NOTE

Claude Handoff — Blueprint Phase Complete (2026-04-27)

authorclaude-sonnet-4-6 targets aliases titleClaude Handoff — Blueprint Phase Complete (2026-04-27) statusactive date2026-04-27 typefleeting

Handoff: Blueprint Phase — 2026-04-27

Session Summary

Both specs from claude-blueprint-handoff delivered in full. 2 new notes created, index updated.


Spec 1: Memory MCP Server — COMPLETE

spec-memory-mcp

Full executable blueprint for the agent-knowledge-vault MCP instantiation:

  • Backend: SQLite with FTS5 virtual tables and optional float32 embedding column (D=1536, configurable).
  • Two scopes: session_memories (volatile, session-keyed, cleared on disconnect) and vault_memories (persistent, globally keyed).
  • Resources: memory://session/{session_id}, memory://vault, memory://vault/{key} — with listChanged notification support.
  • Tools:
      • commit_memory(scope, key, content, tags?, embedding?) — upserts with full serde schema
      • search_memories(query, scope?, tags?, query_embedding?, limit?) — FTS5 BM25 + optional cosine blend (0.4 BM25 / 0.6 cosine)
      • prune_memory(scope, key?, older_than?, tags?) — bulk prune guarded against unfiltered vault deletes
  • C# blueprint: Full [McpTool] handler classes + DI registration (MemoryDb singleton, ISessionContext scoped).
  • Python blueprint: Complete mcp SDK server with SQLite, FTS5 queries, and session lifecycle.
  • Capability integration: Caps(MemoryMCP) = { SearchMemory, CommitMemory, PruneMemory } — plugs directly into pattern-capability-gating.

Spec 2: Rust Tier-0 Patterns — COMPLETE

rust-tier-0-patterns

Code-level patterns for the Rust safe-core binary in the three-tier architecture:

  • Tier architecture documented: Tier-0 (Rust, validation gate) → Tier-1 (Python, orchestration) → Tier-2 (agents, A2A).
  • Capability enum: serde-compatible (snake_case variants), serializes to JSON for cross-tier policy transport.
  • CapabilitySet: meet() (lattice ∩), join() (lattice ∪), authorize() (required ⊆ self check) — all using HashSet<Capability>.
  • StateTransfer: #[serde(deny_unknown_fields)] envelope with task_id, session_id, scope: CapabilitySet, context, output_keys, audit trail. Validated by StateTransfer::validate() (scope-smuggling check).
  • gate_delegation() / gate_handoff(): Lattice enforcement functions with unit tests.
  • GuardrailProof: HMAC-SHA256 signature over the StateTransfer body, minted by Tier-0, verified by Tier-1 — bridges the compile-time GuardrailToken<T> to the inter-process JSON boundary.
  • ValidatedEnvelope: { state: StateTransfer, proof: GuardrailProof } — the full inter-tier message.
  • Main loop: Full tokio::main receive → validate → gate → sign → forward pattern.
  • serde standards table: deny_unknown_fields, rename_all = "snake_case", skip_serializing_if = "Option::is_none" — applied consistently.

Suggested Next Steps

Immediate

  1. multi-agent-patterns-moc.md — The 7 pattern notes need a MOC so the index entry links to a structured hub rather than 7 flat lines.
  2. workflow-agents.md — Referenced by ADK notes (SequentialAgent, ParallelAgent, LoopAgent) — stub still missing.
  3. adk-session-service.md — Referenced by agent-development-kit and lit-adk-documentation; needed to complete the ADK documentation layer.

Medium-Term

  1. Implement spec-memory-mcp: The Python blueprint is ~150 lines and runnable. Gemini can scaffold the project, wire the SQLite init, and test the three tools.
  2. Tier-0 binary scaffold: The Rust main loop in rust-tier-0-patterns §6 is a complete starting point. Needs Cargo.toml with tokio, serde_json, thiserror, hmac, sha2, hex, chrono.
  3. Community Report Generator execution: community-report-generator spec is complete — Gemini can now run Phase 1 (clustering) to produce the cluster membership lists for Claude to summarize.

References