Skip to main content

MemForge: portable, agent-neutral persistent memory for coding agents (ILDAN).

Project description

MemForge

Typed, git-native, dynamic memory for coding agents. A markdown folder + a small spec + reference tooling. Works across Claude Code, Cursor, Aider, Codex, and GitHub Copilot Chat through thin adapters.

Status: pre-1.0; external PRs paused. Issues and Discussions are open. External pull requests are paused until the Contributor License Agreement infrastructure lands; the CLA flow will land in a v0.3.x patch release. See CONTRIBUTING.md. Security reports go through the private channel in SECURITY.md.

The gap MemForge fills

Coding agents have static instruction surfaces (AGENTS.md, .cursorrules, CONVENTIONS.md, .github/copilot-instructions.md, Claude Code's auto-memory) for things you want the agent to read at the start of every session. They handle the "always-true" half well.

What they don't handle: the changing half. The fact that you decided to use bun not npm last Tuesday. The reason you rejected the obvious database schema. The post-incident rule about not mocking the staging API. The seven things you've told four different agents the same way and are tired of repeating.

That state belongs in memory: typed entries that the agent can read, write, audit, and version-control alongside the code. MemForge is the format for that memory and a small set of tools that keep it healthy.

What you get

  • A folder of markdown files with YAML frontmatter. Hand-editable, diffable, code-reviewable.
  • Four memory types: user (facts about the developer), feedback (rules they have given), project (state about ongoing work), reference (pointers to external systems).
  • A MEMORY.md index any agent loads at session start.
  • Rollup subfolders for topic clusters of five or more memories, so the index stays scannable.
  • Audit + integrity tooling that runs in CI: schema checks, link integrity, DLP scan, tamper-evident audit log.
  • Adapters for Claude Code, Cursor, Aider, OpenAI Codex, and GitHub Copilot Chat (VS Code).

60-second install

pip install ildan-memforge

The PyPI distribution is published under ildan-memforge because the shorter memforge name is held by an unrelated project. The Python import path is still memforge, and the 15 CLI commands install with the same names (memory-audit, memory-watch, memory-dlp-scan, etc.). You can also install straight from source:

pip install git+https://github.com/ildan-ai/memforge.git

Pick a folder for your memory. The defaults the tooling assumes:

~/.claude/global-memory/                          # cross-project rules
~/.claude/projects/<USER>-claude-projects/memory/ # per-cwd state

Other layouts work too; the tooling takes a --path argument everywhere.

A memory file, end-to-end

---
name: Use bun, not npm
description: Bun is the package manager for this monorepo
type: feedback
tags: [topic:tooling, topic:javascript]
status: active
created: 2026-04-12
---

When installing or running scripts in this repo, use `bun` and `bunx`. Lockfile is `bun.lockb`.

**Why:** the workspace setup at `apps/web/package.json` relies on bun's workspace resolver; npm pulls a slightly different dependency tree and the build fails downstream.

**How to apply:** any time you reach for `npm install`, `npx`, or a `package-lock.json`, stop and use bun instead. If a script in the README still says `npm run`, treat that as a docs bug, not a directive.

That file is the unit. Every tool, every adapter, every check operates on files of exactly this shape.

When MemForge is the right tool

  • You move between coding agents and want them to share the same notes.
  • You want memory entries reviewable in pull requests, like code.
  • You want the operator to see what the agent has written about them and edit it freely.
  • You want CI gates on memory hygiene (broken links, secret leakage, schema drift).

When it is not

  • Not a vector database. No embeddings, no similarity search at runtime. Use mem0 or letta if that is the shape you need.
  • Not a secrets store. The DLP scanner refuses files that look like they leak credentials, but the format is human-readable plain text. Keep secrets in a vault.
  • Not a runtime memory layer. MemForge is the file format and the discipline, not a service. Adapters load files into agent context at session start; nothing runs continuously.
  • Not a replacement for AGENTS.md. AGENTS.md is the README for agents (static, repo-level, project setup). MemForge is the working notebook (dynamic, evolving, often per-developer). They coexist.

How it compares

MemForge mem0 letta .cursorrules / AGENTS.md
Storage Markdown files in git Hosted vector store Hosted agent state Single text file
Typed entries Yes (4 types + status) No Partial No
Cross-agent Yes (adapters) Per-SDK Per-SDK Per-agent
Reviewable in PRs Yes (diff = the file) No (opaque store) No Yes
Runtime cost Zero (load at session start) Per-query embedding cost Per-query Zero
Best for Long-lived rules + decisions Conversational recall Stateful agent loops Project-level setup

The honest summary: if your agent is a long-running service that needs to remember a thousand things from yesterday's chat, you want a vector store. If your agent is a coding session that needs to remember the rules and decisions a human cares about across sessions, you want MemForge.

