Skip to main content

Git-native codebase evolution indexer

Project description

Evolution Engine

AI coding tools write correct code that silently breaks your architecture. Evolution Engine detects the drift, shows you the exact commit, and lets your AI fix it — with evidence.

Calibrated on 90+ open-source repos. 6.18M signals analyzed. Your code never leaves your machine.


The Problem

AI coding assistants (Cursor, Copilot, Claude Code, Codex) generate code that passes tests and looks correct in isolation. But over time, they introduce architectural drift — scattered file changes, unexpected dependency growth, broken structural patterns — that no single tool catches.

Evolution Engine is a drift detector for AI-assisted development. It learns what is structurally normal for your repository, flags when development patterns shift, identifies the exact commit where drift started, and hands evidence to your AI agent to fix it.

The Loop: Detect → Evidence → Fix → Verify

  evo analyze .          What changed? Is it unusual for THIS repo?
       |
  evo investigate .      AI identifies the root cause commit + drift pattern
       |
  evo fix .              AI proposes a fix based on evidence, not guesswork
       |
  evo verify .           Did the fix resolve the drift? Or did it make it worse?
       |
  evo accept . 1 2       Expected change? Accept it. Move on.

This is the full cycle no other tool offers: detect drift, provide evidence, let AI fix it, verify the fix worked, and let humans decide what's intentional.

How It Works (5-Phase Pipeline)

Your Repo → Phase 1 (Record events) → Phase 2 (Detect deviation from YOUR baseline)
                                            |
            Phase 5 (Advisory) ← Phase 4 (Match known patterns) ← Phase 3 (Explain)
                    |
               HTML Report + PR/MR Comments
                    |
              HUMAN decides: investigate / fix / accept
Phase What It Does
Phase 1 Records immutable events — commits, builds, deps, releases
Phase 2 Computes per-repo baselines, flags statistical deviation (MAD/IQR)
Phase 3 Explains signals in human language — PM-friendly, evidence-backed
Phase 4 Matches against 44 validated patterns from 90+ repos
Phase 5 Prioritized advisory with severity, evidence, and action items

Quick Start

pip install evolution-engine
evo analyze .

Three Integration Paths

Path Command When to use
CLI Explorer evo analyze . Start here -- manual analysis, reports, investigation
Git Hooks evo init . --path hooks Automate locally -- analyze on every commit or push
GitHub Action evo init . --path action Automate in CI -- PR comments with risk badges

Start with the CLI. Graduate to hooks when you trust the output. Add the GitHub Action for team-wide coverage. See QUICKSTART.md for the full walkthrough.

# Path 1: CLI Explorer (start here)
evo analyze .                    # Run the full pipeline
evo report . --open              # Visual HTML report
evo status                       # Detected adapters and run info

# Path 2: Git Hooks (automate locally)
evo init . --path hooks          # Install post-commit hook
evo watch .                      # Or poll for commits continuously

# Path 3: GitHub Action (CI)
evo init . --path action         # Generate workflow file, then push

# All paths at once
evo init . --path all

Free tier covers Path 1 (CLI). Pro unlocks Path 2 (hooks) and Path 3 (CI integration), plus AI investigation, AI fix loop, and inline PR review comments.

Founding Member Program

We're looking for 50 developers who use AI coding tools daily. In exchange for monthly feedback, you get founding member pricing: $9.50/month for 3 months (regular: $19/month). Use code FOUNDING50 at checkout.

Environment Variables

# .env file (all optional)
GITHUB_TOKEN=ghp_xxx            # Unlocks CI, deployment, security adapters
GITLAB_TOKEN=glpat-xxx          # Unlocks GitLab CI, releases adapters
EVO_LICENSE_KEY=xxx              # Pro features (free tier works without)
ANTHROPIC_API_KEY=sk-ant-xxx    # For evo investigate / evo fix (Pro)

Source Families & Auto-Detection

The adapter registry automatically detects available data sources in three tiers:

Tier 1 — File-Based (zero config, always works offline)

Family Detected By What It Observes
Version Control .git/ Commits, file changes, structural coupling, co-change novelty
Dependency Graph requirements.txt, package-lock.json, go.mod, Cargo.lock, Gemfile.lock Dependency count, churn, transitive depth
Configuration *.tf, docker-compose.yml Resource count, config churn
Schema / API openapi.yaml, *.graphql Endpoint growth, field changes

