How Contox Works
A deep dive into the memory layer that powers AI-native development. From capture to enrichment, from brain to action.
From Code to Context
Every commit and file save is captured in real-time by the VS Code extension, signed, and stored as structured session data.
Raw Data to Structured Memory
A multi-stage LLM pipeline transforms raw commits into structured, searchable memory items with embeddings for semantic retrieval.
Reliable Job Processing
A Redis-backed priority queue with exponential backoff ensures every enrichment job completes — even under failure.
7
Priority Levels
5
Retry Attempts
10
Concurrent Jobs
60s
Exp. Backoff
Hierarchical Project Knowledge
All memory is organized in a tree structure, from high-level architecture decisions down to individual bug fixes, each with confidence scores and semantic links.
Project Brain
Root context · Always loaded
One Protocol, Every AI Tool
The Model Context Protocol (MCP) enables any AI agent to read and write project memory through a standardized interface. One integration, universal access.
MCP Server
8 tools · Universal protocol
Deep Codebase Analysis
Genesis scans your entire codebase in 7 analysis layers, extracting architecture patterns, security findings, and conventions in a single pass.
12-Phase Security Scanner
Full-stack SAST, SCA, secret detection, taint analysis, license compliance, malware detection, AI/LLM security, and SBOM generation. 10 of 12 phases are zero-LLM cost.
What We Don't Cover
Contox is a static analysis platform. We read your code via GitHub API without deploying it. These are capabilities that require running your application or specialized tooling.
We do not deploy or run your application. No HTTP fuzzing, no runtime endpoint testing, no live vulnerability exploitation.
We audit Dockerfiles for misconfigurations but do not scan built container images for OS-level vulnerabilities.
No runtime instrumentation or agent-based monitoring. We cannot observe your application behavior in production.
SBOM lists all components with versions but does not score license risks (GPL, AGPL copyleft propagation).
SAST rules and taint analysis target JavaScript and TypeScript only. Other languages get basic config rules.
Static analysis only. No active exploitation attempts, no manual security testing, no red team simulation.
Question Your Codebase
Ask natural language questions about your project. Semantic search finds relevant memory items, then an LLM synthesizes a cited answer.
How does the auth middleware work?
The auth middleware uses Appwrite server SDK to verify session cookies. It checks for a valid session token in the request headers and extracts the user ID for downstream handlers. [Source 1] [Source 2]
This Is What One Developer Can Build
Full-stack product from capture to enrichment, from real-time sync to semantic search. Built with Next.js, TypeScript, Appwrite, and AI. Designed for scale from day one.
50+
API Endpoints
8
MCP Tools
7
Genesis Layers
3
LLM Models