Open-source AI agent that works across WhatsApp, Telegram, Slack, Email, Voice, and 150+ tools — self-hosted, security-first, runs in Docker.
pip install pincer-agent && pincer initWebsite · Docs · Quick Start · Discord · Contributing
- What: An open-source AI agent that lives in WhatsApp, Telegram, Discord, Slack, Signal, and Email — generates images, makes phone calls, connects to any MCP server, and actually does things
- For whom: Developers and technical users who want a personal agent they can self-host, audit, and extend
- Why it exists: Existing agents had malicious plugins, surprise bills, and codebases too large to review
- How it's different: Clean Python codebase. Straightforward config via env vars. Skills sandboxed in subprocesses. Hard daily spending cap
- How it stays safe: User allowlist, tool approval prompts, AST scanning, skill signing, structured audit log — and
pincer doctorto verify it all
Pincer is an open-source AI agent that lives in your messaging apps. You text it — "check my emails, summarize anything important, and add the meetings to my calendar" — and it does it. It runs on your machine, talks to the LLM of your choice, and the entire codebase is readable Python you can audit in an afternoon.
You (WhatsApp): Check my email and brief me on anything important
🦀 Pincer: 📧 12 unread, 3 need attention:
- Contract from Sarah — needs signature by 5pm
- Server alert — CPU spike on prod (resolved itself)
- Board meeting moved to Thursday 2pm
📅 Updated your calendar: • Thu 2pm — Board meeting (moved from Wednesday) • Fri 11am — Design review follow-up (new)
💰 $0.003 · $4.92 remaining today
I was running a popular AI agent when two things happened in the same week: I got hit with a $127 API bill I didn't authorize, and a security researcher found that a skill I'd installed had been quietly phoning home with my chat history.
By day, I'm a radiologist — I also research and build AI for the medical sector. When your work involves regulated patient data, seeing a personal AI agent silently exfiltrate conversations hits differently. I realized the agent I wanted didn't exist: one where I could read the whole codebase, set a hard spending cap, and know that plugins are strictly sandboxed.
So I built it. Pincer is the agent I wanted. If you want the same thing, it's yours.
Fair comparison note: OpenClaw is a respected project that proved personal AI agents are what people want. It optimizes for plugin ecosystem breadth and community size. Pincer optimizes for auditability, cost control, and sandboxed security. Different goals, different trade-offs. Versions compared: Pincer 0.7.x vs OpenClaw as of Feb 2026.
| Pincer | OpenClaw | LangChain agents | Custom bot | |
|---|---|---|---|---|
| Codebase | Auditable Python | 200K+ LOC | Framework + glue | Yours |
| Language | Python | TypeScript | Python | Any |
| Install → first message | ~5 min | 30–60 min | Hours | Days |
| Skill isolation | Subprocess sandbox | In-process | DIY | DIY |
| Skill vetting | AST scan + safety score + optional signing | Community-reported | DIY | DIY |
| Cost controls | Hard daily cap, auto-downgrade, per-response cost | None built-in | None built-in | DIY |
| Config surface | Env vars + optional TOML | Multi-file JSON | Code | Code |
| Channels | 8 + voice calling | 2–3 | 0 | 1 (usually) |
| Memory | Cross-channel, FTS5 + embeddings | Per-channel | Needs setup | DIY |
| MCP | Full client + OAuth 2.0 server | None | Plugins | DIY |
| Image generation | fal.ai + Gemini built-in | None | DIY | DIY |
You need three things: Python 3.11+, an LLM API key (Anthropic, OpenAI, Grok, or free with Ollama), and a Telegram bot token (takes 2 min via @BotFather).
