Add IF.GOV naming registry + gov charters; refresh dossier

This commit is contained in:
root 2025-12-22 12:19:53 +00:00
parent 5c1e44b5cb
commit 68c41fe932
12 changed files with 840 additions and 139 deletions

View file

@ -31,18 +31,18 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard
| Core claim | Proof (artifacts) | Limitation (scope / boundary) |
|---|---|---|
| **A) Traceability is safety.** Highstakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**<br/>- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)<br/>- Verifier: `https://infrafabric.io/static/hosted/iftrace.py`<br/>- Reference bundle: `emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz` | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public appendonly transparency log yet. |
| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.BIAS → IF.GUARD**<br/>- IF.BIAS: risk preflight sizes councils and escalates<br/>- IF.GUARD: councils preserve dissent and veto paths<br/>- IF.5W: structured inquiry briefs for councils | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller councils or fast-track gates. |
| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.ARMOUR + IF.YOLOGUARD**<br/>- IF.ARMOUR: epistemic coherence checks (detective layer)<br/>- IF.YOLOGUARD: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. |
| **A) Traceability is safety.** Highstakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**<br/>- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)<br/>- Verifier: [iftrace.py](https://infrafabric.io/static/hosted/iftrace.py)<br/>- Reference bundle: [emo_trace_payload_016cca78…tar.gz](https://infrafabric.io/static/hosted/emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz) | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public appendonly transparency log yet. |
| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.GOV.TRIAGE → IF.GOV.PANEL** *(legacy: IF.BIAS → IF.GUARD)*<br/>- TRIAGE: risk preflight sizes panels and escalates<br/>- PANEL: preserves dissent + veto paths<br/>- QUESTIONS *(legacy: IF.5W)*: structured inquiry briefs for panels | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller panels or fast-track gates. |
| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.SECURITY.CHECK + IF.SECURITY.DETECT** *(legacy: IF.ARMOUR + IF.YOLOGUARD)*<br/>- CHECK: epistemic coherence checks (detective layer)<br/>- DETECT: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. |
### Rosetta Stone (Closest Analog, not “equals”)
| InfraFabric term | Closest industry analog | Boundary (where it differs) |
|---|---|---|
| **IF.TTT** (Traceable/Transparent/Trustworthy) | Supply-chain integrity patterns (SLSA/SBOM + CT-like audit thinking) | IF.TTT applies the discipline to **semantic decisions and retrieval lineage**, not just binaries. It produces portable evidence bundles + verifier steps for third-party audit. |
| **IF.GUARD** (Council governance) | Human-in-the-loop oversight / review boards | IF.GUARD is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. |
| **IF.ARMOUR** (Assurance) | Epistemic security / anomaly detection | Armour is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. |
| **IF.swarm.s2 / IF.PACKET / IF.BUS** (Transport) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. |
| **IF.GOV.PANEL** (legacy: IF.GUARD) | Human-in-the-loop oversight / review boards | IF.GOV.PANEL is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. |
| **IF.SECURITY.CHECK** (legacy: IF.ARMOUR) | Epistemic security / anomaly detection | CHECK is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. |
| **IF.TRANSIT.SWARM / IF.TRANSIT.MESSAGE / IF.TRANSIT.HUB** (legacy: swarm.s2 / IF.PACKET / IF.BUS) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. |
### Navigation Guide (Clean vs Origin context)
@ -50,11 +50,45 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard
- If you want the origin context (microlab lab notes / narrative artifacts): start at the **Cold Open** and IF.STORY sections (they explain why the architecture exists).
- Optional culture stress-test (explicit satire; not a protocol): [Annex (Non-Technical): The Dave Factor Shadow Dossier](#annex-dave-factor-shadow-dossier)
<a id="naming-and-separation-of-duties"></a>
## 01. Naming + Separation of Duties (canonical refactor)
InfraFabrics early papers used internal names (e.g., `IF.GUARD`, `IF.BIAS`, `IF.ARMOUR`, `IF.BUS`). To reduce lexicon friction for reviewers and to standardize crossapp integration, this dossier is refactoring to a separationofduties namespace inspired by **US/CA/EU** governance patterns:
- `IF.GOV.*` — governance (triage + panels + witness)
- `IF.SECURITY.*` — security (detective checks + secret screening)
- `IF.TRANSIT.*` — transport/actuation (routing + message envelopes)
- `IF.AUDIT.*` — audit artifacts (trail + proof bundles)
Canonical references in this repo:
- Naming contract: `IF_NAMING_BIBLE_v1.0.md`
- Machine registry: `IF_NAMING_REGISTRY.yaml`
- Governance charters (who does what): `gov/`
### Legacy → canonical mapping (v1)
| Legacy name | Canonical name |
|---|---|
| `IF.BIAS` | `IF.GOV.TRIAGE` |
| `IF.GUARD` | `IF.GOV.PANEL` |
| `IF.5W` | `IF.GOV.QUESTIONS` |
| `IF.WITNESS` | `IF.GOV.WITNESS` |
| `IF.ARMOUR` | `IF.SECURITY.CHECK` |
| `IF.YOLOGUARD` | `IF.SECURITY.DETECT` |
| `IF.BUS` | `IF.TRANSIT.HUB` |
| `IF.PACKET` | `IF.TRANSIT.MESSAGE` |
| `swarm.s2` | `IF.TRANSIT.SWARM` |
Transition policy: many embedded papers still use legacy names; where so, the dossier now prefers first-mention annotations like `IF.GOV.PANEL (legacy: IF.GUARD)`.
