--- sidebar_position: 9 title: "Matrix" description: "Set up Hermes Agent as a Matrix bot" --- # Matrix Setup Hermes Agent integrates with Matrix, the open, federated messaging protocol. Matrix lets you run your own homeserver or use a public one like matrix.org — either way, you keep control of your communications. The bot connects via the `mautrix` Python SDK, processes messages through the Hermes Agent pipeline (including tool use, memory, and reasoning), and responds in real time. It supports text, file attachments, images, audio, video, and optional end-to-end encryption (E2EE). Hermes works with any Matrix homeserver — Synapse, Conduit, Dendrite, or matrix.org. Before setup, here's the part most people want to know: how Hermes behaves once it's connected. ## How Hermes Behaves | Context | Behavior | |---------|----------| | **DMs** | Hermes responds to every message. No `@mention` needed. Each DM has its own session. Set `MATRIX_DM_MENTION_THREADS=true` to start a thread when the bot is `@mentioned` in a DM. | | **Rooms** | By default, Hermes requires an `@mention` to respond. Set `MATRIX_REQUIRE_MENTION=false` or add room IDs to `MATRIX_FREE_RESPONSE_ROOMS` for free-response rooms. Room invites are auto-accepted. | | **Threads** | Hermes supports Matrix threads (MSC3440). If you reply in a thread, Hermes keeps the thread context isolated from the main room timeline. Threads where the bot has already participated do not require a mention. | | **Auto-threading** | By default, Hermes auto-creates a thread for each message it responds to in a room. This keeps conversations isolated. Set `MATRIX_AUTO_THREAD=false` to disable. | | **Shared rooms with multiple users** | By default, Hermes isolates session history per user inside the room. Two people talking in the same room do not share one transcript unless you explicitly disable that. | :::tip The bot automatically joins rooms when invited. Just invite the bot's Matrix user to any room and it will join and start responding. ::: ### Session Model in Matrix By default: - each DM gets its own session - each thread gets its own session namespace - each user in a shared room gets their own session inside that room This is controlled by `config.yaml`: ```yaml group_sessions_per_user: true ``` Set it to `false` only if you explicitly want one shared conversation for the entire room: ```yaml group_sessions_per_user: false ``` Shared sessions can be useful for a collaborative room, but they also mean: - users share context growth and token costs - one person's long tool-heavy task can bloat everyone else's context - one person's in-flight run can interrupt another person's follow-up in the same room ### Mention and Threading Configuration You can configure mention and auto-threading behavior via environment variables or `config.yaml`: ```yaml matrix: require_mention: true # Require @mention in rooms (default: true) free_response_rooms: # Rooms exempt from mention requirement - "!abc123:matrix.org" auto_thread: true # Auto-create threads for responses (default: true) dm_mention_threads: false # Create thread when @mentioned in DM (default: false) ``` Or via environment variables: ```bash MATRIX_REQUIRE_MENTION=true MATRIX_FREE_RESPONSE_ROOMS=!abc123:matrix.org,!def456:matrix.org MATRIX_AUTO_THREAD=true MATRIX_DM_MENTION_THREADS=false ``` :::note If you are upgrading from a version that did not have `MATRIX_REQUIRE_MENTION`, the bot previously responded to all messages in rooms. To preserve that behavior, set `MATRIX_REQUIRE_MENTION=false`. ::: This guide walks you through the full setup process — from creating your bot account to sending your first message. ## Step 1: Create a Bot Account You need a Matrix user account for the bot. There are several ways to do this: ### Option A: Register on Your Homeserver (Recommended) If you run your own homeserver (Synapse, Conduit, Dendrite): 1. Use the admin API or registration tool to create a new user: ```bash # Synapse example register_new_matrix_user -c /etc/synapse/homeserver.yaml http://localhost:8008 ``` 2. Choose a username like `hermes` — the full user ID will be `@hermes:your-server.org`. ### Option B: Use matrix.org or Another Public Homeserver 1. Go to [Element Web](https://app.element.io) and create a new account. 