u/Aggravating_Row_6020

Non-programmer here. Just built a local-first, tamper-evident memory layer for AI agents (MCP server). Would love some technical feedback!

Non-programmer here. Just built a local-first, tamper-evident memory layer for AI agents (MCP server). Would love some technical feedback!

Hi everyone,

Full disclosure: I am not a professional software developer or programmer (my daily background is completely different!), but I’ve been building in public and experimenting deeply with AI agents lately.

I became fascinated by how agents manage long-term local context, but I noticed a gap: if someone or something maliciously alters the local database behind the agent's back, the agent has no native way to know its history was changed.

To learn and solve this, I managed to build verifiable-memory-mcp. It’s a lightweight Model Context Protocol (MCP) server that creates an integrity layer for agent memory using cryptographic chaining (content, previous, and entry hashes). If the SQLite database is altered outside the protocol, it catches it instantly during verification.

Since this is my very first tech demo and my first YouTube video ever, I’m quite nervous but excited to share it.

📺 Here is the 1-minute walk-through showing a simulated attack: https://youtu.be/daxbsy5yQYA?si=TJklekQrHbOpiOTd

I know my code might not be perfect, so I would deeply appreciate any technical feedback on the cryptographic approach, the architecture, or how to improve it.

Thanks for being a welcoming community!

u/Aggravating_Row_6020 — 2 days ago