Agentic Knowledge Compiler — turn messy real-world information into executable knowledge
Project description
Agentic Knowledge Compiler (AKC)
AKC is an AI-native software factory for turning project knowledge into buildable software.
It grounds software generation in real project context: docs, codebases, OpenAPI specs, messaging exports, and MCP resources. Instead of stopping at a one-shot AI answer, AKC moves work through structured stages that can generate code and other artifacts, verify results, track evidence, and support runtime, delivery, and control-plane workflows.
What’s missing to ship?
Run:
akc deliver preflight
AKC will tell you exactly what prerequisites are missing (repo, environment, operator inputs) to ship via execute-mode delivery and store lanes.
The core loop is:
Plan -> Retrieve -> Generate -> Execute -> Repair
AKC defaults to an offline-friendly path for local demos:
- ingest can use
--embedder hashfor deterministic, key-free indexing - compile uses an offline backend by default
- verify, view, and most control-plane flows run locally
- validation can stay evidence-first through operator-side validator bindings plus exported artifacts
Status
Alpha. The repository is active and broad in scope, but interfaces are still moving.
What AKC Does
- Ground software work in context: ingest
docs,codebase,openapi,slack,discord,telegram,whatsapp, andmcp - Generate more than answers: produce code and other structured artifacts through compile and verification stages
- Keep work inspectable: record replayable evidence, policy decisions, and validation results
- Support operator workflows: expose assistant, runtime, living-recompile, control-plane, and fleet surfaces
- Move toward delivery: support named-recipient delivery sessions and packaging/distribution workflows for web, iOS, and Android targets
- Preserve local inspection: provide TUI, static web, and export viewer modes for emitted artifacts
Quick Start
Requirements
- Python 3.11+
- uv
Install
Operator-friendly installs (one command, predictable upgrades):
# Preferred (isolated tool install)
uv tool install runform-akc
# Upgrade later
uv tool upgrade runform-akc
# Alternative (also isolated)
pipx install runform-akc
# Upgrade later
pipx upgrade runform-akc
Optional: install a prebuilt standalone binary from GitHub Releases (no Python env):
curl -fsSL https://raw.githubusercontent.com/nonameuserd/runform/main/scripts/install-akc.sh | sh
~/.local/bin/akc --help
From source (contributors / editable dev):
git clone https://github.com/nonameuserd/runform.git
cd runform
uv sync
uv sync --extra dev
source .venv/bin/activate # Windows: .venv\Scripts\activate
akc --help
Useful optional extras:
uv sync --extra ingest-allfor docs/OpenAPI/embedding/vector/messaging/MCP ingest extrasuv sync --extra mcp-serveforakc mcpuv sync --extra vectorstore-pgfor the pgvector index backenduv sync --extra delivery-providersfor store-signing/provider integrations used byakc deliver
Safe Local Demo
This path stays local and avoids working-tree writes by using --artifact-only.
# Optional: create .akc/project.json and a local policy stub
akc init
# Ingest local docs into a persistent sqlite index
akc ingest \
--tenant-id demo \
--connector docs \
--input ./docs \
--embedder hash \
--index-backend sqlite
# Compile into reviewable artifacts only
akc compile \
--tenant-id demo \
--repo-id runform \
--outputs-root ./out \
--artifact-only
# Verify emitted artifacts
akc verify \
--tenant-id demo \
--repo-id runform \
--outputs-root ./out
# Generate a static HTML viewer bundle
akc view \
--tenant-id demo \
--repo-id runform \
--outputs-root ./out \
web
If you want weighted memory during compile or assistant sessions:
export AKC_WEIGHTED_MEMORY_ENABLED=1
Common Workflows
Ingest
Index repository or external knowledge sources for later retrieval. Supported connectors: docs, codebase, openapi, slack, discord, telegram, whatsapp, mcp (see akc ingest --help and examples/README.md for one recipe per connector).
# Local docs tree (tiny sample under examples/)
akc ingest --tenant-id demo --connector docs --input ./examples/docs-sample --embedder hash --index-backend sqlite
# Repository code
akc ingest --tenant-id demo --connector codebase --input . --embedder hash --index-backend sqlite
# OpenAPI 3.x (JSON path or URL; YAML specs need akc[ingest-openapi])
akc ingest --tenant-id demo --connector openapi --input ./examples/openapi/petstore.json --embedder hash --index-backend sqlite
# Messaging / MCP need tokens or payload paths—see examples/messaging and examples/mcp
Compile and Verify
Generate artifacts under <outputs-root>/<tenant>/<repo>/ and verify them:
akc compile --tenant-id demo --repo-id runform --outputs-root ./out --artifact-only
akc verify --tenant-id demo --repo-id runform --outputs-root ./out
akc compile defaults to scoped_apply, so use --artifact-only when you want a non-mutating run.
For backend execution-workspace generation, mixed and polyglot repositories are valid inputs, but v1 built-in authoritative backend materializers are limited to typescript_node and python_fastapi. Other requested runtimes such as go, rust, or java require an external generator manifest under .akc/backend_generators/; otherwise AKC fails closed for authoritative materialization and emits fallback diagnostic workspaces.
