Event-sourced temporal knowledge graph fabric for AI agent memory
Project description
Zaxy
Event-sourced temporal knowledge graph fabric for AI agent memory.
Zaxy replaces markdown files + vector DBs with a structured, replayable, bi-temporal memory system built on Eventloom and Neo4j, with optional Pathlight tracing.
Quick Start
# Install the Zaxy CLI before generating MCP config. The distribution is
# zaxy-memory; the import package and console command remain zaxy.
pipx install zaxy-memory
# or: pip install zaxy-memory
# 1. Initialize local memory, MCP config, hooks, session genesis, and heartbeat.
# Local stdio MCP auto-starts a localhost Neo4j container when Docker is
# available, so average users do not need to manage a sidecar manually.
zaxy init . \
--domain my-project \
--preset local-claude
# Optional: explicit local development setup if you want shell commands too.
./scripts/setup.sh
# Production setup writes Docker secret files under ./secrets/.
./scripts/setup.sh --production
./scripts/generate-certs.sh .certs
docker compose -f docker-compose.prod.yml up -d
# 2. Explicitly start Neo4j + Zaxy MCP server for development outside an MCP client
docker compose up -d
# 3. Verify
zaxy status
zaxy memory status --eventloom-path .eventloom
zaxy memory log --eventloom-path .eventloom --limit 20
zaxy memory diff --eventloom-path .eventloom --session-id my-project-default --from-seq 1 --to-seq 10
pytest
# Integration-only runs need --no-cov because the project-level coverage gate
# is intended for the full suite.
pytest -m integration --no-cov
# 4. Validate local onboarding and hook posture.
zaxy doctor --eventloom-path .eventloom
Architecture
Agent (LangGraph / Any MCP Client)
|
v
MCP Server — memory_append / memory_query / memory_feedback / memory_replay / memory_invalidate
|
v
Eventloom (immutable JSONL log) → Hybrid Extraction → Neo4j (temporal KG)
| |
+—————— Optional Pathlight traces ———————————————→ Query Router
|
Hybrid Retrieval
(exact + BM25 + vector + traversal)
Zaxy also includes an observe-only OpenAI-compatible packet analyzer for model
call provenance. It forwards packets to one configured upstream endpoint and
records llm.packet.completed events to Eventloom without acting as a router.
See LLM Packet Analyzer.
Public Site and Documentation
- Public static site:
site/index.html - Getting started:
docs/getting-started.md - Architecture:
docs/architecture.md - Configuration:
docs/configuration.md - MCP interface:
docs/mcp.md - Eventloom contract:
docs/eventloom.md - Graph schema:
docs/graph-schema.md - Retrieval:
docs/retrieval.md - LLM packet analyzer:
docs/packet-analyzer.md - Embeddings:
docs/embeddings.md - Security:
docs/security.md - Operations and deployment:
docs/operations.md,docs/deployment.md,docs/runbook.md - Python API:
docs/api.md
Key Features
- Immutable audit trail: Eventloom append-only JSONL with SHA-256 hash chains.
- Bi-temporal graph: Facts have validity windows (
valid_from,valid_to). - Hybrid extraction: Rule-based for typed events (60–80% cost reduction), LLM fallback.
- Hybrid retrieval: Exact + keyword + vector + graph traversal with configurable fusion weights.
- Session sharding: One Eventloom log per agent/session, with a shared graph.
- MCP-native: Drop-in memory for any MCP-compatible agent framework over stdio or SSE.
- Observable: Optional Pathlight traces, breakpoints, and diff support.
- Hardened local defaults: bounded MCP inputs, safe session IDs, localhost-bound Neo4j ports, and optional admin token support for replay/invalidation.
Project Structure
| File | Purpose |
|---|---|
src/zaxy/event.py |
Eventloom JSONL I/O + hash chain integrity |
src/zaxy/extract.py |
Hybrid extraction engine + rule registry |
src/zaxy/graph.py |
Neo4j bi-temporal wrapper |
src/zaxy/query.py |
Hybrid retrieval router |
src/zaxy/mcp_server.py |
MCP stdio/SSE server |
src/zaxy/trace.py |
Pathlight observability hooks |
src/zaxy/core.py |
MemoryFabric orchestrator |
src/zaxy/session.py |
Per-session Eventloom log manager |
src/zaxy/security.py |
Shared validation and input bounds |
src/zaxy/__main__.py |
CLI (zaxy serve, zaxy replay, etc.) |
Production Secrets
Zaxy supports Docker/Kubernetes-style secret files for sensitive settings:
| Variable | Secret-file variant |
|---|---|
NEO4J_PASSWORD |
NEO4J_PASSWORD_FILE |
MCP_ADMIN_TOKEN |
MCP_ADMIN_TOKEN_FILE |
PATHLIGHT_ACCESS_TOKEN |
PATHLIGHT_ACCESS_TOKEN_FILE |
Direct environment variables take precedence over their *_FILE variants.
Use docker-compose.prod.yml as the production compose baseline.
Development
- Tests first (Karpathy rule). Every public function has a test.
- Unit tests mock Neo4j/Pathlight. Integration tests use Docker.
- Coverage gate: ≥90% enforced by CI.
- Lint/format:
ruff. Types:mypy.
# Run full suite with coverage gate
pytest
# Run integration tests (requires Docker)
docker compose up -d neo4j-test
./scripts/generate-certs.sh .certs
docker compose up -d neo4j-tls
pytest -m integration --no-cov
# Lint and type-check
ruff check src tests
mypy src
# Competitive retrieval benchmark harness
pytest tests/test_competitive_benchmarks.py --benchmark-only --no-cov
# Frozen live benchmark: markdown vs BM25 vs vector vs markdown+vector vs Zaxy
scripts/live-benchmark.sh --embedding-provider openai --workload frozen --runs 1 --reset-graph
# Representative benchmark suite: temporal memory + docs + transcripts + mixed context
scripts/live-benchmark.sh --embedding-provider openai --workload suite --subjects 100 --documents 250 --sessions 50 --runs 1 --reset-graph
# Production deployment preflight
scripts/validate-deployment.sh --root .
# Build and validate Python release artifacts
scripts/build-dist.sh --root .
# Validate public site and documentation links
scripts/validate-docs.sh --root .
# Go-live release gate
scripts/release-check.sh --root .
The full suite must stay at or above 90% coverage before a sprint is complete.
Release Publishing
The PyPI distribution name is zaxy-memory because zaxy is already occupied
on PyPI. Published releases build from GitHub Actions and upload to
https://pypi.org/project/zaxy-memory/ using the PYPI_API_TOKEN repository
secret. The import package and console command remain zaxy.
License
MIT
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file zaxy_memory-0.1.0.tar.gz.
File metadata
- Download URL: zaxy_memory-0.1.0.tar.gz
- Upload date:
- Size: 573.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
e4283f271328f18d7df95a6434d315f550f50149bb7c7260b7be8921e2f2d348
|
|
| MD5 |
079ef3d39cb91dbaad427b811ab442b3
|
|
| BLAKE2b-256 |
48a22a40873d5138ccc8ebb3785a954c851b4a0caab880d45374d506faa60e26
|
File details
Details for the file zaxy_memory-0.1.0-py3-none-any.whl.
File metadata
- Download URL: zaxy_memory-0.1.0-py3-none-any.whl
- Upload date:
- Size: 162.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
3dbccff1c1884621ba1cab4cae4904809374438f8f3fd4531cb74db696655aa1
|
|
| MD5 |
816bd416981558a29747c3721be3f07f
|
|
| BLAKE2b-256 |
278de87f844ceda61cd8516cf88fb9e01253c65c49726566e59280d77e32b1ac
|