# context-compression
Context Compression Strategies When agent sessions generate millions of tokens of conversation history, compression becomes mandatory. The naive approach is aggressive compression to minimize tokens per request. The correct optimization target is tokens per task: total tokens consumed to complete a task, including re-fetching costs when compression loses critical information. When to Activate Activate this skill when: Agent sessions exceed context window limits Codebases exceed context windows (5M+ token systems) Designing conversation summarization strategies Debugging cases where agents "forget" what files they modified Building evaluation frameworks for compression quality Core Concepts Context compression trades token savings against information loss. Three production-ready approaches exist: Anchored Iterative Summarization: Maintain structured, persistent summaries with explicit sections for session intent, file modifications, decisions, and next steps. When compression triggers, summarize only the newly-truncated span and merge with the existing summary. Structure forces preservation by dedicating sections to specific information types. Opaque Compression: Produce compressed representations optimized for reconstruction fidelity. Achieves highest compression ratios (99%+) but sacrifices interpretability. Cannot verify what was preserved. Regenerative Full Summary: Generate detailed structured summaries on each compression. Produces readable output but may lose details across repeated compression cycles due to full regeneration rather than incremental merging. The critical insight: structure forces preservation. Dedicated sections act as checklists that the summarizer must populate, preventing silent information drift. Detailed Topics Why Tokens-Per-Task Matters Traditional compression metrics target tokens-per-request. This is the wrong optimization. When compression loses critical details like file paths or error messages, the agent must re-fetch information, re-explore approaches, and waste tokens recovering context. The right metric is tokens-per-task: total tokens consumed from task start to completion. A compression strategy saving 0.5% more tokens but causing 20% more re-fetching costs more overall. The Artifact Trail Problem Artifact trail integrity is the weakest dimension across all compression methods, scoring 2.2-2.5 out of 5.0 in evaluations. Even structured summarization with explicit file sections struggles to maintain complete file tracking across long sessions. Coding agents need to know: Which files were created Which files were modified and what changed Which files were read but not changed Function names, variable names, error messages This problem likely requires specialized handling beyond general summarization: a separate artifact index or explicit file-state tracking in agent scaffolding. Structured Summary Sections Effective structured summaries include explicit sections:
## Session Intent
[What the user is trying to accomplish]
## Files Modified
## Decisions Made
## Current State
## Next Steps
Accuracy: Are technical details correct? File paths, function names, error codes.
Context Awareness: Does the response reflect current conversation state? Artifact Trail: Does the agent know which files were read or modified?
Completeness: Does the response address all parts of the question?
Continuity: Can work continue without re-fetching information?
Instruction Following: Does the response respect stated constraints? Accuracy shows the largest variation between compression methods (0.6 point gap). Artifact trail is universally weak (2.2-2.5 range). Practical Guidance Three-Phase Compression Workflow For large codebases or agent systems exceeding context windows, apply compression through three phases: Research Phase: Produce a research document from architecture diagrams, documentation, and key interfaces. Compress exploration into a structured analysis of components and dependencies. Output: single research document. Planning Phase: Convert research into implementation specification with function signatures, type definitions, and data flow. A 5M token codebase compresses to approximately 2,000 words of specification. Implementation Phase: Execute against the specification. Context remains focused on the spec rather than raw codebase exploration. Using Example Artifacts as Seeds When provided with a manual migration example or reference PR, use it as a template to understand the target pattern. The example reveals constraints that static analysis cannot surface: which invariants must hold, which services break on changes, and what a clean migration looks like. This is particularly important when the agent cannot distinguish essential complexity (business requirements) from accidental complexity (legacy workarounds). The example artifact encodes that distinction. Implementing Anchored Iterative Summarization Define explicit summary sections matching your agent's needs On first compression trigger, summarize truncated history into sections On subsequent compressions, summarize only new truncated content Merge new summary into existing sections rather than regenerating Track which information came from which compression cycle for debugging When to Use Each Approach Use anchored iterative summarization when: Sessions are long-running (100+ messages) File tracking matters (coding, debugging) You need to verify what was preserved Use opaque compression when: Maximum token savings required Sessions are relatively short Re-fetching costs are low Use regenerative summaries when: Summary interpretability is critical Sessions have clear phase boundaries Full context review is acceptable on each compression Compression Ratio Considerations MethodCompression RatioQuality ScoreTrade-offAnchored Iterative98.6%3.70Best quality, slightly less compressionRegenerative98.7%3.44Good quality, moderate compressionOpaque99.3%3.35Best compression, quality loss The 0.7% additional tokens retained by structured summarization buys 0.35 quality points. For any task where re-fetching costs matter, this trade-off favors structured approaches. Examples Example 1: Debugging Session Compression Original context (89,000 tokens, 178 messages): 401 error on /api/auth/login endpoint Traced through auth controller, middleware, session store Found stale Redis connection Fixed connection pooling, added retry logic 14 tests passing, 2 failing Structured summary after compression:
## Session Intent
Debug 401 Unauthorized error on /api/auth/login despite valid credentials.
## Root Cause
Stale Redis connection in session store. JWT generated correctly but session could not be persisted.
## Files Modified
## Test Status
14 passing, 2 failing (mock setup issues)
## Next Steps
Created: 2025-12-22
Last Updated: 2025-12-26
Author: Agent Skills for Context Engineering Contributors
Version: 1.1.0
Join 80,000+ one-person companies automating with AI