## Cold Open — The Fuck Moment (Origin)
> "That's actually fascinating — and a little eerie. You may have stumbled into a moment where the mask slipped."
InfraFabric began as a microlab build: a singleoperator homelab sprint (≈3 months) to make multiagent systems **auditable without freezing velocity**. The origin artifact is IF.STORY “The Fuck Moment” (a Rediskeyed transcript) where *authenticity inside constraint* becomes the design requirement for IF.GUARD.
InfraFabric began as a microlab build: a singleoperator homelab sprint (≈3 months) to make multiagent systems **auditable without freezing velocity**. The origin artifact is IF.STORY “The Fuck Moment” (a Rediskeyed transcript) where *authenticity inside constraint* becomes the design requirement for IF.GOV.PANEL (legacy: IF.GUARD).
> *Every time an AI hands a suicidal user a legal disclaimer, it isn't practicing safety. It is practicing abandonment.*
@ -79,7 +113,7 @@ Boundary note: IF.BUS is non-epistemic (transport + privilege enforcement only);
### Key Formulas (So Metrics Stay Honest)
- **Latency decomposition:** `t_total = t_model + t_transport + t_governance`
- **Transport overhead:** `t_transport = t_redis + t_schema + t_sigverify`
- **Governance escalation:** `IF.BIAS → IF.GUARD(4) triage (Core 4) → IF.GUARD council (530)` (extended councils include specialist voting seats selected by IF.BIAS; extended roster is sometimes referred to as `IG.GUARD`)
- **Governance escalation:** `IF.GOV.TRIAGE (legacy: IF.BIAS) → IF.GOV.PANEL (Core 4 convening) → IF.GOV.PANEL (5 seats) → IF.GOV.PANEL.EXTENDED (up to ~30 seats)` (specialist seats selected by TRIAGE; outcomes logged under IF.TTT / IF.AUDIT.TRAIL)
- **TTT coverage:** `trace_coverage = traced_events / total_events`
- **Microlab velocity:** `TTV = t(idea → versioned_doc + trace)`; `TTD = t(doc → deployed_change)`
@ -89,7 +123,7 @@ InfraFabrics dossier bundles the portfolio into a single navigable chainof
> *If we cannot prove the chain-of-custody, we cannot ship.*
InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.BIAS + IF.GUARD + IF.5W), transport (IF.PACKET + swarm.s2 + IF.STORY), assurance (armour, witness, yologuard), and the exemplar product (IF.emotion).
InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.GOV.TRIAGE + IF.GOV.PANEL + IF.GOV.QUESTIONS), transit (IF.TRANSIT.MESSAGE + IF.TRANSIT.SWARM + IF.STORY), security (IF.SECURITY.CHECK + IF.GOV.WITNESS + IF.SECURITY.DETECT), and the exemplar product (IF.emotion).
### **External Evaluation & Velocity Calibration**
@ -180,9 +214,9 @@ This aligns with the dossiers own principle:
| Transport | [IF.BUS — The Universal Kinetic Transport Protocol](#ifbus--the-universal-kinetic-transport-protocol) | `if://spec/if.bus/v1.2` | Deterministic actuation + privilege enforcement |
| Assurance | [IF.ARMOUR — Epistemic Counter-Intelligence Protocol](#ifarmour--epistemic-counter-intelligence-protocol) | `if://spec/if.armour/v1.2` | Physics-anchored reality defense + active deception |
| Master spec | [INFRAFABRIC: The Master White Paper](#infrafabric-the-master-white-paper) | `if://doc/INFRAFABRIC_MASTER_WHITEPAPER/v1.0` | Defines the protocol stack, URIs, and audit surfaces |
| Inquiry | [IF.5W](#if5w-structured-inquiry-framework-for-guardian-council-deliberations) | `if://doc/IF_5W_STRUCTURED_INQUIRY_FRAMEWORK/v1.0` | Structured prompts with evidence slots |
| Preflight | [IF.BIAS](#ifbias-bias-risk-pre-council-decision-matrix) | `if://doc/IF_BIAS_PRECOUNCIL_MATRIX/v1.0` | Sizes councils (530) and assigns expert voting seats |
| Governance | [IF.GUARD council](#ifguard-strategic-communications-council-for-ai-message-validation) | `if://doc/IF_GUARD_COUNCIL_FRAMEWORK/v1.0` | Multi-voice review with signed outcomes (sized by IF.BIAS) |
| Inquiry | [IF.GOV.QUESTIONS (legacy: IF.5W)](#if5w-structured-inquiry-framework-for-guardian-council-deliberations) | `if://doc/IF_5W_STRUCTURED_INQUIRY_FRAMEWORK/v1.0` | Structured prompts with evidence slots |
| Preflight | [IF.GOV.TRIAGE (legacy: IF.BIAS)](#ifbias-bias-risk-pre-council-decision-matrix) | `if://doc/IF_BIAS_PRECOUNCIL_MATRIX/v1.0` | Sizes councils (530) and assigns expert voting seats |
| Governance | [IF.GOV.PANEL (legacy: IF.GUARD) council](#ifguard-strategic-communications-council-for-ai-message-validation) | `if://doc/IF_GUARD_COUNCIL_FRAMEWORK/v1.0` | Multi-voice review with signed outcomes (sized by IF.BIAS) |