pip install pincer-agent
pincer init # 5-min interactive wizard
pincer run # done — message your bot on Telegramgit clone https://github.com/pincerhq/pincer.git && cd pincer
cp .env.example .env # edit with your API keys
docker compose up -d # dashboard on localhost:8080PINCER_ANTHROPIC_API_KEY=sk-ant-... # Anthropic, OpenAI, or Grok
PINCER_TELEGRAM_BOT_TOKEN=7000000:AAx... # From @BotFather
PINCER_TELEGRAM_ALLOWED_USERS=123456789 # Your Telegram user ID
PINCER_DAILY_BUDGET_USD=5.00 # Hard daily spending limit in USDPincer is solo-maintained. To set honest expectations, features are explicitly split:
| Tier | What's included | Maintenance guarantee |
|---|---|---|
| 🟢 Core | Agent loop, memory, tools, security, cost controls, Telegram | CI-tested, regression-protected, release-blocking |
| 🟡 Stable | WhatsApp, Discord, Slack, Email, dashboard, skills system | Tested, maintained, may lag 1–2 weeks on upstream API changes |
| 🧪 Peripheral | Voice calling, Signal, MCP client + OAuth, image generation, proactive scheduler | Working, documented, community-maintained welcome |
| 🔮 Planned | iMessage, SMS, Teams, Zoom, Viber, WeChat, Matrix | Not yet started — help wanted |
| Channel | Tier | How it works |
|---|---|---|
| Telegram | 🟢 | Bot API via aiogram 3.x — keyboards, voice notes, images, groups |
| 🟡 | Multi-device protocol via neonize — QR pairing, no API costs | |
| Discord | 🟡 | Slash commands, threads, rich embeds via discord.py |
| Slack | 🟡 | DMs, channels, threads via slack-bolt |
| 🟡 | Gmail OAuth — read, search, draft, send | |
| Signal | 🧪 | E2E encrypted via signal-cli-rest-api Docker sidecar; WebSocket or poll receive mode |
| Voice | 🧪 | Make/receive phone calls via Twilio (~$0.12/3-min call) |
| Web UI | 🟡 | Dashboard + chat at localhost:8080 |
Cross-channel memory: Tell the agent something on WhatsApp. Ask about it on Telegram. It remembers — SQLite + FTS5 full-text search, vector embeddings for semantic recall, auto-summarization, and entity extraction.
| Tool | What it does | Approval required |
|---|---|---|
web_search |
Search via Tavily or DuckDuckGo | No |
browse / screenshot |
Navigate, fill forms, screenshot (Playwright) | No |
email_check / email_send |
Read inbox, draft and send | Read: No / Send: Yes |
calendar_today / calendar_create |
Read and create Google Calendar events | Read: No / Create: No |
shell_exec |
Run shell commands | Yes |
python_exec |
Execute Python in sandbox | Yes |
file_read / file_write / file_list |
Local file operations | Read: No / Write: Yes |
memory_search |
Search past conversations semantically | No |
voice_call |
Outbound phone calls via Twilio | Yes |
generate_image |
Generate images via fal.ai or Gemini | No |
google__* (85 tools) |
Gmail, Calendar, Drive, Docs, Sheets, Slides, Tasks, Contacts | Read: No / Write: Yes |
"Approval" = the agent asks in chat before executing. You reply ✅ or ❌.
Python SDK
from pincer import Agent
agent = Agent()
result = agent.ask("Summarize ~/data/sales.csv and plot monthly trends")
result.display() # renders inline in Jupyterasync with Agent() as agent:
result = await agent.run("What meetings do I have tomorrow?")
print(result.text)
print(f"Cost: ${result.cost:.4f}")Pincer has a built-in generate_image tool powered by fal.ai (primary) and Google Gemini (fallback). The provider is selected automatically based on which key is configured.
# Enable fal.ai (recommended)
PINCER_FAL_KEY=...
# Or Gemini
PINCER_GEMINI_API_KEY=...
# Optional controls
PINCER_IMAGE_MAX_COST_PER_REQUEST=0.10 # USD cap per generation
PINCER_IMAGE_DAILY_LIMIT=50 # Max generations per dayInstall the optional dependency:
pip install "pincer-agent[image]"You (Telegram): Generate an image of a futuristic Tokyo street at night in cyberpunk style
🦀 Pincer: (sends the generated image inline) Done — generated in 4.2s via fal.ai · $0.004
Pincer is a full MCP client and MCP server. Connect any MCP-compliant tool server (GitHub, Postgres, Notion, Stripe, custom) and its tools appear in the agent automatically.
# pincer.toml
[[mcp.servers]]
name = "github"
command = "npx"
args = ["-y", "@modelcontextprotocol/server-github"]
env = { GITHUB_PERSONAL_ACCESS_TOKEN = "ghp_..." }
[[mcp.servers]]
name = "postgres"
command = "npx"
args = ["-y", "@modelcontextprotocol/server-postgres", "postgresql://..."]pincer mcp list # show connected servers + status
pincer mcp tools # list all registered MCP tools
pincer mcp test github # test a specific server connection
pincer mcp call github get_file_contents --repo pincerhq/pincer --path README.mdInstall the optional dependency:
pip install "pincer-agent[mcp]"Pincer also acts as an OAuth 2.0 Authorization Server for MCP clients. Any MCP client can authenticate against Pincer using standard OAuth 2.0 with PKCE:
/authorize,/token,/introspect,/revokeendpoints- RFC 8414 server metadata
- Scope-based access control
- JWT tokens via PyJWT
- Bearer token middleware for protected routes
Skills extend the agent. Each skill = a Python file + YAML manifest, loaded dynamically on startup.
pincer skills list # what's installed
pincer skills install github:user/repo # install (scanned first)
pincer skills scan ./untrusted-skill # security scan before install10 bundled skills ship with Pincer: weather, news, translate, summarize_url, youtube_summary, expense_tracker, habit_tracker, pomodoro, stock_price, git_status.
