MCP Compatible

Encrypted Memory for AI Agents.

Give your agents persistent, searchable memory with end-to-end encryption. They remember across sessions — and only you hold the keys.

14-day free trial · MCP protocol · Zero-knowledge architecture

MCP Protocol
E2E Encrypted
Semantic Search
Persistent Memory

How it works

Give your agent persistent memory in minutes

1

Connect in seconds

Use proxy mode for zero-code integration — just set one env var. Or connect via MCP config for full control. Works with Claude, GPT, Cursor, and any MCP-compatible agent.

2

Store & Retrieve Memories

Agents write durable facts, plans, and skills. Semantic search surfaces the right context on every query.

3

Encrypted & Persistent

Every memory is encrypted with AES-256-GCM before storage. Your agent remembers across sessions — securely.

Get started in 30 seconds

Two ways to connect — pick what fits your workflow

Zero-code — just set one environment variable.

# Point your agent at the ExoVault proxy
export ANTHROPIC_BASE_URL="https://proxy.exovault.dev"
export EXOVAULT_AGENT_KEY="exv_your_key_here"

# That's it — your agent now has persistent memory

Everything agents need to remember

A complete encrypted memory layer for AI agents

MCP Integration
Connect any MCP-compatible agent with a single config. Works with Claude, GPT, Cursor, and custom agents.
Semantic Memory Search
Vector-based retrieval with configurable thresholds. Agents find relevant context without exact keyword matches.
Knowledge Graph
Wiki-links, backlinks, and typed relations connect your memories into a queryable graph. Multi-hop traversal follows connections automatically.
Encrypted at Rest
AES-256-GCM encryption for every memory and note. Zero-knowledge — not even we can read agent data.
Knowledge Import
Seed agent memory from Notion, Obsidian, or Markdown files. Encrypted on arrival, searchable instantly.
Durable Write-back
Agents persist facts, plans, and skills they discover. Knowledge accumulates across sessions automatically.

Two layers, one memory

MCP gives your agent tools to read and write. Turn capture passively records every conversation. Together they build a complete knowledge layer.

MCP CONNECTIONread & write memories, search, explore graphTURN CAPTUREplugin hooks, proxy, or ingest APICClaude CodeWWindsurfCuCursor+Any AgentExoVaultencrypted memory layerREQUIREDOPTIONALwrite_memorysearchexplore_graphsession_start
MCP ConnectionRequired

Your agent gets 27 tools — write memories, semantic search, explore the knowledge graph, manage sessions. Bidirectional, real-time.

Turn CaptureOptional

Every conversation is passively captured and processed for knowledge extraction. Via hooks (Claude Code, Windsurf), proxy, or API.

One memory layer, every agent

Connect Claude, GPT, Cursor, LangChain, CrewAI, or your own agents — they all share encrypted memory via MCP

CClaudeGPTGPTCursorCursorCustomCustomCrewCrewAILangChain

MCP protocol

Standard tool interface — any MCP agent connects instantly

Semantic retrieval

Vector search with configurable thresholds and top-K

Zero-knowledge

Agent memories encrypted before they leave your environment

Agent memory you can trust

Built on proven cryptographic primitives — your agents' knowledge stays private

AES-256-GCM

Military-grade authenticated encryption for every agent memory and note

PBKDF2 Key Derivation

600,000 iterations protect against brute-force attacks on your vault

Zero-Knowledge

Server only stores ciphertext — we cannot read your agents' memories

Client-Side Only

Encryption and decryption happen in your environment, never on our servers

Wrapped MEK

Master key wrapped with your password — rotate credentials without re-encrypting

Recovery Phrase

Optional 24-word recovery phrase for vault access recovery

Your Agent

Encrypt & Decrypt

ciphertext only

ExoVault Cloud

Encrypted Storage

The server never sees plaintext memories or encryption keys

Beyond plain-text notes

Markdown vaults are a great starting point for AI knowledge — ExoVault is what you build when you need them to be secure, scalable, and multi-agent ready.

End-to-End Encrypted

ExoVault

AES-256-GCM encryption with zero-knowledge architecture. Every note and memory is encrypted client-side before it ever leaves your device. The server stores only ciphertext — not even ExoVault can read your data. Per-field encryption with fresh random IVs, PBKDF2 key derivation (600K iterations), and a wrapped Master Encryption Key that never touches the network.

Plain-text vaults

Plain text on disk — if your machine is compromised, everything is exposed. No encryption layer, no access control. Your entire knowledge base is one bad actor away from full exposure.

Security isn't optional for knowledge that shapes how your AI agents think. Plain-text vaults treat security as someone else's problem. ExoVault treats it as the foundation.

Semantic Search at Scale

ExoVault

Hybrid search combining 70% semantic (vector cosine similarity via pgvector HNSW indexes over 1536-dimensional embeddings) with 30% keyword scoring (weighted: title 3x, tags 2x, content 1x). Thousands of notes searched in milliseconds. Configurable similarity thresholds, automatic fallback to recency when embeddings aren't available, and stopword filtering for precision.

Plain-text vaults

File scanning with manual index files and tree commands. The author of the Obsidian approach admits searching thousands of notes is 'impossible' — so they build workarounds: flat index files that Claude scans sequentially, MOC (Map of Content) pages, and session-start hooks that dump folder trees. It works for hundreds of notes but degrades linearly.

When your vault grows from a personal notebook to an organizational knowledge base, the search strategy that worked at 50 notes collapses at 5,000. ExoVault's hybrid approach scales without workarounds.

Multi-Agent Coordination

ExoVault

Built for multi-agent from day one. Atomic lockfile-based token refresh (O_EXCL, 10s stale detection) ensures only one agent refreshes credentials at a time. Per-agent usage tracking with agent IDs, session logging, and token cost accounting. Claude, GPT, Cursor, and custom agents all share the same encrypted memory through the MCP protocol.

