Self-hosted memory for AI apps. No vendor cloud, no per-call billing, no SDK to install.
The open-source memory layer for AI apps you actually own. Just a Go binary, an HTTP API, and your data. Every claim has evidence, every contradiction surfaces, every decision replays — months later, in your infra.
No SDK to install. Any language with an HTTP client works. Below is Python; substitute curl, fetch, reqwest, etc.
import httpx, uuid
m = "http://localhost:7777"
run = str(uuid.uuid4())
# Remember something
httpx.post(f"{m}/v1/events", json={"events": [{
"id": str(uuid.uuid4()),
"run_id": run,
"source_input_id": "chat-session-1",
"content": "user prefers vegetarian options",
"timestamp": "2026-05-03T16:00:00Z",
"metadata": {"role": "preference"},
}]})
# Recall it later (months later, same call)
events = httpx.get(f"{m}/v1/events", params={"run_id": run}).json()That's the whole API for the simple case. For richer memory — typed claims, contradiction detection, evidence-back-to-source — keep reading.
| Approach | Best for | Trade-off |
|---|---|---|
| Hosted AI memory services | Fast onboarding, consumer apps | Vendor cloud, per-call billing, customer data leaves your infra |
| Vector DBs (Pinecone, Chroma, Weaviate) | Pure semantic search | No claim/contradiction structure, no evidence trace, no replay |
| Notes apps (Notion, Obsidian, Roam) | Humans organising their thinking | Not built for programmatic AI memory writes at scale |
| Mnemos | AI memory in stacks that can't leave your servers — regulated, on-prem, air-gapped | You run a binary |
# macOS / Linux (Homebrew)
brew tap felixgeelhaar/tap && brew install mnemos
# Go (any platform with Go 1.26+)
go install github.com/felixgeelhaar/mnemos/cmd/mnemos@latest
# Docker
docker run --rm ghcr.io/felixgeelhaar/mnemos --version
# From source
git clone https://github.com/felixgeelhaar/mnemos.git && cd mnemos && make installmnemos process --text "The deployment succeeded in production. The deployment did not succeed in production. Response times averaged 45ms."Mnemos extracts three claims, detects the contradiction between the first two, and flags them as contested.
mnemos query "What happened with the deployment?"The answer comes with the source claims, confidence scores, and surfaced contradictions — so you know what's true and what's contested.
mnemos process meeting-notes.md
mnemos query "What decisions were made?"No API keys required — rule-based extraction and contradiction detection work out of the box.
For querying real documents, set up an LLM provider. This enables semantic search, better extraction, and grounded answers:
export MNEMOS_LLM_PROVIDER=openai # or: anthropic, gemini, ollama, openai-compat
export MNEMOS_LLM_API_KEY=sk-...
# LLM extraction + embeddings + grounded query answers
mnemos process --llm --embed meeting-notes.md
mnemos query --llm "What decisions were made?"Without a provider, extraction and contradiction detection still work via rule-based heuristics. Queries use BM25 keyword matching, which works well for simple questions but may miss nuance on longer documents. With --embed (or any embedding provider configured), queries upgrade to a hybrid BM25 + cosine ranking — see "Query ranking" below for the full signal breakdown.
mnemos mcp # Exposes query_knowledge, process_text, and knowledge_metrics over stdioMnemos doubles as the audit substrate beneath any AI agent. Each
node-or-step emits one event keyed to a single run_id; the full
reasoning chain is one HTTP call away weeks later.
# A 4-node LangGraph refund-triage agent that wraps Mnemos for audit:
cd examples/refund_triage_langgraph
pip install -r requirements.txt
python agent.py --customer-id CUST-42 --amount 245.00
# Replay the exact decision chain
curl -s "http://localhost:7777/v1/events?run_id=<run-id>" | jqThe example uses raw HTTP (no SDK), so you can see the four lines per
node that get you a defensible audit trail. Source:
examples/refund_triage_langgraph/.
┌─────────────┐ ┌─────────────┐ ┌─────────────┐ ┌─────────────┐
│ Ingest │ -> │ Extract │ -> │ Relate │ -> │ Query │
│ (events) │ │ (claims) │ │ (evidence) │ │ (truth) │
└─────────────┘ └─────────────┘ └─────────────┘ └─────────────┘
Extract — Turns raw text into structured claims (facts, decisions, hypotheses) Relate — Detects support and contradiction relationships between claims Query — Returns answers with claims, evidence, and surfaced contradictions
{
"answer": "Tech stack decisions show contradiction: PostgreSQL vs MySQL",
"claims": [
{"text": "We decided to use PostgreSQL", "type": "decision", "confidence": 0.88},
{"text": "The team prefers MySQL", "type": "fact", "confidence": 0.75}
],
"contradictions": [
{"from": "claim-1", "to": "claim-2", "type": "contradicts"}
]
}| Traditional RAG | Mnemos | |
|---|---|---|
| Claims traced to evidence | ❌ | ✅ |
| Contradictions surfaced | ❌ | ✅ |
| Local-first / private | ❌ | ✅ |
| Grounded in governed data | ❌ | ✅ |
| Evolves over time | ❌ | ✅ |
- Evidence-backed claims — Every extracted claim maps to source material
- Contradiction detection — Automatically surface conflicting information
- Local-first — Your data stays on your machine (
~/.local/share/mnemos/) - Multi-provider extraction — Anthropic, OpenAI, Gemini, Ollama, and OpenAI-compatible endpoints
- Developer-friendly — CLI-first, JSON output, MCP-ready, pipeline-friendly
| Command | Description |
|---|---|
mnemos process <path or --text> |
Ingest + extract + relate in one step |
mnemos process --llm --text <text> |
Use LLM-backed extraction |
mnemos ingest <file> |
Ingest document as events |
mnemos extract --run <run-id> |
Extract claims from a run's events |
mnemos relate |
Detect relationships between claims |
mnemos query <question> |
Query with evidence |
mnemos query --hops <N> <question> |
Expand result claims by N supports/contradicts hops (max 5) |
mnemos query --llm <question> |
Query with LLM-grounded answer generation |
mnemos metrics |
Knowledge base statistics |
mnemos audit [--include-embeddings] |
Export the full knowledge base as JSON for compliance/backup |
mnemos resolve <winner> --over <loser> [--reason "..."] |
Resolve a contradiction: winner → resolved, loser → deprecated |
mnemos resolve <new> --supersedes <old> [--reason "..."] |
Temporal supersession: close old.valid_to at new.valid_from. Old claim keeps its status — it remained true while it was true. |
mnemos query --at YYYY-MM-DD "..." |
Point-in-time query against the temporal-validity layer |
mnemos query --include-history "..." |
Include superseded claims in the answer set (off by default) |
mnemos query --entity <name|id> "..." |
Restrict the answer to claims linked to this entity |
mnemos entities list [--type T] |
List canonicalised entities (people/orgs/projects/...) |
mnemos entities show <name|id> |
Show one entity and the claims linked to it |
mnemos entities merge <winner> <loser> |
Collapse one entity into another (manual canonicalisation) |
mnemos extract-entities [--all] |
Backfill entity links for claims that predate the v0.9 prompt |
mnemos reset [--keep-events] [--yes] |
Wipe claims/relationships/embeddings (events optional) |
mnemos delete-claim <id>... |
Delete specific claims and their derived state |
mnemos delete-event <id>... |
Delete events and cascade to derived claims |
mnemos reembed [--force] [--dry-run] |
(Re)generate claim embeddings under the current embed config |
mnemos recompute-trust |
Rebuild trust_score for every claim (confidence × corroboration × freshness) |
mnemos dedup [--threshold T] [--force] |
Merge near-duplicate claims by embedding cosine similarity (dry-run by default) |
mnemos query --min-trust X "..." |
Only return claims whose trust_score ≥ X |
mnemos query --kind causes,validates "..." |
Restrict hop expansion to specific edge kinds (causes, caused_by, supports, contradicts, validates, refutes, action_of, outcome_of, derived_from) |
