Memorylayer

Hosted memory runtime for agents

Security posture

Small surface, clear boundaries.

Memorylayer keeps the service model narrow: GitHub identity, workspace-scoped keys, hashed secrets, audit trails, and Postgres-backed isolation.

No passwordsGitHub OAuth handles user authentication.
Scoped keysWorkspace API keys can be revoked independently.
AuditabilityMemory writes, bridge calls, invites, keys, and usage are recorded.

Controls

The current controls are designed to be understandable and inspectable.

AreaCurrent behaviorOperator action
IdentityGitHub OAuth only; no service-side passwords.Use GitHub account controls and organization policy.
API keysTokens are shown once, stored as hashes, and scoped to one workspace.Use separate keys per agent or integration.
RevocationKeys can be revoked from the workspace dashboard.Rotate keys when an integration changes hands.
IsolationEach workspace uses its own Engram schema.Create separate workspaces for separate projects or teams.
UsageAuthenticated calls are recorded with route, key, status, and timestamp.Review usage before rotating or deleting keys.
AuditWorkspace actions and bridge calls write audit entries.Use the audit feed to explain state changes.

Responsible use

Hosted memory is durable infrastructure. Store useful context, not secrets.

Do not store secrets

Use secret managers for API keys, credentials, and tokens. Memorylayer is for context.

Keep entries specific

Prefer decisions, outcomes, file paths, and verified state over vague transcripts.

Use one key per integration

Separate keys make usage trails readable and revocation safe.