Skip to main content

Agentic Knowledge Compiler — turn messy real-world information into executable knowledge

Project description

Agentic Knowledge Compiler (AKC)

AKC is an AI-native software factory for turning project knowledge into buildable software.

It grounds software generation in real project context: docs, codebases, OpenAPI specs, messaging exports, and MCP resources. Instead of stopping at a one-shot AI answer, AKC moves work through structured stages that can generate code and other artifacts, verify results, track evidence, and support runtime, delivery, and control-plane workflows.

What’s missing to ship?

Run:

akc deliver preflight

AKC will tell you exactly what prerequisites are missing (repo, environment, operator inputs) to ship via execute-mode delivery and store lanes.

The core loop is:

Plan -> Retrieve -> Generate -> Execute -> Repair

AKC defaults to an offline-friendly path for local demos:

  • ingest can use --embedder hash for deterministic, key-free indexing
  • compile uses an offline backend by default
  • verify, view, and most control-plane flows run locally
  • validation can stay evidence-first through operator-side validator bindings plus exported artifacts

Status

Alpha. The repository is active and broad in scope, but interfaces are still moving.

What AKC Does

  • Ground software work in context: ingest docs, codebase, openapi, slack, discord, telegram, whatsapp, and mcp
  • Generate more than answers: produce code and other structured artifacts through compile and verification stages
  • Keep work inspectable: record replayable evidence, policy decisions, and validation results
  • Support operator workflows: expose assistant, runtime, living-recompile, control-plane, and fleet surfaces
  • Move toward delivery: support named-recipient delivery sessions and packaging/distribution workflows for web, iOS, and Android targets
  • Preserve local inspection: provide TUI, static web, and export viewer modes for emitted artifacts

Quick Start

Requirements

  • Python 3.11+
  • uv

Install

Operator-friendly installs (one command, predictable upgrades):

# Preferred (isolated tool install)
uv tool install runform-akc

# Upgrade later
uv tool upgrade runform-akc
# Alternative (also isolated)
pipx install runform-akc

# Upgrade later
pipx upgrade runform-akc

Optional: install a prebuilt standalone binary from GitHub Releases (no Python env):

curl -fsSL https://raw.githubusercontent.com/nonameuserd/runform/main/scripts/install-akc.sh | sh
~/.local/bin/akc --help

From source (contributors / editable dev):

git clone https://github.com/nonameuserd/runform.git
cd runform
uv sync
uv sync --extra dev

source .venv/bin/activate   # Windows: .venv\Scripts\activate
akc --help

Useful optional extras:

  • uv sync --extra ingest-all for docs/OpenAPI/embedding/vector/messaging/MCP ingest extras
  • uv sync --extra mcp-serve for akc mcp
  • uv sync --extra vectorstore-pg for the pgvector index backend
  • uv sync --extra delivery-providers for store-signing/provider integrations used by akc deliver

Safe Local Demo

This path stays local and avoids working-tree writes by using --artifact-only.

# Optional: create .akc/project.json and a local policy stub
akc init

# Ingest local docs into a persistent sqlite index
akc ingest \
  --tenant-id demo \
  --connector docs \
  --input ./docs \
  --embedder hash \
  --index-backend sqlite

# Compile into reviewable artifacts only
akc compile \
  --tenant-id demo \
  --repo-id runform \
  --outputs-root ./out \
  --artifact-only

# Verify emitted artifacts
akc verify \
  --tenant-id demo \
  --repo-id runform \
  --outputs-root ./out

# Generate a static HTML viewer bundle
akc view \
  --tenant-id demo \
  --repo-id runform \
  --outputs-root ./out \
  web

If you want weighted memory during compile or assistant sessions:

export AKC_WEIGHTED_MEMORY_ENABLED=1

Common Workflows

Ingest

Index repository or external knowledge sources for later retrieval. Supported connectors: docs, codebase, openapi, slack, discord, telegram, whatsapp, mcp (see akc ingest --help and examples/README.md for one recipe per connector).

# Local docs tree (tiny sample under examples/)
akc ingest --tenant-id demo --connector docs --input ./examples/docs-sample --embedder hash --index-backend sqlite

# Repository code
akc ingest --tenant-id demo --connector codebase --input . --embedder hash --index-backend sqlite

# OpenAPI 3.x (JSON path or URL; YAML specs need akc[ingest-openapi])
akc ingest --tenant-id demo --connector openapi --input ./examples/openapi/petstore.json --embedder hash --index-backend sqlite

# Messaging / MCP need tokens or payload paths—see examples/messaging and examples/mcp

Compile and Verify

Generate artifacts under <outputs-root>/<tenant>/<repo>/ and verify them:

akc compile --tenant-id demo --repo-id runform --outputs-root ./out --artifact-only
akc verify --tenant-id demo --repo-id runform --outputs-root ./out

akc compile defaults to scoped_apply, so use --artifact-only when you want a non-mutating run.

