{"id":"https://openalex.org/W7151445429","doi":"https://doi.org/10.48550/arxiv.2604.04660","title":"Springdrift: An Auditable Persistent Runtime for LLM Agents with Case-Based Memory, Normative Safety, and Ambient Self-Perception","display_name":"Springdrift: An Auditable Persistent Runtime for LLM Agents with Case-Based Memory, Normative Safety, and Ambient Self-Perception","publication_year":2026,"publication_date":"2026-04-06","ids":{"openalex":"https://openalex.org/W7151445429","doi":"https://doi.org/10.48550/arxiv.2604.04660"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2604.04660","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.04660","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2604.04660","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5132741345","display_name":"Seamus Brady","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Brady, Seamus","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5132741345"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.36169999837875366,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.36169999837875366,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10906","display_name":"AI-based Problem Solving and Planning","score":0.12060000002384186,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10456","display_name":"Multi-Agent Systems and Negotiation","score":0.08489999920129776,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6161999702453613},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5809000134468079},{"id":"https://openalex.org/keywords/accountability","display_name":"Accountability","score":0.4909999966621399},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.46299999952316284},{"id":"https://openalex.org/keywords/normative","display_name":"Normative","score":0.41769999265670776},{"id":"https://openalex.org/keywords/principal","display_name":"Principal (computer security)","score":0.359499990940094},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.34929999709129333},{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.3375000059604645},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.3271999955177307},{"id":"https://openalex.org/keywords/container","display_name":"Container (type theory)","score":0.3257000148296356}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.745199978351593},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6161999702453613},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5809000134468079},{"id":"https://openalex.org/C2776007630","wikidata":"https://www.wikidata.org/wiki/Q2798912","display_name":"Accountability","level":2,"score":0.4909999966621399},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.46299999952316284},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4487000107765198},{"id":"https://openalex.org/C44725695","wikidata":"https://www.wikidata.org/wiki/Q288156","display_name":"Normative","level":2,"score":0.41769999265670776},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38519999384880066},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3668000102043152},{"id":"https://openalex.org/C144559511","wikidata":"https://www.wikidata.org/wiki/Q2986279","display_name":"Principal (computer security)","level":2,"score":0.359499990940094},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.34929999709129333},{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.3375000059604645},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.3271999955177307},{"id":"https://openalex.org/C2781018962","wikidata":"https://www.wikidata.org/wiki/Q5164884","display_name":"Container (type theory)","level":2,"score":0.3257000148296356},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.31949999928474426},{"id":"https://openalex.org/C61797465","wikidata":"https://www.wikidata.org/wiki/Q1188986","display_name":"Term (time)","level":2,"score":0.3172999918460846},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.31529998779296875},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.31450000405311584},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.3124000132083893},{"id":"https://openalex.org/C188045909","wikidata":"https://www.wikidata.org/wiki/Q3306359","display_name":"Atomicity","level":3,"score":0.3111000061035156},{"id":"https://openalex.org/C74072328","wikidata":"https://www.wikidata.org/wiki/Q1142726","display_name":"Intelligent agent","level":2,"score":0.30730000138282776},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3037000000476837},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3021000027656555},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.29170000553131104},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.28859999775886536},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.288100004196167},{"id":"https://openalex.org/C145428669","wikidata":"https://www.wikidata.org/wiki/Q471748","display_name":"Exception