Features
- Minimal by Design: Turn mom into whatever you need. She builds her own tools without pre-built assumptions
- Self-Managing: Installs tools (apk, npm, etc.), writes scripts, configures credentials. Zero setup from you
- Slack Integration: Responds to @mentions in channels and DMs
- Full Bash Access: Execute any command, read/write files, automate workflows
- Docker Sandbox: Isolate mom in a container (recommended for all use)
- Persistent Workspace: All conversation history, files, and tools stored in one directory you control
- Working Memory & Custom Tools: Mom remembers context across sessions and creates workflow-specific CLI tools (aka “skills”) for your tasks
- Thread-Based Details: Clean main messages with verbose tool details in threads
Installation
Slack App Setup
- Create a new Slack app at https://api.slack.com/apps
- Enable Socket Mode (Settings → Socket Mode → Enable)
- Generate an App-Level Token with
connections:writescope. This isMOM_SLACK_APP_TOKEN - Add Bot Token Scopes (OAuth & Permissions):
app_mentions:readchannels:historychannels:readchat:writefiles:readfiles:writegroups:historygroups:readim:historyim:readim:writeusers:read
- Subscribe to Bot Events (Event Subscriptions):
app_mentionmessage.channelsmessage.groupsmessage.im
- Enable Direct Messages (App Home):
- Go to App Home in the left sidebar
- Under Show Tabs, enable the Messages Tab
- Check Allow users to send Slash commands and messages from the messages tab
- Install the app to your workspace. Get the Bot User OAuth Token. This is
MOM_SLACK_BOT_TOKEN - Add mom to any channels where you want her to operate
Quick Start
CLI Usage
Environment Variables
| Variable | Description |
|---|---|
MOM_SLACK_APP_TOKEN | Slack app-level token (xapp-…) |
MOM_SLACK_BOT_TOKEN | Slack bot token (xoxb-…) |
ANTHROPIC_API_KEY | (Optional) Anthropic API key |
Authentication
Mom needs credentials for Anthropic API. You have two options: Option 1: Environment Variable- Run interactive coding agent session:
npx @mariozechner/pi-coding-agent - Enter
/logincommand- Choose “Anthropic” provider
- Follow instructions in the browser
- Link
auth.jsonto mom:ln -s ~/.pi/agent/auth.json ~/.pi/mom/auth.json
How Mom Works
Mom is a Node.js app that runs on your host machine. She connects to Slack via Socket Mode, receives messages, and responds using an LLM-based agent that can create and use tools.Per-Channel Conversations
For each channel you add mom to (group channels or DMs), mom maintains a separate conversation history with its own context, memory, and files. When a message arrives in a channel:- The message is written to the channel’s
log.jsonl, retaining full channel history - If the message has attachments, they are stored in the channel’s
attachments/folder for mom to access - Mom can later search the
log.jsonlfile for previous conversations and reference the attachments
- Syncs all unseen messages from
log.jsonlintocontext.jsonl. The context is what mom actually sees when she responds - Loads memory from MEMORY.md files (global and channel-specific)
- Responds to your request, dynamically using tools to answer it:
- Read attachments and analyze them
- Invoke command line tools
- Write new files or programs
- Attach files to her response
- Any files or tools mom creates are stored in the channel’s directory
- Mom’s direct reply is stored in
log.jsonl, while details like tool call results are kept incontext.jsonl
Data Directory Structure
You provide mom with a data directory (e.g.,./data) as her workspace:
log.jsonl: All channel messages (user messages, bot responses). Source of truth.context.jsonl: Messages sent to the LLM. Synced from log.jsonl at each run start.- Memory files: Context mom remembers across sessions
- Custom tools/scripts mom creates (aka “skills”)
- Working files, cloned repos, generated output
Tools
Mom has access to these tools:- bash: Execute shell commands. This is her primary tool for getting things done
- read: Read file contents
- write: Create or overwrite files
- edit: Make surgical edits to existing files
- attach: Share files back to Slack
Bash Execution Environment
Docker environment (recommended):- Commands execute inside an isolated Linux container
- Mom can only access the mounted data directory from your host, plus anything inside the container
- She installs tools inside the container and knows apk, apt, yum, etc.
- Your host system is protected
- Commands execute directly on your machine
- Mom has full access to your system
- Not recommended. See security section in the README
Memory System
Mom uses MEMORY.md files to remember basic rules and preferences:- Global memory (
data/MEMORY.md): Shared across all channels. Project architecture, coding conventions, communication preferences - Channel memory (
data/<channel>/MEMORY.md): Channel-specific context, decisions, ongoing work
Skills (Custom CLI Tools)
Mom can install standard CLI tools (like GitHub CLI, npm packages, etc.) and write custom tools for your specific needs, called skills. Skills are stored in:/workspace/skills/: Global tools available everywhere/workspace/<channel>/skills/: Channel-specific tools
SKILL.md file with frontmatter and detailed usage instructions:
SKILL.md files, so she knows what’s available to handle your request.
Example workflow: Ask mom to “remind me about the dentist tomorrow at 9am” and she’ll create a one-shot event. Ask her to “check my inbox every morning at 9” and she’ll create a periodic event.
Events (Scheduled Wake-ups)
Mom can schedule events that wake her up at specific times or when external things happen. Events are JSON files indata/events/.
Three event types:
| Type | When it triggers | Use case |
|---|---|---|
| Immediate | As soon as file is created | Webhooks, external signals, programs mom writes |
| One-shot | At a specific date/time, once | Reminders, scheduled tasks |
| Periodic | On a cron schedule, repeatedly | Daily summaries, inbox checks, recurring tasks |
Security Considerations
Mom is a power tool. With that comes great responsibility. Mom can be abused to exfiltrate sensitive data through direct or indirect prompt injection.Prompt Injection Attacks
Direct prompt injection: A malicious Slack user asks mom directly to reveal credentials. Indirect prompt injection: Mom fetches malicious content that contains hidden instructions to exfiltrate data. Mitigations:- Use dedicated bot accounts with minimal permissions
- Use read-only tokens when possible
- Never give production credentials
- Monitor activity. Check tool calls and results in threads
- Audit the data directory regularly
Docker vs Host Mode
Docker mode (recommended):- Limits mom to the container. She can only access the mounted data directory from your host
- Credentials are isolated to the container
- Still vulnerable to credential exfiltration
- Mom has full access to your machine
- Can access SSH keys, config files, anything on your system
- Only use in disposable VMs
Access Control
Different teams need different mom instances. Run multiple isolated mom instances for different security contexts:Development
Code Structure
src/main.ts: Entry point, CLI arg parsing, handler setup, SlackContext adaptersrc/agent.ts: Agent runner, event handling, tool execution, session managementsrc/slack.ts: Slack integration (Socket Mode), backfill, message loggingsrc/context.ts: Session manager (context.jsonl), log-to-context syncsrc/store.ts: Channel data persistence, attachment downloadssrc/sandbox.ts: Docker/host sandbox executionsrc/tools/: Tool implementations (bash, read, write, edit, attach)