Local-first DevOps assistant

Your servers, automated by AI.
Controlled by you.

Axolotl is a local-first desktop app that runs entirely on your PC—not in the cloud. No shared logs, no remote control. Your commands, your servers, your privacy.

Runs locally on Windows, no cloud account required
Uses your existing SSH keys and API tokens
No telemetry or command logs sent to Axolotl
Download from Microsoft Store

Axolotl Workspace

A focused command workspace that orchestrates Docker, SSH, and cloud tooling for you—without ever leaving your desktop.

vps-production-01
Reply to Axolotl...
Telegram Bot Integration

Manage your infrastructure from anywhere.

Connect Axolotl directly to your own private Telegram bot. Check server health, manage containers, and even trigger rolling deployments right from your phone without needing a laptop or VPN.

  • Deploy containers with simple slash commands.
  • Monitor system resource usage remotely.
  • Check live metrics on the go.
Axolotl Bot
Axolotl Bot bot
Today
Message...

Security architecture built for local-first DevOps

Axolotl is designed so that your secrets never need to leave your machine. The app connects directly to your infrastructure and relies on OS-level protections instead of a remote control plane.

Local encryption of credentials

API keys and SSH credentials are stored and accessed using OS-provided keychains and in-memory protections.

  • Secrets are loaded, encrypted, and used exclusively on your local device—never transmitted to Axolotl servers.
  • At rest, credentials are protected by the underlying OS keystore; at runtime, keys reside only in process memory.
  • No Axolotl-operated database or control plane can access, mirror, or replay your authentication material.

Direct, brokerless connections

Sessions originate from your desktop straight to your servers and cloud APIs—no middlebox owned by us.

  • SSH and HTTPS connections are opened directly from your machine, using your keys and client configuration.
  • There is no Axolotl “relay” service that can intercept, log, or tamper with your commands in transit.
  • Network access can be audited and restricted using your existing firewall, VPN, and bastion host policies.
Common Questions

Frequently Asked Questions

Everything you need to know about Axolotl and how it works. Can't find what you're looking for? Reach out to our support team.