Skip to main content

Deterministic reasoning runtime for AI agents, built on CLIPS via clipspy

Project description

Fathom

A modern Python-first expert system runtime built on CLIPS. Define rules in YAML. Evaluate in microseconds. Zero hallucinations.

Status: Design Draft License: MIT Language: Python 3.14+ Package Manager: uv


Why Fathom?

Every AI agent framework lets agents decide what to do by guessing. For most tasks, that's fine.

For some tasks, guessing is unacceptable:

  • Policy enforcement — "Is this agent allowed to do this?" can't be a maybe.
  • Data routing — "Which databases should this query hit?" can't hallucinate a source.
  • Compliance — "Did this fleet operate within NIST 800-53 controls?" needs a provable answer.
  • Classification — "What clearance level does this data require?" is not a prompt engineering problem.

Fathom provides deterministic, explainable, auditable reasoning using CLIPS — a battle-tested expert system — wrapped in a modern Python library with YAML-first rule authoring.

Quick Start

uv add fathom-rules
from fathom import Engine

engine = Engine()
engine.load_templates("templates/")
engine.load_rules("rules/")

engine.assert_fact("agent", {
    "id": "agent-alpha",
    "clearance": "secret",
    "purpose": "threat-analysis",
    "session_id": "sess-001"
})

engine.assert_fact("data_request", {
    "agent_id": "agent-alpha",
    "target": "hr_records",
    "classification": "top-secret",
    "action": "read"
})

result = engine.evaluate()
print(result.decision)   # "deny"
print(result.reason)     # "Agent clearance 'secret' insufficient for 'top-secret' data"
print(result.duration_us)  # 47

Core Primitives

Primitive Purpose CLIPS Construct
Templates Define fact schemas with typed slots deftemplate
Facts Typed instances asserted into working memory working memory
Rules Pattern-matching logic with conditions and actions defrule
Modules Namespace rules with controlled execution order defmodule
Functions Reusable logic for conditions and actions deffunction

Key Differentiator: Working Memory

Unlike stateless policy engines (OPA, Cedar), Fathom maintains working memory across evaluations within a session:

  • Cumulative reasoning — "This agent accessed PII from 3 sources — deny the 4th."
  • Temporal patterns — "Denial rate spiked 400% in 10 minutes — escalate."
  • Cross-fact inference — "Agent A passed data to Agent B, who is requesting external access — violation."

Integration

As a library:

from fathom import Engine
engine = Engine.from_rules("rules/")
result = engine.evaluate()

As a sidecar:

docker run -p 8080:8080 -v ./rules:/rules kraken/fathom:latest
curl -X POST localhost:8080/v1/evaluate -d '{"facts": [...], "ruleset": "access-control"}'

As an MCP tool:

from fathom.integrations.mcp import FathomMCPServer
server = FathomMCPServer(engine)
server.serve()

Rule Packs

Pre-built rule collections (planned):

  • fathom-owasp-agentic — OWASP Agentic Top 10 mitigations
  • fathom-nist-800-53 — Access control, audit, information flow
  • fathom-hipaa — PHI handling, minimum necessary, breach triggers
  • fathom-cmmc — CMMC Level 2+ controls

Performance Targets

Operation Target
Single rule evaluation < 100µs
100-rule evaluation < 500µs
Fact assertion < 10µs
YAML compilation < 50ms

Related Projects

  • Bosun — Agent governance built on Fathom (fleet analysis, compliance attestation)
  • Nautilus — Intelligent data broker built on Fathom (multi-source routing, classification-aware scoping)

Development

git clone <repo-url>
cd fathom
uv sync
uv run pytest

See design.md for the full specification and roadmap.

License

MIT — see LICENSE for details.


Maintained by Kraken Networks

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

fathom_rules-0.3.0.tar.gz (430.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

fathom_rules-0.3.0-py3-none-any.whl (76.8 kB view details)

Uploaded Python 3

File details

Details for the file fathom_rules-0.3.0.tar.gz.

File metadata

  • Download URL: fathom_rules-0.3.0.tar.gz
  • Upload date:
  • Size: 430.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.11.6 {"installer":{"name":"uv","version":"0.11.6","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":null,"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for fathom_rules-0.3.0.tar.gz
Algorithm Hash digest
SHA256 bc7996720abee5b2febb123fa791d969d4b96f7f349b8f82ea22edf686eea240
MD5 8f531e77b31a2949937177ce5bcef1ff
BLAKE2b-256 bf014eb8f026bc56abead32446048e383bd45fe4c8d28849ecc33838d5e31d66

See more details on using hashes here.

File details

Details for the file fathom_rules-0.3.0-py3-none-any.whl.

File metadata

  • Download URL: fathom_rules-0.3.0-py3-none-any.whl
  • Upload date:
  • Size: 76.8 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.11.6 {"installer":{"name":"uv","version":"0.11.6","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":null,"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for fathom_rules-0.3.0-py3-none-any.whl
Algorithm Hash digest
SHA256 9c1b101e8976a6f64a93fcbf718c403ca6deb9f12d57e6c44165487ad03f5bb9
MD5 dc7810e3adc3a29fbd2c8a39a7e091ba
BLAKE2b-256 eb504bc6839cd70ce1190e3e31edd4403026cd7c481e930c78f1a738d10ca5c3

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page