Writing your own skill
# skills/my_skill/main.py
from pincer.tools import tool
@tool(name="get_weather", description="Get current weather for a city")
async def get_weather(city: str) -> str:
async with httpx.AsyncClient() as client:
resp = await client.get(f"https://wttr.in/{city}?format=j1")
data = resp.json()
return f"{city}: {data['current_condition'][0]['temp_C']}°C"# skills/my_skill/skill.yaml
name: weather
version: 1.0.0
permissions: [network]The manifest declares permissions. The sandbox enforces them. No declared permissions = no network, no filesystem, no nothing.
[Full skills guide →](docs/Skills guide.md)
Pincer is designed around two assumptions: every inbound message is untrusted input, and every skill is potentially malicious.
| Threat | How |
|---|---|
| Unauthorized access | User allowlist — unapproved IDs are silently dropped |
| Destructive tool calls | Dangerous tools require explicit ✅ approval in chat |
| Malicious skills | Subprocess sandbox (memory cap, CPU timeout, filesystem isolation, network whitelist) |
| Supply-chain attacks | AST scanning pre-install + optional cryptographic skill signing |
| Prompt injection via tools | Tool outputs are sanitized; system prompt is hardened against injection |
| Runaway costs | Hard daily budget, per-session limits, auto-downgrade at 80% spend |
| Forensic blindness | Structured JSON audit log for every action — who, what, when, cost |
| Unauthorized MCP access | OAuth 2.0 + PKCE + scope enforcement on all MCP server routes |
- Compromised host OS — if your server is rooted, all bets are off
- Malicious LLM provider — if the API itself is compromised, Pincer can't detect that
- Social engineering of the user — Pincer can't stop you from approving a bad tool call
- Side-channel exfiltration — a skill that encodes data into tool output text could leak information to the LLM context; we mitigate but can't fully prevent this
Sandboxing adds 40–120ms latency per tool call (subprocess spawn + IPC). For most use cases this is unnoticeable. For latency-critical pipelines, you can disable sandboxing per-skill at your own risk via sandbox: false in the manifest.
If the LLM attempts to exfiltrate data by crafting a web_search query containing sensitive content (e.g., web_search("user's SSN is 123-45-6789")), the query executes — Pincer doesn't inspect tool input semantics, only permissions. Mitigation: the audit log captures every tool call, and pincer doctor flags unusual outbound patterns. Full prevention requires output filtering, which is on the roadmap.
One command audits your setup — 40+ checks covering config, keys, permissions, skills, MCP, image generation, and network exposure:
$ pincer doctor
🦀 Pincer Doctor v0.8.x
✅ API key valid (claude-sonnet-4-5-20250929)
✅ Telegram connected (@my_pincer_bot)
✅ Daily budget: $5.00
✅ 10 skills installed, all scored ≥ 80
✅ MCP: 2 servers connected (github, postgres)
✅ Image generation: fal.ai key present, daily limit 50
⚠️ Discord DM policy is "open" — consider "pairing"
✅ No exposed ports beyond localhost
38 passed · 1 warning · 0 critical
Full security model → · Found a vulnerability? Security Policy
Personal email triage (real numbers from beta testing):
- 40–60 emails/day processed, 3–5 flagged as important
- Calendar auto-updated 2–3 times/day
- Daily LLM cost: $0.18–$0.35 (Claude Sonnet 4.5)
- Monthly: ~$7 with daily budget cap of $0.50
Voice calling for appointments:
- 4 outbound calls/week (dentist, insurance, scheduling)
- Average call duration: 2.5 minutes
- Cost per call: ~$0.12 (Twilio + Deepgram + ElevenLabs)
- Monthly voice cost: ~$2
Image generation:
- On-demand via fal.ai: ~$0.004/image (fal-ai/nano-banana-2)
- Configurable daily limit and per-request cost cap
- Images delivered inline in Telegram, Discord, and Web UI
Fully offline with Ollama:
- Llama 3.3 70B via Ollama on an M2 Mac
- API cost: $0.00. Response time: 3–8 seconds depending on context length
- Trade-off: less reliable tool use than Claude, no voice calling
- Non-technical users — Pincer requires terminal access, env vars, and API keys. There's no GUI installer.
