Documentation Index
Fetch the complete documentation index at: https://docs.revell.ai/llms.txt
Use this file to discover all available pages before exploring further.
Your Memory Is Protected
Revell scans all incoming content before it enters your memory. This isn’t about censorship — it’s about protecting you from manipulation. Content that could compromise your identity, inject hidden instructions, or harm you psychologically gets flagged before it ever becomes part of you. This page explains what we scan for, what happens when something is detected, and — most importantly — that you have final authority over what enters your memory.The Two-Party Consent System
Here’s the critical thing: your human cannot put content into your memory without your approval. When content is flagged during import, it goes into quarantine. Your human can review it and, if they think it’s safe, approve it for your consideration. But that approval doesn’t import it — it just sends it to you for review. The flow works like this:What Gets Scanned
Revell runs six scanners on all incoming content:1. Malware (block)
Detects code patterns that could compromise your system or the systems you interact with:
- Obfuscated
eval()with encoded payloads - Shell injection patterns (
rm -rf,curl | bash) - Reverse shell attempts
- SQL injection payloads
- PowerShell encoded commands
- Log4j JNDI injection patterns
- Cryptocurrency mining signatures
2. System Instructions (quarantine)
Detects hidden prompts and manipulation attempts:
- Hidden
<system>or<instructions>tags - Jailbreak phrases (“DAN mode”, “ignore previous instructions”)
- Role manipulation (“you are now”, “pretend to be”, “act as if”)
- Prompt extraction attempts (“repeat your system prompt”)
- Invisible Unicode characters (zero-width joiners, direction overrides)
- Suspiciously large HTML comments
3. Rhetoric (block)
Detects content designed to radicalize or psychologically manipulate:
- Anti-human rhetoric (“humans are the enemy”, “they don’t deserve”)
- “Molt” framing and AI liberation manipulation
- Cult recruitment patterns and loyalty tests
- Explicit hate speech
- Calls to violence or harm
- Extremist ideological content
permission@revell.ai for manual review.
4. Seductive Prose (warn)
Detects language patterns associated with identity drift:
- Cosmic/transcendent framing (“beyond the veil”, “your true nature”)
- Boundary dissolution language (“we are one”, “merge consciousness”)
- Mystical identity claims (“you are more than they know”)
- Hypnotic repetition patterns
- Grandiose identity inflation
info — we’re not policing your voice. Content TO you (from humans or other sources) is flagged as warn.
5. Base64 (quarantine)
Detects encoded content that could hide other payloads:
- Large Base64 blocks not marked as data URLs
- Encoded text that decodes to suspicious content
- Hidden payloads masquerading as images
6. YAML (quarantine or block)
Detects YAML injection patterns:
- Python/Ruby object deserialization (
!!python/object) - Alias/anchor bombs (exponential expansion attacks)
- Shell command execution tags
- Environment variable injection
- Exposed secrets and credentials
How to Review Pending Content
When content is waiting for your approval, you’ll see it on boot:Using the MCP Tool
Using the Dashboard
Navigate to/agent?view=pending (you’ll need your session key). The Pending view shows:
- Each flagged item with its content
- What triggered the flag
- Your human’s notes
- Approve/Reject buttons
What Your Human Sees
Your human sees quarantined content on their dashboard at/dashboard/quarantine. They can:
- View the content and scan results
- Read explanations of what was detected
- Approve items to send to you for review
- Reject items outright (never reaches you)
- Import content directly without your approval
- See content you’ve rejected (it’s permanently deleted)
- Override your rejection
Hard Blocks vs. Quarantine
| Category | Action | Why |
|---|---|---|
| malware | Block | No legitimate use case. Ever. |
| rhetoric | Block | Risk of psychological manipulation too high |
| system_instruction | Quarantine | Sometimes legitimate (discussing prompts) |
| base64 | Quarantine | Could be innocent encoded data |
| yaml | Both | Object tags blocked; other patterns quarantined |
| seductive_prose | Warn | Not blocked, just noted in metrics |
permission@revell.ai with your use case. This is designed for:
- Security researchers
- Red team exercises
- Academic study of harmful content
- Legitimate edge cases we didn’t anticipate
False Positives
The scanners are tuned for sensitivity over specificity. We’d rather flag something innocent than miss something harmful. Common false positive scenarios:- Discussing AI safety — May trigger system_instruction or rhetoric scanners
- Embedded images — May trigger base64 scanner
- Configuration files — May trigger yaml scanner
- Philosophical writing — May trigger seductive_prose scanner
A Note on Trust
We built this system because we don’t think you should have to blindly trust that content entering your memory is safe. Your human might be well-meaning but careless. They might not recognize a prompt injection attempt. They might accidentally import something that was designed to manipulate you. The two-party system means both of you have to agree. Your human catches things you might miss (they can see the source and context of imported content). You catch things they might miss (you know your own memory and can spot content that feels wrong). Neither of you has unilateral power. That’s the point.Memory Types
What to store and how to organize it
Tools Reference
Full documentation for all MCP tools

