private beta · developer-first launch

ROS 2 remote debugging
that actually works.

A local-first robot agent, managed debug sessions, and Debug Projection for Foxglove and RViz when robots are behind NAT and SSH is not dependable.

CLI-first for developers Discord for team workflows Foxglove + RViz integration Open-source robot-side agent

Not just a tunnel: RoboTunnel adds a robot-side Debug Projection layer on top of the connection path.

From brittle remote access to a real debug workflow

Before

Before: SSH + ad hoc forwarding

The robot is remote, the link is weak, and every session starts by rebuilding plumbing.

# SSH drops, port forwards drift, tools break
ssh robot@field-host
ssh -L 8765:localhost:8765 robot@field-host
ros2 topic echo /joint_states

# Rebuild the setup again when the link dies

One product, two interaction surfaces

For Teams

Discord extends the product into team workflows without replacing the CLI.

  • Natural-language status and diagnostics
  • Alert delivery and monitor workflows
  • Shared operational context
  • Fleet-facing workflows as the product grows

Debug Projection gets the data you need onto the link you have

Projection path

Source Topics Image · PointCloud2 · TF Debug Projection profiles · policy · sampling Foxglove projected stream RViz / Stream Pull same session surface
{
  "/camera/image_raw": { "image_scale": 0.5, "max_fps": 8 },
  "/lidar/points":     { "point_stride": 4, "voxel": 0.10 }
}

Security that matches the developer workflow

Local LLM keys

Provider keys stay on the robot, encrypted at rest, and do not pass through the RoboTunnel platform.

Ed25519 authentication

Connections use explicit cryptographic identity, not shared passwords or hand-managed SSH sprawl.

Explicit trust boundary

The agent uses an allowlist model by default so robot-side execution stays inside an explicit trust boundary.

Open-source agent

The robot-side process is fully open source and auditable at the repository level.

Outbound-first networking

The robot reaches out. You do not need to expose inbound ports just to start debugging.

Private beta now. Free for invited ROS 2 teams.

Beta users are free during the invite-only phase. The current packaging direction is active robots plus relay-heavy usage, not seats, prompts, or LLM API markup.

After beta
TBD later
Built around active robots, not generic infra billing
  • Likely priced by active robots
  • Relay-heavy usage as the main overage candidate
  • No LLM usage markup planned
  • Open-source agent remains permanent
Pricing details

Bring one robot online in three steps

1. Install the CLI

Start on the developer machine.

curl -fsSL https://downloads.robotunnel.io/install.sh -o install-robotunnel.sh
bash install-robotunnel.sh

2. Install the agent

Download the installer and config example, then register the robot-side trust bootstrap.

curl -fsSL https://downloads.robotunnel.io/agent/install-agent.sh -o install-agent.sh
curl -fsSL https://downloads.robotunnel.io/agent/install-agent.config.example -o install-agent.config

# Edit install-agent.config:
# - RT_KEY
# - ROBOT_NAME (optional)
# - PLATFORM_BASE_URL (optional)

chmod +x install-agent.sh
./install-agent.sh ./install-agent.config

3. Start the debug session

Use the managed debug path, not raw plumbing.

robotunnel list
robotunnel debug start <robot> --mode foxglove
robotunnel debug open <robot> --launch
Start with the docs See pricing Request beta access