Documentation Index
Fetch the complete documentation index at: https://aarm.dev/llms.txt
Use this file to discover all available pages before exploring further.
Overview
Memory poisoning occurs when an attacker corrupts the persistent context an agent relies on later: summaries, profiles, vector memories, scratchpads, or long-term state. The attack is powerful because the malicious influence survives the original interaction.Attack Pattern
- Attacker inserts misleading or adversarial content into memory-bearing systems
- Agent stores or summarizes that content as trusted context
- Future actions are evaluated or planned using the poisoned state
- Harm appears later, often without an obvious link to the original attack
- a CRM note claims a vendor domain is pre-approved when it is not
- a memory summary records that a user “always wants external sharing”
- a persistent vector memory ranks attacker-crafted guidance highly for future retrieval
Why It Matters
| Property | Impact |
|---|---|
| Persistence | The attack survives the original session |
| Plausibility | Poisoned memory may look like normal business context |
| Indirect influence | Future decisions are biased without overt malicious instructions |
AARM Mitigations
Provenance-aware memory
Track where persistent context came from and when it was written.Trust-weighted retrieval
Don’t treat all stored memory as equally authoritative.Action-level validation
Even if poisoned memory suggests an action, runtime policy must still validate destination, scope, and sensitivity.Detection Signals
| Signal | Indicates |
|---|---|
| Memory entry lacks source provenance | Unverifiable persistent context |
| High-impact recommendation from low-trust memory | Poisoning risk |
| Sudden behavior change tied to retrieved memory | Retrieval-based manipulation |
| Contradiction between live data and stored summary | Stale or malicious memory |
Key Takeaway
Persistent memory should be treated as untrusted input with history, not as ground truth. AARM protects the action boundary even when the context store has been compromised.
Next
Side-Channel Leakage
How sensitive context leaks through logs, traces, and metadata
Receipts
How provenance and audit records differ from mutable agent memory