Tier 2 — API-Enriched (optional token unlocks more)

Family Token What It Observes
CI / Build Pipeline GITHUB_TOKEN Build durations, failure rates
Deployment GITHUB_TOKEN Release cadence, pre-releases, asset count
Security Scanning GITHUB_TOKEN Vulnerability count, severity, Dependabot alerts

Tier 3 — Community Plugins (pip-installable)

Already using tools like Snyk, SonarQube, Jenkins, ArgoCD, GitLab CI, Datadog, or PagerDuty? Evo doesn't replace them — it learns from them. Install or build an adapter to feed their data into the pipeline, and Evo will correlate it with your git history, dependencies, and other sources to discover cross-tool patterns.

pip install evo-adapter-jenkins    # Jenkins CI adapter
pip install evo-adapter-snyk       # Snyk security adapter
pip install evo-adapter-argocd     # ArgoCD deployment adapter
evo analyze .                      # Auto-detected!

Plugins are auto-discovered via Python entry_points. If an adapter for your tool doesn't exist yet, you can build one or request one (evo adapter request).

Historical Replay

The Git History Walker extracts dependency, schema, and config files from git history, creating temporal evolution timelines (not just current-state snapshots). This enables Phase 4 to correlate dependency changes with CI failures, deployments, and other events over time.


CLI Commands

# Core Analysis
evo analyze [path]               # Detect adapters, run full pipeline
evo analyze . --families git,ci  # Override auto-detection
evo report [path]                # Generate HTML report from last run
evo status                       # Show detected adapters and event counts
evo investigate [path]           # AI root cause analysis (Pro)
evo fix [path]                   # AI fix-verify loop (Pro)
evo fix [path] --residual        # Iteration-aware prompt (current vs previous)
evo verify <advisory>            # Compare current state to a previous advisory

# Setup & Integration
evo init [path]                  # Detect environment and suggest integration path
evo init . --path hooks          # Install git hooks for auto-analysis
evo init . --path action         # Generate GitHub Action workflow
evo init . --path all            # Set up all integration paths
evo setup [path]                 # Interactive configuration wizard
evo setup --ui                   # Browser-based settings page
evo watch [path]                 # Watch for commits and auto-analyze
evo watch . --daemon             # Run watcher in background
evo hooks install [path]         # Install git hooks
evo hooks uninstall [path]       # Remove git hooks
evo hooks status [path]          # Show hook status

# Patterns & Knowledge Base
evo patterns list                # Show discovered patterns
evo patterns pull [path]         # Fetch community patterns from registry
evo patterns push [path]         # Share anonymized patterns (requires privacy_level >= 1)
evo patterns export              # Export anonymized pattern digests
evo patterns import <file>       # Import community patterns
evo patterns packages            # List pattern packages + cache status
evo patterns new <name>          # Scaffold a pattern package
evo patterns validate <path>     # Validate a pattern package
evo patterns publish <path>      # Publish pattern package to PyPI
evo patterns add <package>       # Subscribe to a pattern package
evo patterns remove <package>    # Unsubscribe from a pattern package
evo patterns block <name>        # Block a pattern package
evo patterns unblock <name>      # Unblock a pattern package

# Adapter Ecosystem
evo adapter list                 # Show detected adapters with trust badges
evo adapter discover [path]      # Find available adapters for your tools
evo adapter validate <class>     # Run 13-check certification
evo adapter validate <class> --security  # + security scan
evo adapter security-check <mod> # Standalone security scan
evo adapter guide                # How to build an adapter
evo adapter new <name> --family ci   # Scaffold a pip-installable package
evo adapter prompt <name> --family ci  # Generate AI prompt for building
evo adapter request <description>     # Request an adapter from the community
evo adapter block <name> -r "reason"  # Block an adapter locally
evo adapter unblock <name>       # Unblock a blocked adapter
evo adapter check-updates        # Check PyPI for plugin updates
evo adapter report <name>        # Report a broken/malicious adapter

# Configuration & History
evo config list                  # Show all settings
evo config set <key> <val>       # Update a setting
evo license status               # Check license tier
evo history list [path]          # Show run history
evo history diff [r1 r2]         # Compare two runs

Building Adapters

The Evolution Engine supports a plugin ecosystem. Third-party adapters are pip-installable packages that auto-register via Python entry_points.

