/docs/Documentation hub
Canonical overview for builders, security reviewers, and buyers.
CORTEX docs are organized around the production path: install locally, admit facts through guards, verify the ledger, expose a tenant-scoped API, and wire MOSKVbot-style agent memory without trusting raw chat transcripts.
Install, initialize the ledger, store a decision, query it, and verify continuity.
02Memory writes, hybrid search, tenant scope, checkout handoff, and operator endpoints.
03Threat boundaries, tenant isolation, secret redaction, hash continuity, and audit posture.
04Reference architecture for a bot with a portable, auditable memory passport.
CORTEX is easier to understand when the documentation mirrors the system contract: proposal, validation, ledger, persistence, retrieval, export.
An agent proposes a fact, decision, observation, or handoff state.
Schema, tenant scope, taint/provenance, redaction, and deterministic validation decide admission.
Accepted facts are written transactionally with hash-chain continuity and explicit failure semantics.
Operators can query, replay, export, and inspect evidence when an incident or audit happens.
These paths are now stable entry points for the landing footer, external links, and future search indexing.
/docs/Canonical overview for builders, security reviewers, and buyers.
/quickstart/The shortest path from install to verified memory.
/reference/Routes, payloads, tenant scoping, and integration examples.
/security/Isolation, audit continuity, encryption notes, and operational guardrails.
/architecture/How CORTEX becomes the verifiable memory passport for a flagship agent.
/changelog/Release notes and roadmap evidence for product maturity.
The docs are now organized as a product surface, not a dump of links: each path answers who uses it, what evidence it creates, and where the operational boundary sits.
/crypto-tax/Wallet graph, transaction classification, cost-basis support, custody gaps, NFT royalties, and advisor-ready exports.
/blog/Essays on verifiable memory, agent trust, MOSKVbot, fiscal evidence, and why CORTEX is not just recall.
/architecture/How to build an assistant with a portable memory passport and proof anchors.
CORTEX is strongest when a future reviewer may ask why the system believed something, who had access, and whether evidence was altered.
Agent decisions, crypto/NFT audit packs, incident reconstruction, compliance evidence, long-running research, and cross-agent handoffs.
Disposable chat context, simple cache lookups, temporary UI state, or low-risk drafts that never become durable operational state.
Technical founder, security lead, AI platform engineer, compliance owner, fiscal advisor working with onchain evidence.
Hash chain, Merkle checkpoint, source manifest, tenant scope, guard outcome, exportable evidence pack.
$ pip install cortex-persist
$ cortex init
$ cortex store --type decision "Use tenant-scoped memory with ledger verification"
stored fact | tenant=default | hash=sha256:...
$ cortex trust-ledger verify --full
ledger intact | checkpoint verified | evidence ready
No vague memory claims. Each page should expose the contract, the command, the API shape, the failure mode, and the audit implication. That is how CORTEX separates itself from generic agent memory tools.