The System Architecture
A purely local, high-performance architecture designed for zero-latency retrieval and absolute data sovereignty.
Enterprise Compliance
Attribute-based access control, immutable audit trails, and retention policy management.
Behavioral Learning
Outcome tracking and pattern extraction. The system learns which memories lead to successful actions.
Lifecycle Management
Automatic memory aging with bounded growth. Memories transition through states based on usage patterns.
Visualization
Interactive Dashboard (v2.2.0)
Hybrid Search
Semantic + FTS5 + Graph
Universal Access
MCP + Skills + CLI
MCP Integration
12 Tools, 6 Resources
Adaptive Learning
Three-Layer Learning (v2.7)
Skills Layer
Universal Slash Commands
Pattern Learning
Bayesian Confidence Scoring
Knowledge Graph
Recursive Leiden Clustering
Hierarchical Index
Tree Structure Navigation
Raw Storage
SQLite + FTS5 + TF-IDF
Data Flow
Data enters through the Agent Protocol (Layer 10), is processed by the Skills Layer (Layer 05), stored in Raw Storage (Layer 01), and then graph-processed (Layer 03) for relational context.
Security Boundary
All your data stays on your machine. No data is sent to external servers.