Quick Path

# Scaffold a complete pip package
evo adapter new jenkins --family ci

# Or generate an AI prompt and paste it into your coding assistant
evo adapter prompt jenkins --family ci --copy

Certification

Before publishing, validate your adapter passes all 13 contract checks:

cd evo-adapter-jenkins
pip install -e .
evo adapter validate evo_jenkins.JenkinsAdapter

Adapters pass 13 structural checks + security scanning before certification.

Learn More

evo adapter guide    # Full tutorial with contract details

Pattern Knowledge Base

The Evolution Engine discovers cross-family patterns automatically:

  • Pearson correlation: deviation magnitudes track together (|r| >= 0.3)
  • Lift-based co-occurrence: deviations co-occur more than chance (lift >= 1.5)
  • Presence-based: metric distributions differ when events co-occur (Cohen's d >= 0.2)

Patterns progress through scopes: local (this repo) -> community (shared anonymously) -> confirmed (local + community match).

Community patterns are distributed through two redundant channels:

  • Registry (real-time) — patterns pushed by users are immediately available via codequal.dev/api
  • PyPI packages (durable) — periodic snapshots published as evo-patterns-community, auto-fetched without pip install

If the registry is unavailable, PyPI packages still work. Both are checked automatically on evo analyze.

Pattern Distribution

# Auto-fetch happens on every `evo analyze` — no manual install needed
evo analyze .
#   Imported 25 pattern(s) from community registry
#   Imported 25 pattern(s) from community packages

# Pull/push patterns from the community registry
evo patterns pull .
evo patterns push .   # requires: evo config set sync.privacy_level 2

# Add a third-party pattern package to your sources
evo patterns add evo-patterns-web-security

# Block an unwanted package
evo patterns block evo-patterns-untrusted

# Build and publish your own pattern package
evo patterns new my-patterns
# ... edit patterns.json ...
evo patterns validate evo-patterns-my-patterns
evo patterns publish evo-patterns-my-patterns

Project Structure

evolution-engine/
├── evolution/
│   ├── cli.py                     # Click-based CLI (evo command)
│   ├── orchestrator.py            # Pipeline orchestration (detect → P1-P5)
│   ├── registry.py                # 3-tier adapter auto-detection
│   ├── phase1_engine.py           # Phase 1: Observation
│   ├── phase2_engine.py           # Phase 2: Baselines (MAD/IQR)
│   ├── phase3_engine.py           # Phase 3: Explanations (template-based)
│   ├── phase4_engine.py           # Phase 4: Pattern discovery
│   ├── phase5_engine.py           # Phase 5: Advisory
│   ├── knowledge_store.py         # SQLite knowledge base
│   ├── kb_export.py               # Anonymized pattern export/import
│   ├── kb_security.py             # Import validation (XSS, injection, traversal)
│   ├── pattern_registry.py        # Auto-fetch pattern packages from PyPI
│   ├── pattern_validator.py       # Pattern package validation
│   ├── pattern_scaffold.py        # Pattern package scaffolding
│   ├── report_generator.py        # Standalone HTML report generator
│   ├── investigator.py            # AI investigation (evo investigate, Pro)
│   ├── fixer.py                   # AI fix-verify loop (evo fix, Pro)
│   ├── adapter_validator.py       # 13-check adapter certification
│   ├── adapter_scaffold.py        # Package scaffolding + AI prompt gen
│   ├── license.py                 # License tier gating
│   ├── data/
│   │   ├── universal_patterns.json  # Bundled universal patterns
│   │   ├── pattern_index.json       # Known pattern packages
│   │   └── pattern_blocklist.json   # Blocked pattern packages
│   └── adapters/
│       ├── git/                   # Version Control (+ Git History Walker)
│       ├── ci/                    # CI / Build Pipeline (GitHub Actions)
│       ├── testing/               # Test Execution (JUnit XML)
│       ├── dependency/            # Dependency Graph (pip, npm, go, cargo, bundler)
│       ├── schema/                # Schema / API (OpenAPI)
│       ├── deployment/            # Deployment (GitHub Releases)
│       ├── config/                # Configuration (Terraform)
│       └── security/              # Security Scanning (Trivy, Dependabot)
├── tests/
│   ├── conftest.py                # Shared fixtures
│   ├── unit/                      # 1500+ unit tests
│   │   ├── test_phase2_deviation.py
│   │   ├── test_phase4_cooccurrence.py
│   │   ├── test_phase5_advisory.py
│   │   ├── test_knowledge_store.py
│   │   ├── test_registry.py
│   │   ├── test_adapter_validator.py
│   │   ├── test_adapter_scaffold.py
│   │   ├── test_kb_export.py
│   │   ├── test_kb_security.py
│   │   ├── test_license.py
│   │   ├── test_report_generator.py
│   │   └── adapters/              # Lockfile parser tests
│   └── integration/
│       └── test_pipeline_e2e.py   # Full pipeline integration test
├── scripts/
│   └── aggregate_calibration.py   # Cross-repo pattern aggregation
├── docs/
│   ├── ARCHITECTURE_VISION.md     # Constitution
│   ├── IMPLEMENTATION_PLAN.md     # Roadmap
│   ├── PHASE_*_CONTRACT.md        # Phase contracts (2, 3, 4, 5)
│   ├── PHASE_*_DESIGN.md          # Phase designs (2, 3, 4, 5)
│   ├── ADAPTER_CONTRACT.md        # Universal adapter contract
│   └── adapters/                  # 8 family contracts
├── pyproject.toml                 # Package config (entry point: evo)
└── .env                           # Environment config (optional)

