npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

@weavory/mcp

v0.1.22

Published

weavory.ai — Responsible-AI memory for agent swarms. Every belief signed, every decision auditable. MCP-native.

Readme

weavory.ai

Responsible-AI memory for agent swarms. Every belief signed. Every decision auditable. Works with any MCP-native agent — in five tools.

npm license tests ci

Why Responsible AI

Agents in banking, insurance, and healthcare can't be trusted without a paper trail. Today, when an agent denies a claim, nothing signed that. When it changes its mind, nothing records the history. When compliance asks what it knew on Tuesday, nothing answers. weavory is the shared memory layer that closes that gap — signed beliefs, per-(signer, predicate) trust gating, hash-chained audit, bi-temporal replay, and revocation by tombstone — in an MCP-native server any agent can spawn with one command.


Install

# npx — zero install, no build
npx -y @weavory/mcp start

# Docker — multi-arch (linux/amd64, linux/arm64)
docker run -v weavory-data:/data ghcr.io/deepakkts/weavory:latest

# From source
git clone https://github.com/DeepakKTS/weavory.ai.git
cd weavory.ai && pnpm install && pnpm build

The server speaks MCP over stdio. Point Claude Desktop, Cursor, any MCP-capable agent, or the official MCP SDKs at it. See docs/INSTALL.md for the Claude Desktop config snippet.


The five tools

| Tool | What it does | |------|--------------| | weavory_believe | Sign a claim (Ed25519), content-address it (BLAKE3), store it, append to the audit chain, fan out to matching subscribers. | | weavory_recall | Retrieve beliefs with trust gating, bi-temporal as_of, quarantine filter, tombstone visibility (include_tombstoned), and subject / predicate / confidence filters. | | weavory_subscribe | Register a bounded queue keyed on a pattern + filters. Drain via recall. | | weavory_attest | Update trust(signer, topic) in [-1, 1]. | | weavory_forget | Tombstone a belief — invalidated_at set, history preserved for as_of queries. |

This is the complete public API. No magic, no hidden surface.


60-second example

Four agents triage a $42,000 insurance claim: intake → fraud → underwriting → approver. An unknown signer tries to inject a forged approval. Under WEAVORY_ADVERSARIAL=1, weavory's default trust floor (0.6) quarantines the forgery automatically. The honest chain completes. An incident JSON is exported for forensic replay.

pnpm exec tsx examples/bfsi_claims_triage.ts

Self-asserts: the attacker's belief is never visible in the approver's default recall (under WEAVORY_ADVERSARIAL=1 where the trust floor is 0.6), but is visible in the compliance audit view (min_trust: -1, include_quarantined: true, include_tombstoned: true). Audit chain verifies ok at the end.

Full walkthrough in docs/REAL_WORLD_USAGE.md.


What you get

  • Ed25519-signed beliefs — every claim is cryptographically attributable to a signer.
  • BLAKE3 hash-chained audit log — retroactive edits break the chain; tamper is detected.
  • Trust-gated recall — per-(signer, predicate) trust in [-1, 1]. Default min_trust=0.3 (0.6 under WEAVORY_ADVERSARIAL=1); neutral trust for an unattested signer is 0.5. Pass min_trust: 0.6 explicitly to enforce "only attested signers" without adversarial mode. Attest at topic=<predicate> to gate that predicate.
  • Bi-temporal replayrecall({ as_of: "<ISO>" }) reconstructs the world as it was at any past instant.
  • Dual persistence — JSONL (default, zero native deps, synchronously durable) or DuckDB (opt-in, WAL-backed) with graceful binary fallback.
  • Pre-ingest policy hookWEAVORY_POLICY_FILE=<json> for allow / deny rules on subjects (glob), predicates (exact), payload size.
  • Incident export + replayexportIncident() snapshots state; weavory replay --from <path> rehydrates off-process for review.
  • Honest scope — G-Set beliefs + LWW tombstones + optional consensus merge. Not a full state-merging CRDT; we don't overclaim.

Canonical audit view — compliance-grade enumeration of every belief under a subject, including tombstoned and quarantined:

weavory_recall({
  query: "",
  filters: { subject: "claim/CLM-42017" },
  min_trust: -1,
  include_quarantined: true,
  include_tombstoned: true,
  top_k: 100,
})

Works with any MCP-native agent

Weavory's only interface is the five MCP tools — any MCP-capable agent can use it from docs/README.md alone. We verify this end-to-end by running a stock Claude Opus 4.7 agent against the public quickstart, with no agent-specific wiring, and recording every tool call + result.

Excerpt — the stock agent discovers Alice's belief, trusts her, and answers:

weavory_recall({ query: "traffic cambridge", top_k: 5 })
weavory_attest({ signer_id: "<alice>", topic: "observation", score: 0.9 })
→ "Yes, Cambridge is congested with an ETA delta of 14 minutes."

Documentation

| Doc | What's inside | |-----|---------------| | docs/README.md | 60-second quickstart | | docs/ARCHITECTURE.md | One-page system model | | docs/REAL_WORLD_USAGE.md | Enterprise integration patterns + the BFSI scenario | | docs/INSTALL.md | Three install paths, Claude Desktop config | | docs/DEPLOYMENT.md | Env-var reference, persistence modes, Compose | | docs/RUNBOOK.md | Operational scenarios — restart, policy denial, incident replay, key rotation | | docs/COMPLIANCE.md | SOC2 / ISO27001 / GDPR / EU AI Act / NIST AI-RMF mapping | | docs/SECURITY.md | Protected · mitigated · deferred |


Status

  • 232/232 automated tests — unit + integration + performance
  • CI green on Ubuntu + macOS with Node 22 LTS
  • Strict TypeScript — no any in src/
  • Published to npm and GitHub Container Registry on every release tag
  • Time-to-first-belief from fresh npx -y @weavory/mcp start: under 30 seconds

What weavory is not (deliberate scope)

  • Not a generic memory-as-a-service — run one weavory per trust boundary.
  • Not a vector database — substring recall today.
  • Not federated — single writer per data directory.
  • Not multi-tenant — isolation is filesystem / process level.
  • Not encrypted at rest — use filesystem-layer encryption (LUKS, EFS/KMS).
  • Not an identity provider — signer IDs are public keys; SSO mapping is external.

Each is a documented boundary, not a hidden gap.


Contributing

Issues and PRs welcome. Please read docs/ARCHITECTURE.md before proposing core changes; the public API (five MCP tools) is locked and any new surface requires a design discussion.

Run the full test suite before submitting:

pnpm install && pnpm test && pnpm lint

License

Apache-2.0. See LICENSE and NOTICE.

Copyright © 2026 DeepakKTS.


Built for NandaHack 2026 @ MIT Media Lab.