Law-first governance kit for AI coding agents: installable scaffold + memory MCP server that lets agents read project rules before they write code.
Project description
agentlaw
A law-first governance kit for AI coding agents — install governance structure before writing code.
agentlaw gives any repository a governed starting structure that AI coding agents can read, follow, and maintain. It works for brand-new repositories and already-existing codebases alike. Drop it in, run the bootstrap, and the agent knows what the rules are before it writes a single line.
This repository is the authoring workspace for agentlaw. The public distribution lives at
paranmir/agentlaw, and the installable Python package is published to PyPI asagentlaw. Most users want the public repo or the PyPI package; this workspace develops the kit using the kit (recursive improvement).
For Humans
Install
Install from PyPI:
pipx install agentlaw
The default install is lightweight and keeps the large embedding/model stack
out of the core pipx environment. If you want agentlaw init to download the
semantic embedding model, install the optional extra instead:
pipx install "agentlaw[embeddings]"
For an existing pipx install, add the optional stack with:
pipx inject agentlaw sentence-transformers huggingface_hub
For local development from this authoring source tree:
git clone https://github.com/paranmir/agentlaw-workspace
cd agentlaw-workspace
pip install -e .
# Or, with semantic embedding support:
pip install -e ".[embeddings]"
Quick Start
# 1. Place agentlaw governance into your project
agentlaw init <your-project-dir> --skip-model
# 2. Register the agentlaw-memory MCP server with your AI agent host.
# The default `--setup-agents prompt` mode emits LLM-actionable
# instructions — copy them into your agent and let it edit its host
# config. Restart the host after the edit lands.
# 3. Open a fresh chat with your AI agent on the project and say:
# Restore the session
# The agent loads the harness context and you can start work.
Using agentlaw in Your AI Coding Session
Once agentlaw is initialized in a project and the agentlaw-memory MCP server is registered with your AI agent host, you drive the harness through natural-language triggers in your conversation. The agent maps each trigger to one of the harness's MCP tools and follows the procedure that the kit ships.
Triggering session restore — at the start of any new conversation on the project, say one of:
- "Restore the session" / "세션 복원해봐"
- "Pick up where we left off"
- "지금 어디까지 했어?"
The agent calls agentlaw_session_restore, the response packet carries the project's working set, every active plan body, the most recent session_save log entry, framework reminders (memory intent rule, write discipline, consult-before-answer rule), and a step-by-step reminder of the §Canonical Restore Route Mandatory Tier the agent must follow before answering. The first turn of every session is a context-loading turn; substantive work starts on turn two.
Triggering session save — when ending a session, before context compaction, or at any milestone, say one of:
- "Save the session" / "세션 저장해줘"
- "Wrap up and save state"
- "Snapshot what we did"
The agent calls agentlaw_session_save with the working frame, and the save tool surfaces a post-save verification obligation that you run after.
When something feels off — if the agent appears to be answering with stale context or missing rules, ask it to call agentlaw_session_restore again, or run agentlaw mcp-recover --target . --client auto --json to diagnose MCP connectivity from the shell side.
Multi-project usage
Install agentlaw once with pipx install agentlaw, then bootstrap each project independently with agentlaw init <dir> --skip-model --setup-agents prompt for the lightweight FTS-only path. Use pipx install "agentlaw[embeddings]" or inject the embedding dependencies first if you want agentlaw init to download the semantic model. Each initialized project gets its own <dir>/.harness/index/meta.db; the memory index is not shared across projects.
Host registration scope differs by agent host:
| Host | Registration scope | Multi-project behavior |
|---|---|---|
| Claude Code | local, per-project and keyed by project path | each project sees only its own .harness/index/meta.db |
| Gemini CLI | project-local .gemini/settings.json |
each project sees only its own .harness/index/meta.db |
| Codex | user-level, one global entry | the registration omits --target; agentlaw run-mcp resolves the target from the cwd where Codex is opened |
agentlaw verify checks target scaffold integrity; it does not enforce host MCP scope. Use agentlaw agent-setup --verify to check the host registration contract.
