MCPHub LabRegistryphodal/routa
phodal

phodal/routa

Built by phodal 276 stars

What is phodal/routa?

Build Your Agent Team for Real-World AI Development - Workspace-first multi-agent coordination platform for AI development, with shared Specs, Kanban orchestration, and MCP/ACP/ A2A support across w

How to use phodal/routa?

1. Install a compatible MCP client (like Claude Desktop). 2. Open your configuration settings. 3. Add phodal/routa using the following command: npx @modelcontextprotocol/phodal-routa 4. Restart the client and verify the new tools are active.
🛡️ Scoped (Restricted)
npx @modelcontextprotocol/phodal-routa --scope restricted
🔓 Unrestricted Access
npx @modelcontextprotocol/phodal-routa

Key Features

Native MCP Protocol Support
Real-time Tool Activation & Execution
Verified High-performance Implementation
Secure Resource & Context Handling

Optimized Use Cases

Extending AI models with custom local capabilities
Automating system workflows via natural language
Connecting external data sources to LLM context windows

phodal/routa FAQ

Q

Is phodal/routa safe?

Yes, phodal/routa follows the standardized Model Context Protocol security patterns and only executes tools with explicit user-granted permissions.

Q

Is phodal/routa up to date?

phodal/routa is currently active in the registry with 276 stars on GitHub, indicating its reliability and community support.

Q

Are there any limits for phodal/routa?

Usage limits depend on the specific implementation of the MCP server and your system resources. Refer to the official documentation below for technical details.

Official Documentation

View on GitHub
<div align="center"> <img src="public/logo-animated.svg" alt="Routa" width="360" />

Routa

Workspace-first multi-agent coordination platform for software delivery

TypeScript Next.js Rust License Join Slack npm version crates.io

DemoArchitectureHow It WorksWhy RoutaQuick StartDocs中文

</div>

Routa is a workspace-first multi-agent coordination platform for software delivery. It keeps goals, tasks, sessions, traces, evidence, and review state visible on a board instead of burying them inside a single chat thread.

Releases · Architecture · Feature Tree · Quick Start · Docs Site · Slack · Contributing

Demo

Routa Kanban Overview

Community

Architecture

System Architecture

Routa architecture

The current implementation is intentionally dual-backend, not two separate products.

  • Web: Next.js pages and route handlers in src/
  • Desktop: Tauri shell in apps/desktop/ backed by the Axum server in crates/routa-server/
  • Shared boundary: both runtimes preserve the same workspace, session, task, trace, codebase, worktree, and review semantics defined by api-contract.yaml
  • Integration surfaces: ACP, MCP, A2A, AG-UI, A2UI, REST, and SSE

Review Gate Architecture

Routa review gate

The delivery gate is a stacked decision path, not a single reviewer persona.

  • Harness Monitor answers what happened by surfacing traces, changed files, commands, git state, and attribution
  • Entrix Fitness answers what should be true by enforcing hard gates, evidence requirements, and file budget or policy checks
  • Gate Specialist answers whether the card can move by verifying acceptance criteria and routing to Done, Dev, or human escalation

How It Works

You: "Build a user auth system with login, registration, and password reset"
                                                            ↓
                                    Workspace + Kanban Board
                                                            ↓
 Backlog              Todo              Dev               Review            Done
 Backlog Refiner  ->  Todo Orchestrator -> Dev Crafter -> Review Guard -> Done Reporter
                                                            ↘
                                                                Blocked Resolver

Routa treats the board as both the planning surface and the coordination bus. The important detail is that each lane is backed by a different specialist prompt, and each downstream lane is deliberately stricter than the previous one.

At a high level, two specialist layers work together:

  • Core roles: ROUTA coordinates, CRAFTER implements, GATE verifies
  • Kanban lane specialists: each column applies a concrete prompt contract and a concrete evidence contract

End-to-End Example

  1. You describe a goal in natural language.
  2. ROUTA or the board automation turns that goal into a workspace-scoped card.
  3. Backlog Refiner rewrites the rough request into a canonical YAML story with acceptance criteria, constraints, dependencies, and an INVEST snapshot.
  4. Todo Orchestrator distrusts that upstream card, reparses the YAML, rejects weak stories, and appends an execution-ready brief.
  5. Dev Crafter distrusts the plan again, refuses to code unless the story is executable, implements only the scoped change, runs validation, commits the work, and appends Dev Evidence.
  6. Review Guard distrusts Dev's self-assessment, independently checks each acceptance criterion, requires tests and a clean git state, and either rejects to Dev or approves to Done.
  7. Done Reporter appends a short completion summary that explains what shipped and what evidence justified completion.
  8. If the work is blocked by environment, dependency, or ambiguity, Blocked Resolver writes down the blocker and routes the card back to the correct lane instead of letting the problem stay implicit.

Lane Contracts

LaneSpecialistWhat the prompt enforcesWhat gets written to the cardTypical handoff
BacklogBacklog RefinerClarify scope, do not code, and do not move forward until the card contains exactly one canonical YAML story blockCanonical YAML story with problem statement, acceptance criteria, constraints, dependencies, out-of-scope items, and INVEST checksMove to Todo only when the story parses and is independently executable
TodoTodo OrchestratorRe-validate Backlog output, reject malformed or vague cards, and turn a valid story into an execution-ready briefExecution Plan, Key Files and Entry Points, Dependency Plan, Risk NotesMove to Dev only when implementation can start within minutes
DevDev CrafterRe-check that the card is executable, implement only the scoped change, run verification, commit the work, and keep git cleanDev Evidence with changed files, work summary, tests run, per-AC verification, caveatsMove to Review only after commit exists and the worktree is clean
ReviewReview GuardIndependently verify every acceptance criterion, reject missing evidence, reject scope creep, reject dirty git state, reject broken lint or type checksReview Findings with verdict, per-AC status, issues found, reviewer notesMove to Done only with APPROVED verdict
DoneDone ReporterTreat Done as terminal, do not advance further, and leave behind a concise completion recordCompletion Summary with what shipped, key evidence, and completion dateStay in Done
BlockedBlocked ResolverClassify the blocker, explain root cause, and route back only when there is a concrete next stepBlocker Analysis with blocker type, root cause, resolution, and routing decisionReturn to Backlog, Todo, Dev, Review, or remain Blocked

Card Artifacts Grow As The Work Moves Forward

The same card becomes stricter over time:

  • Backlog produces the canonical story YAML
  • Todo adds the execution brief
  • Dev adds evidence of implementation and verification
  • Review adds a formal verdict and findings
  • Done adds a completion summary

This is why the board is not just visual status. Each column changes what the next specialist is allowed to trust.

Core Specialist Prompts Under The Board

  • ROUTA Coordinator: plans first, never edits files directly, writes the spec, waits for approval, delegates work in waves, and calls GATE for verification after implementation.
  • CRAFTER Implementor: stays within task scope, avoids refactors and scope creep, coordinates with other agents when files overlap, runs the verification steps it was given, and commits in small units.
  • GATE Verifier: verifies against acceptance criteria only, treats evidence as mandatory, does not allow partial approval, and reports explicit verdicts instead of vague confidence.

The built-in lane prompts live under resources/specialists/workflows/kanban/*.yaml, and the core role prompts live under resources/specialists/core/{routa,crafter,gate}.yaml.

Why Routa

Single-agent chat works for isolated tasks. It breaks down when the same thread has to do decomposition, implementation, review, evidence collection, and release decisions.

Routa makes those responsibilities explicit:

  • Work starts from a workspace, not hidden global repo state
  • Kanban lanes route work between specialists instead of mixing every role into one prompt
  • Sessions, traces, notes, artifacts, codebases, and worktrees are durable objects
  • Provider runtimes are normalized through adapters instead of leaking provider-specific behavior into the product
  • The review boundary is a real gate, not just another opinionated reviewer

What You Can Do Today

  • Create workspace-scoped overviews, Kanban boards, sessions, team views, and codebase views
  • Run agent sessions with create, prompt, cancel, reconnect, streaming, and trace inspection flows
  • Route work across specialist lanes with queueing and per-board automation
  • Manage local repositories, worktrees, file search, Git refs, and commit inspection
  • Import GitHub repositories as virtual workspaces and browse trees, files, issues, PRs, and comments
  • Add MCP tools and custom MCP servers
  • Use schedules, webhooks, background tasks, and workflow runs for automation beyond one-off prompts
  • Review changes with findings, severity, traces, harness signals, and fitness reports
  • Run the product in a local-first desktop mode or a self-hosted web mode

Quick Start

Choose the shortest path that matches how you want to use Routa.

SurfaceBest forStart
DesktopFull product experience, visual workflows, local-first usageDownload from GitHub Releases
CLITerminal-first workflows and scriptingnpm install -g routa-cli
WebSelf-hosting or browser-first accessRun from source

Desktop

  1. Download Routa Desktop from GitHub Releases.
  2. Create a workspace.
  3. Enable one provider.
  4. Attach a repository.
  5. Start from Session for ad hoc work, or Kanban for routed delivery.

CLI

npm install -g routa-cli

routa --help
routa -p "Explain the architecture of this repository"
routa acp list
routa workspace list

Web

npm install --legacy-peer-deps
npm run dev

Open http://localhost:3000.

Develop From Source

Web runtime

npm install --legacy-peer-deps
npm run dev

Desktop runtime

npm install --legacy-peer-deps
npm --prefix apps/desktop install
npm run tauri:dev

Docker

docker compose up --build
docker compose --profile postgres up --build

The Tauri smoke path uses http://127.0.0.1:3210/ behind the desktop shell.

Validation

Use docs/fitness/README.md as the canonical validation rulebook.

cargo build -p entrix
entrix run --dry-run
entrix run --tier fast
entrix run --tier normal
npm run test
npm run test:e2e
npm run api:test
npm run lint

Repository Map

PathPurpose
src/app/Next.js App Router pages and API routes
src/client/Client components, hooks, view models, and UI protocol helpers
src/core/TypeScript domain services for ACP/MCP, Kanban, workflows, traces, review, harness, and stores
apps/desktop/Tauri shell and desktop packaging
crates/routa-core/Shared Rust runtime foundation
crates/routa-server/Axum backend used by desktop and local server mode
crates/routa-cli/CLI entrypoints and ACP serving commands
crates/harness-monitor/Run observation, evaluation, and operator-facing harness monitor
docs/ARCHITECTURE.mdCanonical architecture boundaries and invariants
docs/adr/Architecture decision records
docs/product-specs/FEATURE_TREE.mdGenerated route and endpoint inventory
docs/fitness/Validation and quality gates

Docs

License

MIT. See LICENSE.

Global Ranking

8.5
Trust ScoreMCPHub Index

Based on codebase health & activity.

Manual Config

{ "mcpServers": { "phodal-routa": { "command": "npx", "args": ["phodal-routa"] } } }