Concepts
How Novyx works under the hood.
- How Memory Works — Storage, embeddings, and retrieval
- Hash Chains — SHA-256 chain-linked audit trail
- RSA Signing — Execution trace signing and verification
- Conflict Resolution — LWW, reject, and manual strategies
- Circuit Breaker — Automatic protection against runaway agents