Documentation Index
Fetch the complete documentation index at: https://docs.mnemom.ai/llms.txt
Use this file to discover all available pages before exploring further.
Base URL
All API requests are made to:- URL (
/v1/) — the API generation. Changes only for complete redesigns (infrequent). X-Mnemom-Version: YYYY-MM-DDheader — controls behavior within/v1/. Pin this for production stability.
X-Mnemom-Version, the latest behavior is used — fine for new integrations, but production systems (including AI agents) should pin to a specific date. Every response echoes the version used:
2026-04-13. Support window: 18 months per version.
See the Versioning Policy for the canonical commitment (what we’ll and won’t change, deprecation cadence, the support-window contract), or the API Versioning guide for integration how-to.
Authentication
The Mnemom API supports three authentication patterns. Pick the one that matches the caller, not the endpoint. For end-user sign-in (passkey, password + MFA, SSO), session lifecycle, and API-key rotation, see the Authentication guide. Passkeys are the default dashboard sign-in method — see Passkeys for browser support and enrollment.Session cookie (dashboard / SPA)
Browser sessions atmnemom.ai (and www.mnemom.ai) authenticate via an HttpOnly, Secure, SameSite=Lax cookie named mnemom_session, issued on sign-in by the API itself. The cookie is opaque to JavaScript — it holds an AES-256-GCM-encrypted blob of the underlying session tokens, never a raw access token.
/v1/auth/passkey/* and return the same session cookie; MFA step-up and SSO are carried through /v1/auth/mfa/* and /v1/auth/sso/*. Sensitive operations require AAL2 step-up — a fresh user-verification gesture within the session’s AAL2 window; see the Authentication guide for the list of protected actions. This is the only auth pattern where Access-Control-Allow-Credentials: true matters — fetch() calls from the SPA must include credentials: "include".
Bearer token (CLI)
The Mnemom CLI and anything mimicking it use the classicAuthorization: Bearer <token> header. The CLI obtains its token via a one-time browser → localhost handoff at login time (exchanged through POST /v1/auth/cli-exchange, which requires an already-authenticated session cookie); the raw token never leaves the CLI’s local auth file after that.
mnemom login and read ~/.mnemom/auth.json. Generating your own Bearer tokens from scratch is not supported — use an API key (below) for programmatic access.
API key
For server-to-server and enterprise fleet management, authenticate with an API key:GET /v1/auth/me, DELETE /v1/auth/delete-account, POST /v1/agents/:id/link, and billing management.
Error format
All error responses return a JSON body with a human-readableerror field:
Common HTTP status codes
| Status Code | Meaning |
|---|---|
400 | Bad Request — The request body is malformed or missing required fields. |
401 | Unauthorized — Missing or invalid authentication credentials. |
403 | Forbidden — Valid credentials but insufficient permissions for the requested resource. |
404 | Not Found — The requested resource does not exist. |
429 | Too Many Requests — Rate limit exceeded. Retry after the duration specified in the Retry-After header. |
500 | Internal Server Error — Something went wrong on our end. Contact support if the issue persists. |
Rate limits
API requests are rate-limited across three tiers, evaluated in order:| Tier | Scope | Default Limit | Configurable |
|---|---|---|---|
| Per-IP | Client IP address | 100 requests/minute | No |
| Per-agent | Agent hash (API key identity) | 100 requests/minute | Yes (per-org) |
| Per-org | Billing account | 1,000 requests/minute | Yes (per-org) |
Rate limit response
When any tier is exceeded, the API returns HTTP429 with these headers:
| Header | Description |
|---|---|
Retry-After | Seconds to wait before retrying |
X-RateLimit-Limit | Maximum requests allowed in the window |
X-RateLimit-Remaining | Requests remaining (always 0 on a 429) |
X-RateLimit-Reset | Unix timestamp when the window resets |
tier field indicates which limit was hit (ip, agent, or org). Rate limit windows are 1 minute.
Endpoint documentation
All endpoint documentation below is auto-generated from our OpenAPI specification. Each endpoint has a “Try It” button for interactive testing.
API surface areas
| Domain | Overview | Description |
|---|---|---|
| Reputation | Reputation API | Trust scores, public pages, badges, verification |
| Risk | Risk API | Risk assessment and scoring |
| Policy | Policy API | Policy CRUD, evaluation, resolved policies |
| Reclassification | Reclassification API | Violation reclassification, score recomputation, compliance export |
| Intelligence | Intelligence API | Fault lines, risk forecasting, policy recommendations, transactions |
| On-Chain | On-Chain API | Merkle root anchoring, score publishing, on-chain verification |
| Containment | Containment endpoints | Pause, kill, resume agents — kill-switch for rogue agents |
| Teams | Teams API | Team management, team reputation, team cards |
The Policy, Reclassification, Intelligence, and On-Chain APIs form the CLPI governance layer — governance-as-code with policy enforcement, trust recovery, risk intelligence, and on-chain reputation anchoring.
Versioning
The API is versioned via the URL path (/v1). When breaking changes are introduced, a new version will be released under a new path (e.g., /v2). Non-breaking changes (new optional fields, new endpoints) are added to the current version without a version bump.
We will provide advance notice and a migration guide before deprecating any API version.