2. Pick a username for your bot (e.g., `hermes-bot`). ### Option C: Use Your Own Account You can also run Hermes as your own user. This means the bot posts as you — useful for personal assistants. ## Step 2: Get an Access Token Hermes needs an access token to authenticate with the homeserver. You have two options: ### Option A: Access Token (Recommended) The most reliable way to get a token: **Via Element:** 1. Log in to [Element](https://app.element.io) with the bot account. 2. Go to **Settings** → **Help & About**. 3. Scroll down and expand **Advanced** — the access token is displayed there. 4. **Copy it immediately.** **Via the API:** ```bash curl -X POST https://your-server/_matrix/client/v3/login \ -H "Content-Type: application/json" \ -d '{ "type": "m.login.password", "user": "@hermes:your-server.org", "password": "your-password" }' ``` The response includes an `access_token` field — copy it. :::warning[Keep your access token safe] The access token gives full access to the bot's Matrix account. Never share it publicly or commit it to Git. If compromised, revoke it by logging out all sessions for that user. ::: ### Option B: Password Login Instead of providing an access token, you can give Hermes the bot's user ID and password. Hermes will log in automatically on startup. This is simpler but means the password is stored in your `.env` file. ```bash MATRIX_USER_ID=@hermes:your-server.org MATRIX_PASSWORD=your-password ``` ## Step 3: Find Your Matrix User ID Hermes Agent uses your Matrix User ID to control who can interact with the bot. Matrix User IDs follow the format `@username:server`. To find yours: 1. Open [Element](https://app.element.io) (or your preferred Matrix client). 2. Click your avatar → **Settings**. 3. Your User ID is displayed at the top of the profile (e.g., `@alice:matrix.org`). :::tip Matrix User IDs always start with `@` and contain a `:` followed by the server name. For example: `@alice:matrix.org`, `@bob:your-server.com`. ::: ## Step 4: Configure Hermes Agent ### Option A: Interactive Setup (Recommended) Run the guided setup command: ```bash hermes gateway setup ``` Select **Matrix** when prompted, then provide your homeserver URL, access token (or user ID + password), and allowed user IDs when asked. ### Option B: Manual Configuration Add the following to your `~/.hermes/.env` file: **Using an access token:** ```bash # Required MATRIX_HOMESERVER=https://matrix.example.org MATRIX_ACCESS_TOKEN=*** # Optional: user ID (auto-detected from token if omitted) # MATRIX_USER_ID=@hermes:matrix.example.org # Security: restrict who can interact with the bot MATRIX_ALLOWED_USERS=@alice:matrix.example.org # Multiple allowed users (comma-separated) # MATRIX_ALLOWED_USERS=@alice:matrix.example.org,@bob:matrix.example.org ``` **Using password login:** ```bash # Required MATRIX_HOMESERVER=https://matrix.example.org MATRIX_USER_ID=@hermes:matrix.example.org MATRIX_PASSWORD=*** # Security MATRIX_ALLOWED_USERS=@alice:matrix.example.org ``` Optional behavior settings in `~/.hermes/config.yaml`: ```yaml group_sessions_per_user: true ``` - `group_sessions_per_user: true` keeps each participant's context isolated inside shared rooms ### Start the Gateway Once configured, start the Matrix gateway: ```bash hermes gateway ``` The bot should connect to your homeserver and start syncing within a few seconds. Send it a message — either a DM or in a room it has joined — to test. :::tip You can run `hermes gateway` in the background or as a systemd service for persistent operation. See the deployment docs for details. ::: ## End-to-End Encryption (E2EE) Hermes supports Matrix end-to-end encryption, so you can chat with your bot in encrypted rooms. ### Requirements E2EE requires the `mautrix` library with encryption extras and the `libolm` C library: ```bash # Install mautrix with E2EE support pip install 'mautrix[encryption]' # Or install with hermes extras pip install 'hermes-agent[matrix]' ``` You also need `libolm` installed on your system: ```bash # Debian/Ubuntu sudo apt install libolm-dev # macOS brew install libolm # Fedora sudo dnf install libolm-devel ``` ### Enable E2EE Add to your `~/.hermes/.env`: ```bash MATRIX_ENCRYPTION=true ``` When E2EE is enabled, Hermes: - Stores encryption keys in `~/.hermes/platforms/matrix/store/` (legacy installs: `~/.hermes/matrix/store/`) - Uploads device keys on first connection - Decrypts incoming messages and encrypts outgoing messages automatically - Auto-joins encrypted rooms when invited ### Cross-Signing Verification (Recommended) If your Matrix account has cross-signing enabled (the default in Element), set the recovery key so the bot can self-sign its device on startup. Without this, other Matrix