AAM · Memory

Memory is an action. Audit it like one.

When an agent writes a memory, it mutates its own future behavior. When it reads one, it retrieves a directive that may shape an answer no one else will see. AAM treats every memory mutation as a state change — and therefore something that should leave a tamper-evident, third-party-verifiable record. Bonis Knox provides that record, vendor-neutrally, above any memory store.

Memory writesMemory readsMemory editsMemory redactionsMemory exportsBitcoin-anchoredVendor-neutral

The next operational seam

Agents don’t only act. They remember.

The agent stack has been settling into recognizable layers: a control plane decides what an agent may attempt, an identity layer says who the agent is, a runtime executes what the agent decides, and an orchestration framework wires it all together. A fifth seam has now become unavoidable — the memory layer.

Memory entries are not transient. They survive sessions. They shape future tool calls. They influence what the agent tells one user about another. A bad write in March can warp a decision in October. A good write becomes the silent reason a difficult problem gets solved fluently. Either way, the mutation is consequential — and consequential actions need records that survive scrutiny.

AAM’s position has not changed: it is the post-deployment evidence layer for every agent action, across every industry. Memory is one of those actions. The audit-permanence treatment is the same.


Five mutations, five anchors

Every change to memory becomes a Knox event.

Knox already anchors any event with a canonical byte representation. Memory mutations qualify trivially: each is a discrete change to a content-addressable artifact.

01
agent_memory_write

A new memory entry is added. Knox anchors the SHA-256 of the entry, a chain-of-command stamp identifying which agent wrote it under which policy, and the sequence number in the agent's memory stream.

02
agent_memory_read

An existing memory entry is retrieved into agent context. Knox anchors the entry hash, the read timestamp, and the operation that triggered the retrieval — useful when reconstructing why an agent answered what it did.

03
agent_memory_edit

A memory entry is rewritten. Knox anchors both the pre-edit and post-edit content commitments, so the diff is reconstructible from the anchor chain even if the live store has only the latest version.

04
agent_memory_redact

A memory entry is deleted under a retention or data-subject directive. Knox anchors the redaction itself — proof of removal, with the original content commitment, without making the original bytes recoverable.

05
agent_memory_export

A memory store is exported, copied, or migrated. Knox anchors the export-set commitment so any later reconstitution can be checked against what was actually exported.

06
agent_memory_policy_change

The retention or access policy on a memory store is itself changed. Knox anchors the policy-document commitment so policy drift is observable across time, not just enforceable at the moment.


Properties of the layer

What this gives you.

Vendor-neutral

The audit layer is content-addressed, not coupled to any particular memory store. Files, database rows, vector entries, blob objects — all are hashable, therefore all are anchorable. Operators do not have to choose between the audit layer and the memory product they prefer.

Independent verifiability

Anchors are published to the Bitcoin blockchain via OpenTimestamps. Verification does not require Bonis to be online, in business, or cooperative. A counter-party, a court, a regulator, or a future operator can verify the chain with public tools alone.

Privacy-compatible deletion

The anchor commits to a hash, not the memory content. Deleting the underlying entry preserves the audit record without making the bytes recoverable. Redactions are themselves anchored — the deletion event is auditable on its own terms.

Post-quantum resilient

Memory mutations may carry post-quantum signatures via Knox Agent #11 Layer 4 (NIST FIPS 204 / ML-DSA and FIPS 205 / SLH-DSA). The audit chain remains verifiable under threat models that assume future quantum-capable adversaries.

Self-authenticating

Every anchor resolves to a court-ready affidavit architected for FRE 902(13) and 902(14) self-authentication. Admissibility in any given matter remains a determination of the presiding court, but the structural requirements are met by construction.

Above any control plane

Whichever control plane authorized the agent and whichever runtime executed it, the memory anchor is produced and verified outside that stack. The audit layer is independent, by design, of the layer being audited.


Defensive only

Evidence layer, not enforcement.

The doctrine that governs every Knox surface governs this one. Bonis Systems does not access third-party memory stores, does not operate counter-agents, and does not undertake active disruption of any external system. The audit layer is invitational: operators of agents instrument their own memory mutations through Knox if they want the record. The takedown, when there is one, belongs to lawful authority. Bonis provides the evidence.



USPTO provisional applications, inventor of record Jonis Aaron Fields: 64/038,359 (Knox · 2026-04-13), 64/012,440 (TerraVault · 2026-03-21), 64/036,498 (TrustAI · 2026-04-11), 64/002,221 (HealthAgent · 2026-03-11), 64/013,240 (DealMatcher · 2026-03-22). Provisionals are priority-date footnotes; the operating moat is shipping code, public anchors, and open-standard alignment. Bonis Systems LLC · UEI R2BPJDC5CBA3 · CAGE 1TSP2.