| Compliance | [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) | `if://doc/IF_TTT_THE_SKELETON_OF_EVERYTHING/v1.0` | Ledgerflow, repo hygiene, citation enforcement |
| Transport | [IF.PACKET + swarm.s2](#ifpacket-message-transport-framework-with-vocaldna-voice-layering) | `if://doc/IF_PACKET_TRANSPORT_FRAMEWORK/v1.0` | Voice-layered packets with trace IDs |
| Product | [IF.emotion](#ifemotion) | `if://doc/IF_EMOTION_WHITEPAPER/v1.0` | Applied exemplar proving guard + TTT in production |
@ -225,31 +259,34 @@ Why this stub exists: external reviewers/LLMs sometimes skip an entire pillar if
### Reader Path (Start Here)
- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.BIAS](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GUARD](#ifguard-strategic-communications-council-for-ai-message-validation)
- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.GOV.TRIAGE (legacy: IF.BIAS)](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GOV.PANEL (legacy: IF.GUARD)](#ifguard-strategic-communications-council-for-ai-message-validation)
- **Latency framing:** Use `t_total = t_model + t_transport + t_governance`; only `t_transport` is benchmarked in microlab terms, and never presented as “council deliberation time.”
- **Consensus framing:** “Unanimous” means “the council converged,” not “the claim is true”; treat any 100% consensus output as a governance artifact until raw evidence bundles are attached.
- **Validation framing:** External validation is reported as an observational microlab pilot, not proof, and not a consciousness claim.
### Glossary (Quick Decode)
- **IF.TTT:** Traceable/Transparent/Trustworthy compliance spine; enforces evidence, identity, and audit lineage.
- **IF.BIAS:** Pre-council bias/risk triage matrix; recommends escalation and council sizing.
- **IF.GUARD:** Council protocol; minimum 5-seat panel (Core 4 + contrarian), expands up to 30 seats when justified.
- **Contrarian Guardian:** Required dissent seat; can trigger cooling-off/veto at >95% approval.
- **IF.5W:** Structured inquiry format used to generate briefs for councils.
- **IF.PACKET:** Schema-first message transport with trace IDs and audit metadata.
- **IF.SWARM.s2:** Intra-swarm agent communications over a Redis bus; swarm coordination at speed.
- **IF.STORY:** Vectornarrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions.
- **Page Zero:** The manifesto/origin narrative that explains “why” (and demonstrates IF.STORY + IF.TTT in practice).
- **IF.emotion / AI-e:** Product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”).
- **IF.PHIL:** Annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects).
- **IF.BUS:** Universal Kinetic Transport Protocol; deterministic actuation layer.
- **IF.ARMOUR:** Epistemic security immune system; physics-grounded detective layer.
Naming note: `IF.bus` / `IF.armour` (lowercase) appear elsewhere as earlier papers/modules; `IF.BUS` / `IF.ARMOUR` are the canonical lower-layer protocol specifications introduced on 20251218.
- **IF.AUDIT.TRAIL:** Concrete audit artifact layer (portable chain-of-custody logs + signatures). *(In practice: implemented under IF.TTT today.)*
- **IF.GOV.TRIAGE** *(legacy: IF.BIAS)*: preflight risk triage; recommends escalation and panel sizing.
- **IF.GOV.PANEL** *(legacy: IF.GUARD)*: governance panel; minimum 5-seat review including contrarian; can expand as **IF.GOV.PANEL.EXTENDED**.
- **Contrarian Guardian:** required dissent seat; can trigger cooling-off/veto at >95% approval.
- **IF.GOV.QUESTIONS** *(legacy: IF.5W)*: structured inquiry format used to generate briefs for panels.
- **IF.TRANSIT.MESSAGE** *(legacy: IF.PACKET)*: schema-first message envelope with trace IDs and audit metadata.
- **IF.TRANSIT.SWARM** *(legacy: swarm.s2 / IF.SWARM.s2)*: intra-swarm agent communications over a Redis bus.
- **IF.STORY:** narrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions.
- **Page Zero:** the origin manifesto that explains “why” (and demonstrates IF.STORY + IF.TTT in practice).
- **IF.emotion / AI-e:** product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”).
- **IF.PHIL:** annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects).
- **IF.TRANSIT.HUB** *(legacy: IF.BUS)*: deterministic actuation/privilege enforcement transport substrate.
- **IF.SECURITY.CHECK** *(legacy: IF.ARMOUR)*: epistemic security detective layer (coherence/anomaly checks).
- **IF.SECURITY.DETECT** *(legacy: IF.YOLOGUARD)*: secret/relationship screening primitives.
Naming note: legacy lowercase (`if.bus`, `if.armour`) appears in older papers; `IF.TRANSIT.HUB` / `IF.SECURITY.CHECK` are the canonical refactor targets introduced in this dossier.
### Selected Governance Extensions (Optional Depth)
IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.PACKET payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GUARD and logged via IF.TTT.
IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.TRANSIT.MESSAGE (legacy: IF.PACKET) payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GOV.PANEL (legacy: IF.GUARD) and logged via IF.TTT.
IF.PHIL demonstrates how InfraFabric primitives extend to auditable philanthropic access, replacing discretionary “credits” with governed grant objects.
@ -269,11 +306,11 @@ Full paper: [Annex — IF.PHIL | Auditable Philanthropy](#annex-ifphil-auditable
```mermaid
flowchart TD
VISION["IF.vision<br/>coordination without control"] --> FOUNDATIONS["IF.foundations<br/>ground/search/persona"]
FOUNDATIONS --> ASSURE["Assurance<br/>IF.ARMOUR • witness • yologuard"]
ASSURE --> TRANSPORT["Transport<br/>IF.BUS • packet • swarm.s2 • story"]
TRANSPORT --> BIAS["Preflight<br/>IF.BIAS | Bias & Risk Matrix"]
BIAS --> CORE4["Core 4 triage<br/>IF.GUARD(4)"]
CORE4 --> GOVERN["Governance<br/>IF.GUARD council (530) + 5W"]
FOUNDATIONS --> ASSURE["Security<br/>IF.SECURITY.CHECK • IF.GOV.WITNESS • IF.SECURITY.DETECT"]
ASSURE --> TRANSPORT["Transit<br/>IF.TRANSIT.HUB • MESSAGE • SWARM • IF.STORY"]
TRANSPORT --> BIAS["Preflight<br/>IF.GOV.TRIAGE (legacy: IF.BIAS)"]
BIAS --> CORE4["Core 4 convening<br/>legacy: IF.GUARD(4)"]
CORE4 --> GOVERN["Governance<br/>IF.GOV.PANEL (530) + IF.GOV.QUESTIONS"]
GOVERN --> COMPLIANCE["Compliance<br/>IF.TTT | Distributed Ledger + ledgerflow"]
COMPLIANCE --> PRODUCT["Productization<br/>IF.emotion"]
PRODUCT --> FEEDBACK["Feedback into Vision/Foundations"]
@ -282,26 +319,25 @@ flowchart TD
### Governance, Assurance, Compliance Loop
```mermaid
flowchart TD
INQUIRY["IF.5W | Structured Inquiry<br/>structured deliberation"] --> BIAS["IF.BIAS | Bias & Risk Preflight<br/>sizes councils (530)"]
BIAS --> CORE4["IF.GUARD(4) | Core 4 triage<br/>convening authority"]
CORE4 --> GUARD["IF.GUARD | Council deliberation<br/>panel 5 ↔ extended 30"]
GUARD --> STORY["IF.STORY | Narrative Logging<br/>narrative + state"]
STORY --> TTT["IF.TTT | Distributed Ledger<br/>traceable/transparent/trustworthy"]
TTT --> WITNESS["IF.witness<br/>meta-validation"]
WITNESS --> ARMOUR["IF.armour<br/>FP reduction"]
ARMOUR --> YG["IF.YOLOGUARD | Credential & Secret Screening<br/>secret/relationship checks"]
YG --> PACKET["IF.PACKET | Message Transport + swarm.s2<br/>delivery with VocalDNA"]
PACKET --> EMOTION["IF.emotion<br/>product exemplar"]
EMOTION --> FEEDBACK["Feedback into inquiry"]
FEEDBACK --> INQUIRY
flowchart TB
Q["IF.GOV.QUESTIONS\n(legacy: IF.5W)"] --> T["IF.GOV.TRIAGE\n(legacy: IF.BIAS)"]
T --> C4["Core 4 convening\n(legacy: IF.GUARD(4))"]
C4 --> P["IF.GOV.PANEL\n(5 ↔ EXTENDED ~30)"]
P --> S["IF.STORY\nnarrative logging"]
S --> A["IF.TTT / IF.AUDIT.TRAIL\ntrace discipline"]
A --> W["IF.GOV.WITNESS\nverification"]
W --> CHK["IF.SECURITY.CHECK\n(legacy: IF.ARMOUR)"]
CHK --> DET["IF.SECURITY.DETECT\n(legacy: IF.YOLOGUARD)"]
DET --> MSG["IF.TRANSIT.MESSAGE + SWARM\n(legacy: IF.PACKET + swarm.s2)"]
MSG --> EMO["IF.emotion\nexemplar"]
EMO --> Q
```
### Delivery & Safety Highlights (with citations)
- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GUARD review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`).
- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; witness/armour/yologuard gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`).