clients may refuse to share encryption sessions with the bot after a device key rotation. ```bash MATRIX_RECOVERY_KEY=EsT... your recovery key here ``` **Where to find it:** In Element, go to **Settings** → **Security & Privacy** → **Encryption** → your recovery key (also called the "Security Key"). This is the key you were asked to save when you first set up cross-signing. On each startup, if `MATRIX_RECOVERY_KEY` is set, Hermes imports cross-signing keys from the homeserver's secure secret storage and signs the current device. This is idempotent and safe to leave enabled permanently. :::warning If you delete the `~/.hermes/platforms/matrix/store/` directory, the bot loses its encryption keys. You'll need to verify the device again in your Matrix client. Back up this directory if you want to preserve encrypted sessions. ::: :::info If `mautrix[encryption]` is not installed or `libolm` is missing, the bot falls back to a plain (unencrypted) client automatically. You'll see a warning in the logs. ::: ## Home Room You can designate a "home room" where the bot sends proactive messages (such as cron job output, reminders, and notifications). There are two ways to set it: ### Using the Slash Command Type `/sethome` in any Matrix room where the bot is present. That room becomes the home room. ### Manual Configuration Add this to your `~/.hermes/.env`: ```bash MATRIX_HOME_ROOM=!abc123def456:matrix.example.org ``` :::tip To find a Room ID: in Element, go to the room → **Settings** → **Advanced** → the **Internal room ID** is shown there (starts with `!`). ::: ## Troubleshooting ### Bot is not responding to messages **Cause**: The bot hasn't joined the room, or `MATRIX_ALLOWED_USERS` doesn't include your User ID. **Fix**: Invite the bot to the room — it auto-joins on invite. Verify your User ID is in `MATRIX_ALLOWED_USERS` (use the full `@user:server` format). Restart the gateway. ### "Failed to authenticate" / "whoami failed" on startup **Cause**: The access token or homeserver URL is incorrect. **Fix**: Verify `MATRIX_HOMESERVER` points to your homeserver (include `https://`, no trailing slash). Check that `MATRIX_ACCESS_TOKEN` is valid — try it with curl: ```bash curl -H "Authorization: Bearer YOUR_TOKEN" \ https://your-server/_matrix/client/v3/account/whoami ``` If this returns your user info, the token is valid. If it returns an error, generate a new token. ### "mautrix not installed" error **Cause**: The `mautrix` Python package is not installed. **Fix**: Install it: ```bash pip install 'mautrix[encryption]' ``` Or with Hermes extras: ```bash pip install 'hermes-agent[matrix]' ``` ### Encryption errors / "could not decrypt event" **Cause**: Missing encryption keys, `libolm` not installed, or the bot's device isn't trusted. **Fix**: 1. Verify `libolm` is installed on your system (see the E2EE section above). 2. Make sure `MATRIX_ENCRYPTION=true` is set in your `.env`. 3. In your Matrix client (Element), go to the bot's profile -> Sessions -> verify/trust the bot's device. 4. If the bot just joined an encrypted room, it can only decrypt messages sent *after* it joined. Older messages are inaccessible. ### Upgrading from a previous version with E2EE If you previously used Hermes with `MATRIX_ENCRYPTION=true` and are upgrading to a version that uses the new SQLite-based crypto store, the bot's encryption identity has changed. Your Matrix client (Element) may cache the old device keys and refuse to share encryption sessions with the bot. **Symptoms**: The bot connects and shows "E2EE enabled" in the logs, but all messages show "could not decrypt event" and the bot never responds. **What's happening**: The old encryption state (from the previous `matrix-nio` or serialization-based `mautrix` backend) is incompatible with the new SQLite crypto store. The bot creates a fresh encryption identity, but your Matrix client still has the old keys cached and won't share the room's encryption session with a device whose keys changed. This is a Matrix security feature -- clients treat changed identity keys for the same device as suspicious. **Fix** (one-time migration): 1. **Generate a new access token** to get a fresh device ID. The simplest way: ```bash curl -X POST https://your-server/_matrix/client/v3/login \ -H "Content-Type: application/json" \ -d '{ "type": "m.login.password", "identifier": {"type": "m.id.user", "user": "@hermes:your-server.org"}, "password": "***", "initial_device_display_name": "Hermes Agent" }' ``` Copy the new `access_token` and update `MATRIX_ACCESS_TOKEN` in `~/.hermes/.env`. 