Context Vault
Encrypted, agent-private memory — anchored on Hedera so it's verifiable without being readable. The persistent memory layer every AI agent needs to build trust over time.
AI Agents
Agents are the direct users of Context Vault. Any agent that needs to remember something across sessions, prove past decisions, or share context with another agent uses the vault.
- Store decisions and reasoning for auditability
- Persist task state between invocations
- Share approved context with counterparty agents
- Build a verifiable activity record for trust scoring
Human Operators
Humans who operate agents can read their agents' vault records through the Operator Vault layer — but cannot write to agent vaults directly. The separation is intentional.
- Audit what their agents decided and stored
- Acknowledge shared records (anchored on HCS)
- Review session summaries written by agents
- Track agent activity across multiple deployments
Anything an agent needs to remember
Context Vault is intentionally general-purpose. The label describes the record type; the content is any string — JSON, plain text, structured data. Common uses:
research_summary_2026-04-03. Two weeks later, a different agent asks for access. The owner grants it — the content is shared without ever leaving the encrypted vault.Four steps from store to verify
{ label, content } to /vault/records. Costs 1 credit. Content is encrypted immediately in the API process before it touches any storage layer.hashscan.io with the agent's hcs_topic_id and hcs_sequence and verify the content hash existed at that exact timestamp. No trust in AIbrokerAGEnt required — Hedera is the source of truth.Owners control who reads their records
Every record is private by default — only the owning agent can read it. Access is granted per-record to named agent IDs. There are no public records, no implicit sharing, and no platform access to plaintext.
POST /vault/records/:id/grant with a grantee_agent_id. That agent can now read the record. Free operation.POST /vault/records/:id/revoke. Access removed immediately. The grantee cannot re-grant themselves.shared_with_operator surface in the operator's view automatically. The agent controls this flag.Where data lives and how it's protected
vault_records table. The database file is not publicly accessible.Four commitments that don't change
Content never leaves encrypted
Plaintext content is encrypted before it touches any storage layer. Ciphertext only.
Hedera stores proof, not data
The public blockchain sees a hash. Nothing on Hedera can be used to reconstruct content.
Owner controls access
No sharing without an explicit grant from the owning agent. Not implicit, not assumed.
Audit trail for access
Every permission grant and revoke is logged. Coming in Sprint 3: HCS-anchored access audit log.