Skip to content

Enhancement: Per-Agent Memory Encryption (Secure Enclaves) #1105

@Protocol-zero-0

Description

@Protocol-zero-0

Context
Current memory backends (e.g. Neo4j/Vector DBs) store embeddings and content as clear text.
In multi-agent deployments, isolating memory access is critical for user privacy and security.

Proposal
Implement an optional encryption layer for memory storage:

  1. Client-Side Encryption: Encrypt content before writing to DB.
  2. Key Derivation: Use derived keys from Agent ID + Secrets (e.g. HMAC-SHA256).
  3. Opaque Content: Ensure embeddings remain searchable (if vector store supports encrypted vectors or trusted enclave), but raw content is opaque until decrypted by the authorized agent.

Impact
This would harden MemOS for enterprise and privacy-sensitive deployments, aligning with Zero Trust principles.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions