BYOD Agents#
Bring Your Own Device (BYOD) agents allow you to collect data from private sources using your own credentials.
What are BYOD Agents?#
BYOD agents run on your infrastructure and connect to private data sources using your own accounts and credentials. Your session data never leaves your machine.
βββββββββββββββ βββββββββββββββ βββββββββββββββ
β Private ββββββΆβ Your BYOD ββββββΆβ HubFeed β
β Source β β Agent β β Platform β
βββββββββββββββ βββββββββββββββ βββββββββββββββ
Benefits#
- Access private content - Monitor private channels and groups
- Your credentials - Use your own accounts, authenticated locally
- Your infrastructure - Run agents where you choose
- Data sovereignty - Session material never leaves your device
Supported Platforms#
Telegram#
Authenticate via QR code or phone number through the agent UI. Supports monitoring public and private channels, groups, and media downloads.
| Feature | Supported |
|---|---|
| Public Channels | Yes |
| Private Channels | Yes |
| Groups | Yes |
| Direct Messages | No |
| Media Download | Yes |
LinkedIn#
Authenticate via browser login through the agent UI. Monitors your LinkedIn feed timeline.
| Feature | Supported |
|---|---|
| Feed Timeline | Yes |
| User Profiles | No |
| Company Pages | No |
X (Twitter)#
Authenticate via browser login through the agent UI. Supports multiple monitoring modes.
| Feature | Supported |
|---|---|
| Home Timeline | Yes |
| User Tweets | Yes |
| Hashtag Search | Yes |
| Direct Messages | No |
Security Considerations#
Important: BYOD agents require careful security management.
Best Practices#
- Dedicated accounts - Use accounts dedicated to monitoring
- Secure storage - Back up the
data/directory and protect it - Network isolation - Run agents in isolated networks when possible
- Conservative frequencies - Avoid aggressive collection intervals that could flag your accounts
- Access logging - Monitor agent activity via the History tab
Credential Storage#
The agent stores session data in the data/ directory as JSON files. These files contain your authenticated sessions β protect them like you would any credential:
- Do not share the
data/directory - Back it up regularly
- If compromised, re-authenticate your avatars
Agent Management#
Viewing Agents#
Access your agents at Profile > Agent Tokens
Agent Status#
| Status | Description |
|---|---|
| Active | Connected and collecting |
| Inactive | Not currently running |
| Error | Connection or auth issue |
Avatar Status#
| Status | Description |
|---|---|
| Active | Authenticated and ready |
| Inactive | Not currently in use |
| Auth Required | Session expired, needs re-authentication |
| Failed Reauth | Re-authentication attempt failed |
Next Steps#
- Deploy Your Agent β Install and run the agent on your infrastructure
- Configuration Blocks β Connect avatars to your workflows