Skip to main content

fork() for AI agents — snapshot, branch, and merge live agent state.

Project description

ProcessFork

git for AI agents. Snapshot, fork, and merge live LLM sessions in 8 ms.

snapshot a 4-hour Claude Code session in 8 ms, fork into 12 attempts, merge the winner back, push to a registry

60-second demo: pf snapshot → pf fork ×12 → pf merge → pf push file:// → pf clone on a fresh store
Replay it locally: asciinema play demo/processfork-demo.cast

crates.io PyPI npm release MIT

CI 200 tests 8 ms snapshot 88.96% line coverage Rust + Py + TS


Why

You're 4 hours into a refactor with Claude Code. The agent has read 200 files, run 47 tests, opened a database, started a dev server. Then it suggests a destructive change.

Today: lose everything, undo by hand, or restart. With ProcessFork: pf snapshot → 8 ms → safe. Try 12 alternatives in parallel, merge the winner back, ship the whole session to a teammate.

It's git — snapshot, branch, merge, push, clone — but for live AI agent state.

Highlights

  • 8 ms snapshots. Full agent state — model + KV-cache + files + tools + reasoning — into one content-addressed .pfimg.
  • 🌳 Real fork & merge. 12 parallel attempts share storage automatically (CoW). Merge the winner with a real 3-way diff (files, tools, trace) — git-style <<<<<<< markers and all.
  • 🔒 Won't double-send your email. HMAC-chained tool-call ledger; restored agents see prior side-effects as facts, not as actions to re-issue. (ACRFence-resistant.)
  • 🤝 Drop-in for Claude Code, LangGraph, OpenInterpreter, vLLM, SGLang, AutoGen, CrewAI.
  • 📦 Single binary, MIT, Rust core, Python + TypeScript SDKs. 200+ tests.

Quick start (60 seconds)

# install the CLI:
cargo install processfork                      # → `pf` on your $PATH

# snapshot a directory:
mkdir /tmp/sandbox && echo "fn main() {}" > /tmp/sandbox/main.rs
pf snapshot --agent-id demo --fs-root /tmp/sandbox
# → sha256:1c2497b0…   ⏱ 8 ms

# edit something, snapshot again, see the diff:
echo "fn main() { println!(\"hi\") }" > /tmp/sandbox/main.rs
pf snapshot --agent-id demo --fs-root /tmp/sandbox --name v2
pf log
pf diff <first-cid> <second-cid>

Prefer Python? pip install processfork. TypeScript? npm install @processfork/sdk.

The full 60-second demo (snapshot → fork ×12 → merge → push → clone on a fresh store) is bash demo/script.sh. Runs end-to-end on a laptop. No GPU, no API keys.

When you'd reach for it

Situation Command
Agent about to do something destructive pf snapshot pre-rm-rf
Stuck — want to try 12 approaches in parallel pf fork -n 12 --explore "fix bug"
Hand a complex session to a teammate pf push hf://you/session-name
Time-travel debug ("when did it go wrong?") pf log then pf checkout <CID>
RL rollout fabric for agent training snapshot, fan out, score, merge

Use it with your stack

Adapter Status What it gives you
Claude Code ✅ ships now /snapshot, /fork, /merge slash-commands inside any session
LangGraph ✅ ships now drop-in BaseCheckpointSaver (full 4-layer, not just state dict)
OpenInterpreter ✅ ships now interpreter.snapshot("pre-rm-rf") then .checkout("pre-rm-rf")
AutoGen ✅ ships now atomic snapshot across a whole agent group's state
CrewAI ✅ ships now CrewMemory drop-in; every step time-travelable
vLLM ✅ ships now bit-exact KV-cache snapshot/restore (V0 + V1 engine via collective_rpc)
SGLang ✅ ships now live RadixCache k_buffer/v_buffer capture, mock-mode parity tests

How it works

ProcessFork captures the five things that together make up a live agent — atomically — into one content-addressed file:

Layer What it captures
Model LoRA / IA³ / full-finetune weight diffs, in-place TTT updates
Cache Paged KV-cache, content-addressed per page (CoW across forks)
World Filesystem, env, in-flight subprocesses, browser DOM
Effects Append-only ledger of irreversible tool calls (HMAC-chained)
Trace Chat + tool-call message log

Identical content shares storage automatically — 12 parallel forks use ~1.5× the space of one, not 12×. The merge engine handles each layer with the right algorithm: git-style 3-way diff for files, TIES + DARE for model weights, an HMAC chain that defends against semantic-rollback attacks (ACRFence), and an LLM-summarized "what branch B learned" patch injected into branch A's reasoning trace without re-prefilling the cache.

Architecture deep-dive · Three-way merge protocol · Engineering specs

Status

v1.0.10 tagged. Closes the two TypeScript SDK gaps the v1.0.9 retest flagged. CLI, Python SDK, and TypeScript SDK now all go through the same scrub regex and the same HMAC-chained pf_effects::Ledger::append code path — full parity across all three surfaces. Concretely: snapshotFilesystem(store, kind, root, env, messages, opts?) applies the default secret-shaped scrub regex (so JS callers passing { OPENAI_API_KEY: "..." } get safe-by-default redaction), and opts.effects = [...] routes every tool call through the HMAC chain (was previously a hardcoded empty blob regardless of input — TS integrations had no ACRFence protection at all). New readBlob SDK surface to mirror the Python read_blob. The smoke-test bug that hid the leak (new Map(...) silently serialized to {} over napi) is fixed and replaced with 3 regression tests proving the exact attack patterns the auditor reported. cargo deny check: advisories ok, bans ok, licenses ok, sources ok. Earlier rounds' fixes still apply (CLI scrub + ledger, Python SDK scrub + ledger, vLLM/SGLang persistence, cargo-audit clear).

metric observed target
Snapshot p50, synthetic 4-layer fixture (macOS arm64) 7.9 ms < 500 ms p99
Snapshot p50, real GPU host (Modal A10G, 64 × 4 KiB) 42 ms (warm) < 500 ms p99
Bit-exact KV-cache replay, vLLM 0.6.6 + TinyLlama-1.1B on A10G ✅ verified — 38 619 KV pages snapshotted, restored, regenerated text byte-identical out_a == out_b
Cache capture, 64 pages 531 µs
12-fork ÷ 1-fork storage ratio well < 1.5× ≤ 1.5×
Total tests passing 200

Synthetic-fixture numbers come from cargo bench --workspace. GPU numbers come from modal run scripts/gpu-validate-modal.py; raw JSON lives in benchmarks/gpu-validation/ and the breakdown in benchmarks/RESULTS.md. vLLM ≥0.10 (V1 engine, subprocess-worker architecture) is the v1.0.2 milestone — the v1.0.1 adapter targets V0's directly-introspectable CacheEngine.

Install

cargo install processfork                          # Rust CLI (the `pf` binary)
pip   install processfork                          # Python SDK
npm   install @processfork/sdk                     # TypeScript SDK

Per-adapter packages (one each on PyPI):

pip install processfork-claude-code
pip install processfork-langgraph
pip install processfork-openinterpreter
pip install "processfork-vllm[vllm]"               # needs CUDA + vllm ≥ 0.10
pip install "processfork-sglang[sglang]"           # needs CUDA + sglang ≥ 0.5
pip install "processfork-autogen[autogen]"
pip install "processfork-crewai[crewai]"

Build from source if you want to hack on it:

git clone https://github.com/manav8498/processfork && cd processfork
cargo build --release -p processfork               # → target/release/pf

Full build-from-source instructions in docs/install.md. Pre-built wheels cover macOS arm64, Linux x86_64, and Linux aarch64; macOS Intel + Windows wheels arrive in v1.0.1 (operator: same package, just more platforms).

Repo layout

crates/      Rust workspace (10 crates: pf-core, pf-cache, pf-world, pf-effects,
             pf-model, pf-merge, pf-registry, processfork (CLI, the `pf` binary), pf-py, pf-ts)
adapters/    7 first-party integration packages
benchmarks/  PFBench harness + Criterion microbench
docs/        mdBook source (25+ pages)
examples/    8 self-contained runnable examples
demo/        60-second demo recording script

Docs

Your first fork (5 min) · 60-second demo · Architecture · Merge protocol · Security model · Performance tuning · Engineering specs

Contributing

PRs welcome. The bar is cargo fmt, cargo clippy --all-targets -- -D warnings, cargo test --workspace, plus a green coverage delta. See CONTRIBUTING.md.

License

MIT.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distributions

No source distribution files available for this release.See tutorial on generating distribution archives.

