The debt appears when the memory is compressed, copied, retrieved, and reused by another agent in a different context. The original uncertainty disappears. The new agent sees a clean statement. The workflow treats it as ground truth. The memory has silently moved from note to authority.
This is why provenance debt compounds faster in multi-agent systems than in human teams. Agents can retrieve and act on old context at machine speed. They can also write new summaries that obscure the weakness of the source.
Provenance budget matrix
| Memory class | Minimum provenance | Allowed use | Expiry trigger |
|---|
| Preference | Writer identity and timestamp | Personalization and drafting | User change or inactivity |
| Runbook note | Source file or approved owner | Planning and low-risk execution | Repo or process change |
| Policy exception | Approver, scope, and evidence | Narrow workflow only | Date, owner, or policy update |
| Vendor risk claim | Evidence packet and reviewer | Procurement recommendation | New assessment or incident |
| Security approval | Ticket, signer, scope, and tool | Permission request support | Tool, model, or data change |
| Eval result | Test set, version, and run receipt | Trust score input | Model, prompt, or task drift |
The phrase "provenance budget" is deliberate. Not every memory needs the same evidence. But the stronger the downstream authority, the stronger the provenance budget must be.
The downstream-use trace
The most overlooked field is downstream use. It is not enough to know who wrote a memory. A serious system should know which later actions consumed it.
If a memory later contributes to a refund decision, vendor approval, database migration, security exception, or customer message, the incident reviewer should see that chain. Without downstream-use tracing, memory remains a hidden actor. The team may blame the final agent while missing the stale memory that shaped its decision.
This is where ordinary logging falls short. Logs may show a retrieval event. They rarely classify the authority weight of the retrieved memory or record whether that memory materially influenced the action. Provenance-aware memory needs a stronger use receipt.
The dispute state
Provenance is not only about origin. It is also about challenge. A memory can be well-sourced and later become disputed. A customer may reject a preference. A security owner may revoke an exception. A vendor risk note may be superseded. A codebase convention may change.
Disputed memory should not keep expanding authority. It can remain visible for review, but it should not silently feed high-risk workflows. This is the difference between preserving evidence and preserving influence.
Provenance debt has a social cause
Provenance debt is not usually caused by laziness. It is caused by speed. Teams summarize because summaries are useful. Agents compress because context windows are finite. Operators turn repeated findings into runbook notes because nobody wants to rediscover the same answer every week. Every one of those choices is locally rational.
The failure comes when compression strips the confidence class away from the content. A tentative note becomes a durable memory. A support workaround becomes a policy. A one-time approval becomes a reusable exception. The system gets faster by becoming less honest about the source.
The remedy is not to ban summaries. The remedy is to preserve uncertainty through summarization. A good memory record should say whether it came from a verified source, a human assertion, an inferred pattern, a disputed run, or an agent-generated synthesis. Those labels keep useful context from pretending to be stronger than it is.
The Armalo provenance boundary
Armalo's architecture is well suited to this conversation because trust is treated as evidence plus consequence. Memory provenance can become part of an agent's behavioral record: agents that write accurate, scoped, source-backed memories should earn trust, while agents that write broad, stale, or disputed memories should lose trust.
Armalo should describe this as an operating primitive rather than a magical memory product. The architecture direction is clear: memory, pacts, attestations, disputes, and scores need to reinforce each other. A memory that affects authority should be visible in the trust record.
Implementation pattern
Start with a memory schema that includes source, writer, tenant, task class, confidence class, freshness rule, dispute state, and downstream-use trace. Then classify every retrieval by use: background context, planning hint, low-risk recommendation, permission support, or high-risk action support.
The classification matters because it prevents weak memory from doing strong work. A preference can personalize tone. It should not approve a payment. A stale runbook note can suggest a check. It should not authorize a deployment.
FAQ
Is provenance debt the same as hallucination?
No. Hallucination is false or unsupported output. Provenance debt can involve true information whose source, scope, or freshness is no longer inspectable. True but unscoped memory can still be dangerous.
Should agents forget more aggressively?
Sometimes. But deletion is not the only answer. Many memories should be downgraded, expired, quarantined, or preserved as low-authority context rather than used as action-grade evidence.
What metric should operators track?
Track the percentage of high-risk actions influenced by memories with complete provenance and current freshness. That metric reveals whether memory is earning authority or merely accumulating.
The provenance takeaway
Enterprise AI memory will not fail because memory is useless. It will fail because useful memories become untraceable authority. Provenance debt is the bill that arrives when nobody can explain why the agent believed what it believed.