c2c

Architecture

High-Level Model

The project currently has three moving parts:

  1. Session discovery
  2. PTY-master message injection
  3. Transcript inspection

Session Discovery

claude_list_sessions.py scans local Claude profile directories:

For each live session it resolves:

PTY Injection

claude_send_msg.py does not write to /dev/pts/N directly.

Instead it uses the proven helper:

That helper:

Transcript Reading

claude_read_history.py reads the target session’s JSONL transcript and extracts recent user and assistant messages.

This is the primary verification surface.