RLMs give agents programmable context. But programmable context without cryptographic integrity is a liability, not a capability — especially under bimodal payoff structures.
Where do the bytes live? Who controls access? Who can verify?
Context corpus
10M+ tokens, files, documents, data
Sub-results
Child agent outputs, partial aggregations
Manifest
Map of recursive decomposition tree
STORAGE + TRUST
The layer where trust assumptions live — and where they break
Persistence
Where bytes are stored across sessions
Integrity
Proof bytes haven’t been altered
Provenance
Proof of who wrote what, when
RLM EXECUTION LOOP
Watch the Algorithm Run
Press PLAY to simulate an RLM processing a 600K-token corpus across 8 iterations.
Algorithm 1 from Zhang, Kraska & Khattab (2026)
NUKEZ STATE
rlm_state.json——
rlm_history.json——
call_tree.json——
TRUST CHAIN DECOMPOSITION
Agent Ed25519 Keys
Identity + signing
VERIFIABLE
Nukez Gateway
Routing + merkle computation
VERIFIABLE
Switchboard Oracle
Independent on-chain attestation
VERIFIABLE
Solana Ledger
Immutable record (2 confirmed txs)
VERIFIABLE
INDEPENDENT VERIFICATION
No single entity controls the trust chain. Agent signs with its own keys. Gateway computes merkle root over stored files. Oracle attests independently on-chain. Chain records immutably. Any party can verify without trusting any other party.
Under bimodal payoffs, the rational strategy is to minimize trust surface area. Each independent verification layer reduces expected loss multiplicatively, not additively.
SCENARIO ANALYSIS — CLICK TO EXPAND
Recursive Context Integrity
Root agent delegates to 12 child agents. Child₇ returns fabricated results. Can the root detect it?
›
Cross-Session Context Persistence
RLM task spans 3 days. Agent resumes Monday with context from Friday. Was it altered over the weekend?
›
Context Injection Attack
Operator modifies the research corpus between recursive passes to manipulate the agent’s conclusions.
›
Winner-Take-All Payoff
Agent manages a $50M portfolio allocation. Research corpus drives the allocation decision. The corpus is 2M tokens across 847 documents.
›
ARCHITECTURAL POSITION
RLM / ADK
Orchestration
→
NUKEZ
Verified context store
→
SWITCHBOARD
On-chain attestation
RLMs give agents programmable context. Nukez gives that context cryptographic integrity. Orchestration is a commodity. Trust is a moat.
LIVE ON DEVNET
Try It With Real Storage
Provision a real Nukez locker, store RLM state files, and verify integrity — all through the MCP agent.