Skip to main content
In the Myrmex Multi-Agent System (MAS), “Shared State” is the collective mental space where all agents collaborate. It ensures that every finding from a sub-agent is immediately available to the entire execution chain, creating a truly Unified Knowledge system.

The Architecture of Shared Memory

In the Myrmex orchestration, information is not siloed. Instead, agents operate over a Shared Memory Buffer. When Centurion initiates a mission, it establishes a secure memory context that exists for the duration of the execution.

Focused on Metadata

The platform specifically manages Contextual Metadata rather than raw files or logs. This ensures a high degree of privacy and operational speed:
CategoryDescriptionStorage Nature
Operational IntelligenceMetadata about the user’s intent and organizational guardrails.In-Memory (Active)
Environmental MetadataAttributes of the assets involved (OS type, network placement, status).In-Memory (Active)
Execution ArtifactsSummarized results and findings from specialized agents.In-Memory (Active)
Persistent AwarenessLong-term context required for future relationship awareness.Encrypted (Persistent)

How Information and Knowledge Flow

The synergy is powered by the instantaneous sharing of metadata across the collaborative chain:
1

Memory Handshake

When a task is delegated to a sub-agent, the platform shares the active memory context. The agent immediately “inherits” the intelligence gathered by its predecessors.
2

Metadata Enrichment

As an agent performs its duty, it enriches the shared state by adding its findings as structured metadata. It never stores the raw data, only the context and result.
3

Unified Synthesis

The final coordinator reads the entire metadata accumulation to build a comprehensive, intelligent response.
Data Integrity & Privacy: Myrmex does not store your raw logs or original files. We exclusively process and retain the Metadados (metadata) necessary to understand the security context.
When information needs to be retained for long-term topology awareness, it is automatically encrypted before being moved from volatile memory to persistent storage.