default and cannot be uninstalled.
Connectors
Connectors are bridges between the Waker and external tools or services. You can add connectors manually.Projects
Projects define the workspace the Waker operates in. Go to Waker details → Projects to:- Bind local directories or Git repositories.
- Add multiple sources to a single project (multiple directories or repositories).
- Use project-level memory, kept separate from the Waker’s personal memory.
Permissions
Permissions control exactly what a Waker can and cannot do. Go to Waker details → Permissions, which covers two main areas plus built-in tool policies. Tool protection validates tool parameters against built-in security rules and triggers an approval request when a high-risk action is detected. Rule categories include:- Command injection — detects destructive operations like
rm,mv. - Resource abuse — detects fork bombs, system restarts, and similar.
- Code execution — detects remote-execution patterns like
curl | bash. - Network abuse — detects reverse shells, localhost tunneling.
- Sensitive file access — detects access to critical system files.
- Privilege escalation — detects
sudoand similar operations.