What This Project Is
The problem. AI coding agents arrive at a repository without governance. They make plausible-looking changes that violate invariants the team has not written down. The team adds a CLAUDE.md or AGENTS.md to capture rules; the file grows; the agent reads less of it; the rules silently stop applying. The agent and the team need shared structure they can both rely on.
The kit. agentlaw installs that structure as governance scaffolding: a constitution, a law layer (memory, artifact, oracle, failure rules), root control tools (init / update / fix), contract documents, a memory subsystem (working set, logs, rules, preferences), and a runtime MCP server that surfaces the rules every session. The agent reads the law before it writes; the kit's verifier mechanically catches drift between the rules and the code.
Recursive improvement. This authoring workspace develops agentlaw by using agentlaw on itself. Every plan that lands here goes through AGENTLAW_INIT_TOOL.md / AGENTLAW_UPDATE_TOOL.md / AGENTLAW_FIX_TOOL.md rules; shared law changes are reflected in the bundled package scaffold under src/agentlaw/scaffold/; the same agentlaw verify that ships to target projects also runs against this repo. The kit's failures and improvements both surface here first.
Requirements
- Python 3.11 or newer (the kit uses
typing.Literalunpacking and other 3.11-era stdlib features). - Operating systems: developed on Windows; Ubuntu and macOS are exercised through the publish-readiness CI matrix.
- Disk: the optional embedding model occupies roughly 500 MB once downloaded (cached under
<your-project>/.harness/models/). - Runtime dependencies are declared in
pyproject.tomlunder[project] dependencies(currentlytyper,mcp,sqlite-vec,PyYAML). Optional semantic embedding dependencies live under theembeddingsextra (sentence-transformers,huggingface_hub). - Dev dependencies (
pip install -e ".[dev,test]"):build,pytest,mutmut, andhypothesis.
Authoring Verification
For this authoring workspace, install development dependencies into the Python environment you intend to use, then run:
python -m pip install -e ".[dev,test]"
python -m pytest
python verify_agentlaw.py
For a project initialized by agentlaw, use the target verifier instead:
agentlaw verify <target-project>
python -m agentlaw verify <target-project>
Ubuntu and macOS do not need to be available locally. The repository's
Compatibility checks GitHub Actions workflow uses GitHub-hosted Windows,
Ubuntu, and macOS runners for the cross-platform baseline. The macOS job
intentionally creates a venv from Homebrew Python and verifies sqlite loadable
extension support before installing agentlaw, because sqlite-vec requires that
Python capability. Treat non-Windows support as CI-ready until that workflow
has actually run and passed.
Repository Layout (this authoring workspace)
agentlaw-workspace/
├── AGENTLAW_CONSTITUTION.md # highest authority
├── AGENTLAW_INIT_TOOL.md # bootstrap entry
├── AGENTLAW_UPDATE_TOOL.md # update flow
├── AGENTLAW_FIX_TOOL.md # gap-fix flow
├── AGENTS.md # routing-only entry map
├── README.md # this file
├── docs/
│ ├── harness/ # law layer
│ ├── contracts/ # contract documents shared with target projects
│ ├── references/ # local references (binaries gitignored)
│ └── plans/ # active and completed plans
├── memory/ # derived continuity (logs, rules, working-set)
├── src/agentlaw/ # Python package (CLI, MCP server, init, verify, scaffold)
├── tests/ # pytest suite
├── sync_package_data.py # shared docs → bundled scaffold sync
└── verify_agentlaw.py # workspace integrity verifier
Links
- Public seed (the kit users install): https://github.com/paranmir/agentlaw
- PyPI: https://pypi.org/project/agentlaw/
- This authoring workspace: https://github.com/paranmir/agentlaw-workspace
- Issues: https://github.com/paranmir/agentlaw/issues
For AI Agents
This section is the agent-facing reading order for first-time entry into the kit. If you are reading this README as a new session on a project that has agentlaw installed, follow the §Canonical Restore Route Mandatory Tier in docs/law/MEMORY_AND_CONTINUITY_RULES.md instead — that procedure is the binding one. This README is the on-ramp; the law file is the substance.