handling","level":2,"score":0.28700000047683716},{"id":"https://openalex.org/C65414064","wikidata":"https://www.wikidata.org/wiki/Q484105","display_name":"Autonomy","level":2,"score":0.2818000018596649},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.27140000462532043},{"id":"https://openalex.org/C2780224610","wikidata":"https://www.wikidata.org/wiki/Q1530061","display_name":"Credibility","level":2,"score":0.26930001378059387},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.2646999955177307},{"id":"https://openalex.org/C2777632292","wikidata":"https://www.wikidata.org/wiki/Q315515","display_name":"Discretion","level":2,"score":0.26190000772476196},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2597000002861023},{"id":"https://openalex.org/C2779607372","wikidata":"https://www.wikidata.org/wiki/Q4789757","display_name":"Argumentation framework","level":3,"score":0.25760000944137573},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.2572999894618988}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2604.04660","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.04660","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2604.04660","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.04660","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.5088313221931458,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"We":[0,89,129],"present":[1],"Springdrift,":[2],"a":[3,23,33,37,53,92,138,156,182,186,194,200,204],"persistent":[4,142],"runtime":[5],"for":[6,41,135],"long-lived":[7],"LLM":[8],"agents.":[9],"The":[10],"system":[11,140],"integrates":[12],"an":[13,114,152],"auditable":[14,45],"execution":[15],"substrate":[16],"(append-only":[17],"memory,":[18,143],"supervised":[19],"processes,":[20],"git-backed":[21],"recovery),":[22],"case-based":[24],"reasoning":[25],"memory":[26],"layer":[27],"with":[28,44,141,155,203],"hybrid":[29],"retrieval":[30],"(evaluated":[31],"against":[32],"dense":[34],"cosine":[35],"baseline),":[36],"deterministic":[38],"normative":[39],"calculus":[40],"safety":[42],"gating":[43],"axiom":[46],"trails,":[47],"and":[48,86,117,122,148,164,172,189,227],"continuous":[49],"ambient":[50],"self-perception":[51],"via":[52],"structured":[54],"self-state":[55],"representation":[56],"(the":[57],"sensorium)":[58],"injected":[59],"each":[60],"cycle":[61],"without":[62,126],"tool":[63],"calls.":[64],"These":[65],"properties":[66,214],"support":[67,216],"behaviours":[68],"difficult":[69],"to":[70],"achieve":[71],"in":[72,151,217,220],"session-bounded":[73],"systems:":[74],"cross-session":[75],"task":[76],"continuity,":[77],"cross-channel":[78],"context":[79,119],"maintenance,":[80],"end-to-end":[81],"forensic":[82,149],"reconstruction":[83],"of":[84,176,210],"decisions,":[85],"self-diagnostic":[87],"behaviour.":[88],"report":[90,184],"on":[91,168,185,223],"single-instance":[93],"deployment":[94,190],"over":[95],"23":[96],"days":[97],"(19":[98],"operating":[99],"days),":[100],"during":[101],"which":[102],"the":[103,131,173],"agent":[104],"diagnosed":[105],"its":[106],"own":[107],"infrastructure":[108],"bugs,":[109],"classified":[110],"failure":[111],"modes,":[112],"identified":[113],"architectural":[115,213],"vulnerability,":[116],"maintained":[118],"across":[120],"email":[121],"web":[123],"channels":[124],"--":[125,159],"explicit":[127],"instruction.":[128],"introduce":[130],"term":[132],"Artificial":[133],"Retainer":[134],"this":[136],"category:":[137],"non-human":[139],"defined":[144],"authority,":[145],"domain-specific":[146],"autonomy,":[147],"accountability":[150],"ongoing":[153],"relationship":[154],"specific":[157],"principal":[158],"distinguished":[160],"from":[161,199],"software":[162],"assistants":[163],"autonomous":[165],"agents,":[166],"drawing":[167],"professional":[169],"retainer":[170],"relationships":[171],"bounded":[174],"autonomy":[175],"trained":[177],"working":[178],"animals.":[179],"This":[180],"is":[181,198],"technical":[183],"systems":[187],"design":[188],"case":[191],"study,":[192],"not":[193],"benchmark-driven":[195],"evaluation.":[196],"Evidence":[197],"single":[201,205],"instance":[202],"operator,":[206],"presented":[207],"as":[208],"illustration":[209],"what":[211],"these":[212],"can":[215],"practice.":[218],"Implemented":[219],"approximately":[221],"Gleam":[222],"Erlang/OTP.":[224],"Code,":[225],"artefacts,":[226],"redacted":[228],"operational":[229],"logs":[230],"will":[231],"be":[232],"available":[233],"at":[234],"https://github.com/seamus-brady/springdrift":[235],"upon":[236],"publication.":[237]},"counts_by_year":[],"updated_date":"2026-04-08T06:07:18.267832","created_date":"2026-04-08T00:00:00"}