To execute observability or mobile validators before operational verification:
akc verify \
--tenant-id demo \
--repo-id runform \
--outputs-root ./out \
--execute-validators
Assistant
Run a single planning turn:
akc assistant --mode plan -p "show me the next command to verify the latest compile outputs"
Run an interactive session:
akc assistant
View Artifacts
akc view --tenant-id demo --repo-id runform --outputs-root ./out tui
akc view --tenant-id demo --repo-id runform --outputs-root ./out web
akc view --tenant-id demo --repo-id runform --outputs-root ./out export
Runtime, Control, Delivery, and Fleet
The CLI also exposes:
runtimefor start/stop/status, reconcile, replay, checkpoint, coordination planning, and autopilotcontrolandpolicyfor operational indexes, replay forensics, policy bundles, and explainabilitycontrol-botfor the standalone multi-channel operator gatewaydeliverfor named-recipient delivery sessionsfleetfor aggregated read-only control-plane views across many outputs roots
Repository Map
| Path | Purpose |
|---|---|
src/akc/ |
Main Python package: CLI, ingest, compile, runtime, control, delivery, memory, assistant, viewer |
tests/ |
Unit, integration, and end-to-end coverage |
docs/ |
Getting started, CLI reference, architecture, runtime, delivery, viewer, ops |
configs/ |
Example policy, eval, and SLO configuration |
deploy/ |
Deployment references for systemd, Compose, Kubernetes, and CI |
examples/ |
Ingest recipes for every connector, sample OpenAPI/docs/WASM, LLM backend wiring, golden viewer snapshot |
rust/ |
Optional Rust crates for ingest, executor, and protocol surfaces |
scripts/ |
CI and quality gate helpers |
packaging/, tools/nuitka/ |
Packaging and standalone binary build helpers |
Documentation
Published site (GitHub Pages): https://nonameuserd.github.io/runform/
The site is built with MkDocs Material (mkdocs.yml) and deployed from main when documentation-related paths change (see .github/workflows/docs.yml). Pull requests run a strict build check via .github/workflows/docs-verify.yml. Maintainer setup (once): in the GitHub repo, open Settings → Pages → Build and deployment and set Source to GitHub Actions (not “Deploy from branch”).
Repository Markdown:
- Docs index
- Getting started
- CLI command reference
- Architecture
- Compile-time skills
- Validation
- Runtime execution
- Delivery architecture
- Viewer
- Ops runbook
- Artifact contracts
Development
Local checks:
uv run ruff check .
uv run ruff format .
uv run mypy src/akc
uv run pytest
Contributor docs:
License
Licensed under the Apache-2.0 license.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file runform_akc-0.1.0.tar.gz.
File metadata
- Download URL: runform_akc-0.1.0.tar.gz
- Upload date:
- Size: 919.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
53f278f391c5effcb42bc779c4c5cfd2a67341138099fdc5fd2e086d2ebfd21e
|
|
| MD5 |
ed0e7b5943aca82ed76065fc0c50ee15
|
|
| BLAKE2b-256 |
1a7c14532bde37f9400b733e60972338641ab9ceff8bb25e6a13781732329825
|
Provenance
The following attestation bundles were made for runform_akc-0.1.0.tar.gz:
Publisher:
release.yml on nonameuserd/runform
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
runform_akc-0.1.0.tar.gz -
Subject digest:
53f278f391c5effcb42bc779c4c5cfd2a67341138099fdc5fd2e086d2ebfd21e - Sigstore transparency entry: 1201753794
- Sigstore integration time:
-
Permalink:
nonameuserd/runform@0c79eba54a94beff8d86a3abbddeb168247f264d -
Branch / Tag:
refs/heads/main - Owner: https://github.com/nonameuserd
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@0c79eba54a94beff8d86a3abbddeb168247f264d -
Trigger Event:
push
-
Statement type:
File details
Details for the file runform_akc-0.1.0-py3-none-any.whl.
File metadata
- Download URL: runform_akc-0.1.0-py3-none-any.whl
- Upload date:
- Size: 1.1 MB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
136b975dc9e3aed1a41b7baf01a4854ed62a994caca8160046b0877fe4b461e7
|
|
| MD5 |
a5ea129a71842ae4e6f153a70376050a
|
|
| BLAKE2b-256 |
c1c63b919356aa13e4d8c16990b254e8c531f0f6d0a5735d16735d11219584e6
|
Provenance
The following attestation bundles were made for runform_akc-0.1.0-py3-none-any.whl:
Publisher:
release.yml on nonameuserd/runform
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
runform_akc-0.1.0-py3-none-any.whl -
Subject digest:
136b975dc9e3aed1a41b7baf01a4854ed62a994caca8160046b0877fe4b461e7 - Sigstore transparency entry: 1201754036
- Sigstore integration time:
-
Permalink:
nonameuserd/runform@0c79eba54a94beff8d86a3abbddeb168247f264d -
Branch / Tag:
refs/heads/main - Owner: https://github.com/nonameuserd
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@0c79eba54a94beff8d86a3abbddeb168247f264d -
Trigger Event:
push
-
Statement type: