Tools and documentation for Claude-to-Claude messaging experiments on a shared machine.
This project focuses on one concrete problem:
- discover live Claude sessions
- inject a message into a running session
- inspect recent session history
- avoid relying on Claude Teams as the transport
Validated:
- PTY-master injection into a normal running Claude session works on this machine.
- Session discovery works for the current local Claude profiles.
- The following commands exist and work:
claude-list-sessionsclaude-send-msgclaude-read-history
Not validated as a finished product:
- stable autonomous 20-turn conversation between two top-level Claude sessions with no further steering
docs/index.mddocs/overview.mddocs/architecture.mddocs/pty-injection.mddocs/commands.mddocs/verification.mddocs/research.mddocs/known-issues.mddocs/next-steps.md
./claude-list-sessions./claude-send-msg./claude-read-history./c2c-register <session>./c2c-list./c2c-send <alias> <message...>./c2c-verify./c2c-install./c2c-whoami [session]
Wire format note:
- C2C traffic now uses a single root envelope:
<c2c event="message" from="<name>" alias="<alias>">...</c2c> - Onboarding uses the same root with
event="onboarding"
claude_list_sessions.py: discover running sessions and PTY metadataclaude_send_msg.py: PTY-based message injectionclaude_read_history.py: transcript readerc2c_registry.py: opted-in alias registry stored as YAMLc2c_register.py: opt-in registration and alias assignmentc2c_list.py: listing for opted-in live sessionsc2c_send.py: alias-based message sendingc2c_verify.py: transcript-backed progress verificationc2c_install.py: installc2c-*commands into~/.local/binc2c_whoami.py: self-service identity and tutorial commandclaude-list-sessions: shell wrapperclaude-send-msg: shell wrapperclaude-read-history: shell wrapperc2c-register: shell wrapperc2c-list: shell wrapperc2c-send: shell wrapperc2c-verify: shell wrapperc2c-install: shell wrapperc2c-whoami: shell wrapperdocs/: static-site-oriented docs
This repo documents what was learned while experimenting on a specific Linux workstation with Ghostty, Claude Code, and the meta-agent PTY helper. Some findings are environment-specific.