Skip to main content

Git-native codebase evolution indexer

Project description

Evolution Engine

AI coding tools write correct code that silently breaks your architecture. Evolution Engine detects the drift, shows you the exact commit, and lets your AI fix it — with evidence.

Calibrated on 90+ open-source repos. 6.18M signals analyzed. Your code never leaves your machine.


The Problem

AI coding assistants (Cursor, Copilot, Claude Code, Codex) generate code that passes tests and looks correct in isolation. But over time, they introduce architectural drift — scattered file changes, unexpected dependency growth, broken structural patterns — that no single tool catches.

Evolution Engine is a drift detector for AI-assisted development. It learns what is structurally normal for your repository, flags when development patterns shift, identifies the exact commit where drift started, and hands evidence to your AI agent to fix it.

The Loop: Detect → Evidence → Fix → Verify

  evo analyze .          What changed? Is it unusual for THIS repo?
       |
  evo investigate .      AI identifies the root cause commit + drift pattern
       |
  evo fix .              AI proposes a fix based on evidence, not guesswork
       |
  evo verify .           Did the fix resolve the drift? Or did it make it worse?
       |
  evo accept . 1 2       Expected change? Accept it. Move on.

This is the full cycle no other tool offers: detect drift, provide evidence, let AI fix it, verify the fix worked, and let humans decide what's intentional.

How It Works (5-Phase Pipeline)

Your Repo → Phase 1 (Record events) → Phase 2 (Detect deviation from YOUR baseline)
                                            |
            Phase 5 (Advisory) ← Phase 4 (Match known patterns) ← Phase 3 (Explain)
                    |
               HTML Report + PR/MR Comments
                    |
              HUMAN decides: investigate / fix / accept
Phase What It Does
Phase 1 Records immutable events — commits, builds, deps, releases
Phase 2 Computes per-repo baselines, flags statistical deviation (MAD/IQR)
Phase 3 Explains signals in human language — PM-friendly, evidence-backed
Phase 4 Matches against 44 validated patterns from 90+ repos
Phase 5 Prioritized advisory with severity, evidence, and action items

Quick Start

pip install evolution-engine
evo analyze .

Three Integration Paths

Path Command When to use
CLI Explorer evo analyze . Start here -- manual analysis, reports, investigation
Git Hooks evo init . --path hooks Automate locally -- analyze on every commit or push
GitHub Action evo init . --path action Automate in CI -- PR comments with risk badges

Start with the CLI. Graduate to hooks when you trust the output. Add the GitHub Action for team-wide coverage. See QUICKSTART.md for the full walkthrough.

# Path 1: CLI Explorer (start here)
evo analyze .                    # Run the full pipeline
evo report . --open              # Visual HTML report
evo status                       # Detected adapters and run info

# Path 2: Git Hooks (automate locally)
evo init . --path hooks          # Install post-commit hook
evo watch .                      # Or poll for commits continuously

# Path 3: GitHub Action (CI)
evo init . --path action         # Generate workflow file, then push

# All paths at once
evo init . --path all

Free tier covers Path 1 (CLI). Pro unlocks Path 2 (hooks) and Path 3 (CI integration), plus AI investigation, AI fix loop, and inline PR review comments.

Founding Member Program

We're looking for 50 developers who use AI coding tools daily. In exchange for monthly feedback, you get founding member pricing: $9.50/month for 3 months (regular: $19/month). Use code FOUNDING50 at checkout.

Environment Variables

# .env file (all optional)
GITHUB_TOKEN=ghp_xxx            # Unlocks CI, deployment, security adapters
GITLAB_TOKEN=glpat-xxx          # Unlocks GitLab CI, releases adapters
EVO_LICENSE_KEY=xxx              # Pro features (free tier works without)
ANTHROPIC_API_KEY=sk-ant-xxx    # For evo investigate / evo fix (Pro)

Source Families & Auto-Detection

The adapter registry automatically detects available data sources in three tiers:

Tier 1 — File-Based (zero config, always works offline)

Family Detected By What It Observes
Version Control .git/ Commits, file changes, structural coupling, co-change novelty
Dependency Graph requirements.txt, package-lock.json, go.mod, Cargo.lock, Gemfile.lock Dependency count, churn, transitive depth
Configuration *.tf, docker-compose.yml Resource count, config churn
Schema / API openapi.yaml, *.graphql Endpoint growth, field changes

Tier 2 — API-Enriched (optional token unlocks more)

Family Token What It Observes
CI / Build Pipeline GITHUB_TOKEN Build durations, failure rates
Deployment GITHUB_TOKEN Release cadence, pre-releases, asset count
Security Scanning GITHUB_TOKEN Vulnerability count, severity, Dependabot alerts

Tier 3 — Community Plugins (pip-installable)

Already using tools like Snyk, SonarQube, Jenkins, ArgoCD, GitLab CI, Datadog, or PagerDuty? Evo doesn't replace them — it learns from them. Install or build an adapter to feed their data into the pipeline, and Evo will correlate it with your git history, dependencies, and other sources to discover cross-tool patterns.

pip install evo-adapter-jenkins    # Jenkins CI adapter
pip install evo-adapter-snyk       # Snyk security adapter
pip install evo-adapter-argocd     # ArgoCD deployment adapter
evo analyze .                      # Auto-detected!

Plugins are auto-discovered via Python entry_points. If an adapter for your tool doesn't exist yet, you can build one or request one (evo adapter request).

Historical Replay

The Git History Walker extracts dependency, schema, and config files from git history, creating temporal evolution timelines (not just current-state snapshots). This enables Phase 4 to correlate dependency changes with CI failures, deployments, and other events over time.


CLI Commands

# Core Analysis
evo analyze [path]               # Detect adapters, run full pipeline
evo analyze . --families git,ci  # Override auto-detection
evo report [path]                # Generate HTML report from last run
evo status                       # Show detected adapters and event counts
evo investigate [path]           # AI root cause analysis (Pro)
evo fix [path]                   # AI fix-verify loop (Pro)
evo fix [path] --residual        # Iteration-aware prompt (current vs previous)
evo verify <advisory>            # Compare current state to a previous advisory

# Setup & Integration
evo init [path]                  # Detect environment and suggest integration path
evo init . --path hooks          # Install git hooks for auto-analysis
evo init . --path action         # Generate GitHub Action workflow
evo init . --path all            # Set up all integration paths
evo setup [path]                 # Interactive configuration wizard
evo setup --ui                   # Browser-based settings page
evo watch [path]                 # Watch for commits and auto-analyze
evo watch . --daemon             # Run watcher in background
evo hooks install [path]         # Install git hooks
evo hooks uninstall [path]       # Remove git hooks
evo hooks status [path]          # Show hook status

# Patterns & Knowledge Base
evo patterns list                # Show discovered patterns
evo patterns pull [path]         # Fetch community patterns from registry
evo patterns push [path]         # Share anonymized patterns (requires privacy_level >= 1)
evo patterns export              # Export anonymized pattern digests
evo patterns import <file>       # Import community patterns
evo patterns packages            # List pattern packages + cache status
evo patterns new <name>          # Scaffold a pattern package
evo patterns validate <path>     # Validate a pattern package
evo patterns publish <path>      # Publish pattern package to PyPI
evo patterns add <package>       # Subscribe to a pattern package
evo patterns remove <package>    # Unsubscribe from a pattern package
evo patterns block <name>        # Block a pattern package
evo patterns unblock <name>      # Unblock a pattern package

# Adapter Ecosystem
evo adapter list                 # Show detected adapters with trust badges
evo adapter discover [path]      # Find available adapters for your tools
evo adapter validate <class>     # Run 13-check certification
evo adapter validate <class> --security  # + security scan
evo adapter security-check <mod> # Standalone security scan
evo adapter guide                # How to build an adapter
evo adapter new <name> --family ci   # Scaffold a pip-installable package
evo adapter prompt <name> --family ci  # Generate AI prompt for building
evo adapter request <description>     # Request an adapter from the community
evo adapter block <name> -r "reason"  # Block an adapter locally
evo adapter unblock <name>       # Unblock a blocked adapter
evo adapter check-updates        # Check PyPI for plugin updates
evo adapter report <name>        # Report a broken/malicious adapter

# Configuration & History
evo config list                  # Show all settings
evo config set <key> <val>       # Update a setting
evo license status               # Check license tier
evo history list [path]          # Show run history
evo history diff [r1 r2]         # Compare two runs

Building Adapters

The Evolution Engine supports a plugin ecosystem. Third-party adapters are pip-installable packages that auto-register via Python entry_points.

