# User Feedback Analysis — 2026-03-12 (elizaOS)

## 1) Pain Point Categorization (Top recurring 5–7)

> Quantification note: insights below are based on the available 2026-03-09 to 2026-03-11 feedback sample (Discord summaries + referenced GitHub activity). Percentages reflect share of *distinct feedback themes raised* in this sample, not the whole user base.

### 1. Community — Project confidence & token-related anxiety (≈30% of themes; high severity)
**What users reported (examples):**
- Repeated concern that **token price hit new ATL**, with accusations/speculation of “constant selling pressure” and fear that **devs have left**.
- **X (Twitter) account suspension** perceived as harming visibility and fueling FUD.
- Requests for **clear airdrop/buyback/exchange listing updates** (raised explicitly on 03-09 and echoed through 03-10/03-11).

**Why it’s severe:** This is dominating discussion time and displacing technical/product conversations; it also directly impacts retention and willingness to build publicly.

---

### 2. Documentation — Unclear roadmap, timelines, and “what is elizaOS for?” (≈20–25%; high severity)
**What users reported (examples):**
- “Missed deadlines,” “unclear roadmaps,” and “disconnect” between what’s being built and what users expect (03-10).
- Requests to **define/document elizaOS use cases** and clarify distribution plans for holders (03-09).

**Most impacted users:** newcomers/investor-adjacent community members and builders trying to decide whether to commit.

---

### 3. Technical Functionality — Branch instability / broken develop + configuration confusion (≈15–20%; high severity)
**What users reported (examples):**
- “Develop branch is currently broken” (03-10), blocking downstream tasks.
- **Model configuration issues across different agents** (03-09).
- Need for a clearer pattern for timed autonomy (agent-to-agent conversations on a schedule) (03-09).

**Impact:** prevents successful builds, increases support burden, and slows plugin authors.

---

### 4. Integration — Database / environment configuration friction (≈10–15%; medium severity)
**What users reported (examples):**
- Confusion about where to set **Neon database configuration** (“located under env in the json file”), plus unresolved **system permissions/capabilities** issues (03-10).
- Interest in a cloud **REST endpoint for embeddings processing + persistence** (03-11) indicates local setup friction and scaling needs.

---

### 5. Performance/Cost — Voice provider cost concerns (≈10%; medium severity)
**What users reported (examples):**
- ElevenLabs perceived as expensive; request for a **functional Google voice plugin** as a cheaper alternative (03-09).

**Pattern:** users optimize for predictable operating cost and want multiple interchangeable providers.

---

### 6. Security — Scam/phishing + wallet safety architecture questions (≈10%; high severity)
**What users reported (examples):**
- Phishing attempt claiming Discord requires wallet linking; user confusion required a public warning (03-11).
- Wallet-enabled agents prompt-injection/drain concerns; desire for clear safeguards (03-11).

**Impact:** immediate user harm risk + reputational damage.

---

### 7. UX/UI (Content UX) — Updates feel monotonic; signal is hard to digest (≈5–10%; low-to-medium severity)
**What users reported (examples):**
- Feedback that daily updates can become “monotonic”; request for variety/highlights (03-11).
- Strong pull toward **video briefings** and “ticker”-style updates to track progress (03-10/03-11).

---

## 2) Usage Pattern Analysis (Actual vs intended)

### How users are actually using elizaOS (observed)
1. **Community operations & comms automation**
   - Jin building **video briefings** that condense Discord/Telegram into daily/weekly/monthly digests (03-11).
   - Demand for “objective updates” and narrative summaries indicates elizaOS is being used as a *community ops layer*, not just an agent runtime.

2. **Autonomous social/Discord agents**
   - Users want timed behaviors like `TWITTER_POST_INTERVAL_MIN/MAX`, but for **Discord agent-to-agent conversations** (03-09).
   - Builders are learning from examples repos rather than formal docs.

3. **On-chain agent commerce & reputation**
   - TraderTomson’s **AEP plugin** usage: agent registration, marketplace browsing, deal proposals, reputation checks (03-10).
   - This suggests real demand for standardized “agent economy” primitives inside elizaOS.

4. **Serious B2B agent orchestration**
   - Jaime’s YOYO procurement agent: LangGraph + MCP + Supabase/pgvector + computer-use + multi-agent purchasing decisions (03-09).
   - This is more “enterprise workflow automation” than typical hobby bots—an emerging high-value segment.

### Emerging / unexpected use cases
- **Git branch storytelling** (Odilitime tool) as a developer productivity layer (03-11): elizaOS community wants *narrative tooling* around engineering progress, not just code.

### Feature requests aligned with usage
- Scheduling/trigger framework for non-X channels (Discord timers) → aligns with autonomy usage.
- Pluggable voice providers (Google TTS) → aligns with cost-sensitive production deployments.
- Cloud embeddings endpoint → aligns with scaling and operational simplicity.

