Reflect Memory

Every event logged and queryable

Reflect records every read, write, authentication attempt, and administrative action to an append-only audit trail. Query events through the API or dashboard, set retention policies per workspace, and export logs for external compliance tooling — all without any additional configuration.

Complete operational transparency

The audit trail captures every interaction with your memory store — who did what, when, from which tool, and whether it succeeded or was denied.

memory.readcursorok
auth.attemptclaudeok
memory.writeapiok
memory.readchatgptdenied

Comprehensive event logging

Every API call, MCP request, dashboard action, and auth attempt generates a structured audit event. Events include the actor identity, vendor, action type, target memory, timestamp, and outcome — success or denial reason.
GET /audit?vendor=cursor&action=memory.read&since=2025-01-01

Queryable via API

Filter audit events by actor, vendor, action type, time range, or target memory through the REST API. Build custom dashboards, pipe events to your SIEM, or run ad-hoc investigations without ever leaving your existing tooling.
30 days
1 year
Indefinite

Configurable retention

Set retention policies per workspace — keep audit logs for 30 days, a year, or indefinitely. Retention runs automatically and can be adjusted at any time through the dashboard or API. Enterprise deployments support custom pruning schedules.

Export for compliance

Export audit logs as structured JSON for ingestion into compliance platforms, SIEM tools, or long-term archival storage. Exports can be filtered by the same parameters as the query API, so you only pull what you need for each review cycle.
Export JSON
SOC 2·HIPAA·GDPR

Trust through transparency

Complete visibility into data access

Know exactly which AI tools read which memories, how often, and whether any requests were denied. The audit trail gives security and compliance teams a single source of truth for all memory operations.

Meet compliance requirements

Structured, exportable audit logs align with SOC 2, HIPAA, and GDPR record-keeping requirements. Configurable retention ensures logs exist for as long as your policy demands.

Detect anomalies early

Unusual access patterns — spikes in read volume, repeated auth failures, or unexpected vendor requests — surface quickly when every event is logged and queryable in real time.

Full transparency for every memory operation

Audit logging is enabled by default on every plan. Start tracking every interaction today.

Audit Trail | Reflect Memory | Reflect Memory