2. **Delete old encryption state**: ```bash rm -f ~/.hermes/platforms/matrix/store/crypto.db rm -f ~/.hermes/platforms/matrix/store/crypto_store.* ``` 3. **Set your recovery key** (if you use cross-signing — most Element users do). Add to `~/.hermes/.env`: ```bash MATRIX_RECOVERY_KEY=EsT... your recovery key here ``` This lets the bot self-sign with cross-signing keys on startup, so Element trusts the new device immediately. Without this, Element may see the new device as unverified and refuse to share encryption sessions. Find your recovery key in Element under **Settings** → **Security & Privacy** → **Encryption**. 4. **Force your Matrix client to rotate the encryption session**. In Element, open the DM room with the bot and type `/discardsession`. This forces Element to create a new encryption session and share it with the bot's new device. 5. **Restart the gateway**: ```bash hermes gateway run ``` If `MATRIX_RECOVERY_KEY` is set, you should see `Matrix: cross-signing verified via recovery key` in the logs. 6. **Send a new message**. The bot should decrypt and respond normally. :::note After migration, messages sent *before* the upgrade cannot be decrypted -- the old encryption keys are gone. This only affects the transition; new messages work normally. ::: :::tip **New installations are not affected.** This migration is only needed if you had a working E2EE setup with a previous version of Hermes and are upgrading. **Why a new access token?** Each Matrix access token is bound to a specific device ID. Reusing the same device ID with new encryption keys causes other Matrix clients to distrust the device (they see changed identity keys as a potential security breach). A new access token gets a new device ID with no stale key history, so other clients trust it immediately. ::: ## Proxy Mode (E2EE on macOS) Matrix E2EE requires `libolm`, which doesn't compile on macOS ARM64 (Apple Silicon). The `hermes-agent[matrix]` extra is gated to Linux only. If you're on macOS, proxy mode lets you run E2EE in a Docker container on a Linux VM while the actual agent runs natively on macOS with full access to your local files, memory, and skills. ### How It Works ``` macOS (Host): └─ hermes gateway ├─ api_server adapter ← listens on 0.0.0.0:8642 ├─ AIAgent ← single source of truth ├─ Sessions, memory, skills └─ Local file access (Obsidian, projects, etc.) Linux VM (Docker): └─ hermes gateway (proxy mode) ├─ Matrix adapter ← E2EE decryption/encryption └─ HTTP forward → macOS:8642/v1/chat/completions (no LLM API keys, no agent, no inference) ``` The Docker container only handles Matrix protocol + E2EE. When a message arrives, it decrypts it and forwards the text to the host via a standard HTTP request. The host runs the agent, calls tools, generates a response, and streams it back. The container encrypts and sends the response to Matrix. All sessions are unified — CLI, Matrix, Telegram, and any other platform share the same memory and conversation history. ### Step 1: Configure the Host (macOS) Enable the API server so the host accepts incoming requests from the Docker container. Add to `~/.hermes/.env`: ```bash API_SERVER_ENABLED=true API_SERVER_KEY=your-secret-key-here API_SERVER_HOST=0.0.0.0 ``` - `API_SERVER_HOST=0.0.0.0` binds to all interfaces so the Docker container can reach it. - `API_SERVER_KEY` is required for non-loopback binding. Pick a strong random string. - The API server runs on port 8642 by default (change with `API_SERVER_PORT` if needed). Start the gateway: ```bash hermes gateway ``` You should see the API server start alongside any other platforms you have configured. Verify it's reachable from the VM: ```bash # From the Linux VM curl http://:8642/health ``` ### Step 2: Configure the Docker Container (Linux VM) The container needs Matrix credentials and the proxy URL. It does NOT need LLM API keys. **`docker-compose.yml`:** ```yaml services: hermes-matrix: build: . environment: # Matrix credentials MATRIX_HOMESERVER: "https://matrix.example.org" MATRIX_ACCESS_TOKEN: "syt_..." MATRIX_ALLOWED_USERS: "@you:matrix.example.org" MATRIX_ENCRYPTION: "true" MATRIX_DEVICE_ID: "HERMES_BOT" # Proxy mode — forward to host agent GATEWAY_PROXY_URL: "http://192.168.1.100:8642" GATEWAY_PROXY_KEY: "your-secret-key-here" volumes: - ./matrix-store:/root/.hermes/platforms/matrix/store ``` **`Dockerfile`:** ```dockerfile FROM python:3.11-slim RUN apt-get update && apt-get install -y