Architecture

flowchart LR
    Dev[Developer] -->|edits| Folder[Memory folder<br/>markdown + YAML]
    Folder -->|read at session start| AdapterCC[Claude Code adapter]
    Folder -->|read at session start| AdapterCursor[Cursor adapter]
    Folder -->|read at session start| AdapterAider[Aider adapter]
    Folder -->|read at session start| AdapterCodex[Codex adapter]
    Folder -->|read at session start| AdapterCopilot[Copilot Chat adapter]
    AdapterCC --> Agent1[Claude Code]
    AdapterCursor --> Agent2[Cursor]
    AdapterAider --> Agent3[Aider]
    AdapterCodex --> Agent4[OpenAI Codex]
    AdapterCopilot --> Agent5[GitHub Copilot Chat]
    Folder -->|CI gate| Tools[memory-audit<br/>memory-dlp-scan<br/>memory-link-rewriter<br/>memory-audit-log]
    Tools -->|fail PR on violation| GH[GitHub Actions]
    Folder -->|append-only| ChainLog[(.memforge-audit-log.jsonl<br/>tamper-evident chain)]

Adapters are thin: they translate "load this folder at session start" into the agent's native rules surface. Adding an agent means writing a new adapter, not changing the format.

Key tools

Run --help on any of them.

Tool What it does
memory-audit Schema + integrity check. Pass --strict in CI.
memory-audit-deep Recursive audit: UID uniqueness, taxonomy membership, supersedes resolution, link integrity.
memory-index-gen Build MEMORY.md from frontmatter as a CI artifact. RBAC-aware filtering for shared folders.
memory-cluster-suggest Suggest rollup subfolders when a topic accumulates five or more memories.
memory-dlp-scan Pre-commit scanner for secrets, credentials, and PII in memory bodies.
memory-link-rewriter UID-based cross-folder link integrity (check, rename, rename-batch, upgrade).
memory-audit-log Append-only tamper-evident hash chain. JSONL on disk, exports CEF for SIEM.
memory-dedup LLM-backed near-duplicate detection. Local-only by default; reports candidates, never writes.
memory-rollup Bulk-move primitive: create / undo / list. Maintains an undo ledger.
memory-query Filter memories by topic, type, tag, status, owner, date range, or text.
memory-watch Filesystem watcher (Linux + macOS via watchdog).
memory-promote Move a memory between folders with index fixup.

The tools/README.md has the long-form reference.

Spec

Format invariants are in spec/SPEC.md. Topic taxonomy is in spec/taxonomy.yaml. The current package version is in pyproject.toml; the on-disk format version is in spec/VERSION. They track separately on purpose: a tooling release does not always shift the format, and a format bump is a deliberate event.

Status

Version Date Headline
v0.1.0 2026-04-19 First spec release.
v0.2.0 (unreleased) Sensitivity classification (4 levels) + consumer obligations.
v0.3.0 2026-05-07 Schema expansion (uid, tier, tags, owner, last_reviewed, status), rollup-with-subfolder formalization, access labels, controlled topic taxonomy, full Phase 1 tooling, audit log, DLP scan.
v0.4.0 2026-05-08 Required-field expansion: uid, tier, tags, owner, status, created required (was optional in v0.3.x). v0.3.x files load in degraded mode. Multi-agent concurrency: five new frontmatter keys, snooze record, config file, resolve operation, canonical competing-claim block, layered Tier 1 + Tier 2 audit rule set, status enumeration BLOCKER, secure-mode adapter conformance. Sensitivity enforcement: default-on export-tier gate (memory-audit --export-tier), DLP label/content cross-check, conformance fixture set; hard floor protects privileged tier from config-disable. Closes the v0.3.x multi-user concurrency deferral.

The reference implementation is running in production. External adoption is welcome once the CLA flow is live.

License

Apache-2.0. See LICENSE.

The "MemForge" name and logo are subject to pending trademark filings; the Apache-2.0 grant does not cover the marks. A trademark policy will land alongside the v0.3.x CLA release.

Contributing

External pull requests are paused. Issues and Discussions are open. See CONTRIBUTING.md for the current model and the post-CLA contributor flow.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

ildan_memforge-0.4.0.tar.gz (89.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

ildan_memforge-0.4.0-py3-none-any.whl (90.8 kB view details)

Uploaded Python 3

File details

Details for the file ildan_memforge-0.4.0.tar.gz.

File metadata

  • Download URL: ildan_memforge-0.4.0.tar.gz
  • Upload date:
  • Size: 89.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.4

File hashes

Hashes for ildan_memforge-0.4.0.tar.gz
Algorithm Hash digest
SHA256 271f6c2e7fe5200e447ecf7cd74afc0227f3e360552d106aa70abeca02378b3b
MD5 3aa13ab9168b630313da5fa689d0bb95
BLAKE2b-256 4fb7f00aa8c396dfadc360ae4432294952be199749006c3d3c89163a059a91cc

See more details on using hashes here.

File details

Details for the file ildan_memforge-0.4.0-py3-none-any.whl.

File metadata

  • Download URL: ildan_memforge-0.4.0-py3-none-any.whl
  • Upload date:
  • Size: 90.8 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.4

File hashes

Hashes for ildan_memforge-0.4.0-py3-none-any.whl
Algorithm Hash digest
SHA256 40f201eb6a6a26f0241c933cd4c041b01d69774aaab68a5f5621e44eaeb5ac07
MD5 65f4115342288814f8e8aaa06829dfd6
BLAKE2b-256 8acd4862dc2cb2c71b8f58d123d0cefd75d315cf6c818812604c507724406a73

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page