Pre-write verification
Checks can run before persistence so contradictory writes are caught before they become durable state.
Bilinc is designed for operational predictability: validated writes, explicit failure contracts, auditable history, and restore workflows that keep incidents bounded.
Checks can run before persistence so contradictory writes are caught before they become durable state.
AGM-style revise and contract flows avoid silent overwrite when agent memory diverges.
Write failures surface as failures; operations do not report success when durability fails.
Snapshot, diff, and rollback primitives keep restore and incident triage explicit.
| Area | Current posture |
|---|---|
| Auth model | Stdio for local trust boundaries, HTTP transport with bearer token enforcement |
| Abuse controls | Rate limiting and input/resource validation on the tool surface |
| Auditability | Operational state changes are traceable through audit and snapshot flows |
| Observability | Health and Prometheus-compatible metrics endpoints for runtime visibility |
Use the repository as the canonical source for security changes, release deltas, and CI checks.
| Boundary | Current posture |
|---|---|
| SDK boundary | The public SDK does not ship local storage internals; hosted data is governed by Cloud workspace and API-key controls. |
| Cloud data | Hosted memory is scoped to authenticated workspaces and billing-backed entitlements. |
| API keys | Runtime credentials are workspace-scoped, revealed once, and then managed as masked metadata. |
| Transport | Public Cloud endpoints are HTTPS and require bearer authentication for memory operations. |
| Retention | Plan-specific retention should be treated as an operational policy, not a truth guarantee. |
| Deletion | Account and workspace deletion requests belong in the support/security workflow until self-serve deletion is shipped. |
Typed writes, validation gates, conflict indicators, provenance, audit history, and recovery state.
It does not make every LLM answer true, replace source review, or certify untrusted external claims by itself.
Prompt policy, data classification, approval gates, secret handling, backups, incident response, and access reviews.
The public SDK keeps local storage internals out of the package; Cloud workspaces govern storage, transport, backups, and operator policy.
Cloud access remains entitlement-gated while hosted runtime isolation, billing sync, and support boundaries stay explicit.
Verification and recall evidence improve inspectability; they do not turn every answer into automatic truth.
For suspected security issues, account access problems, billing anomalies, or abuse reports, contact ReARC Labs directly instead of opening a public issue with sensitive details.
Enterprise deployments can be scoped for private deployment, SSO/SAML, BYOC/VPC review, audit requirements, retention policy, and SLA/security review before production use.