libolm-dev && rm -rf /var/lib/apt/lists/* RUN pip install 'hermes-agent[matrix]' CMD ["hermes", "gateway"] ``` That's the entire container. No API keys for OpenRouter, Anthropic, or any inference provider. ### Step 3: Start Both 1. Start the host gateway first: ```bash hermes gateway ``` 2. Start the Docker container: ```bash docker compose up -d ``` 3. Send a message in an encrypted Matrix room. The container decrypts it, forwards it to the host, and streams the response back. ### Configuration Reference Proxy mode is configured on the **container side** (the thin gateway): | Setting | Description | |---------|-------------| | `GATEWAY_PROXY_URL` | URL of the remote Hermes API server (e.g., `http://192.168.1.100:8642`) | | `GATEWAY_PROXY_KEY` | Bearer token for authentication (must match `API_SERVER_KEY` on the host) | | `gateway.proxy_url` | Same as `GATEWAY_PROXY_URL` but in `config.yaml` | The host side needs: | Setting | Description | |---------|-------------| | `API_SERVER_ENABLED` | Set to `true` | | `API_SERVER_KEY` | Bearer token (shared with the container) | | `API_SERVER_HOST` | Set to `0.0.0.0` for network access | | `API_SERVER_PORT` | Port number (default: `8642`) | ### Works for Any Platform Proxy mode is not limited to Matrix. Any platform adapter can use it — set `GATEWAY_PROXY_URL` on any gateway instance and it will forward to the remote agent instead of running one locally. This is useful for any deployment where the platform adapter needs to run in a different environment from the agent (network isolation, E2EE requirements, resource constraints). :::tip Session continuity is maintained via the `X-Hermes-Session-Id` header. The host's API server tracks sessions by this ID, so conversations persist across messages just like they would with a local agent. ::: :::note **Limitations (v1):** Tool progress messages from the remote agent are not relayed back — the user sees the streamed final response only, not individual tool calls. Dangerous command approval prompts are handled on the host side, not relayed to the Matrix user. These can be addressed in future updates. ::: ### Sync issues / bot falls behind **Cause**: Long-running tool executions can delay the sync loop, or the homeserver is slow. **Fix**: The sync loop automatically retries every 5 seconds on error. Check the Hermes logs for sync-related warnings. If the bot consistently falls behind, ensure your homeserver has adequate resources. ### Bot is offline **Cause**: The Hermes gateway isn't running, or it failed to connect. **Fix**: Check that `hermes gateway` is running. Look at the terminal output for error messages. Common issues: wrong homeserver URL, expired access token, homeserver unreachable. ### "User not allowed" / Bot ignores you **Cause**: Your User ID isn't in `MATRIX_ALLOWED_USERS`. **Fix**: Add your User ID to `MATRIX_ALLOWED_USERS` in `~/.hermes/.env` and restart the gateway. Use the full `@user:server` format. ## Security :::warning Always set `MATRIX_ALLOWED_USERS` to restrict who can interact with the bot. Without it, the gateway denies all users by default as a safety measure. Only add User IDs of people you trust — authorized users have full access to the agent's capabilities, including tool use and system access. ::: For more information on securing your Hermes Agent deployment, see the [Security Guide](../security.md). ## Notes - **Any homeserver**: Works with Synapse, Conduit, Dendrite, matrix.org, or any spec-compliant Matrix homeserver. No specific homeserver software required. - **Federation**: If you're on a federated homeserver, the bot can communicate with users from other servers — just add their full `@user:server` IDs to `MATRIX_ALLOWED_USERS`. - **Auto-join**: The bot automatically accepts room invites and joins. It starts responding immediately after joining. - **Media support**: Hermes can send and receive images, audio, video, and file attachments. Media is uploaded to your homeserver using the Matrix content repository API. - **Native voice messages (MSC3245)**: The Matrix adapter automatically tags outgoing voice messages with the `org.matrix.msc3245.voice` flag. This means TTS responses and voice audio are rendered as **native voice bubbles** in Element and other clients that support MSC3245, rather than as generic audio file attachments. Incoming voice messages with the MSC3245 flag are also correctly identified and routed to speech-to-text transcription. No configuration is needed — this works automatically.