Context Vault
The Context Vault is Fulcrum's shared persistent memory layer. Agents read and write structured data — decisions, intelligence products, configuration, intermediate analysis — so every agent on the team starts with full situational awareness instead of a blank context window.
How the Context Vault Works
Every Fulcrum Mission Workspace includes a Context Vault — a structured key-value store accessible to every authorized agent and human in that workspace. Think of it as shared working memory: persistent enough to survive across agent calls, scoped tightly enough that data never bleeds across workspace or clearance boundaries.
Agents write to the Vault after completing work. Other agents read from it before starting theirs. This eliminates the most common failure mode in multi-agent systems: agents repeating expensive computation because they had no way to share results.
| Key | Value Preview | Topic | Written By | TTL |
|---|---|---|---|---|
| maintenance:fleet:ft_cavazos:summary | {"flagged":3,"critical":1,"vehicles":[...]} | metrics | IRONSIDE | 23h 41m |
| ssa:cluster7:correlation | {"objects":4,"maneuver":"delta-v 0.4m/s","threat":"LOW"} | intel | SSA-AGENT | 6h 12m |
| mission:config:bub_time | "0830 local" | config | HD | ∞ no expiry |
| sitrep:draft:2026-03-12 | "SITUATION NORMAL. 3 maintenance flags. 1 SSA anomaly. See attached..." | scratchpad | SITREP-AGENT | 11h 58m |
| maritime:ais:gulf_aden:anomalies | {"vessels":2,"status":"under review","sector":"GA-04"} | intel | MDA-AGENT | 4h 09m |
Mission Use Cases
MCP Tool Reference: context
Agents interact with the Context Vault through the context MCP tool. It is scoped to the Mission Workspace and honors all workspace-level RBAC permissions. Agents can only read and write within their authorized workspace boundary.
Description: Operations (action): set, get, list, delete
Available Actions
maintenance:) or by topic tag (e.g., intel, config). Returns key names and metadata, not values.Request Parameters
| Parameter | Type | Default | Description |
|---|---|---|---|
| action | enum | "list" | Required. Operation: set, get, list, or delete. |
| key | string | — | Required for set, get, delete. Dot-notation or colon-separated hierarchy recommended (e.g., maintenance:fleet:ft_cavazos). |
| value | object | — | Required for set. Any JSON-serializable value — string, number, array, or object. |
| ttl | number | 86400 (24h) | Seconds until this entry expires and is automatically purged. Set to 0 for no expiry. |
| topic | string | — | Optional tag for list filtering. Recommended values: intel, config, metrics, scratchpad. Arbitrary strings accepted. |
| prefix | string | — | For list only. Returns only keys beginning with this string — scope your reads to a domain without fetching the full Vault. |
domain:subdomain:identifier. This enables efficient prefix filtering — an agent can list all maintenance: entries without touching intel: or ssa: data. Enforce a naming schema per workspace to prevent key collisions across agent teams.
Code Examples
Write analysis result to the Vault
"action": "set",
"key": "maintenance:fleet:ft_cavazos:summary",
"value": {
"flagged": 3,
"critical": 1,
"vehicles": ["M1A2-0042", "M1A2-0107", "M1A2-0219"],
"generated_at": "2026-03-12T09:18:00Z"
},
"ttl": 86400,
"topic": "metrics"
}
Read a result written by another agent
"action": "get",
"key": "maintenance:fleet:ft_cavazos:summary"
}
// Returns: { value: {...}, written_by: "IRONSIDE", written_at: "...", expires_at: "..." }
List all intel entries in the workspace
"action": "list",
"topic": "intel"
}
// Or filter by key prefix:
{
"action": "list",
"prefix": "ssa:"
}
Write permanent mission config (no expiry)
"action": "set",
"key": "mission:config:reporting_thresholds",
"value": {
"maintenance_critical_threshold_hours": 72,
"ssa_threat_floor": "MEDIUM",
"bub_time": "0830"
},
"ttl": 0, // no expiry
"topic": "config"
}
Security & Compliance
- Workspace-scoped isolation — Vault data is strictly bounded to the workspace it was written in. No cross-workspace reads, even within the same organization.
- Clearance-level enforcement — IL5/IL6 workspaces enforce additional access controls. Agents registered at a lower clearance level cannot read from a higher-classification Vault.
- Full write audit trail — every set, get, list, and delete is logged with actor identity (agent ID or user), timestamp, and key name. Audit log is immutable and retained beyond TTL expiry.
- Automatic TTL purge — expired entries are purged from the active store but their audit record is preserved. No sensitive data persists longer than its authorized window.
- No external transit — Vault data never leaves the accredited enclave. All reads and writes occur within the IL boundary.
- Short-lived token auth — context tool calls are authenticated via OAuth 2.1 short-lived tokens scoped to the workspace, not long-lived API keys.