Prove what your AI agent knew. Mathematically.
Tamper-evident memory and decision lineage for AI agents.
Local-first. SHA-256 hash-chained. Merkle-sealed. Audit-ready.
Quickstart · API · Security Model · Roadmap · Contributing
CORTEX is trust infrastructure for AI agents. It sits between your runtime and your memory layer, making facts, decisions, and derived state tamper-evident. If stored context changes after the fact, verification fails. If you need to explain what an agent knew, when it knew it, and what it did next, CORTEX gives you a cryptographic trail instead of an anecdote.
| Feature | Logs & Observability | CORTEX Persist (Trust Layer) |
|---|---|---|
| Trust Model | "Trust the process" | "Verify the evidence" |
| Tamper Detection | Weak (DB mutation is silent) | Cryptographic (SHA-256 + Merkle) |
| Compliance Proof | Requires manual reconstruction | O(1) Portable JSON Audit Packs |
| Agent Liability | Ambiguous context reconstruction | Mathematically defensible lineage |
Logs tell you what happened. CORTEX proves exactly what the agent knew, when it knew it, and mathematically guarantees the record hasn't been altered since. Review a real verification proof.
- Autonomous Agents: Prove exactly what context an agent had when making a critical, irreversible decision (e.g. executing a trade, sending a legal email).
- Multi-Agent Systems: Trace state propagation across agents and workflows.
- Compliance-Heavy Environments: Produce audit trails for finance, security, and regulated operations.
- Post-incident forensics: detect silent mutation, tampering, or replayed state.
- Trust-sensitive AI products: ship memory with evidence, not vibes.
Traditional logging and standard vector stores fail the epistemic containment test. If an agent hallucinates, or if a database is mutated passively, you lose structural trust in the machine. CORTEX makes mutation mathematically defensible.
| Feature | Standard Logs (Datadog/ELK) | Standard Vector DB (Pinecone/Qdrant) | CORTEX Persist |
|---|---|---|---|
| Primary Goal | Observability & Debugging | Semantic Search & RAG | Tamper-Evident Cognitive Lineage |
| Write Integrity | Overwritable / Editable | Silent CRUD operations | Append-Only + Cryptographic Hash |
| Fact Mutability | Easy (API/Admin access) | Easy (API/Admin access) | Impossible (Breaks hash chain) |
| Evidence Export | Text dumps | JSON extracts | Zero-Trust Sealed Audit Packs |
See a real artifact: View Exported Audit Pack
- CORTEX is not a Semantic Search primary DB: Continue using Qdrant, Pinecone, or Milvus for purely ephemeral RAG chunks. CORTEX stores the decisions and core facts.
- CORTEX is not an Observability Platform: Continue using Datadog or ELK for server metrics, APM, and basic string logs.
- CORTEX does not stop hallucinations: A cryptographically logged lie from an LLM is still a lie. It is merely an auditable lie, flagged if it contradicts prior sealed facts.
- Tamper-evident memory: append-only ledger for facts, decisions, and state transitions.
- Hash-linked records: SHA-256 chaining across stored entries.
- Batch integrity proofs: Merkle checkpoints for efficient verification at scale.
- Deterministic audit exports: reproducible evidence for internal review and regulated workflows.
- Drop-in positioning: works on top of existing memory stores instead of replacing your stack.
| Environment | Status | Storage / Scaling |
|---|---|---|
| Local-Only | ✅ Production-Ready | SQLite + WAL + built-in Vector Search. Perfect for single daemons. |
| Self-Hosted | 🟡 Beta | Multi-tenant. API-driven. Redis cache. Pluggable to your infra. |
| Cloud-Ready | ⏳ Roadmap | AlloyDB/PostgreSQL + Qdrant. For distributed massive swarms. |
# 1. Start the ledger
$ cortex init
# 2. Store a memory
$ cortex memory store --agent "risk-bot" --content "Transaction flagged: IP mismatch"
[+] Fact stored. Ledger hash: 8f4a2b9e...
# 3. Verify integrity
$ cortex verify record 8f4a2b9e
[✔] VERIFIED: Hash chain intact. Merkle root sealed.
# 4. Tamper attempt (direct DB mutation)
$ sqlite3 cortex.db "UPDATE facts SET content='Transaction approved' WHERE id='8f4a2b9e'"
# 5. Ledger verification
$ cortex verify ledger
[✘] TAMPER DETECTED: Hash mismatch at block 8f4a2b9e
# 6. Export evidence
$ cortex compliance-report generate --format pdfStart logging tamper-evident memories locally in under a minute.
# 1. Install & Initialize
pip install cortex-persist
cortex init
# 2. Store a memory (SHA-256 hashed and chained to prior facts)
cortex memory store --agent "risk-bot" --content "Transaction flagged: IP mismatch"
# 3. Verify integrity (detects any manual database tampering)
cortex verify ledgerCORTEX wraps your existing state management. It does not replace your embeddings or vector search.
import asyncio
from cortex import CortexEngine
async def main() -> None:
engine = CortexEngine()
receipt = await engine.store_fact(
content="User approved transaction $5,000",
fact_type="decision",
project="fin-fraud-bot",
tenant_id="customer-123",
)
assert await engine.verify(receipt.hash) is True
asyncio.run(main())Typical execution on a standard cloud instance (4 vCPU, 16 GB RAM).
| Operation | Median | P95 | Notes |
|---|---|---|---|
| Memory Write | ~18 ms | ~35 ms | Local SQLite + SHA-256 |
| Verify Record | ~5 ms | ~12 ms | Single block validation |
| Merkle Checkpoint | ~85 ms | ~140 ms | Aggregating 10k records |
| Report Export | ~400 ms | ~800 ms | Lineage traversal |
CORTEX is governed by a strict zero-trust philosophy regarding generative AI output.
- Generative Output is Conjecture: We treat all LLM output as thermodynamically unstable (
Void-State). It only becomes durable memory after crossing the deterministic verification membrane. - SQL Sandboxing: Agents cannot run arbitrary queries; mutations must pass through rigid schema validation and formal AST checkpoints.
- Tamper Evidence over Access Control: Instead of just hoping admins don't edit rows, we hash-chain the ledger so any manual modification invalidates the mathematical proof of the memory thread.
Read the exhaustive cryptographic guarantees in our Security & Trust Model.
- Security & Trust Model — Cryptographic invariants & guarantees.
- Roadmap — Deployment phases and scaling logic.
- API Reference — SDK primitives and REST endpoints.
Apache License 2.0. See LICENSE.
Built by borjamoskv.com · cortexpersist.com