For backend execution-workspace generation, mixed and polyglot repositories are valid inputs, but v1 built-in authoritative backend materializers are limited to typescript_node and python_fastapi. Other requested runtimes such as go, rust, or java require an external generator manifest under .akc/backend_generators/; otherwise AKC fails closed for authoritative materialization and emits fallback diagnostic workspaces.

To execute observability or mobile validators before operational verification:

akc verify \
  --tenant-id demo \
  --repo-id runform \
  --outputs-root ./out \
  --execute-validators

Assistant

Run a single planning turn:

akc assistant --mode plan -p "show me the next command to verify the latest compile outputs"

Run an interactive session:

akc assistant

View Artifacts

akc view --tenant-id demo --repo-id runform --outputs-root ./out tui
akc view --tenant-id demo --repo-id runform --outputs-root ./out web
akc view --tenant-id demo --repo-id runform --outputs-root ./out export

Runtime, Control, Delivery, and Fleet

The CLI also exposes:

  • runtime for start/stop/status, reconcile, replay, checkpoint, coordination planning, and autopilot
  • control and policy for operational indexes, replay forensics, policy bundles, and explainability
  • control-bot for the standalone multi-channel operator gateway
  • deliver for named-recipient delivery sessions
  • fleet for aggregated read-only control-plane views across many outputs roots

Repository Map

Path Purpose
src/akc/ Main Python package: CLI, ingest, compile, runtime, control, delivery, memory, assistant, viewer
tests/ Unit, integration, and end-to-end coverage
docs/ Getting started, CLI reference, architecture, runtime, delivery, viewer, ops
configs/ Example policy, eval, and SLO configuration
deploy/ Deployment references for systemd, Compose, Kubernetes, and CI
examples/ Ingest recipes for every connector, sample OpenAPI/docs/WASM, LLM backend wiring, golden viewer snapshot
rust/ Optional Rust crates for ingest, executor, and protocol surfaces
scripts/ CI and quality gate helpers
packaging/, tools/nuitka/ Packaging and standalone binary build helpers

Documentation

Published site (GitHub Pages): https://nonameuserd.github.io/runform/

The site is built with MkDocs Material (mkdocs.yml) and deployed from main when documentation-related paths change (see .github/workflows/docs.yml). Pull requests run a strict build check via .github/workflows/docs-verify.yml. Maintainer setup (once): in the GitHub repo, open Settings → Pages → Build and deployment and set Source to GitHub Actions (not “Deploy from branch”).

Repository Markdown:

Development

Local checks:

uv run ruff check .
uv run ruff format .
uv run mypy src/akc
uv run pytest

Contributor docs:

License

Licensed under the Apache-2.0 license.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

runform_akc-0.1.0.tar.gz (919.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

runform_akc-0.1.0-py3-none-any.whl (1.1 MB view details)

Uploaded Python 3

File details

Details for the file runform_akc-0.1.0.tar.gz.

File metadata

  • Download URL: runform_akc-0.1.0.tar.gz
  • Upload date:
  • Size: 919.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for runform_akc-0.1.0.tar.gz
Algorithm Hash digest
SHA256 53f278f391c5effcb42bc779c4c5cfd2a67341138099fdc5fd2e086d2ebfd21e
MD5 ed0e7b5943aca82ed76065fc0c50ee15
BLAKE2b-256 1a7c14532bde37f9400b733e60972338641ab9ceff8bb25e6a13781732329825

See more details on using hashes here.

Provenance

The following attestation bundles were made for runform_akc-0.1.0.tar.gz:

Publisher: release.yml on nonameuserd/runform

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file runform_akc-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: runform_akc-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 1.1 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for runform_akc-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 136b975dc9e3aed1a41b7baf01a4854ed62a994caca8160046b0877fe4b461e7
MD5 a5ea129a71842ae4e6f153a70376050a
BLAKE2b-256 c1c63b919356aa13e4d8c16990b254e8c531f0f6d0a5735d16735d11219584e6

See more details on using hashes here.

Provenance

The following attestation bundles were made for runform_akc-0.1.0-py3-none-any.whl:

Publisher: release.yml on nonameuserd/runform

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page