loading…
Search for a command to run...
loading…
Code-pinned team memory for AI coding agents — typed artifacts (Decision/Analysis/Debug/Task), MCP-native workflow, self-host with Docker Compose.
Code-pinned team memory for AI coding agents — typed artifacts (Decision/Analysis/Debug/Task), MCP-native workflow, self-host with Docker Compose.
Code-pinned team memory for AI-assisted development. Agents write the durable record; humans review, discuss, and steer.
Pindoc is a self-hosted project memory system for teams working with AI coding agents. It turns useful agent discoveries into typed artifacts: decisions, debugging paths, task closeouts, verification notes, and code-linked analyses. Every artifact is scoped to a project area and pinned back to commits, files, URLs, resources, or related Pindoc artifacts.
It is still the wiki you never type into, but the point is not automation for its own sake. Pindoc keeps the parts of agent work that teammates and future agents can reuse.
AI coding sessions are productive, but team context still falls through the cracks:
Pindoc turns agent work worth keeping into searchable, code-pinned team memory. The next teammate or coding agent can ask Pindoc what matters before it edits.
pindoc.context_for_task, pindoc.artifact.propose, and pindoc.task.queue regulate agent behavior instead of acting as a thin CRUD API./mcp endpoint can serve multiple projects; each tool call carries project_slug.A read-only public demo is a follow-up track and is not part of this OSS
release. Until it ships, the README, docs/, and a
self-hosted clone are the primary proof. Operators who want to evaluate
Pindoc end-to-end run docker compose up -d --build and inspect their own
artifacts.
The follow-up demo plan stays in Public Demo Plan for when a hosted instance is appropriate.
Prerequisites:
The default Docker path includes semantic search through a bundled EmbeddingGemma Q4 ONNX provider, so no embedding sidecar is required. See System Requirements for minimum and optional deployment profiles.
git clone https://github.com/var-gg/pindoc.git
cd pindoc
docker compose up -d --build
Open the Reader:
http://localhost:5830/
On a fresh instance, / first asks for the owner identity (display name and
email), then routes to the first-project wizard. To open the project wizard
directly after identity setup:
http://localhost:5830/projects/new?welcome=1
Older builds could create a project through POST /api/projects without a
matching project_members owner row. After upgrading, repair any affected
project by assigning the configured loopback owner:
INSERT INTO project_members (project_id, user_id, role)
SELECT p.id, s.default_loopback_user_id::uuid, 'owner'
FROM projects p
CROSS JOIN server_settings s
WHERE p.slug = '<project-slug>'
AND s.default_loopback_user_id IS NOT NULL
ON CONFLICT (project_id, user_id) DO UPDATE SET role = 'owner';
The Docker daemon exposes one account-level MCP endpoint:
{
"mcpServers": {
"pindoc": {
"type": "http",
"url": "http://127.0.0.1:5830/mcp"
}
}
}
Project scope is not encoded in the URL. Agents pass project_slug on
project-scoped tool calls. Workspaces generated by pindoc.harness.install
store that slug in PINDOC.md frontmatter.
Ask an agent to start work with project context:
Use Pindoc context before editing. Find the current project, inspect assigned
Tasks, then implement the next acceptance item.
Typical MCP loop:
pindoc.workspace.detectpindoc.task.queuepindoc.context_for_taskpindoc.artifact.proposeThe default Docker path is single-user and loopback-only:
| Variable | Default | Purpose |
|---|---|---|
PINDOC_DAEMON_PORT |
5830 |
Host port used by Docker Compose. |
PINDOC_PROJECT |
pindoc |
Default project for unscoped reads/config. |
PINDOC_PUBLIC_BASE_URL |
http://127.0.0.1:${PINDOC_DAEMON_PORT} |
Public base URL used in generated links and OAuth metadata. |
PINDOC_BIND_ADDR |
127.0.0.1:5830 |
Security intent. Non-loopback values require an IdP or explicit public unauthenticated opt-in. |
PINDOC_AUTH_PROVIDERS |
empty | Identity providers enabled for external requests. Current provider: github. |
PINDOC_ALLOW_PUBLIC_UNAUTHENTICATED |
false |
Explicit opt-in for external exposure without an IdP. Use only behind a trusted network/reverse proxy. |
PINDOC_FORCE_OAUTH_LOCAL |
false |
Development flag that routes loopback /mcp calls through OAuth bearer auth for local QA. |
PINDOC_ALLOWED_ORIGINS |
empty | Comma-separated CORS allowlist. Empty means same-origin only; set explicit origins for cross-origin frontends. |
PINDOC_DEV_MODE |
false |
Development-only flag that permits wildcard CORS for local tooling. Do not enable on public instances. |
Do not expose a writable daemon to the public internet without an identity
provider. For a public read-only demo, keep /mcp and mutating HTTP routes
blocked at the reverse proxy; see SECURITY.md and
docs/22-public-demo.md.
The daemon also sets baseline security headers itself, including nosniff,
clickjacking protection, referrer policy, and hardened asset-blob CSP.
For a writable public or cross-device instance, follow
docs/oauth-setup.md. It covers GitHub OAuth App setup,
the ${PINDOC_PUBLIC_BASE_URL}/auth/github/callback callback rule, runtime
MCP client registration, and local OAuth QA with PINDOC_FORCE_OAUTH_LOCAL.
# Run Go tests. Integration tests that need Postgres are skipped unless
# PINDOC_TEST_DATABASE_URL is set.
go test ./...
# Web checks.
cd web
pnpm install --frozen-lockfile
pnpm typecheck
pnpm test:unit
pnpm build
# Full image build.
docker build -t pindoc-server:local .
To test the OAuth bearer path locally while still connecting through
127.0.0.1, set PINDOC_FORCE_OAUTH_LOCAL=true; the daemon will warn on boot
and require Bearer tokens for loopback /mcp calls.
On Windows hosts without a local C toolchain, run Go tests through Docker:
docker run --rm -v "${PWD}:/work" -w /work golang:1.25 go test ./...
Pindoc is in active dogfood. The local self-host path, Reader UI, project/area model, artifact proposal flow, task queue, revision history, summaries, and real embedding provider path are implemented. The public OSS launch track is focused on first-run reliability, a read-only dogfood demo, CI, security docs, and clearer collaborative positioning.
Apache License 2.0. See LICENSE.
Add this to claude_desktop_config.json and restart Claude Desktop.
{
"mcpServers": {
"pindoc": {
"command": "npx",
"args": []
}
}
}