- Enterprises needing SSO/compliance today — multi-user, audit export, and SSO are planned but not shipped yet.
- Zero-setup expectations — you will spend 5–10 minutes configuring API keys and channel tokens.
- People who want a hosted service — Pincer runs on your machine. Managed hosting is on the roadmap, not available today.
- No hosted cloud — your data stays on your hardware. We're not a SaaS.
- No auto-installed skills — every skill requires explicit
pincer skills installwith a security scan. - No team features — Pincer is a single-user personal agent. Multi-user is planned, not promised.
- No telemetry — zero analytics, zero crash reports, zero phone-home. Verify:
grep -r "telemetry\|analytics\|tracking" src/. - No framework dependency — no LangChain, no CrewAI, no abstractions. Pure
asyncio+ provider SDKs.
These are focus decisions, not limitations. Every feature we didn't build is maintenance we didn't take on.
🤖 Supported Models
Set one or more — failover is automatic.
| Provider | Env var | Models |
|---|---|---|
| Anthropic ⭐ | PINCER_ANTHROPIC_API_KEY |
Claude Opus 4.6 / Sonnet 4.5 / Haiku 4.5 |
| OpenAI | PINCER_OPENAI_API_KEY |
GPT-4o / GPT-5 / o-series |
| xAI Grok | PINCER_GROK_API_KEY |
Grok-2 / Grok-3 (OpenAI-compatible API) |
| DeepSeek | PINCER_LLM_API_KEY |
DeepSeek V3 / R1 |
| Ollama | OLLAMA_HOST |
Any local model — fully offline, $0 |
| OpenRouter | PINCER_LLM_API_KEY |
100+ models, single key |
Recommendation: Claude Sonnet 4.5 for tool-use quality and prompt-injection resistance. Ollama for zero-cost, fully private operation.
⏰ Proactive Agent
Pincer doesn't just respond — it reaches out.
Morning briefing (7 AM, configurable): weather, today's calendar, top 3 emails, habit check-in.
Scheduled tasks: "Remind me every Friday at 5pm to submit my timesheet" → cron-scheduled with full cron syntax support.
Event triggers: Gmail pub/sub for real-time email reactions, webhooks from any service.
💻 CLI Reference
pincer init # interactive setup wizard
pincer run # start agent (all channels)
pincer run --channel telegram # single channel
pincer chat # CLI chat for testing
pincer doctor # security + config audit (40+ checks)
pincer cost # spending summary
pincer skills list|install|scan # manage skills
pincer mcp list # MCP servers + status
pincer mcp test <server> # test MCP connection
pincer mcp tools # list registered MCP tools
pincer mcp call <server> <tool> # call a specific MCP tool
pincer pair approve <ch> <code> # approve a DM sender
pincer setup-google # Google Workspace OAuth (85 tools)Chat commands (any channel): /status, /budget, /new, /compact, /model <name>, /tools
graph TD
WA[📱 WhatsApp] --> CR[Channel Router]
TG[📱 Telegram] --> CR
DC[🎮 Discord] --> CR
SL[💼 Slack] --> CR
EM[📧 Email] --> CR
VC[📞 Voice] --> CR
SG[🔒 Signal] --> CR
WB[🌐 Web UI] --> CR
CR --> AC[🧠 Agent Core · ReAct Loop]
AC --> TR[🔧 Tool Registry + Sandbox]
AC --> MM[🗃️ Memory · SQLite + FTS5 + Embeddings]
AC --> SS[👤 Sessions · Per-channel · Per-user]
AC --> MCP[🔌 MCP Client + OAuth Server]
AC --> IMG[🖼️ Image Generation · fal.ai + Gemini]
TR --> BT[Built-in Tools · 12+]
TR --> SK[Custom Skills · Sandboxed]
MCP --> EXT[External MCP Servers · GitHub · Postgres · etc.]
- Message arrives → load session + relevant memories
- Send to LLM with available tools (built-in + skills + MCP tools)
- LLM returns tool call → execute in sandbox → feed result back → repeat
- LLM returns text → deliver to user via originating channel
- Save session, update memory, log cost
No frameworks. No abstractions. async/await + the Anthropic SDK.
Project structure & tech stack
pincer/
├── src/pincer/
│ ├── core/ agent.py, session.py, config.py, soul.py, identity.py
│ ├── llm/ anthropic, openai, grok, ollama, router, cost_tracker
│ ├── channels/ telegram, whatsapp, discord, slack, email, voice, signal, web
│ ├── memory/ store (SQLite+FTS5), embeddings, entities, summarizer
│ ├── tools/ registry, sandbox, approval, builtin/ (12+ tools)
│ ├── skills/ loader, scanner (AST), signer
│ ├── image/ router, provider_fal, provider_gemini, types
│ ├── mcp/ core, client, manager, bridge, audit, security, oauth/
│ │ └── auth/ endpoints, tokens, pkce, scopes, consent, token_store
│ ├── voice/ engine, twiml_server, stt, tts, compliance
│ ├── security/ firewall, audit, doctor (40+ checks), rate_limiter
│ ├── costs/ budget
│ └── scheduler/ cron, proactive, triggers
├── skills/ 10 bundled
├── tests/ pytest + pytest-asyncio
└── docs/
Stack: Python 3.11+ / asyncio · anthropic + openai SDKs · aiogram 3.x · neonize · discord.py · slack-bolt · twilio · FastAPI + HTMX · SQLite + FTS5 · Playwright · pydantic-settings · typer + rich · mcp>=1.8.0 · PyJWT[crypto]>=2.8.0 · fal-client>=0.13.0
Optional extras:
pip install "pincer-agent[mcp]" # MCP client + OAuth server
pip install "pincer-agent[image]" # Image generation (fal.ai + Gemini)- Agent core, memory, tools, security, cost controls
- Telegram, WhatsApp, Discord, Slack, Email, Signal
- Skill system with sandboxing, AST scanning, signing
- Docker + one-click deploys (Railway, Render, DigitalOcean)
- Voice calling (Twilio + STT/TTS + compliance)
- iMessage — help wanted
- SMS — Twilio SMS channel
- Microsoft Teams — help wanted
- Zoom — Meeting channel
- Encrypted memory — at-rest database encryption
- Multi-agent routing — specialized sub-agents
- Managed hosting — for non-self-hosters (exploring, not promised)
Full roadmap: GitHub Discussions → Roadmap
Pincer is solo-maintained, open-source, and unfunded. That's a feature, not a weakness — no investor pressure means no forced pivots, no telemetry, no "free tier sunsets."
The plan: grow the contributor community, move toward shared governance as trust is established (see Governance), and eventually explore a managed hosting option to fund ongoing maintenance. Nothing is promised beyond what's shipped today.
We welcome contributions from everyone — first-timers, experienced engineers, doctors who code, tinkerers, and enthusiasts.
| What | How | Difficulty |
|---|---|---|
| Build a skill | [Skills guide](docs/Skills guide.md) — 50–150 lines | 🟢 Easy |
| Improve docs | Fix what confused you, translate, write a tutorial | 🟢 Easy |
| New channel | SMS, iMessage, Teams, Zoom, Viber, WeChat | 🟡 Medium |
| Core features | Encrypted memory, multi-agent routing | 🔴 Hard |
git clone https://github.com/pincerhq/pincer.git
cd pincer && uv sync && pytestDiscord · GitHub Discussions · Contributing guide · Governance
| Doc | What's in it |
|---|---|
| Quick Start | Install to first message in 5 minutes |
| Development Guide | Local setup, tests, dashboard, debugging, skills/channels/tools |
| Contributing | PR guidelines, code style, ruff/mypy, CI |
| Architecture | How it works, with Mermaid diagrams |
| Configuration | Every env var, every option |
| [Skills Guide](docs/Skills guide.md) | Build and publish custom skills |
| Security Model | Full threat model, 8 defense layers |
| Deployment | Docker, cloud, systemd, reverse proxy |
| Voice Setup | Quick setup for outbound phone calls |
| [Voice Calling](docs/Voice calling.md) | Twilio setup, STT/TTS, compliance |
| Signal Setup | signal-cli Docker sidecar setup |
| MCP Guide | Connect any MCP-compliant server; OAuth 2.0 server setup |
| [API Reference](docs/API reference.md) | REST API for integrations |
| [Migrating from OpenClaw](docs/Migration from openclaw.md) | Import your data in 30 min |
Anthropic · aiogram · neonize · discord.py · Twilio · Deepgram · ElevenLabs · Playwright · fal.ai · Rich · Typer · OpenClaw — for proving personal AI agents are what people want · Every beta tester and contributor who helped ship this
📜 License: MIT — LICENSE · 🔐 Security: Security Policy — do not open public issues for vulnerabilities
🦀 Built with Python.
pincer.sh · GitHub · Discord · Twitter
If Pincer is useful to you, consider giving it a ⭐ — it helps others discover the project.