mnemos query --service X --env prod --team Y "..." |
Multi-tenant scope filter on the answer claims |
mnemos process --no-relate ... |
Skip the relate stage for fast ingest; relate later in batch |
mnemos verify <claim-id> [--half-life-days N] |
Bump last_verified and verify_count; optional per-claim freshness override |
mnemos init [--force] |
Create .mnemos/mnemos.db for the current project (otherwise resolves to XDG global) |
mnemos doctor |
Health-check the install: store reachable, schema applied, env wired, LLM/embed configured |
mnemos quality |
Memory-quality telemetry: avg trust, avg confidence, stale/contested/contradiction counts |
mnemos trust --test=<requirement-ref> [--service X --env Y --team Z] |
Rank test_result claims under one requirement by epistemic credibility; surface winner + rationale |
mnemos incident open --title "..." [--severity sev1|sev2|sev3|sev4] / incident close <id> |
Track incident lifecycle alongside Decisions/Outcomes |
mnemos user create / list / rotate-token and mnemos agent register / list / authority |
JWT-auth admin: create operator users + non-human agents, manage authority scores |
mnemos metrics --workspace [--telemetry-opt-in|--telemetry-opt-out|--telemetry-send] |
North Star workspace view (active runs / evidence-backed claims) + opt-in anonymized payload |
Record real operational changes and their observed results so the synthesis layer can derive Lessons.
| Command | Description |
|---|---|
mnemos action record --kind <K> --subject <name> [--actor X] [--run R] |
Record an operational action (deploy, rollback, scale, ...) |
mnemos action list [--subject X|--run R] |
List recorded actions |
mnemos outcome record --action <id> --result <success|failure|partial|unknown> [--metric k=v]... |
Attach an observed outcome to an action |
mnemos outcome list [--action <id>] |
List outcomes |
| Command | Description |
|---|---|
mnemos synthesize [--min-corroboration N] [--min-confidence X] |
Cluster action→outcome chains into Lessons |
mnemos lessons [--service X|--trigger T] |
List validated lessons |
mnemos playbook synthesize |
Derive Playbooks from Lessons sharing a trigger |
mnemos playbook list [--service X] / mnemos playbook <trigger> |
Browse playbooks |
mnemos playbook show <id> |
Full playbook with steps |
| Command | Description |
|---|---|
mnemos decision record --statement "..." --risk <low|medium|high|critical> [--belief cl_id]... [--alternative "..."]... |
Record an agent decision with its belief evidence |
mnemos decision list [--risk X] / mnemos decision show <id> |
Audit recorded decisions |
mnemos decision attach-outcome <decision-id> <outcome-id> |
Wire an outcome onto a previously recorded decision |
| Command | Description |
|---|---|
mnemos export --kind <lesson|playbook> --id <id> [--out file.md] |
Export to YAML-frontmatter markdown |
mnemos import <file.md> |
Re-upsert a hand-edited markdown file |
mnemos history --kind <lesson|playbook> --id <id> |
List prior snapshots from *_versions |
Every claim carries a status: active, contested, resolved, or deprecated. Status changes are recorded in claim_status_history (from, to, when, why) so the lifecycle of every claim is auditable. When a query surfaces a claim whose status changed at some point, the answer text includes an Evolution: line summarizing the timeline — e.g. "Transitioned from contested to resolved on 2026-04-18 (evidence review by jane)."
| mnemos mcp | Start MCP server over stdio |
| mnemos serve [--port N] | Start HTTP registry server (default :7777) |
| mnemos registry connect <url> | Wire this project to a remote registry |
| mnemos push | Send local knowledge to the registry |
| mnemos pull | Fetch knowledge from the registry into the local DB |
mnemos serve exposes the local knowledge base as a small HTTP API so other tools, dashboards, or scripts can read and write without speaking SQLite. Cross-project federation and namespace scoping land in subsequent commits.
| Endpoint | Method | Description |
|---|---|---|
/health |
GET | Liveness probe + version |
/v1/events |
GET | List events (?limit, ?offset) |
/v1/events |
POST | Append a batch of events |
/v1/claims |
GET | List claims (?type=fact|hypothesis|decision, ?status=active|contested|resolved|deprecated, ?limit, ?offset) |
/v1/claims |
POST | Upsert a batch of claims (with optional evidence links) |
/v1/relationships |
GET | List relationships (?type=supports|contradicts, ?limit, ?offset) |
/v1/relationships |
POST | Upsert a batch of relationships |
/v1/embeddings |
GET | List embeddings (?entity_type=event|claim, ?limit, ?offset) |
/v1/embeddings |
POST | Upsert a batch of embeddings (vector as JSON float array) |
/v1/metrics |
GET | Counts mirroring mnemos metrics |
Defaults: limit=50, capped at 200. Port also accepts MNEMOS_SERVE_PORT. Request bodies cap at 5 MB.
Web UI. mnemos serve also serves a minimal single-page UI at GET /. It renders the metrics, paginated claims (with type/status filters), and the contradiction list by hitting the same /v1/* endpoints above. The HTML is embedded via //go:embed so there's no separate deploy step — one binary, one port.
Authentication. All write methods (POST/PUT/DELETE) require a JWT bearer token issued by the same mnemos serve instance: Authorization: Bearer <jwt>. Reads stay open by default — useful for browse-only dashboards. The signing key comes from MNEMOS_JWT_SECRET (hex-encoded, ≥ 32 bytes) or MNEMOS_AUTH_DIR/jwt-secret (auto-created on first boot, 0600). Issue tokens with mnemos token issue; revoke with mnemos token revoke. With no verifier configured, the registry is fully open (suitable for local dev and trusted networks).
The client-side MNEMOS_REGISTRY_TOKEN (used by mnemos push / mnemos pull to talk to a remote registry) is unrelated to inbound HTTP auth — see "Push / Pull" below.
Full HTTP schema: api/openapi.yaml.
mnemos serve --grpc-port 7778 exposes the same registry surface over gRPC for typed, streaming-capable clients. Schema: proto/mnemos/v1/mnemos.proto. The service mirrors HTTP and covers Phase 2-7 entities: ListEvents/AppendEvents, ListClaims/AppendClaims, ListRelationships/AppendRelationships, ListEmbeddings/AppendEmbeddings, Metrics, plus List*/Append* for Actions, Outcomes, Lessons, Decisions, Playbooks, EntityRelationships. Auth uses the JWT verifier (MNEMOS_JWT_SECRET or MNEMOS_AUTH_DIR); send authorization: Bearer <jwt> metadata. With no verifier configured, auth is disabled — appropriate for local development only.
The HTTP API at mnemos serve is the integration surface. Three flavors:
Go (typed client) — import "github.com/felixgeelhaar/mnemos/client":
c := client.New("http://localhost:7777",
client.WithToken("optional-secret"),
client.WithLogger(logger), // *bolt.Logger
client.WithRetry(retry.Config{ // fortify retry; 5xx + 429 retry, 4xx fail fast
MaxAttempts: 3,
InitialDelay: 200 * time.Millisecond,
MaxDelay: time.Second,
BackoffPolicy: retry.BackoffExponential,
Jitter: true,
}),
)
// Write
c.Events().Append(ctx, []client.Event{{
ID: "ev_1", RunID: "session-A", SchemaVersion: "v1",
Content: "We chose Postgres for the new service",
SourceInputID: "src_1", Timestamp: client.FormatTime(time.Now()),
}})
// Read with chained filters
list, _ := c.Claims().Type("decision").Status("active").Limit(25).List(ctx)
for _, claim := range list.Claims {
fmt.Printf("[%s] %s\n", claim.Type, claim.Text)
}Resource accessors (Events(), Claims(), Relationships(), Embeddings()) return fluent builders. Filter methods chain; terminal List(ctx) reads, Append(ctx, ...) writes. Non-2xx responses return *client.APIError with the server's status and message; works with errors.As. Built-in bolt request logging and fortify retry-with-backoff. Safe for concurrent use.
Any other language (curl):
# Append an event
curl -X POST http://localhost:7777/v1/events \
-H 'Content-Type: application/json' \
-H 'Authorization: Bearer <optional-token>' \
-d '{"events":[{"id":"ev_1","content":"...","timestamp":"2026-04-19T10:00:00Z"}]}'
# Browse claims, filtered
curl 'http://localhost:7777/v1/claims?type=decision&limit=25'Python (stdlib):
import json, urllib.request
req = urllib.request.Request(
"http://localhost:7777/v1/events",
data=json.dumps({"events": [{"id": "ev_1", "content": "...", "timestamp": "2026-04-19T10:00:00Z"}]}).encode(),
headers={"Content-Type": "application/json", "Authorization": "Bearer <token>"},
)
urllib.request.urlopen(req)For an AI agent: skip the HTTP API entirely and use the MCP transport (mnemos mcp). Agents that speak MCP get the same surface plus query_knowledge, process_text, browsing, file watching, and git ingestion already wired up.
Once a project is connected to a registry, knowledge flows like git:
mnemos registry connect https://registry.example.com --token <secret>
mnemos push # send local events/claims/relationships
mnemos pull # fetch remote knowledge into the local DBregistry connect writes .mnemos/config.json. Resolution precedence for push/pull is CLI flags (--url, --token) > env vars (MNEMOS_REGISTRY_URL, MNEMOS_REGISTRY_TOKEN) > config file, so CI can override per-job without editing the file.
Sync is idempotent — IDs are the dedup key, so running push/pull twice is safe. Vectors transfer too: embeddings ride on the same wire as JSON float arrays and round-trip bit-exact, so semantic ranking on pulled content works without re-embedding. Claim-evidence links travel with the claims so the local query engine can resolve pulled claims back to their source events.
Federation provenance. Pulled events get stamped with pulled_from_registry: <url> in their metadata. The query engine surfaces this in the answer text — claims sourced from a registry appear as … (from https://reg.example.com) and the summary line counts them: Context used 5 event(s) and 8 claim(s) (3 from a connected registry). Local claims are unmarked (the no-registry case stays uncluttered). The claim_provenance field on the MCP query_knowledge response carries the same map programmatically.
cmd/mnemos # CLI entrypoint (CLI + mcp + serve subcommands)
proto/mnemos/v1 # gRPC schema (Phase 2-7 entities)
internal/
domain/ # Core types: Event, Claim, ClaimEvidence, Relationship, EmbeddingRecord, Action, Outcome, Lesson, Decision, Playbook, Scope
ports/ # Interfaces for engines and repositories
pipeline/ # Shared orchestration (extraction, persistence, embeddings)
ingest/ # Multi-format input ingestion
parser/ # Input-to-event normalization
extract/ # Claim extraction with evidence mapping
relate/ # Relationship + causal edge detection (supports, contradicts, causes, validates, ...)
query/ # Query assembly and ranking (BM25 + cosine hybrid)
embedding/ # Vector embedding client abstraction
llm/ # LLM client abstraction (multi-provider)
synthesize/ # Cluster action→outcome chains into Lessons; Lessons → Playbooks
markdown/ # YAML-frontmatter round-trip for Lessons + Playbooks
adapters/outcomes/ # Pull-based Outcome sources (Prometheus instant-query)
store/ # URL-scheme dispatched repository registry (ADR 0001)
store/sqlite/ # SQLite + FTS5 (sqlc-generated)
store/memory/ # In-process backend
store/postgres/ # Postgres / Postgres-wire-compatible engines
store/mysql/ # MySQL / MariaDB / MySQL-wire-compatible engines
store/libsql/ # libSQL / Turso (remote + local file)
workflow/ # Job runner with retries and structured logs
trust/ # Trust scoring (confidence × corroboration × freshness)
autoedge/ # Polymorphic cross-entity edges + auto-fire
auth/ # JWT signing + bearer-token enforcement
server/ # HTTP REST + gRPC server wiring
| Variable | Description |
|---|---|
MNEMOS_DB_URL |
Storage DSN dispatched by URL scheme: sqlite:///var/lib/mnemos/mnemos.db, memory://, postgres://..., mysql://..., libsql://.... When unset, Mnemos walks up from CWD looking for .mnemos/mnemos.db, falling back to ~/.local/share/mnemos/mnemos.db. See ADR 0001. |
MNEMOS_LLM_PROVIDER |
anthropic, openai, gemini, ollama, openai-compat |
MNEMOS_LLM_API_KEY |
API key (required for cloud providers) |
MNEMOS_LLM_MODEL |
Model override (optional) |
MNEMOS_LLM_BASE_URL |
Custom endpoint. Required for openai-compat. Required for ollama when Mnemos is not on the same host as the Ollama daemon — most commonly when Mnemos runs in a container and Ollama runs on the host (http://host.docker.internal:11434 on Docker Desktop, http://172.17.0.1:11434 on Linux). Defaults to http://localhost:11434 for ollama. |
MNEMOS_LLM_TIMEOUT |
Per-request LLM HTTP timeout (default 120s). Bump for slow local models or large completions: MNEMOS_LLM_TIMEOUT=5m. |
MNEMOS_EXTRACT_MODEL |
Override MNEMOS_LLM_MODEL just for the extract stage. Lets you pair a strong model for extraction with a smaller model elsewhere. |
MNEMOS_JOB_TIMEOUT |
Overall workflow-job deadline (default 10m). Raise this if your provider is slow enough that an entire process run exceeds 10 minutes. |
MNEMOS_EMBED_PROVIDER |
Embedding provider (falls back to LLM_PROVIDER) |
MNEMOS_EMBED_API_KEY |
Embedding API key (falls back to LLM_API_KEY) |
MNEMOS_EMBED_MODEL |
Embedding model override (optional) |
MNEMOS_EMBED_BASE_URL |
Embedding endpoint (same container/host caveat as MNEMOS_LLM_BASE_URL) |
MNEMOS_EMBED_TIMEOUT |
Per-request embedding HTTP timeout (default 60s) |
MNEMOS_AUTH_DIR |
Directory for the JWT signing secret (default: project .mnemos/ or $HOME/.mnemos/). Override when running on a read-only rootfs (Docker read_only: true, k8s readOnlyRootFilesystem: true) by pointing at a writable volume. |
MNEMOS_JWT_SECRET |
Hex-encoded JWT signing secret (≥32 bytes). When set, takes precedence over the file path; useful in CI/Kubernetes where you'd rather inject the secret as an env var than mount a file. |
MNEMOS_LLM_CACHE_MAX_BYTES |
LLM extraction cache cap under data/cache/llm-extraction/ (default 1 GiB; 0 disables eviction). Oldest-mtime files are evicted first. |
MNEMOS_DB_MAX_CONNS |
Postgres/MySQL pool MaxOpenConns (default 25). |
MNEMOS_DB_MAX_IDLE_CONNS |
Postgres/MySQL pool MaxIdleConns (default 5). |
MNEMOS_DB_CONN_MAX_LIFETIME |
Postgres/MySQL pool ConnMaxLifetime (default 30m). |
MNEMOS_TELEMETRY_OPTIN |
Truthy (1/true/yes) to opt in to anonymized usage payload. Default off. See docs/telemetry.md. |
MNEMOS_TELEMETRY_ENDPOINT |
POST destination for mnemos metrics --workspace --telemetry-send. Unset = no destination = no requests, even with opt-in active. |
Every claim carries a trust_score ∈ [0, 1] derived from three
signals the LLM cannot fake:
trust = confidence × corroboration × freshness
corroboration = 1 + ln(evidence_count) × 0.2 # 1 source: 1.0; 5: 1.32; 20: 1.60
freshness = max(0.3, exp(-days_since_latest / 90)) # 90-day half-life, floor 0.3
The score is recomputed automatically after every process run; you
can rebuild it manually with mnemos recompute-trust (e.g., after
upgrading or tuning the constants in internal/trust).
mnemos query --min-trust 0.5 "..." filters out low-confidence
results before ranking. mnemos metrics reports avg_trust and
low_trust_count for at-a-glance corpus quality. The
trust-scoring policy lives in internal/trust/trust.go — change
the constants there to retune for your corpus, then run
mnemos recompute-trust to backfill.
Mnemos now ranks query results with a hybrid signal:
- BM25 over an FTS5 keyword index (added v0.10) catches lexical hits — proper nouns, exact terminology, code snippets — that pure cosine misses.
- Cosine similarity over stored embeddings catches paraphrases and synonyms that BM25 misses.
Each signal is max-normalised into [0, 1] per query, then
equal-weighted into a single composite score. When only one signal
is available (no embeddings yet, or no FTS index for some reason),
that signal carries full weight without further tuning. The
in-memory token-overlap ranker survives as the ultimate fallback for
test doubles and embedding-less, FTS-less deployments.
The FTS5 indexes (events_fts, claims_fts) are auto-created and
backfilled on the v0.9 → v0.10 schema migration; no operator action
required. They're kept current by INSERT/UPDATE/DELETE triggers on
the source tables so reads don't have to think about staleness.
Mnemos canonicalises noun-phrases ("Felix Geelhaar", "Acme", "PostgreSQL", "Berlin", ...) into first-class entity nodes that exist independently of any one claim. Once entities exist you can ask entity-scoped questions:
mnemos entities list --type person
mnemos entities show "Felix Geelhaar"
mnemos query --entity "Felix Geelhaar" "what does he need this week?"How they get created. The v1.4 LLM extraction prompt tags every
claim with the named entities it mentions. After mnemos process
persists claims, the pipeline materialises those tags into the
entities and claim_entities tables, deduping by
(normalized_name, type) so "Felix", "felixgeelhaar", and
"Felix Geelhaar" land on different ids only if the LLM gives them
different names — manual canonicalisation closes the gap:
mnemos entities merge en_abc123 en_def456 # winner absorbs loserFor databases that pre-date v0.9 (claims extracted under the v1.3
prompt or earlier), mnemos extract-entities --all re-runs the
LLM over stored claim text to backfill entity links. It batches
through the LLM cache, so a re-run on the same content is free.
Every claim carries a validity interval — valid_from (when the
fact became true) and valid_to (when it stopped being true; NULL
means "still in force"). The pipeline derives valid_from from the
earliest evidence event's timestamp at insert time, so backfilled
ingest gets correct timelines without operator effort.
Two new behaviors fall out:
- Default queries hide superseded claims.
mnemos query "..."filters out claims whosevalid_tois in the past, so "Felix is a junior engineer" stops surfacing once "senior engineer" closes its interval. Pass--include-historyto see both. - Point-in-time queries.
mnemos query --at 2026-03-01 "..."returns the answer as it would have been on that date — handy for audit trails and "what did we believe at the time?" questions.
To close one claim's interval when a new one takes its place:
mnemos resolve cl_new --supersedes cl_old --reason "promoted 2026-04"--supersedes is distinct from --over (the contradiction
resolver). --over says "one of these was always wrong and the
other right"; --supersedes says "this fact changed". The latter
preserves the old claim's status — it remained true while it was
true — and only sets valid_to. Auto-supersession (heuristic
detection without operator action) is on the v0.9 roadmap.
Mnemos v0.6.1+ auto-migrates older databases on sqlite.Open — no
mnemos reset or DB delete needed. The migration is idempotent and
adds the created_by / changed_by columns the auth feature
introduced in v0.6.0. Schema generation is tracked via
PRAGMA user_version, so re-running on an already-migrated DB is a
no-op.
Tested combinations and known quirks. The extract pipeline is tolerant to
common reasoning-model output (<think> blocks, prose preambles, ```json
fences), so most models work; the table calls out exceptions.
| Model | LLM | Embed | Notes |
|---|---|---|---|
llama3.2:latest |
✅ | — | Fast, reliable, clean JSON |
mistral:latest |
✅ | — | Fast; occasional prose preamble (handled) |
qwen3:* |
✅ | — | Emits <think>...</think> blocks (stripped automatically); pair with MNEMOS_LLM_TIMEOUT=2m+ if reasoning is long |
deepseek-r1:* |
✅ | — | Same reasoning-block handling as qwen3 |
gpt-oss:20b |
— | Strong structured output but slow on consumer hardware → set MNEMOS_LLM_TIMEOUT=5m and MNEMOS_JOB_TIMEOUT=15m |
|
gemma3:* |
❌ | — | No tool/structured-output support in current Ollama builds |
nomic-embed-text |
— | ✅ | 768-dim embeddings, fast; the recommended local embed model |
Quick start for fully-local Mnemos:
ollama pull llama3.2 nomic-embed-text
export MNEMOS_LLM_PROVIDER=ollama
export MNEMOS_LLM_MODEL=llama3.2
export MNEMOS_EMBED_MODEL=nomic-embed-text
mnemos process --llm --embed --text "Your knowledge here"Container note. When Mnemos runs in Docker/Podman and Ollama runs on
the host, set MNEMOS_LLM_BASE_URL=http://host.docker.internal:11434
(Docker Desktop) or http://172.17.0.1:11434 (Linux Docker). The default
http://localhost:11434 resolves to the container itself and will fail
with connection refused.
make check # Format, lint, test, build (CI equivalent)
make build # Build bin/mnemos
make test # Run tests (includes 102 eval cases)
make sqlc # Regenerate sqlc query code
make release-check # Validate GoReleaser configPhase 1: Developer Primitive — Available now.
- Rule-based and LLM-powered extraction with eval coverage
- Embeddings for semantic search
- CLI + MCP server + HTTP REST + gRPC entrypoints
- 102 eval cases (90 extraction + 12 relationship detection)
- Pluggable storage backends per ADR 0001: SQLite, in-memory, Postgres, MySQL/MariaDB, libSQL/Turso
Mnemos has shipped a self-learning loop on top of the evidence layer:
- Causal edges —
causes,caused_by,action_of,outcome_of,validates,refutes,derived_fromextend the relationship graph beyond logical agreement.relate.DetectCausalinfers these from event-time + shared-entity signals; the optionalrelate.DetectCausalLLMaugments borderline pairs via LLM disambiguation. - Action + Outcome recording —
mnemos action record/mnemos outcome recordcapture operational changes and their observed metrics. The Prometheus pull adapter (internal/adapters/outcomes/prometheus.go) scrapes metrics and produces Outcomes automatically. - Lessons synthesis —
mnemos synthesizeclusters action→outcome chains into validated Lessons (confidence = corroboration × consistency × recency). - Playbooks —
mnemos playbook synthesizederives steps-only operational intelligence from Lesson clusters; Praxis (or any execution layer) consumes them. - Decisions —
mnemos decision recordaudits agent reasoning with belief claims, alternatives, and risk level; outcomes attach later viadecision attach-outcome. - Temporal hardening — per-claim
last_verified,verify_count,half_life_days.mnemos verifyre-confirms a claim;Answer.StaleClaimIDssurfaces decay below the trust floor. - Multi-tenant scope —
Scope{Service, Env, Team}on Claims, Lessons, Decisions, Playbooks;mnemos query --service X --env prodfilters the answer. - Human-editable layer —
mnemos export+mnemos importround-trip Lessons/Playbooks to Git-friendly YAML+markdown;mnemos historylists snapshots from system-versioned*_versionstables.
Marketing claim: "evidence-based memory that learns from actions over time, with provable causality, scoped multi-tenancy, and a human-editable corrections loop."
Contributions welcome. See PRD.md for product direction and TDD.md for technical design.
Tagged releases are published with GoReleaser via .github/workflows/release.yml, including Homebrew formula updates and Docker images. Human-readable release history: CHANGELOG.md.
Auth surfaces, threat model, container hardening, and secret management: SECURITY.md.
Default off. Two independent gates (opt-in flag + endpoint URL) must hold for any payload to leave the host. Privacy posture, payload schema, and opt-in/opt-out flows: docs/telemetry.md.
SLO: 99.9% availability over 30 days, p99 read 250ms, p99 write 500ms. Error-budget burn alerts in SLO.md. Mutation-testing gate at 70% kill rate on internal/trust (currently 100% / 45 mutants caught) — see docs/testing/mutation.md.
MIT