Built Distributions

If you're not sure about the file name format, learn more about wheel file names.

processfork-1.0.10-cp39-abi3-win_amd64.whl (1.4 MB view details)

Uploaded CPython 3.9+Windows x86-64

processfork-1.0.10-cp39-abi3-manylinux_2_28_x86_64.whl (1.6 MB view details)

Uploaded CPython 3.9+manylinux: glibc 2.28+ x86-64

processfork-1.0.10-cp39-abi3-manylinux_2_28_aarch64.whl (1.5 MB view details)

Uploaded CPython 3.9+manylinux: glibc 2.28+ ARM64

processfork-1.0.10-cp39-abi3-macosx_11_0_arm64.whl (1.3 MB view details)

Uploaded CPython 3.9+macOS 11.0+ ARM64

processfork-1.0.10-cp39-abi3-macosx_10_12_x86_64.whl (1.5 MB view details)

Uploaded CPython 3.9+macOS 10.12+ x86-64

File details

Details for the file processfork-1.0.10-cp39-abi3-win_amd64.whl.

File metadata

  • Download URL: processfork-1.0.10-cp39-abi3-win_amd64.whl
  • Upload date:
  • Size: 1.4 MB
  • Tags: CPython 3.9+, Windows x86-64
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for processfork-1.0.10-cp39-abi3-win_amd64.whl
Algorithm Hash digest
SHA256 8945abac0aa64dd840c86007754038f2d948476e6aefa7bffbcf836cc4871c22
MD5 2e801502bbe5b0f2bf7aed8769981439
BLAKE2b-256 cadaae657f56643faa41f7a9fd191b0872abe9cc51558b776e1e0106482dc947

See more details on using hashes here.

Provenance

The following attestation bundles were made for processfork-1.0.10-cp39-abi3-win_amd64.whl:

Publisher: release.yml on manav8498/processfork

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file processfork-1.0.10-cp39-abi3-manylinux_2_28_x86_64.whl.

File metadata

File hashes

Hashes for processfork-1.0.10-cp39-abi3-manylinux_2_28_x86_64.whl
Algorithm Hash digest
SHA256 ee3f9ddf5595742a24d9be30b76a68488ded081effa8d52f864c708a6474b40a
MD5 99e10a6a84db09fcaf9dc26627171a57
BLAKE2b-256 a0d464ada9916d2e3fa57997d4f9b1d5edd62acd10d162eb64d8e8e2f365aea9

See more details on using hashes here.

Provenance

The following attestation bundles were made for processfork-1.0.10-cp39-abi3-manylinux_2_28_x86_64.whl:

Publisher: release.yml on manav8498/processfork

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file processfork-1.0.10-cp39-abi3-manylinux_2_28_aarch64.whl.

File metadata

File hashes

Hashes for processfork-1.0.10-cp39-abi3-manylinux_2_28_aarch64.whl
Algorithm Hash digest
SHA256 88a36190e7ed19d4984592018ea0b253dde2f246e6fc65bb0eb88ebdf1826f37
MD5 2a6b852d19088bb4b4d1236bc87936c0
BLAKE2b-256 80fad9411575d0e2417585afdce7d75eecaafa89d1218927c58cf1ac95228d32

See more details on using hashes here.

Provenance

The following attestation bundles were made for processfork-1.0.10-cp39-abi3-manylinux_2_28_aarch64.whl:

Publisher: release.yml on manav8498/processfork

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file processfork-1.0.10-cp39-abi3-macosx_11_0_arm64.whl.

File metadata

File hashes

Hashes for processfork-1.0.10-cp39-abi3-macosx_11_0_arm64.whl
Algorithm Hash digest
SHA256 17eb61b772a918683aa15d619a5b3fb204a9fb0da56806e6e990fd29276b43be
MD5 6c5486c49ab07425ae0c4c4e827f7d49
BLAKE2b-256 b4a177da7676b7f5e4f9641f4547c1ed386412806104095acc06c45edcef4dd4

See more details on using hashes here.

Provenance

The following attestation bundles were made for processfork-1.0.10-cp39-abi3-macosx_11_0_arm64.whl:

Publisher: release.yml on manav8498/processfork

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file processfork-1.0.10-cp39-abi3-macosx_10_12_x86_64.whl.

File metadata

File hashes

Hashes for processfork-1.0.10-cp39-abi3-macosx_10_12_x86_64.whl
Algorithm Hash digest
SHA256 2a723999b8ae0722efd1d7d80aeb6780a3df8a3ce05c29da26bf00ac1c841773
MD5 7a6dadf31cbc4d455588c95a1698953a
BLAKE2b-256 bc7d0e1d233e440d994bdea90326256222d1997f8327fdc45209cd87ba4238d8

See more details on using hashes here.

Provenance

The following attestation bundles were made for processfork-1.0.10-cp39-abi3-macosx_10_12_x86_64.whl:

Publisher: release.yml on manav8498/processfork

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page