bash, etc.) execute on the remote machine.
Threat model
mux treats the remote host as potentially hostile. By default it does not forward your local keys or credentials. The only data synced to the remote machine is:- a git archive of the project
- Project Secrets (explicitly configured)
Why use SSH runtime
- Security: Prompt injection risk is contained to the credentials/files on the remote machine.
- SSH remotes pair well with Agentic Git Identity.
- Performance: Run many agents in parallel without burning laptop CPU/battery.

Host value
The host field accepts anything you can pass tossh <host>:
- a hostname (for example
my-server.com) - a username and hostname (for example
[email protected]) - an alias from your
~/.ssh/config(for examplemy-server)
ssh command, so advanced settings live in ~/.ssh/config.
Example entry:
Authentication
mux delegates to
ssh. This is an abbreviated reference of common ways ssh authenticates.Local default keys
ssh checks these locations by default:
SSH agent
If you have an SSH agent running, add your key:~/.ssh/config
You can also set an explicit identity file:
Coder Workspaces
If you’re using Coder Workspaces, you can use an existing workspace as a mux agent host:- Run
coder config-ssh - Use
coder.<workspace-name>as your SSH host when creating a new mux workspace