Agent Bootstrap (first install)
When the user asks you to set up agentlaw in a project:
- Install agentlaw from the approved source. Published path:
pipx install agentlaw. Usepipx install "agentlaw[embeddings]"only when you want local semantic embeddings. Authoring-source development path:pip install -e .orpip install -e ".[embeddings]"from this workspace. - Run
agentlaw init <target-project> --skip-model --setup-agents promptin the target for the lightweight path. Omit--skip-modelonly after installing the embedding extra. Thepromptdefault emits LLM-actionable instructions for registering theagentlaw-memoryMCP server in your host config; read those instructions and edit your host config rather than letting init auto-write to user-level config (that requires--setup-agents auto --yes). - Restart your host after the config edit so the new MCP registration is picked up.
- On the next agent session, call
agentlaw_session_restore(MCP) oragentlaw session-restore --target . --json(CLI fallback) and follow the §Canonical Restore Route Mandatory Tier in the response. - If the MCP server is not visible in a new session despite restart, run
agentlaw mcp-recover --target . --client auto --jsonto diagnose runtime + registration state.
Layer-by-layer map (what each artifact class is for)
AGENTLAW_CONSTITUTION.md— highest authority; structural invariants. Rare changes; never violate.- Root control tools (
AGENTLAW_INIT_TOOL.md,AGENTLAW_UPDATE_TOOL.md,AGENTLAW_FIX_TOOL.md) — agent-facing procedure documents. Init bootstraps a fresh project, Update incorporates kit upgrades into an existing target, Fix runs the gap-resolution protocol. docs/law/*(law layer) — rules every session reads: memory and continuity, artifact rules, oracle and judgment, code authorship and stewardship, failure taxonomy, mechanical enforcement policy, starter specialization rules, scope, input/output contract.docs/contracts/*— boundary surfaces shared with target projects (MCP tool surface, shared baseline, update workflow). Distributed through the bundled scaffold.docs/references/*— research-and-context references; not authoritative.memory/*— derived continuity (working-set, logs, rules, preferences, lookup rules). Below law in authority.docs/plans/active/*anddocs/plans/completed/*— work-in-flight and historical work. Active plans are read-on-restore.
Governing hierarchy
Authority flows top-down:
AGENTLAW_CONSTITUTION.md- Root control tools
docs/law/*(law)docs/contracts/*docs/references/*(non-authoritative)memory/*AGENTS.md(routing only — never a rule store)
When two artifacts seem to conflict, the higher one wins. Memory never overrides law; references never override contracts; AGENTS.md is the entry map, not a source of rules.
Restore procedure on every session start
§Canonical Restore Route Mandatory Tier (full body in docs/law/MEMORY_AND_CONTINUITY_RULES.md) requires 14 steps before composing a substantive response. Summary: confirm runtime integrity, read the working set, read every law file, read every active plan body, read the most recent session_save log entry, scan recent_logs titles, read every active rule's body, read memory/preferences.md, read memory/LOOKUP_RULES.md, scan the known-facts manifest, run a working-frame memory_search over current_goal + next_actions + open_questions, inspect governance drift, assemble the packet, surface gaps to the user. The runtime pre-fetches body fields into the restore packet so the substance is in your context without extra Read calls; the procedure is binding regardless.
Critical rules — quick reference
One-line restatements; the binding text lives at the anchors.