Why Now

AI coding tools are generating more code than ever. Teams ship faster — but structural quality is invisible until something breaks. EE provides the missing feedback loop: a guardrail that tells you (and your AI) when development patterns drift from what's normal for your project.

Calibrated on 90+ open-source repos, 6.18 million SDLC signals, and 2.1 million commits. 44 validated cross-signal patterns. 1.6% false positive rate.

Open-Core Model

Open Source (MIT) Proprietary (BSL 1.1)
All adapters Phase 2-5 engines
CLI, registry, orchestrator Knowledge store
Phase 1 engine
KB export/import/security
Report generator
Adapter scaffold & validator

The open adapter ecosystem ensures anyone can connect new data sources. The analysis engines are the proprietary core.


Documentation

See docs/README.md for the full documentation structure and authority hierarchy.

Key documents:


Principles

  1. Observation precedes interpretation
  2. History is immutable; interpretation is disposable
  3. Determinism beats intelligence
  4. Local baselines over global heuristics
  5. Multiple weak signals beat one strong opinion
  6. Absence of signal is not evidence of safety
  7. Humans are escalated to, not replaced
  8. Evidence enables action

License

Evolution Engine uses a dual-license model:

Component License File
CLI, adapters, plugins, GitHub Action MIT LICENSE-MIT
Core analysis engine (Phases 2-5) BSL 1.1 LICENSE
Community patterns CC0-1.0

The BSL 1.1 license permits non-production use without a commercial license. Production use requires a Pro subscription. On 2029-02-20 the core engine automatically converts to MIT.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

evolution_engine-0.3.0.tar.gz (264.9 kB view details)

Uploaded Source

Built Distributions

If you're not sure about the file name format, learn more about wheel file names.

evolution_engine-0.3.0-py3-none-any.whl (295.2 kB view details)

Uploaded Python 3

evolution_engine-0.3.0-cp311-cp311-win_amd64.whl (1.8 MB view details)

Uploaded CPython 3.11Windows x86-64

evolution_engine-0.3.0-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (5.4 MB view details)

Uploaded CPython 3.11manylinux: glibc 2.17+ x86-64

evolution_engine-0.3.0-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl (5.4 MB view details)

Uploaded CPython 3.11manylinux: glibc 2.17+ ARM64

evolution_engine-0.3.0-cp311-cp311-macosx_11_0_arm64.whl (1.8 MB view details)

Uploaded CPython 3.11macOS 11.0+ ARM64

File details

Details for the file evolution_engine-0.3.0.tar.gz.