Quick Path

# Scaffold a complete pip package
evo adapter new jenkins --family ci

# Or generate an AI prompt and paste it into your coding assistant
evo adapter prompt jenkins --family ci --copy

Certification

Before publishing, validate your adapter passes all 13 contract checks:

cd evo-adapter-jenkins
pip install -e .
evo adapter validate evo_jenkins.JenkinsAdapter

Adapters pass 13 structural checks + security scanning before certification.

Learn More

evo adapter guide    # Full tutorial with contract details

Pattern Knowledge Base

The Evolution Engine discovers cross-family patterns automatically:

  • Pearson correlation: deviation magnitudes track together (|r| >= 0.3)
  • Lift-based co-occurrence: deviations co-occur more than chance (lift >= 1.5)
  • Presence-based: metric distributions differ when events co-occur (Cohen's d >= 0.2)

Patterns progress through scopes: local (this repo) -> community (shared anonymously) -> confirmed (local + community match).

Community patterns are distributed through two redundant channels:

  • Registry (real-time) — patterns pushed by users are immediately available via codequal.dev/api
  • PyPI packages (durable) — periodic snapshots published as evo-patterns-community, auto-fetched without pip install

If the registry is unavailable, PyPI packages still work. Both are checked automatically on evo analyze.

Pattern Distribution

# Auto-fetch happens on every `evo analyze` — no manual install needed
evo analyze .
#   Imported 25 pattern(s) from community registry
#   Imported 25 pattern(s) from community packages

# Pull/push patterns from the community registry
evo patterns pull .
evo patterns push .   # requires: evo config set sync.privacy_level 2

# Add a third-party pattern package to your sources
evo patterns add evo-patterns-web-security

# Block an unwanted package
evo patterns block evo-patterns-untrusted

# Build and publish your own pattern package
evo patterns new my-patterns
# ... edit patterns.json ...
evo patterns validate evo-patterns-my-patterns
evo patterns publish evo-patterns-my-patterns

Project Structure

evolution-engine/
├── evolution/
│   ├── cli.py                     # Click-based CLI (evo command)
│   ├── orchestrator.py            # Pipeline orchestration (detect → P1-P5)
│   ├── registry.py                # 3-tier adapter auto-detection
│   ├── phase1_engine.py           # Phase 1: Observation
│   ├── phase2_engine.py           # Phase 2: Baselines (MAD/IQR)
│   ├── phase3_engine.py           # Phase 3: Explanations (template-based)
│   ├── phase4_engine.py           # Phase 4: Pattern discovery
│   ├── phase5_engine.py           # Phase 5: Advisory
│   ├── knowledge_store.py         # SQLite knowledge base
│   ├── kb_export.py               # Anonymized pattern export/import
│   ├── kb_security.py             # Import validation (XSS, injection, traversal)
│   ├── pattern_registry.py        # Auto-fetch pattern packages from PyPI
│   ├── pattern_validator.py       # Pattern package validation
│   ├── pattern_scaffold.py        # Pattern package scaffolding
│   ├── report_generator.py        # Standalone HTML report generator
│   ├── investigator.py            # AI investigation (evo investigate, Pro)
│   ├── fixer.py                   # AI fix-verify loop (evo fix, Pro)
│   ├── adapter_validator.py       # 13-check adapter certification
│   ├── adapter_scaffold.py        # Package scaffolding + AI prompt gen
│   ├── license.py                 # License tier gating
│   ├── data/
│   │   ├── universal_patterns.json  # Bundled universal patterns
│   │   ├── pattern_index.json       # Known pattern packages
│   │   └── pattern_blocklist.json   # Blocked pattern packages
│   └── adapters/
│       ├── git/                   # Version Control (+ Git History Walker)
│       ├── ci/                    # CI / Build Pipeline (GitHub Actions)
│       ├── testing/               # Test Execution (JUnit XML)
│       ├── dependency/            # Dependency Graph (pip, npm, go, cargo, bundler)
│       ├── schema/                # Schema / API (OpenAPI)
│       ├── deployment/            # Deployment (GitHub Releases)
│       ├── config/                # Configuration (Terraform)
│       └── security/              # Security Scanning (Trivy, Dependabot)
├── tests/
│   ├── conftest.py                # Shared fixtures
│   ├── unit/                      # 1500+ unit tests
│   │   ├── test_phase2_deviation.py
│   │   ├── test_phase4_cooccurrence.py
│   │   ├── test_phase5_advisory.py
│   │   ├── test_knowledge_store.py
│   │   ├── test_registry.py
│   │   ├── test_adapter_validator.py
│   │   ├── test_adapter_scaffold.py
│   │   ├── test_kb_export.py
│   │   ├── test_kb_security.py
│   │   ├── test_license.py
│   │   ├── test_report_generator.py
│   │   └── adapters/              # Lockfile parser tests
│   └── integration/
│       └── test_pipeline_e2e.py   # Full pipeline integration test
├── scripts/
│   └── aggregate_calibration.py   # Cross-repo pattern aggregation
├── docs/
│   ├── ARCHITECTURE_VISION.md     # Constitution
│   ├── IMPLEMENTATION_PLAN.md     # Roadmap
│   ├── PHASE_*_CONTRACT.md        # Phase contracts (2, 3, 4, 5)
│   ├── PHASE_*_DESIGN.md          # Phase designs (2, 3, 4, 5)
│   ├── ADAPTER_CONTRACT.md        # Universal adapter contract
│   └── adapters/                  # 8 family contracts
├── pyproject.toml                 # Package config (entry point: evo)
└── .env                           # Environment config (optional)