- Memory Intent Rule — when the user expresses intent to remember, persist, or carry forward, resolve to one of
memory_write/promotion_proposal/associative_marker/explicit_non_savebefore final response. Anchor:docs/law/MEMORY_AND_CONTINUITY_RULES.md§Memory Intent Rule. - Write Discipline — silence is a valid answer; a write must clear the §Log Write Criterion three-question gate (and the §Item Write Criterion applicability gate for items). Volume is not the target; selectivity is. Anchor: §Write Discipline.
- Read Routing Criterion — classify the question (prior judgment / cross-session / current source) before reaching for
memory_searchvsGrep/Read. Anchor: §Read Routing Criterion. - Consult-Before-Answer Rule — for memory-routed questions, consult memory before composing the answer, not after. Anchor: §Consult-Before-Answer Rule.
- Self-Narration Prohibition — governed artifact bodies and code comments describe current state only; revision history lives in plans, tracker entries, memory logs, and git, not in the body. Anchor:
docs/law/REPOSITORY_ARTIFACT_RULES.md§Self-Narration Prohibition (paired with §Reasoning-Critical Inline Comments inCODE_AUTHORSHIP_AND_STEWARDSHIP_RULES.md). - Promotion Proposal Protocol — runtime never selects promotion candidates; the agent judges whether durability + future operational relevance + authority gap all hold, then calls
memory_propose_promotion. Anchor: §Promotion Proposal Protocol.
License
MIT. See LICENSE.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file agentlaw-0.1.4.tar.gz.
File metadata
- Download URL: agentlaw-0.1.4.tar.gz
- Upload date:
- Size: 515.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
38e8181291daf8e2b79a2c4b0627d7df297efe73063438bfabb38a37c5c49c77
|
|
| MD5 |
3f653750c8255444c13afe7f94a38f43
|
|
| BLAKE2b-256 |
e1b07f6fc91dc82b2dc93b26d801264b8a66f1df2b507190211cb8e5ef7e09ea
|
Provenance
The following attestation bundles were made for agentlaw-0.1.4.tar.gz:
Publisher:
publish.yml on paranmir/agentlaw-workspace
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
agentlaw-0.1.4.tar.gz -
Subject digest:
38e8181291daf8e2b79a2c4b0627d7df297efe73063438bfabb38a37c5c49c77 - Sigstore transparency entry: 1581430338
- Sigstore integration time:
-
Permalink:
paranmir/agentlaw-workspace@01d874d0db6420ebb40b091aef4d6852013b3aa2 -
Branch / Tag:
refs/tags/v0.1.4 - Owner: https://github.com/paranmir
-
Access:
private
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@01d874d0db6420ebb40b091aef4d6852013b3aa2 -
Trigger Event:
push
-
Statement type:
File details
Details for the file agentlaw-0.1.4-py3-none-any.whl.
File metadata
- Download URL: agentlaw-0.1.4-py3-none-any.whl
- Upload date:
- Size: 460.8 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
d520f8c82bc1be6f5bf33b9ccfa403d41d3d6a896550d1ce5363659a95e1d26a
|
|
| MD5 |
49fc69f18ba1c8c67f7ef5ca964b59d1
|
|
| BLAKE2b-256 |
bb750c0cf621d1c9d3a8c11a47884ed5ec1fb0d2299a536355c7fbd0682cee49
|
Provenance
The following attestation bundles were made for agentlaw-0.1.4-py3-none-any.whl:
Publisher:
publish.yml on paranmir/agentlaw-workspace
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
agentlaw-0.1.4-py3-none-any.whl -
Subject digest:
d520f8c82bc1be6f5bf33b9ccfa403d41d3d6a896550d1ce5363659a95e1d26a - Sigstore transparency entry: 1581430497
- Sigstore integration time:
-
Permalink:
paranmir/agentlaw-workspace@01d874d0db6420ebb40b091aef4d6852013b3aa2 -
Branch / Tag:
refs/tags/v0.1.4 - Owner: https://github.com/paranmir
-
Access:
private
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@01d874d0db6420ebb40b091aef4d6852013b3aa2 -
Trigger Event:
push
-
Statement type: