BRIDGE_MODE compile-time feature flag and requires a claude.ai subscription.
Enabling bridge mode
Start a bridge session using the/bridge or /rc slash command from within an active Claurst session:
Work modes
The standalone bridge supports three session spawn modes, configured viaBridgeConfig.spawnMode:
| Mode | Behavior |
|---|---|
single-session | One session; the bridge tears down when it ends |
worktree | Persistent server; each incoming session gets an isolated git worktree |
same-dir | Persistent server; sessions share the working directory |
worktree mode is the safest option for multi-session use — each session gets its own isolated git worktree so concurrent sessions cannot conflict.
Transport options
The bridge crate supports three transport implementations:| Transport | Description |
|---|---|
SSETransport | Server-Sent Events over HTTP — used for CCR v2 sessions |
WebSocketTransport | Full-duplex WebSocket — default for ws:// URLs |
HybridTransport | WebSocket for reads, HTTP POST for writes — batches stream events before posting |
HybridTransport accumulates stream_event messages for up to 100ms before posting them as a batch, which reduces request overhead during high-throughput streaming.
IDE integration
VS Code and JetBrains extensions connect to Claurst via direct-connect. Once connected:- Live diff viewing — file changes made by Claude appear in your IDE’s diff viewer as they happen
- File selection sync — selecting files in your IDE forwards them to Claude as context
- Status indicator — your IDE shows a status badge reflecting the current bridge connection state (
ready,connected,reconnecting,failed)
JWT authentication
Every bridge API call is authenticated with a JWT. Thecc-bridge crate’s jwt module decodes the payload without signature verification to read the exp claim, and the createTokenRefreshScheduler proactively schedules token refreshes 5 minutes before expiry.
On token expiry:
- V1 sessions: the new OAuth token is injected directly to the child process stdin
- V2 sessions:
reconnectSessionis called to trigger server re-dispatch with a fresh JWT (V2 validates thesession_idJWT claim directly)
Trusted device tokens
When thetengu_sessions_elevated_auth_enforcement gate is active, bridge API requests include an X-Trusted-Device-Token header. This token is derived from a SHA-256 hash of device-identifying information (hostname, username, home directory path) and enables elevated security tiers for persistent bridge registrations.
The device fingerprint is computed in the trusted_device module of cc-bridge:
KAIROS mode
KAIROS is an always-on proactive assistant mode, gated behind thePROACTIVE / KAIROS compile-time feature flags. When active, Claurst does not wait for you to type — it watches, logs, and proactively acts on things it notices.
How KAIROS works
KAIROS maintains append-only daily log files at~/.claude/memory/logs/YYYY/MM/YYYY-MM-DD.md. It writes observations, decisions, and actions throughout the day.
On a regular interval, Claurst sends <tick> prompts to Claude, which then decides whether to act proactively or stay quiet. The tick system has a 15-second blocking budget — any proactive action that would block your workflow for more than 15 seconds is deferred. This keeps KAIROS helpful without being disruptive.
When KAIROS is active, responses use Brief mode: extremely concise output designed for a persistent assistant that should not flood the terminal.
KAIROS-exclusive tools
| Tool | What it does |
|---|---|
SendUserFile | Push files directly to the user (notifications, summaries) |
PushNotification | Send push notifications to the user’s device |
SubscribePR | Subscribe to and monitor pull request activity |
PROACTIVE/KAIROS feature flag is enabled.
ULTRAPLAN
ULTRAPLAN offloads complex planning tasks to a remote Cloud Container Runtime (CCR) session running Opus 4.6, giving it up to 30 minutes to produce a deep plan.ULTRAPLAN is an internal Anthropic feature gated behind additional compile-time flags and is absent from external builds.
How ULTRAPLAN works
Task identification
Claurst identifies a task that requires deep, extended planning beyond what is practical in a local session.
Remote session spin-up
A remote CCR session is created using the
tengu_ultraplan_model config, running Opus 4.6.Polling
Your terminal enters a polling state, checking every 3 seconds for the planning result. Meanwhile, a browser-based UI lets you watch the planning happen and approve or reject the output.