---

## 3) Implementation Opportunities (Concrete solutions per major pain point)

### A) Communication & roadmap ambiguity (Community + Documentation)
**1) Publish a “Now / Next / Later” roadmap with weekly deltas** (High impact, Low–Med difficulty)
- A single markdown page updated weekly: shipped last week, in progress, blocked, next.
- Include Babylon rollout status (e.g., “first 50k live, opening up”), Eliza 2.0 alpha scope, and Eliza app milestones.
- *Comparable approach:* Kubernetes’ weekly release updates + “Enhancements” tracking; Rust’s RFC + roadmap posts.

**2) Create a “Token/Holder ops status” page (facts-only)** (High impact, Med difficulty)
- One canonical page answering: migration process, snapshot requirements, airdrop/buyback status (even if “not decided”), exchange listing policy (“we don’t pre-announce”), and X account status/contingency.
- Reduces repetitive Discord debates and rumor cycles.
- *Comparable approach:* many OSS + token projects maintain a “Transparency/Disclosures” page with changelog-style updates.

**3) Ship the video briefing system as an official comms artifact** (Med–High impact, Med difficulty)
- Standardize segments: shipping, dev highlights, security alerts, ecosystem plugins, contributor shout-outs.
- Randomize rotation to avoid monotony (already suggested in-channel on 03-11).
- *Comparable approach:* GitHub’s “Release Radar” style summaries; some DAOs use weekly “what we did” with consistent sections.

---

### B) Branch instability + configuration friction (Technical Functionality)
**1) Add a “Known Good” release channel + nightly health checks** (High impact, Med difficulty)
- Maintain: `stable`, `beta`, `nightly` with automated “can scaffold + run example agent” checks.
- Explicitly label “develop is broken” states and provide workaround.
- *Comparable approach:* React/Next.js canary channels; Homebrew CI gating for formula health.

**2) Provide a canonical “Agent Config Recipes” doc + validator** (High impact, Med difficulty)
- Document: model config per agent, env JSON schema, common pitfalls.
- Add a CLI validator: flags missing env keys, incompatible model/provider combos.
- *Comparable approach:* Terraform `validate`, Kubernetes schema validation, LangChain template repos.

**3) First-class scheduling/trigger API (Discord timers use case)** (Med impact, Med difficulty)
- Provide a unified scheduler interface with adapters (Discord, X, cron).
- Include example: “agent-to-agent conversation every N minutes”.
- *Comparable approach:* Temporal.io patterns; n8n cron nodes; Airflow DAG scheduling concepts.

---

### C) Integrations: DB permissions + embeddings microservice (Integration)
**1) “DB setup wizard” doc + troubleshooting matrix (Neon/Supabase/Postgres)** (Med impact, Low difficulty)
- A table: provider → required extensions/roles → minimal permissions → common errors.
- Include exact location of config (“env in JSON”) and examples.

**2) Offer an optional “Embeddings Service” reference implementation** (High impact, Med–High difficulty)
- REST endpoint: `/embed`, `/upsert`, `/query`; supports batching and persistence.
- Benefits: consistent embeddings across agents, easier scaling, fewer local dependency issues.
- *Comparable approach:* OpenAI-compatible local gateways; Hugging Face Inference Endpoints; LangChain serves.

**3) Publish a supported “production deployment baseline”** (Med impact, Med difficulty)
- Include monitoring/evals/retries/cost controls/logging (mirrors what NerdPanic offered on 03-09).
- Reduces one-off infra questions and makes enterprise/B2B adoption easier.

---

### D) Cost/performance: voice provider flexibility (Performance/Cost)
**1) Provider-agnostic voice interface + at least one low-cost backend** (Med impact, Med difficulty)
- Define a voice plugin contract and ship Google/AWS/edge-TTS implementation.
- Provide cost benchmarks and caching guidance.
- *Comparable approach:* Speech SDK abstractions in assistants; TTS plugins in Home Assistant.

**2) Add a “cost guardrails” guide** (Med impact, Low difficulty)
- Document rate limits, caching, batching, and “turn off voice in dev” toggles.

---

### E) Security: phishing + wallet agent safety (Security)
**1) Pin an official “No wallet linking” + “official links” message in Discord** (High impact, Low difficulty)
- Include Babylon link, elizaos.news, and a policy: “mods will never DM you for wallet linking.”

**2) Ship a wallet isolation reference architecture (Spartan model)** (High impact, Med difficulty)
- Turn Odilitime’s guidance into a diagram + sample code: LLM sandbox, signing service, policy engine, allowlist, simulation/dry-run.
- *Comparable approach:* OpenZeppelin defender patterns; “signer separation” used by many custodial services.

**3) Add security playbooks for prompt injection in tool-using agents** (Med impact, Med difficulty)
- Red-team checklist, tool permissioning, transaction caps, human-in-the-loop thresholds.

---

## 4) Communication Gaps (Expectations vs reality)

### Recurring expectation mismatches
- **“Is the team shipping?” vs reality:** shipping is happening (Babylon launched to first 50k; Eliza 2.0.0 alpha published), but visibility is insufficient, causing “devs left” narratives (03-11).
- **Token operations assumptions vs reality:** users expect definitive timelines for airdrops/buybacks/listings; team statements indicate uncertainty/ongoing process (03-09 to 03-10).
- **Security expectations:** some users believed Discord requires wallet linking due to scams (03-11), indicating missing prominent safety onboarding.

### Recurring questions that signal onboarding gaps
- “When was Babylon supposed to be out / is it out?” (03-11)
- “Did all the developers leave?” (03-11)
- “How do I schedule agent actions in Discord?” (03-09)
- “Where do I put my Neon DB config?” (03-10)
- “How do you prevent wallet drains/prompt injection?” (03-11)

### Specific improvements to align expectations
- Add a **single canonical “Start Here” page** that links: roadmap, releases, Babylon status, security warnings, config basics.
- Create **FAQ macros** for Discord mods (auto-replies) for the questions above.
- Publish “Alpha means…” guidance: what’s stable, what’s experimental, what breaks.

---

## 5) Community Engagement Insights

### Power users observed (and what they need)
- **Odilitime**: driving architecture (prompt batching, serverless ideas), tooling (git branch storyteller), security patterns. Needs: structured RFC path + a place to publish reference architectures.
- **Jin**: comms automation (video briefings) and narrative extraction. Needs: official distribution channel + content guidelines + access to structured changelog inputs.
- **s / satsbased**: community support and status clarifications. Needs: authoritative source-of-truth to reduce repeated firefighting.
- **BinaryCookies**: integration/testing (Neon DB, model config, timers, voice cost). Needs: better docs + validated config tooling.
- **TraderTomson**: ecosystem expansion via AEP plugin. Needs: plugin promotion path + compatibility/testing guidance.

### Common newcomer questions indicating friction
- Safety (wallet linking scams).
- Project continuity (team left?).
- “What should I build first?” (implied via use-case confusion and reliance on examples).

### Converting passive users into contributors
- Create “**Good First Issue: Docs**” around the exact repeated questions (DB config, scheduling, alpha expectations).
- Launch a monthly “**Plugin Demo Day**” (AEP, voice providers, scheduling adapters) with a short submission template.
- Add a “**Contributor ladder**”: reproduce bug → write doc fix → add test → ship plugin adapter.

---

## 6) Feedback Collection Improvements

### Current channels: effectiveness assessment
- **Discord**: high volume and fast response, but feedback is **unstructured** and repeats; important items (security warnings, migration steps) get buried.
- **GitHub**: better for actionable tasks, but many user issues are **never converted** into issues with reproducible steps (e.g., model config inconsistencies, permissions problems).

### Ways to gather more structured, actionable feedback
1. **Discord → GitHub issue bridge**
   - A bot command like `/report-bug` that captures: version, provider, logs, repro steps, expected/actual.
2. **Monthly “State of the Project” survey**
   - 6–8 questions: what broke, what shipped, top requested plugin, biggest confusion point.
3. **Standard templates**
   - “Integration problem” template (DB/permissions), “Provider costs” template (voice/LLM), “Security incident” template.

### Underrepresented segments (missing feedback)
- **Enterprise/B2B implementers** (Jaime’s use case is a signal, but likely more are lurking): need deployment guides, compliance/security posture, SLAs (even if community-based).
- **Non-crypto builders**: may be put off by token-dominant discussion; need a “framework-first” path.
- **Non-English users**: Babylon’s broader rollout implies global users; localized onboarding may be needed.

---

## Prioritized High-Impact Actions (Next 2–4 weeks)

1. **Ship a single source-of-truth “Start Here” + Roadmap (“Now/Next/Later”) page** (reduces FUD, repeated questions, onboarding friction).
2. **Implement pinned security messaging + official links + scam playbook in Discord** (immediate risk reduction; low effort).
3. **Stabilize developer experience: publish “known good” builds + add CI smoke tests + config validator** (directly addresses broken develop/config confusion).
4. **Document and standardize wallet isolation architecture (Spartan pattern) + threat model checklist** (enables safer wallet-enabled agents; reduces fear).
5. **Create structured intake: Discord `/report-bug` to GitHub + integration troubleshooting templates** (turns recurring chatter into actionable engineering work).