iampantherr/SecureContext

6 stars · Last commit 2026-04-20

Secure memory & context optimization MCP plugin for Claude Code. Drop-in replacement for context-mode with credential isolation, SSRF protection, MemGPT-style persistent memory, and hybrid BM25+vector search. 84 security tests, zero cloud sync.

README preview

# SecureContext — Secure Multi-Agent Harness for Claude Code

> **Persistent memory, verifiable telemetry, and work-stealing coordination for multi-agent Claude Code sessions.**
> Built on the principle: *cybersecurity into the architecture, not bolted on.* HMAC-chained audit trail, per-agent cryptographic identity, Postgres Row-Level Security, atomic work distribution, closed learning loop. Zero cloud sync. MIT license.

[![Version](https://img.shields.io/badge/version-0.17.2-blue)](package.json)
[![Tests](https://img.shields.io/badge/tests-645%20passed-brightgreen)](src)
[![Security Tests](https://img.shields.io/badge/security%20red%20team-60%2B%20RT%20IDs-brightgreen)](security-tests)
[![CI](https://github.com/iampantherr/SecureContext/actions/workflows/ci.yml/badge.svg)](https://github.com/iampantherr/SecureContext/actions)
[![License: MIT](https://img.shields.io/badge/License-MIT-blue.svg)](LICENSE)
[![Node](https://img.shields.io/badge/node-%3E%3D22-green)](package.json)

---

## What SecureContext Is Today

SecureContext started as a token-optimization memory plugin. Through 17 sprints of design + red-team verification it evolved into something larger:

**A hardened harness for running multi-agent Claude Code sessions** where multiple agents (Opus orchestrator + Sonnet worker pool) coordinate through a verifiable audit trail, share memory across sessions, distribute work atomically through a Postgres queue, and feed failures back into a learning corpus — all while staying within the Claude Code TUI (so Claude Pro auth keeps working — no API-key upgrade required).

View full repository on GitHub →