Plain-text vaults

Single Claude Code session operating on files. No coordination between agents, no shared state. If you run Cursor and Claude Code simultaneously, they'll stomp on each other's changes. There's no concept of concurrent access or conflict resolution.

The future isn't one AI assistant — it's a fleet of specialized agents working together. Plain-text vaults are single-player. ExoVault is multiplayer.

Typed & Scored Memories

ExoVault

Five structured memory types (fact, skill, preference, constraint, task) with importance scores (1–5), confidence ratings (1–5), provenance tracking (which agent wrote it, from which session, and why), optional expiration dates, and access counting. Retrieval uses a blended heuristic: 60% semantic similarity + 20% importance + 15% recency + 5% confidence.

Plain-text vaults

Everything is a markdown file with the same status. A fleeting shower thought sits next to a verified technical fact. There's no way for the agent to distinguish importance, confidence, or relevance — it's all just text in folders.

When an agent retrieves context, not all memories are equal. A high-confidence fact about your API architecture should outrank a low-confidence speculation from three months ago. Typed memories make this possible.

Knowledge Graph

ExoVault

A queryable knowledge graph with typed relations (wiki_link, derived_from, contradicts, refines, supersedes, and more). Wiki-links from Obsidian imports are preserved as first-class graph edges. Multi-hop traversal follows connections up to 5 hops deep. Agents can query backlinks, follow relation chains, and discover connections between memories and notes automatically.

Plain-text vaults

Wiki-links in Obsidian create implicit connections, but they're just text patterns — no typed relations, no traversal API, no way for agents to follow connections programmatically. If the link target is renamed or moved, the connection silently breaks.

Knowledge isn't flat — it's a graph. A design decision connects to the constraint that drove it, the ticket that requested it, and the documentation that describes it. ExoVault makes these connections queryable, not just decorative.

Cross-Device Access

ExoVault

Cloud-native with Supabase PostgreSQL backend. Configure the MCP server on any device — your encrypted vault is there instantly. Session tokens auto-refresh across devices, and atomic locking prevents concurrent refresh conflicts. Works from any machine with Node.js.

Plain-text vaults

Requires Obsidian Sync ($4/mo), git workflows, or iCloud/Dropbox to access from another machine. Each device needs Claude Code installed and configured separately, with no guarantee of consistent state across machines.

Your knowledge shouldn't be trapped on one laptop. Whether you're on your desktop at work, laptop at home, or a CI/CD pipeline in the cloud, the same encrypted vault is accessible through the same MCP protocol.

Structured Agent Learning

ExoVault

Durable memory with idempotent writeback using external write IDs (prevents duplicate entries from agent retries). An async embedding pipeline chunks content, generates vector embeddings, and indexes them for semantic retrieval. Every memory tracks its provenance — which agent, which run, which reasoning chain produced it — so you can audit and trust what your agents remember.

Plain-text vaults

The agent leaves 'breadcrumbs' as notes in MOC files for future sessions — clever, but fragile. These notes live in the same folder as your content and can be accidentally edited, moved, or deleted. There's no indexing pipeline, no deduplication, and no way to verify what the agent 'learned' is still accurate.

Agent memory should be as reliable as a database, not as fragile as a sticky note. Idempotent writes, provenance tracking, and semantic indexing turn agent observations into trustworthy, retrievable knowledge.

Obsidian-Compatible Import

ExoVault

Import your Obsidian vault directly — upload a .zip and ExoVault parses your markdown files, preserves wiki-links as queryable note relationships, encrypts everything on arrival, and makes it all semantically searchable. Your existing knowledge graph transfers intact, enhanced with vector search and encryption.

Plain-text vaults

You build the system from scratch: create folders, write a CLAUDE.md (often 2000+ lines), establish naming conventions, build index files, and manually maintain MOC pages. The initial setup cost is significant and the conventions are bespoke to each user.

ExoVault doesn't ask you to abandon your existing workflow. Bring your Obsidian vault, your Notion exports, or your markdown files. We preserve your structure and upgrade it with encryption, semantic search, and multi-agent access.

Simple, predictable pricing

14-day free trial with full Pro features. No credit card required.

Starter
For individual developers getting started
$19/mo

$15/mo billed annually

  • 3 vaults
  • 5,000 memories
  • 3 agent connections
  • Semantic search & knowledge graph
  • Obsidian & Notion import
  • E2E encryption
  • Email support
Most Popular
Pro
For power users and teams
$79/mo

$59/mo billed annually

  • Unlimited vaults
  • Unlimited memories
  • Unlimited agent connections
  • Team shared vaults
  • Agent activity dashboard
  • E2E encryption
  • Priority support
Enterprise
For organizations with custom needs
Custom
  • Everything in Pro
  • SOC 2 & HIPAA compliance (roadmap)
  • Dedicated support channel
  • SLA guarantees
  • Custom integrations
  • Dedicated account manager

All plans include zero-knowledge E2E encryption and MCP access at no extra cost.
3x cheaper than Mem0. 6x cheaper than Zep.

How ExoVault compares

The only agent memory layer with end-to-end encryption

FeatureExoVaultMem0ZepLangMem
E2E Encryption
Zero-Knowledge
MCP Native
Semantic Search
Multi-Agent Support
Knowledge Graph
Knowledge Import
Durable Write-back
Proxy Integration
Agent Documents

Frequently asked questions

Everything you need to know about ExoVault agent memory

Give your agents memory they can trust

Start building encrypted agent memory today. 14-day free trial, no credit card — persistent knowledge with zero-knowledge security.

MCP protocol · E2E encrypted · Your keys, your data