several coding agents. one git tree. only what passes.
bernstein is a deterministic python scheduler that runs cli coding agents in parallel. no llm in the loop.
ships adapters for claude code, codex, gemini cli, aider, and 42 more. each runs in its own git worktree. lint, types, and tests gate every merge.
ask anything.
how it works
How does Bernstein work?
Bernstein is an open-source orchestrator for CLI coding agents. It decomposes a goal into tasks, spawns Claude Code, Codex, Gemini CLI and 43 other agents into isolated git worktrees, runs each task in parallel, then verifies the output through lint, type checks, tests, and an optional cross-model review before merging. The scheduler is plain Python - deterministic, replayable from an HMAC-chained audit log, no LLM tokens spent on coordination.
one run, four stages.
from the blog
three pieces from the blog.
field notes from the orchestra pit. hand-picked: where bernstein sits in the multi-agent coding category, what it looks like in the cloud, and how it started.
bernstein 2.x recap: lineage, ten trackers, A2A capability cards, and a CI that started fixing itself
Thirteen releases since the 1.10 recap consolidated into nine themes: a per-artefact transparency log with Ed25519 signatures, ten tracker adapters from Jira to Plane, A2A capability cards, MCP client and server hardening, a Playwright sandbox for UI agents, a secrets broker, supply-chain coverage with SBOM and OSSF Scorecard, calibrated cost guards, and a web UI plus PWA in the wheel.
agents on cloudflare: workers, durable objects, r2, d1
bernstein 1.8.4 cloudflare backend for ai coding agents: workers run agents, durable workflows handle multi-step tasks, r2 + d1 hold state.
bernstein 1.0: open-source orchestrator for ai coding agents
Orchestrate Claude Code, Codex, Gemini CLI + 40 other CLI coding agents in parallel git worktrees. Deterministic scheduler, HMAC-signed audit chain.
evidence, not vibes
every step signed, in order, on disk.
bernstein writes an hmac-signed event chain to .bernstein/audit.log. each entry references the previous hash. tampering breaks verification. nothing leaves your machine.
this is the artifact security review actually wants. not a screenshot, not a SOC2 PDF - a hash chain you can replay.
frequently asked
the four questions that block install.
is the scheduler an llm?
does it phone home?
where does it run?
how is this different from claude code?
one engineering post a month.
what we shipped, what broke, what we learned. one click to unsubscribe.