- Transport fidelity: IF.PACKET carries voice DNA; swarm.s2 provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`).
- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GOV.PANEL (legacy: IF.GUARD) review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`).
- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; IF.GOV.WITNESS / IF.SECURITY.CHECK / IF.SECURITY.DETECT gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`).
- Transport fidelity: IF.TRANSIT.MESSAGE (legacy: IF.PACKET) carries voice DNA; IF.TRANSIT.SWARM (legacy: swarm.s2) provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`).
- Security/legal: Prompt-injection defenses cover SOTA attack classes; legal DB build operationalizes doc governance; API roadmap + history-file tests reduce integration regressions (sources: `docs/research/PROMPT_INJECTION_DEFENSES.md`, `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`, `docs/api/API_ROADMAP.md`, `HISTORY_FILE_TEST_REPORT.md`).
- Domain credibility: Medical (GLP1 retrofit), emosocial principles, and informal sector resilience (Juakali) field report show adaptability of the same guard/compliance/transport spine (sources: `Brownfield_GLP1_Retrofit_LE_DILEMME_DU_TUYAU_SALE.md`, `DEJA_DE_BUSCARTE_11_principios_emosociales.md`, `JUAKALI_RAPPORT_V2_LOS_20251205_0236 (sent).md`).
@ -443,6 +479,7 @@ InfraFabric is the operating system that turns AI from a chatbot into a reliable
- [DataDriven Technical Report (Microlab)](DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION.md)
- [00. The Bridge: Submission Pack (Reviewer Orientation)](#bridge-submission-pack)
- [01. Naming + Separation of Duties (canonical refactor)](#naming-and-separation-of-duties) — see `IF_NAMING_BIBLE_v1.0.md`, `IF_NAMING_REGISTRY.yaml`, `gov/`
### External audit artifacts (public, reviewer-friendly)
@ -512,7 +549,7 @@ Optional “audit culture” annexes (satire; Dave is a pattern, not a person):
- [ANNEX: IF.PHIL | Auditable Philanthropy: Access, Subsidy, and Governance Without Vibes](#annex-ifphil-auditable-philanthropy-access-subsidy-and-governance-without-vibes) — `if://doc/IF_PHIL_AUDITABLE_ACCESS/v1.0` — Author: Danny Stocker; Status: RELEASE / v1.0
- [History File Error Handling Test Report](#history-file-error-handling-test-report) — `if.api/llm/openwebui/docs/internals/HISTORY_FILE_TEST_REPORT.md`
- [CLOUD SESSION: Legal Document Database Build](#cloud-session-legal-document-database-build) — `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`
- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier) — Full satire (optional): https://infrafabric.io/static/hosted/IF_DAVE_SHADOW_DOSSIER_FULL_SATIRE.md
- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier)
---

View file

@ -41,18 +41,18 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard
| Core claim | Proof (artifacts) | Limitation (scope / boundary) |
|---|---|---|
| **A) Traceability is safety.** Highstakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**<br/>- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)<br/>- Verifier: `https://infrafabric.io/static/hosted/iftrace.py`<br/>- Reference bundle: `emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz` | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public appendonly transparency log yet. |
| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.BIAS → IF.GUARD**<br/>- IF.BIAS: risk preflight sizes councils and escalates<br/>- IF.GUARD: councils preserve dissent and veto paths<br/>- IF.5W: structured inquiry briefs for councils | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller councils or fast-track gates. |
| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.ARMOUR + IF.YOLOGUARD**<br/>- IF.ARMOUR: epistemic coherence checks (detective layer)<br/>- IF.YOLOGUARD: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. |
| **A) Traceability is safety.** Highstakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**<br/>- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)<br/>- Verifier: [iftrace.py](https://infrafabric.io/static/hosted/iftrace.py)<br/>- Reference bundle: [emo_trace_payload_016cca78…tar.gz](https://infrafabric.io/static/hosted/emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz) | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public appendonly transparency log yet. |
| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.GOV.TRIAGE → IF.GOV.PANEL** *(legacy: IF.BIAS → IF.GUARD)*<br/>- TRIAGE: risk preflight sizes panels and escalates<br/>- PANEL: preserves dissent + veto paths<br/>- QUESTIONS *(legacy: IF.5W)*: structured inquiry briefs for panels | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller panels or fast-track gates. |
| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.SECURITY.CHECK + IF.SECURITY.DETECT** *(legacy: IF.ARMOUR + IF.YOLOGUARD)*<br/>- CHECK: epistemic coherence checks (detective layer)<br/>- DETECT: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. |
### Rosetta Stone (Closest Analog, not “equals”)
| InfraFabric term | Closest industry analog | Boundary (where it differs) |
|---|---|---|
| **IF.TTT** (Traceable/Transparent/Trustworthy) | Supply-chain integrity patterns (SLSA/SBOM + CT-like audit thinking) | IF.TTT applies the discipline to **semantic decisions and retrieval lineage**, not just binaries. It produces portable evidence bundles + verifier steps for third-party audit. |
| **IF.GUARD** (Council governance) | Human-in-the-loop oversight / review boards | IF.GUARD is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. |
| **IF.ARMOUR** (Assurance) | Epistemic security / anomaly detection | Armour is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. |
| **IF.swarm.s2 / IF.PACKET / IF.BUS** (Transport) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. |
| **IF.GOV.PANEL** (legacy: IF.GUARD) | Human-in-the-loop oversight / review boards | IF.GOV.PANEL is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. |
| **IF.SECURITY.CHECK** (legacy: IF.ARMOUR) | Epistemic security / anomaly detection | CHECK is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. |
| **IF.TRANSIT.SWARM / IF.TRANSIT.MESSAGE / IF.TRANSIT.HUB** (legacy: swarm.s2 / IF.PACKET / IF.BUS) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. |
### Navigation Guide (Clean vs Origin context)
@ -60,11 +60,45 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard
- If you want the origin context (microlab lab notes / narrative artifacts): start at the **Cold Open** and IF.STORY sections (they explain why the architecture exists).
- Optional culture stress-test (explicit satire; not a protocol): [Annex (Non-Technical): The Dave Factor Shadow Dossier](#annex-dave-factor-shadow-dossier)
<a id="naming-and-separation-of-duties"></a>
## 01. Naming + Separation of Duties (canonical refactor)
InfraFabrics early papers used internal names (e.g., `IF.GUARD`, `IF.BIAS`, `IF.ARMOUR`, `IF.BUS`). To reduce lexicon friction for reviewers and to standardize crossapp integration, this dossier is refactoring to a separationofduties namespace inspired by **US/CA/EU** governance patterns:
- `IF.GOV.*` — governance (triage + panels + witness)
- `IF.SECURITY.*` — security (detective checks + secret screening)
- `IF.TRANSIT.*` — transport/actuation (routing + message envelopes)
- `IF.AUDIT.*` — audit artifacts (trail + proof bundles)
Canonical references in this repo:
- Naming contract: `IF_NAMING_BIBLE_v1.0.md`
- Machine registry: `IF_NAMING_REGISTRY.yaml`
- Governance charters (who does what): `gov/`
### Legacy → canonical mapping (v1)
| Legacy name | Canonical name |
|---|---|
| `IF.BIAS` | `IF.GOV.TRIAGE` |
| `IF.GUARD` | `IF.GOV.PANEL` |
| `IF.5W` | `IF.GOV.QUESTIONS` |
| `IF.WITNESS` | `IF.GOV.WITNESS` |
| `IF.ARMOUR` | `IF.SECURITY.CHECK` |
| `IF.YOLOGUARD` | `IF.SECURITY.DETECT` |
| `IF.BUS` | `IF.TRANSIT.HUB` |
| `IF.PACKET` | `IF.TRANSIT.MESSAGE` |
| `swarm.s2` | `IF.TRANSIT.SWARM` |
Transition policy: many embedded papers still use legacy names; where so, the dossier now prefers first-mention annotations like `IF.GOV.PANEL (legacy: IF.GUARD)`.
## Opening Whitepaper — InfraFabric Synthesis (for Anthropic)
> *If we cannot prove the chain-of-custody, we cannot ship.*
InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.BIAS + IF.GUARD + IF.5W), transport (IF.PACKET + swarm.s2 + IF.STORY), assurance (armour, witness, yologuard), and the exemplar product (IF.emotion).
InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.GOV.TRIAGE + IF.GOV.PANEL + IF.GOV.QUESTIONS), transit (IF.TRANSIT.MESSAGE + IF.TRANSIT.SWARM + IF.STORY), security (IF.SECURITY.CHECK + IF.GOV.WITNESS + IF.SECURITY.DETECT), and the exemplar product (IF.emotion).
### IF.BUS ↔ IF.ARMOUR Threat Coverage Matrix (Normative)
@ -102,31 +136,34 @@ Why this stub exists: external reviewers/LLMs sometimes skip an entire pillar if
### Reader Path (Start Here)
- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.BIAS](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GUARD](#ifguard-strategic-communications-council-for-ai-message-validation)
- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.GOV.TRIAGE (legacy: IF.BIAS)](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GOV.PANEL (legacy: IF.GUARD)](#ifguard-strategic-communications-council-for-ai-message-validation)
- **Latency framing:** Use `t_total = t_model + t_transport + t_governance`; only `t_transport` is benchmarked in microlab terms, and never presented as “council deliberation time.”
- **Consensus framing:** “Unanimous” means “the council converged,” not “the claim is true”; treat any 100% consensus output as a governance artifact until raw evidence bundles are attached.
- **Validation framing:** External validation is reported as an observational microlab pilot, not proof, and not a consciousness claim.
### Glossary (Quick Decode)
- **IF.TTT:** Traceable/Transparent/Trustworthy compliance spine; enforces evidence, identity, and audit lineage.
- **IF.BIAS:** Pre-council bias/risk triage matrix; recommends escalation and council sizing.
- **IF.GUARD:** Council protocol; minimum 5-seat panel (Core 4 + contrarian), expands up to 30 seats when justified.
