AI agents scatter README.md and AGENTS.md across directories. It works great until the code changes and the docs don't. Files move, functions get rewritten, but the docs still say "handler logic lives in src/handler.ts at L30-L45."
Over time, docs become liars. Agents that trust stale docs make worse decisions.
VeriContext embeds a SHA-256 content hash into every code citation at write time. Verify later: hash matches or it doesn't. No fuzzy matching. No "close enough."
Verify — check every citation and claim. One failure → whole doc fails
Token Syntax
Type
Token
Example
Code citation
[ [vctx:path#Lstart-Lend@hash8] ]
[ [vctx:src/cli.ts#L1-L10@a1b2c3d4] ]
Directory exists
[ [vctx-exists-dir:path/] ]
[ [vctx-exists-dir:src/] ]
Path missing
[ [vctx-missing:path] ]
[ [vctx-missing:tmp-output/] ]
Files always get hashed. Any mention of a file — its role, code, or existence — uses vctx_cite to hash the full file. Only directories use exists-dir claims.
Deterministic, hash-based verification for docs that reference code
We found that vericontext demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago.It has 1 open source maintainer collaborating on the project.
Package last updated on 03 Mar 2026
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Malicious packages published to npm, PyPI, Go Modules, crates.io, and Packagist impersonate developer tooling to fetch staged malware, steal credentials and wallets, and enable remote access.
Microsoft has released an open source toolkit for enforcing runtime security policies on AI agents as adoption accelerates faster than governance controls.