~1,900 lines of Python. Zero dependencies. Saves you an hour a day.
Built by Desi Villanueva
Zero-dependency CLI that turns local agent history into instant recall — no MCP server, no hooks, read-only, schema-checked. ~50 tokens per prompt.
Works with: GitHub Copilot CLI, Claude Code (list/show/export/diff) Still deferred: Cursor · Codex-style local stores · optional MCP wrapper
Install package auto-memory. Run binary session-recall.
pip install auto-memory # or: uv tool install auto-memory
# or: pipx install auto-memory
session-recall init
session-recall doctorHard install gate: session-recall schema-check.
session-recall health is optional and diagnostic. On a fresh install it may still show calibrating or sparse-history signals.
Fast no-install probe:
uvx --from auto-memory session-recall --versionClaude Code quick probe:
SESSION_RECALL_SOURCE=claude session-recall list --json --repo all
session-recall show --source claude <session-id> --jsonNow give your agent a memory. Point it at deploy/install.md and let it cook. 🍳
session-recall list now defaults to all history. If you want the old bounded behavior, pass --days 30 explicitly.
Every AI coding agent ships with a big number on the box. 200K tokens. Sounds massive. Here's what actually happens:
200,000 tokens — context window (theoretical max)
120,000 tokens — effective limit before context rot kicks in (~60%)
-65,000 tokens — MCP tools
-10,000 tokens — instruction files
=========
~45,000 tokens — what you ACTUALLY have before quality degrades
LLMs don't degrade gracefully — once you cross roughly 60% of the context window, the model starts losing coherence. The industry calls it "lost in the middle": attention goes to the beginning (instructions) and the end (recent turns), but your actual working context in the middle gets progressively fuzzier.
I timed it over a week: 68 minutes per day lost to re-orientation after compactions and new sessions.
It's a death spiral of diminishing context — each compaction leaves the agent slightly dumber, which burns more tokens explaining things, which triggers the next compaction sooner.
Every 20–30 turns, the context warning hits and you get two bad choices: ignore it and watch the agent hallucinate, or run /compact and watch it lobotomize itself into a tidy two-paragraph summary of a 30-minute investigation. Either way you lose five minutes re-narrating your own project back to the agent like it's a new hire. That's not a workflow — that's a hamster wheel.
Here's the cost comparison that made me build this:
| Operation | Tokens | What you get |
|---|---|---|
grep -r "auth" src/ |
~5,000-10,000 | 500 results, mostly irrelevant |
find . -name "*.py" |
~2,000 | Every Python file, no context |
| Agent re-orientation | ~2,000 | You re-explaining yesterday |
session-recall files --json --limit 10 |
~50 | Exactly the 10 files you touched yesterday |
50 tokens vs 10,000 — a 200x improvement.
Before auto-memory — new session on a project:
You: Fix the failing test in the auth module
Agent: Let me explore the project structure...
$ find . -name "*.py" | head -50 ← 2K tokens
$ grep -r "test.*auth" tests/ ← 5K tokens
$ cat tests/test_auth.py ← 3K tokens
$ cat src/auth/handler.py ← 2K tokens
I see several test files. Which test is failing?
You: The one we were working on yesterday, the token refresh edge case
Agent: Let me search for that...
$ grep -r "refresh" tests/ ← 4K tokens
...
Total: ~16K tokens burned, 8 minutes elapsed, agent still isn't oriented.
After auto-memory — same scenario:
You: Fix the failing test in the auth module
Agent: [auto-recall: session-recall files --json --limit 10]
→ src/auth/refresh.py, tests/test_refresh_edge_cases.py,
src/auth/token_store.py (last touched 14h ago)
[auto-recall: session-recall list --json --limit 3]
→ Yesterday: "Fixed token refresh race condition, one edge case
test still failing on expired token + network timeout combo"
I can see from your last session that test_refresh_edge_cases.py
has a failing test for the expired token + network timeout case.
Let me look at that specific test...
$ cat tests/test_refresh_edge_cases.py ← 1K tokens (targeted)
Total: ~1.1K tokens, 30 seconds, agent is immediately productive.
| Approach | Dependencies | Writes to DB | Setup | Agent-native |
|---|---|---|---|---|
| auto-memory | None (stdlib) | ❌ Read-only | pip install |
✅ Instruction-file |
| MCP server | Node.js runtime | Varies | Server config | ❌ Protocol layer |
| Custom hooks | Varies | Often yes | Hook scripts | ❌ Event-driven |
| Manual grep | None | ❌ | None | ❌ Manual |
- Context window = RAM. Fast, limited, clears on restart.
- session-store.db = Disk. Persistent, searchable, grows forever.
auto-memory is the page fault handler — it pulls exact facts from disk in ~50 tokens when the agent needs them.
It's not unlimited context. It's unlimited context recall. In practice, same thing.
┌─────────────────────────────────────────────────┐
│ copilot-instructions.md │
│ "Run session-recall FIRST on every prompt" │
└──────────────────┬──────────────────────────────┘
│ agent reads instruction
▼
┌─────────────────────────────────────────────────┐
│ session-recall CLI │
│ (package: auto-memory, zero deps, read-only) │
└──────────────────┬──────────────────────────────┘
│ selected backend
▼
┌──────────────────────────┐ ┌──────────────────┐
│ ~/.copilot/session- │ │ ~/.claude/ │
│ store.db │ │ projects/**/*. │
│ (SQLite + FTS5) │ │ jsonl │
└──────────────────────────┘ └──────────────────┘
- Zero dependencies — stdlib only (sqlite3, json, argparse)
- Read-only — never writes to Copilot or Claude history stores
- WAL-safe — exponential backoff retry on SQLITE_BUSY (50→150→450ms)
- Schema-aware where needed — validates Copilot's expected schema on every SQLite-backed call, fails fast on drift
- Telemetry — ring buffer of last 100 invocations for concurrency monitoring
Once wired into your agent's instruction file, session-recall runs on every prompt — giving the agent your recent files and sessions as context before it does anything else.
"Search recent sessions about fixing the db connection bug"
"Check past 5 days sessions for latest plans?"
"Pick up where we left off on the API refactor"
"search recent sessions for last 10 files we modified"
"search sessions for the db migration bug"
No special syntax. The agent reads your session history and gets oriented in seconds instead of minutes.
Want a structured before/after test pack? See EVAL-PROMPTS.md.
Progressive disclosure — most prompts never get past Tier 1.
Tier 1 — Cheap scan (~50 tokens). Usually enough.
session-recall files --json --limit 10
session-recall list --json --limit 5
session-recall list --source claude --json --repo allsession-recall files falls back to checkpoint-derived file hints and then turn-derived file hints when session_files is stale or missing, and marks fallback results with source metadata and warning text.
Tier 2 — Focused recall (~200 tokens). When Tier 1 isn't enough.
session-recall search "specific term" --jsonTier 3 — Full session detail (~500 tokens). Only when investigating something specific.
session-recall show <session-id> --json
session-recall show --source claude <session-id> --jsonPortable artifacts and quick comparisons.
session-recall export <session-id> --format md > handoff.md
session-recall diff <session-a> <session-b> --json
session-recall export --source claude <session-id> --format md > claude-handoff.mdsession-recall export prints a compact markdown handoff with summary, files, checkpoints, refs, and selected turns. session-recall diff compares summary, files, and checkpoint metadata first, and keeps turn diffs out of the first version so agents can consume the output cheaply. On Claude source today, diff is honest about its current limit and compares summary only until file/checkpoint equivalents are proven.
Approximate one-shot recall bundle (experimental).
session-recall context --budget 400
session-recall context --budget 400 --jsonsession-recall context keeps the primitive commands intact under the hood, fills the bundle in this order, files first, then session summaries, then checkpoints, and uses a documented 4-chars-per-token heuristic instead of a tokenizer dependency.
Operational commands:
session-recall health # 10-dimension health dashboard
session-recall stats # telemetry + session-store usage summary
session-recall calibrate --analyze
session-recall schema-check # validate feature-support schema after Copilot CLI upgradesJSON output is the public integration surface for scripts and agents. Add --json whenever another tool will consume the output.
Use session-recall --debug ... when scope resolution, fallback selection, or query behavior is unclear. Debug output stays on stderr so JSON/stdout contracts stay script-safe.
Use --source claude or SESSION_RECALL_SOURCE=claude to read Claude Code transcripts from ~/.claude/projects/ or CLAUDE_CONFIG_DIR/projects/.
| Source | Backing store | Supported commands |
|---|---|---|
copilot |
~/.copilot/session-store.db or SESSION_RECALL_DB |
full current CLI surface |
claude |
~/.claude/projects/**/*.jsonl or CLAUDE_CONFIG_DIR/projects/**/*.jsonl |
list, show, export, diff |
Current non-goals:
- Cursor support is still deferred until transcript files and IDE state boundaries are proven.
- Claude
files,checkpoints,context,search,stats,health, andcalibratestay on the Copilot path for now. - MCP stays outside the zero-dependency core package.
Treat --json output as stable input for scripts, shells, and agents.
session-recall files --json --limit 5 | jq -r '.files[].file_path'
session-recall context --budget 400 --json | jq -r '.text'
session-recall search "auth refresh" --json > recall.jsonEscape hatches are also part of that public surface:
SESSION_RECALL_DB=/tmp/session-store.db session-recall list --json
SESSION_RECALL_TELEMETRY=/tmp/session-recall-stats.json session-recall stats --json
SESSION_RECALL_SOURCE=claude session-recall show <session-id> --json
CLAUDE_CONFIG_DIR=/tmp/.claude SESSION_RECALL_SOURCE=claude session-recall list --json --repo allHomebrew remains future work for now. No tap is shipped until maintainers explicitly opt into owning it.
Dim Name Zone Score Detail
----------------------------------------------------------------------
1 DB Freshness 🟢 GREEN 8.0 15.8h old
2 Schema Integrity 🟢 GREEN 10.0 All tables/columns OK
3 Query Latency 🟢 GREEN 10.0 1ms
4 Corpus Size 🟢 GREEN 10.0 399 sessions
5 Summary Coverage 🟢 GREEN 7.4 92% (367/399)
6 Repo Coverage 🟢 GREEN 10.0 8 sessions for owner/repo
7 File Row Freshness 🔴 RED 0.6 session_files lag recent activity
8 Concurrency 🟢 GREEN 10.0 busy=0.0%, p95=48ms
9 E2E Probe 🟢 GREEN 10.0 list→show OK
10 Progressive Disclosure ⚪ CALIBRATING — Collecting baseline (n=42/200)
File Row Freshness can legitimately degrade on real data when session_files lags recent activity. When fallback hints from checkpoints or turns are fresher than file rows, the dimension reports that degraded-but-recoverable state instead of a hard failure.
Progressive Disclosure starting in CALIBRATING is also normal on a fresh install. That score only activates after enough telemetry accumulates.
Once telemetry has enough history, run session-recall calibrate --analyze to get operator-facing threshold recommendations for health/dim_disclosure.py. The command does not auto-write thresholds or pretend to measure real tokens. It only analyzes observed tier usage and prints recommendations for review.
auto-memory works with any agent that supports instruction files — GitHub Copilot CLI, Claude Code, Cursor, Aider, Windsurf, and more. Installation wires session-recall into your agent's instruction file so it runs context recall automatically.
See deploy/install.md for setup and copilot-instructions-template.md for integration patterns.
See UPGRADE-COPILOT-CLI.md for schema validation after Copilot CLI upgrades.
- Not a vector database — no embeddings, SQLite FTS5 only.
- Not cross-machine sync — local only.
- Not a replacement for project documentation — recalls what you did, not how the system works.
Is it safe? Does it modify my session data?
No. auto-memory is strictly read-only. It never writes to ~/.copilot/session-store.db.
What happens when Copilot CLI updates its schema?
Run session-recall schema-check to validate the feature-support schema. The tool fails fast on schema drift rather than returning bad data. See UPGRADE-COPILOT-CLI.md.
Use these when CI, tests, or local setup need non-default paths:
SESSION_RECALL_DB=/path/to/session-store.dbSESSION_RECALL_TELEMETRY=/path/to/.session-recall-stats.json
Examples:
SESSION_RECALL_DB=/tmp/session-store.db session-recall doctor
SESSION_RECALL_TELEMETRY=/tmp/session-recall-stats.json session-recall doctor --jsonSee ROADMAP.md.
See CONTRIBUTING.md for setup and guidelines. Issues, PRs, and docs improvements are welcome.
⭐ If auto-memory saved you time, star the repo — it's the best way to help others find it.
🔗 Share it: "Zero-dependency CLI that gives your AI coding agent session memory. Read-only, schema-checked, ~50 tokens per prompt." → github.com/dezgit2025/auto-memory
This is an independent open-source project. It is not affiliated with, endorsed by, or supported by Microsoft, GitHub, or any other company. There is no official support — use at your own risk. Contributions and issues are welcome on GitHub.
MIT