- **Contrarian Guardian:** Required dissent seat; can trigger cooling-off/veto at >95% approval.
- **IF.5W:** Structured inquiry format used to generate briefs for councils.
- **IF.PACKET:** Schema-first message transport with trace IDs and audit metadata.
- **IF.SWARM.s2:** Intra-swarm agent communications over a Redis bus; swarm coordination at speed.
- **IF.STORY:** Vectornarrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions.
- **Page Zero:** The manifesto/origin narrative that explains “why” (and demonstrates IF.STORY + IF.TTT in practice).
- **IF.emotion / AI-e:** Product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”).
- **IF.PHIL:** Annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects).
- **IF.BUS:** Universal Kinetic Transport Protocol; deterministic actuation layer.
- **IF.ARMOUR:** Epistemic security immune system; physics-grounded detective layer.
Naming note: `IF.bus` / `IF.armour` (lowercase) appear elsewhere as earlier papers/modules; `IF.BUS` / `IF.ARMOUR` are the canonical lower-layer protocol specifications introduced on 20251218.
- **IF.AUDIT.TRAIL:** Concrete audit artifact layer (portable chain-of-custody logs + signatures). *(In practice: implemented under IF.TTT today.)*
- **IF.GOV.TRIAGE** *(legacy: IF.BIAS)*: preflight risk triage; recommends escalation and panel sizing.
- **IF.GOV.PANEL** *(legacy: IF.GUARD)*: governance panel; minimum 5-seat review including contrarian; can expand as **IF.GOV.PANEL.EXTENDED**.
- **Contrarian Guardian:** required dissent seat; can trigger cooling-off/veto at >95% approval.
- **IF.GOV.QUESTIONS** *(legacy: IF.5W)*: structured inquiry format used to generate briefs for panels.
- **IF.TRANSIT.MESSAGE** *(legacy: IF.PACKET)*: schema-first message envelope with trace IDs and audit metadata.
- **IF.TRANSIT.SWARM** *(legacy: swarm.s2 / IF.SWARM.s2)*: intra-swarm agent communications over a Redis bus.
- **IF.STORY:** narrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions.
- **Page Zero:** the origin manifesto that explains “why” (and demonstrates IF.STORY + IF.TTT in practice).
- **IF.emotion / AI-e:** product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”).
- **IF.PHIL:** annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects).
- **IF.TRANSIT.HUB** *(legacy: IF.BUS)*: deterministic actuation/privilege enforcement transport substrate.
- **IF.SECURITY.CHECK** *(legacy: IF.ARMOUR)*: epistemic security detective layer (coherence/anomaly checks).
- **IF.SECURITY.DETECT** *(legacy: IF.YOLOGUARD)*: secret/relationship screening primitives.
Naming note: legacy lowercase (`if.bus`, `if.armour`) appears in older papers; `IF.TRANSIT.HUB` / `IF.SECURITY.CHECK` are the canonical refactor targets introduced in this dossier.
### Selected Governance Extensions (Optional Depth)
IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.PACKET payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GUARD and logged via IF.TTT.
IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.TRANSIT.MESSAGE (legacy: IF.PACKET) payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GOV.PANEL (legacy: IF.GUARD) and logged via IF.TTT.
IF.PHIL demonstrates how InfraFabric primitives extend to auditable philanthropic access, replacing discretionary “credits” with governed grant objects.
@ -146,11 +183,11 @@ Full paper: [Annex — IF.PHIL | Auditable Philanthropy](#annex-ifphil-auditable
```mermaid
flowchart TD
VISION["IF.vision<br/>coordination without control"] --> FOUNDATIONS["IF.foundations<br/>ground/search/persona"]
FOUNDATIONS --> ASSURE["Assurance<br/>IF.ARMOUR • witness • yologuard"]
ASSURE --> TRANSPORT["Transport<br/>IF.BUS • packet • swarm.s2 • story"]
TRANSPORT --> BIAS["Preflight<br/>IF.BIAS | Bias & Risk Matrix"]
BIAS --> CORE4["Core 4 triage<br/>IF.GUARD(4)"]
CORE4 --> GOVERN["Governance<br/>IF.GUARD council (530) + 5W"]
FOUNDATIONS --> ASSURE["Security<br/>IF.SECURITY.CHECK • IF.GOV.WITNESS • IF.SECURITY.DETECT"]
ASSURE --> TRANSPORT["Transit<br/>IF.TRANSIT.HUB • MESSAGE • SWARM • IF.STORY"]
TRANSPORT --> BIAS["Preflight<br/>IF.GOV.TRIAGE (legacy: IF.BIAS)"]
BIAS --> CORE4["Core 4 convening<br/>legacy: IF.GUARD(4)"]
CORE4 --> GOVERN["Governance<br/>IF.GOV.PANEL (530) + IF.GOV.QUESTIONS"]
GOVERN --> COMPLIANCE["Compliance<br/>IF.TTT | Distributed Ledger + ledgerflow"]