Why Now

AI coding tools are generating more code than ever. Teams ship faster — but structural quality is invisible until something breaks. EE provides the missing feedback loop: a guardrail that tells you (and your AI) when development patterns drift from what's normal for your project.

Calibrated on 90+ open-source repos, 6.18 million SDLC signals, and 2.1 million commits. 44 validated cross-signal patterns. 1.6% false positive rate.

Open-Core Model

Open Source (MIT) Proprietary (BSL 1.1)
All adapters Phase 2-5 engines
CLI, registry, orchestrator Knowledge store
Phase 1 engine
KB export/import/security
Report generator
Adapter scaffold & validator

The open adapter ecosystem ensures anyone can connect new data sources. The analysis engines are the proprietary core.


Documentation

See docs/README.md for the full documentation structure and authority hierarchy.

Key documents:


Principles

  1. Observation precedes interpretation
  2. History is immutable; interpretation is disposable
  3. Determinism beats intelligence
  4. Local baselines over global heuristics
  5. Multiple weak signals beat one strong opinion
  6. Absence of signal is not evidence of safety
  7. Humans are escalated to, not replaced
  8. Evidence enables action

License

Evolution Engine uses a dual-license model:

Component License File
CLI, adapters, plugins, GitHub Action MIT LICENSE-MIT
Core analysis engine (Phases 2-5) BSL 1.1 LICENSE
Community patterns CC0-1.0

The BSL 1.1 license permits non-production use without a commercial license. Production use requires a Pro subscription. On 2029-02-20 the core engine automatically converts to MIT.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

evolution_engine-0.2.1.tar.gz (253.3 kB view details)

Uploaded Source

Built Distributions

If you're not sure about the file name format, learn more about wheel file names.

evolution_engine-0.2.1-py3-none-any.whl (283.4 kB view details)

Uploaded Python 3

evolution_engine-0.2.1-cp311-cp311-win_amd64.whl (1.8 MB view details)

Uploaded CPython 3.11Windows x86-64

evolution_engine-0.2.1-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (5.3 MB view details)

Uploaded CPython 3.11manylinux: glibc 2.17+ x86-64

evolution_engine-0.2.1-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl (5.3 MB view details)

Uploaded CPython 3.11manylinux: glibc 2.17+ ARM64

evolution_engine-0.2.1-cp311-cp311-macosx_11_0_arm64.whl (1.8 MB view details)

Uploaded CPython 3.11macOS 11.0+ ARM64

File details

Details for the file evolution_engine-0.2.1.tar.gz.