File metadata

  • Download URL: evolution_engine-0.3.0.tar.gz
  • Upload date:
  • Size: 264.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for evolution_engine-0.3.0.tar.gz
Algorithm Hash digest
SHA256 0f5d1fd93054c2ed1496fc150cd4bd257cf8b206571b5cfeef8d82e3e2ac5ddb
MD5 0168046cf12777809499a153d6e3703b
BLAKE2b-256 0ca5d128101d500c2ba94d889d72a46d7fdc56f094f73273724001fd8be7af01

See more details on using hashes here.

Provenance

The following attestation bundles were made for evolution_engine-0.3.0.tar.gz:

Publisher: build-wheels.yml on alpsla/evolution_monitor

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file evolution_engine-0.3.0-py3-none-any.whl.

File metadata

File hashes

Hashes for evolution_engine-0.3.0-py3-none-any.whl
Algorithm Hash digest
SHA256 2ca907ed4b14b8af17f115001030c1e90256b4f31a88f193752f7320284bb912
MD5 cd9923524081f548ec2dc83d0e6b9a12
BLAKE2b-256 f4291dd5e34a6b3ac3d1a20f79edb2f7b5501cfa53f4e39427032496ad5a0907

See more details on using hashes here.

Provenance

The following attestation bundles were made for evolution_engine-0.3.0-py3-none-any.whl:

Publisher: build-wheels.yml on alpsla/evolution_monitor

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file evolution_engine-0.3.0-cp311-cp311-win_amd64.whl.

File metadata

File hashes

Hashes for evolution_engine-0.3.0-cp311-cp311-win_amd64.whl
Algorithm Hash digest
SHA256 d906f9334266886465a88a343620ecfa5210b16aebaad1a21dde5cd680b54cd2
MD5 bd3dde538793cfe126bd76dd2ec30de2
BLAKE2b-256 833ecbe1df831e69708b6b3e81a92be847dabbdd0fd3567be520bacdbaacaa19

See more details on using hashes here.

Provenance

The following attestation bundles were made for evolution_engine-0.3.0-cp311-cp311-win_amd64.whl:

Publisher: build-wheels.yml on alpsla/evolution_monitor

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file evolution_engine-0.3.0-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.

File metadata

File hashes

Hashes for evolution_engine-0.3.0-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Algorithm Hash digest
SHA256 1943a1d45ecef137982f5743a93c360742a30c5b537ed0a1f18cabd7e12d4830
MD5 ffb5910f1223676ff4b4be3f5dbedf26
BLAKE2b-256 92af72e71229b10a435b6544f096659b096736eb362b9d8854e82dc08bacfaed

See more details on using hashes here.

Provenance

The following attestation bundles were made for evolution_engine-0.3.0-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl:

Publisher: build-wheels.yml on alpsla/evolution_monitor

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file evolution_engine-0.3.0-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl.

File metadata

File hashes

Hashes for evolution_engine-0.3.0-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl
Algorithm Hash digest
SHA256 e6b5f249dc078d47436af70224ff2cbee0558e3336fd320b6d9475076e7c3c4c
MD5 84ecf68bbdea25a1c8b2fa33cc08c42a
BLAKE2b-256 cf5fd1a88c660b9f1b5539c74133b47c03c6b5011d62a3f2ef0a26a269308aaa

See more details on using hashes here.

Provenance

The following attestation bundles were made for evolution_engine-0.3.0-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl:

Publisher: build-wheels.yml on alpsla/evolution_monitor

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file evolution_engine-0.3.0-cp311-cp311-macosx_11_0_arm64.whl.

File metadata

File hashes

Hashes for evolution_engine-0.3.0-cp311-cp311-macosx_11_0_arm64.whl
Algorithm Hash digest
SHA256 f0c40feb0d7f4a2f364cf9c9dffc69d02439db5088fbc30553389e656b7cf208
MD5 e0f3ad45eaad97b37d70241243414f72
BLAKE2b-256 a41afb933be652ba925af43f2315c1a01633789e1cf753319ceef99c49ab3364

See more details on using hashes here.

Provenance

The following attestation bundles were made for evolution_engine-0.3.0-cp311-cp311-macosx_11_0_arm64.whl:

Publisher: build-wheels.yml on alpsla/evolution_monitor

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page