The team distribution layer across AI platforms
Your team's AI,
now distributed.
Context, memory, and shared skills — on every IDE your team uses. No walled gardens.
Works with Claude Code · Cursor · Codex · Copilot
Works with
One source of truth. Every surface your team already uses.
How it works
Three pillars. One team layer.
Context
Auto-loaded on every new session.
- ·Project state
- ·Main-branch truth
- ·Open decisions
Memory
Recall the decision, not the doc.
- ·Prior sessions
- ·PR threads
- ·Design docs
- ·Text-to-SQL
Registry
Publish once. Install anywhere.
- ·Skills
- ·Agents
- ·Connectors
- ·Playbooks
- ·Versioned & approved
A day in a Maiife team
Three moments. One shared surface.
Morning context. Afternoon recall. Evening publish. Every IDE on the team, one source of truth.
Claude Code opens.
Maiife auto-loads the team's context before the first message.
Maiife context loaded
14 facts · 2 new decisions since yesterday · last sync 3m ago
Stuck on an old design call.
Ask memory, not a teammate.
> /maiife recall "auth provider decision"
→ Decision (PR #412, Mar 14): dropped Auth0, moved to Supabase Auth. Reason: cost + self-host path. Owner: @sakthi.
Built something reusable.
One command and your team has it tomorrow.
$ maiife publish ./skills/triage-incident
✓ Published skill triage-incident@1.0.0 ✓ Live in 4 workspaces · propagation 2m 41s
Plays with what you already have
We don't replace your CLAUDE.md. We enrich it.
Your tool-native files stay put. Maiife adds the team layer on top — main-branch truth, open decisions, shared skills.
Configurable per workspace. Audit-logged.
Default
Enrich
Maiife merges team context into your tool-native file at session start. Main wins on conflict.
One platform, two paths
Start with Observer.
Graduate to Gateway when you need it.
Same registry, same console, same data. Flip Gateway on per workspace when you need it.
Observer
Ships on every tier. Team layer value, no in-path risk.
- Ingress
- Webhooks · OAuth · Artifact reads · OTLP
- Enforcement
- Read-only, advisory
- Setup
- 15-min, no code changes
- Tiers
- Starter · Design Partner · Enterprise
Gateway
In-path enforcement when CISO asks. Same platform, one toggle.
- Ingress
- In-path proxy on model calls
- Enforcement
- Kill switch · Policy · Rate limits
- Setup
- Opt-in per workspace, no migration
- Tiers
- Enterprise only
Gateway is not legacy. Same platform. No migration. No re-onboarding.
Registry
Publish once. Install anywhere.
Skills, agents, playbooks, connectors — versioned, approved, distributed to every teammate's IDE. The team's knowledge compounds here.
$ maiife publish
→ validating manifest…
→ scanning for secrets…
→ submitting to team registry…
✓ triage-incident@1.4.0 approved by @platform-lead
✓ live in 4 workspaces · propagation 2m 41s
→ teammates will load the new version on next session
$ _
Recently in your registry
live- v1.4.0
triage-incident
skill · @mira
- v2.1.3
oncall-routing
agent · @platform
- v3.1.0
incident-response
playbook · @sre
- v1.2.0
salesforce-sync
connector · @revops
- v2.3.1
pr-review
skill · @dev-tools
Pricing
Start on the team layer. Upgrade when you need governance.
All tiers run on the same platform. Upgrade without migration.
Up to 10 users
One source of truth across every IDE your team uses.
Up to 50 users
Shape the roadmap with us. Early pricing, direct founder access, team insights.
Unlimited users
Full governance. Gateway, SSO, local models. Same platform, no migration.
Design Partners lock early pricing. Enterprise flips Gateway on — same data, no re-onboarding.
Security & trust
Privacy-first. Enterprise-ready when you need it.
Defaults already pass review. Deeper governance lives on Enterprise — opt-in, same platform.
EU data residency
Workspaces pin to ap-southeast or eu-west. Data stays in region.
Audit log on every change
Visibility toggles, policy edits, approvals — all tamper-evident, exportable CSV/JSON.
Telemetry is opt-in
Insights default self-visible. Lead visibility requires per-workspace member consent.
SSO / SAML
Enterprise tier. Okta, Azure AD, Google Workspace, generic SAML.
SOC 2 Type I — Q4 2026 target
Controls framework in place today. Auditor selected. Design partners get pre-report access.
Zero trust by default
Every request authenticated. No request reaches a model without policy evaluation on Gateway tier.
Get in Touch
Your AI infrastructure needs a control plane.
Whether you're exploring our open source toolkit or ready for the full platform — we'd love to hear from you.