# ๐Ÿ›ก๏ธ GoMCP: The Secure Memory Core for AI Agents [๐Ÿ‡บ๐Ÿ‡ธ English](README.md) | [๐Ÿ‡ท๐Ÿ‡บ ะ ัƒััะบะธะน](README_ru.md) | [๐Ÿ‡จ๐Ÿ‡ณ ็ฎ€ไฝ“ไธญๆ–‡](README_zh.md) [![Go Version](https://img.shields.io/badge/go-1.22+-blue.svg)](https://go.dev) [![License](https://img.shields.io/badge/License-Apache_2.0-blue.svg)](https://opensource.org/licenses/Apache-2.0) [![Protocol](https://img.shields.io/badge/MCP-Supported-orange.svg)](https://modelcontextprotocol.io/) > **"The only RLM memory server with mathematically proven security (Sentinel Lattice). Runs locally, scales globally."** > Part of the [Syntrex AI SOC](https://syntrex.pro) ecosystem. GoMCP is the enterprise core of the Syntrex AI SOC ecosystem. It is an extremely fast, secure, and persistent Model Context Protocol (MCP) server entirely written in Go. GoMCP gives Large Language Models a permanent, evolving memory and self-modifying context, transforming standard text agents into self-improving persistent intelligences. ## ๐Ÿš€ Key Features - ๐Ÿ›ก๏ธ **Sentinel Lattice Primitives:** (TSA, CAFL, GPS...) - โšก **Sub-millisecond latency:** Pure Go execution with optional Rust bindings - ๐Ÿ”Œ **57+ Native MCP Tools:** Deeply integrated tools right out of the box - ๐Ÿ’พ **Persistent Causal Graph Memory:** Hierarchical memory layers (L0-L3) backed by robust SQLite temporal caching ## โšก Quick Start Get up and running in 30 seconds: ```bash # Install go install github.com/syntrex-lab/gomcp@latest # Initialize gomcp init # Run gomcp serve --port 9100 ``` ## ๐Ÿ“ฆ Installation Options ### From Source ```bash git clone https://github.com/syntrex-lab/gomcp.git cd gomcp go build -o gomcp ./cmd/gomcp ``` ### Docker ```bash docker run -d -p 9100:9100 syntrex/gomcp:latest ``` ### Package Managers - **Homebrew (macOS)**: `brew install syntrex-lab/tap/gomcp` *(planned)* - **Chocolatey (Windows)**: `choco install gomcp` *(planned)* ## ๐Ÿง  Use Cases - **Autonomous Agents:** Build agents with infinite, structured memory. - **Secure RAG:** Query codebases with provable bounds and role-based clearance. - **Local AI Context:** Supercharge your local LLMs (Ollama, vLLM) with a centralized context nervous system. ## ๐Ÿ—๏ธ Architecture ```mermaid graph LR LLM["๐Ÿค– LLM Agent
(Ollama/vLLM)"] <-->|MCP| Server subgraph Server["๐Ÿ›ก๏ธ GoMCP Server"] DIP["DIP Pipeline & Oracle Guard"] Mem["Cยณ Memory (L0-L3)"] Sync["Sentinel Lattice Sync"] end Server <-->|Tools| Env["๐Ÿ’ป Environment &
Local Resources"] ``` GoMCP sits between your LLM and the world, providing: - Persistent memory across sessions - Secure tool execution with DIP validation - Real-time threat detection via Sentinel Lattice GoMCP is the open-source core of Syntrex AI SOC. It handles memory and orchestration, while the enterprise layer adds correlation, dashboards, and compliance reporting. ## ๐Ÿ›ก๏ธ Security Model GoMCP implements defense-in-depth with multiple layers: | Layer | Protection | Mechanism | |-------|------------|-----------| | **Intent** | Malicious prompts | [DIP Pipeline](docs/security/dip_pipeline.md) + Oracle Deny-First | | **Memory** | Data leakage | [CAFL](docs/security/cafl.md) capability flow control | | **Tools** | Tool abuse | Entropy Gate + Circuit Breaker | | **Audit** | Tampering | SHA-256 Decision Logger (immutable) | | **Network** | Unauthorized access | mTLS + Genome Verification | All security primitives are based on the [Sentinel Lattice](docs/lattice.md) framework with mathematical guarantees. ## ๐Ÿ“š Learn More - ๐Ÿ“š [Full Documentation](docs/README.md) - ๐Ÿ›ก๏ธ [Sentinel Lattice Specification](docs/lattice.md) - ๐Ÿ”ง [MCP Tools Reference](docs/mcp-tools.md) - ๐Ÿข [Enterprise Features](https://syntrex.pro) - ๐Ÿ’ฌ [Discord Community](https://discord.gg/syntrex) ## ๐Ÿข Enterprise CTA Need a full SOC dashboard, 66 offensive Rust engines, and distributed intelligence orchestration? Check out our enterprise platform: **[Syntrex AI SOC](https://syntrex.pro)** ## ๐Ÿ“„ License Distributed under the Apache 2.0 License. See [LICENSE](LICENSE) for details.