Build Your First Encrypted Agent Swarm Using Phoenix (Drag Connect Deploy)
Source: Dev.to
What You’re About to Build
In this tutorial, you’ll learn how to:
- Create a Workspace in Phoenix
- Drag agents into the canvas
- Connect and configure them
- Apply constraints
- Validate the swarm
- Build a deployment
This covers the full workflow: Drag agents → constraints → deploy → locked‑down distributed system.
What Is Phoenix?
Phoenix is the GUI cockpit for MatrixOS, a fully encrypted, identity‑driven agent operating system.
- Phoenix = Visual editor, validator, and deployment builder
- MatrixOS = Runtime engine that spawns, monitors, and secures every agent
Official Links
- MatrixOS GitHub:
- Phoenix GitHub:
- Discord:
- YouTube tutorials:
- X / Twitter:
Part 1 — Building a Swarm in the Phoenix Workspace
Step 1 — Create a Workspace
- Open Phoenix.
- Unlock your vault.
- Navigate to Workspace → New Workspace.
This gives you a clean canvas to design your swarm.
Step 2 — Add Agents via Drag‑and‑Drop
- Open the Agent Palette on the left.
- Drag any agent onto the canvas, e.g.:
matrix_websocket(secure egress / ingress)matrix_https(TLS/mTLS ingress)oracle(LLM cognitive engine)- Custom agents you’ve added to MatrixOS
Phoenix treats each icon you drag as a real agent that will spawn on the server.
Step 3 — Build a Hierarchy
- Phoenix uses a real agent tree.
- Drag one agent onto another to make it a child.
This defines the parent → child spawn chain MatrixOS will use to bring your universe online.
- Parents spawn children
- Children inherit identity and cryptographic context
- Each agent only receives its own signed subtree
This is a true operating‑system topology, not just a diagram.
Step 4 — Configure Agents
Click any agent to open the Inspector Panel. You can modify:
- Ports
- Allowlist IPs
- SMTP / IMAP / API settings
- Oracle parameters
- Roles and subscriptions
- Security keys
- Logging options
Phoenix dynamically generates these fields from metadata — no manual JSON editing required.
Step 5 — Define Constraints
Constraints tell Phoenix how your swarm should connect and behave. Example constraint types:
outgoing.command→ which agent sends commands to the swarmhive.rpc.route→ RPC routermatrix_websocket→ ingress agentservice-managerrolestripwire.guard.*services- Any custom service roles from your agents
Constraints ensure your swarm has:
- A valid ingress
- A valid egress
- Valid RPC paths
- Correct cryptographic handshakes
- No circular routing
They make the swarm safe before deployment.
Step 6 — Validate the Swarm
Navigate to Workspace → Validate. Phoenix performs:
- Structural validation
- Constraint validation
- Metadata validation
- Security + certificate presence checks
- Tree shape verification
If something’s wrong, Phoenix shows exactly what needs fixing.
Step 7 — Save the Workspace
Select Workspace → Save. This produces a complete bundle containing:
- Agent tree
- Configuration stack
- Cryptographic vault
- Verified constraints
- Directive bundle
Your workspace is the deployable universe.
Step 8 — Build the Deployment
Click Deploy → New Deployment. Phoenix will:
- Generate crypto identities
- Sign the directive tree
- Build agent vaults
- Compile deployments
- Prepare the swarm for the server
The result is a signed, encrypted deployment that Railgun can install remotely.