File metadata

  • Download URL: evolution_engine-0.2.1.tar.gz
  • Upload date:
  • Size: 253.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for evolution_engine-0.2.1.tar.gz
Algorithm Hash digest
SHA256 ea5e2f0f3e4c9d48491ea9019e19be7660bb083718df8b52996b05bb77afe545
MD5 621b739756b7c3bda0eb30c82458ea4d
BLAKE2b-256 7193a34ea1fdf0c1c16341e7d0d7021fd245bfa70090fac1abd0337f846e7054

See more details on using hashes here.

Provenance

The following attestation bundles were made for evolution_engine-0.2.1.tar.gz:

Publisher: build-wheels.yml on alpsla/evolution_monitor

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file evolution_engine-0.2.1-py3-none-any.whl.

File metadata

File hashes

Hashes for evolution_engine-0.2.1-py3-none-any.whl
Algorithm Hash digest
SHA256 b3d9d6bbee145f5e55d37a193a8b25f0d2e66302e32b48bd0e56d1387bf008f5
MD5 4bb840d1f897439b65ed9a00bf3abde4
BLAKE2b-256 cfa870190f66a5c979a56435120b4550361106ea59eadfb46a278691fd736585

See more details on using hashes here.

Provenance

The following attestation bundles were made for evolution_engine-0.2.1-py3-none-any.whl:

Publisher: build-wheels.yml on alpsla/evolution_monitor

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file evolution_engine-0.2.1-cp311-cp311-win_amd64.whl.

File metadata

File hashes

Hashes for evolution_engine-0.2.1-cp311-cp311-win_amd64.whl
Algorithm Hash digest
SHA256 e80bf622042f5496a96d83bc708a1ee44e8e45fb7de32810901d893c4f463fec
MD5 cbf28ca04d72a57c2e775f4cca3ab0b8
BLAKE2b-256 459123398bd310b3922dd602da0515b5135aea523d67fb99ecf4c2259daeffe8

See more details on using hashes here.

Provenance

The following attestation bundles were made for evolution_engine-0.2.1-cp311-cp311-win_amd64.whl:

Publisher: build-wheels.yml on alpsla/evolution_monitor

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file evolution_engine-0.2.1-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for evolution_engine-0.2.1-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 a4a22a353c2fb860e936ecb5dc23c3e09ec310cd5dfe41cb8ad41430877dcea2
MD5 0cd8eb0804dd2b83847306f1c18a01ff
BLAKE2b-256 509b0a9d710c1d425195e973013952deb2ba9d4232a7e12aacead871981727d2

See more details on using hashes here.

Provenance

The following attestation bundles were made for evolution_engine-0.2.1-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl:

Publisher: build-wheels.yml on alpsla/evolution_monitor

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file evolution_engine-0.2.1-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl.

File metadata

File hashes

Hashes for evolution_engine-0.2.1-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl
Algorithm Hash digest
SHA256 5ad27274347ffb38d1af2c973ead4f898041da5f8cb5f80d8f5f609cddcbfdda
MD5 90d8ae3b251b161e87ca6cd0c0165f7f
BLAKE2b-256 3afcafc30134e36a7cc67d4655a07dc674df1859bcb19a2ae25d0889dc20de3e

See more details on using hashes here.

Provenance

The following attestation bundles were made for evolution_engine-0.2.1-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl:

Publisher: build-wheels.yml on alpsla/evolution_monitor

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file evolution_engine-0.2.1-cp311-cp311-macosx_11_0_arm64.whl.

File metadata

File hashes

Hashes for evolution_engine-0.2.1-cp311-cp311-macosx_11_0_arm64.whl
Algorithm Hash digest
SHA256 1951a423d391683c69427cd64687df08dc88ccfe2e6a5ae93e4bcfc4e860a93a
MD5 0ecc17161d51b97fab84b37700476af7
BLAKE2b-256 054dcc9e0a2ba1cd721993f9daeeacea3ad6bc1c4089a21d160c7df4259b1c81

See more details on using hashes here.

Provenance

The following attestation bundles were made for evolution_engine-0.2.1-cp311-cp311-macosx_11_0_arm64.whl:

Publisher: build-wheels.yml on alpsla/evolution_monitor

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page