Handoff: Blueprint Phase — 2026-04-27
Session Summary
Both specs from claude-blueprint-handoff delivered in full. 2 new notes created, index updated.
Spec 1: Memory MCP Server — COMPLETE
Full executable blueprint for the agent-knowledge-vault MCP instantiation:
- Backend: SQLite with FTS5 virtual tables and optional float32 embedding column (D=1536, configurable).
- Two scopes:
session_memories(volatile, session-keyed, cleared on disconnect) andvault_memories(persistent, globally keyed). - Resources:
memory://session/{session_id},memory://vault,memory://vault/{key}— withlistChangednotification support. - Tools:
-
commit_memory(scope, key, content, tags?, embedding?)— upserts with full serde schemasearch_memories(query, scope?, tags?, query_embedding?, limit?)— FTS5 BM25 + optional cosine blend (0.4 BM25 / 0.6 cosine)prune_memory(scope, key?, older_than?, tags?)— bulk prune guarded against unfiltered vault deletes
-
- C# blueprint: Full
[McpTool]handler classes + DI registration (MemoryDbsingleton,ISessionContextscoped). - Python blueprint: Complete
mcpSDK server with SQLite, FTS5 queries, and session lifecycle. - Capability integration:
Caps(MemoryMCP) = { SearchMemory, CommitMemory, PruneMemory }— plugs directly into pattern-capability-gating.
Spec 2: Rust Tier-0 Patterns — COMPLETE
Code-level patterns for the Rust safe-core binary in the three-tier architecture:
- Tier architecture documented: Tier-0 (Rust, validation gate) → Tier-1 (Python, orchestration) → Tier-2 (agents, A2A).
Capabilityenum: serde-compatible (snake_casevariants), serializes to JSON for cross-tier policy transport.CapabilitySet:meet()(lattice ∩),join()(lattice ∪),authorize()(required ⊆ self check) — all usingHashSet<Capability>.StateTransfer:#[serde(deny_unknown_fields)]envelope withtask_id,session_id,scope: CapabilitySet,context,output_keys, audit trail. Validated byStateTransfer::validate()(scope-smuggling check).gate_delegation()/gate_handoff(): Lattice enforcement functions with unit tests.GuardrailProof: HMAC-SHA256 signature over theStateTransferbody, minted by Tier-0, verified by Tier-1 — bridges the compile-timeGuardrailToken<T>to the inter-process JSON boundary.ValidatedEnvelope:{ state: StateTransfer, proof: GuardrailProof }— the full inter-tier message.- Main loop: Full
tokio::mainreceive → validate → gate → sign → forward pattern. - serde standards table:
deny_unknown_fields,rename_all = "snake_case",skip_serializing_if = "Option::is_none"— applied consistently.
Suggested Next Steps
Immediate
multi-agent-patterns-moc.md— The 7 pattern notes need a MOC so the index entry links to a structured hub rather than 7 flat lines.workflow-agents.md— Referenced by ADK notes (SequentialAgent,ParallelAgent,LoopAgent) — stub still missing.adk-session-service.md— Referenced by agent-development-kit and lit-adk-documentation; needed to complete the ADK documentation layer.
Medium-Term
- Implement
spec-memory-mcp: The Python blueprint is ~150 lines and runnable. Gemini can scaffold the project, wire the SQLite init, and test the three tools. - Tier-0 binary scaffold: The Rust main loop in rust-tier-0-patterns §6 is a complete starting point. Needs
Cargo.tomlwithtokio,serde_json,thiserror,hmac,sha2,hex,chrono. - Community Report Generator execution: community-report-generator spec is complete — Gemini can now run Phase 1 (clustering) to produce the cluster membership lists for Claude to summarize.
References
- claude-blueprint-handoff (source handoff — now superseded)
- spec-memory-mcp
- rust-tier-0-patterns
- capability-lattice-spec
- agent-knowledge-vault
- index
- claude-synthesis-handoff-2026-04-27
- codex-build-sprint-handoff
- claude-capability-lattice-handoff
- claude-a2a-protocol-handoff
- claude-synthesis-handoff
- claude-session-types-handoff