COMPLIANCE --> PRODUCT["Productization<br/>IF.emotion"]
PRODUCT --> FEEDBACK["Feedback into Vision/Foundations"]
@ -159,26 +196,25 @@ flowchart TD
### Governance, Assurance, Compliance Loop
```mermaid
flowchart TD
INQUIRY["IF.5W | Structured Inquiry<br/>structured deliberation"] --> BIAS["IF.BIAS | Bias & Risk Preflight<br/>sizes councils (530)"]
BIAS --> CORE4["IF.GUARD(4) | Core 4 triage<br/>convening authority"]
CORE4 --> GUARD["IF.GUARD | Council deliberation<br/>panel 5 ↔ extended 30"]
GUARD --> STORY["IF.STORY | Narrative Logging<br/>narrative + state"]
STORY --> TTT["IF.TTT | Distributed Ledger<br/>traceable/transparent/trustworthy"]
TTT --> WITNESS["IF.witness<br/>meta-validation"]
WITNESS --> ARMOUR["IF.armour<br/>FP reduction"]
ARMOUR --> YG["IF.YOLOGUARD | Credential & Secret Screening<br/>secret/relationship checks"]
YG --> PACKET["IF.PACKET | Message Transport + swarm.s2<br/>delivery with VocalDNA"]
PACKET --> EMOTION["IF.emotion<br/>product exemplar"]
EMOTION --> FEEDBACK["Feedback into inquiry"]
FEEDBACK --> INQUIRY
flowchart TB
Q["IF.GOV.QUESTIONS\n(legacy: IF.5W)"] --> T["IF.GOV.TRIAGE\n(legacy: IF.BIAS)"]
T --> C4["Core 4 convening\n(legacy: IF.GUARD(4))"]
C4 --> P["IF.GOV.PANEL\n(5 ↔ EXTENDED ~30)"]
P --> S["IF.STORY\nnarrative logging"]
S --> A["IF.TTT / IF.AUDIT.TRAIL\ntrace discipline"]
A --> W["IF.GOV.WITNESS\nverification"]
W --> CHK["IF.SECURITY.CHECK\n(legacy: IF.ARMOUR)"]
CHK --> DET["IF.SECURITY.DETECT\n(legacy: IF.YOLOGUARD)"]
DET --> MSG["IF.TRANSIT.MESSAGE + SWARM\n(legacy: IF.PACKET + swarm.s2)"]
MSG --> EMO["IF.emotion\nexemplar"]
EMO --> Q
```
### Delivery & Safety Highlights (with citations)
- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GUARD review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`).
- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; witness/armour/yologuard gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`).
- Transport fidelity: IF.PACKET carries voice DNA; swarm.s2 provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`).
- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GOV.PANEL (legacy: IF.GUARD) review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`).
- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; IF.GOV.WITNESS / IF.SECURITY.CHECK / IF.SECURITY.DETECT gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`).
- Transport fidelity: IF.TRANSIT.MESSAGE (legacy: IF.PACKET) carries voice DNA; IF.TRANSIT.SWARM (legacy: swarm.s2) provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`).
- Security/legal: Prompt-injection defenses cover SOTA attack classes; legal DB build operationalizes doc governance; API roadmap + history-file tests reduce integration regressions (sources: `docs/research/PROMPT_INJECTION_DEFENSES.md`, `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`, `docs/api/API_ROADMAP.md`, `HISTORY_FILE_TEST_REPORT.md`).
- Domain credibility: Medical (GLP1 retrofit), emosocial principles, and informal sector resilience (Juakali) field report show adaptability of the same guard/compliance/transport spine (sources: `Brownfield_GLP1_Retrofit_LE_DILEMME_DU_TUYAU_SALE.md`, `DEJA_DE_BUSCARTE_11_principios_emosociales.md`, `JUAKALI_RAPPORT_V2_LOS_20251205_0236 (sent).md`).
@ -320,6 +356,7 @@ InfraFabric is the operating system that turns AI from a chatbot into a reliable
- [DataDriven Technical Report (Microlab)](DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION.md)
- [00. The Bridge: Submission Pack (Reviewer Orientation)](#bridge-submission-pack)
- [01. Naming + Separation of Duties (canonical refactor)](#naming-and-separation-of-duties) — see `IF_NAMING_BIBLE_v1.0.md`, `IF_NAMING_REGISTRY.yaml`, `gov/`
### External audit artifacts (public, reviewer-friendly)
@ -389,7 +426,7 @@ Optional “audit culture” annexes (satire; Dave is a pattern, not a person):
- [ANNEX: IF.PHIL | Auditable Philanthropy: Access, Subsidy, and Governance Without Vibes](#annex-ifphil-auditable-philanthropy-access-subsidy-and-governance-without-vibes) — `if://doc/IF_PHIL_AUDITABLE_ACCESS/v1.0` — Author: Danny Stocker; Status: RELEASE / v1.0
- [History File Error Handling Test Report](#history-file-error-handling-test-report) — `if.api/llm/openwebui/docs/internals/HISTORY_FILE_TEST_REPORT.md`
- [CLOUD SESSION: Legal Document Database Build](#cloud-session-legal-document-database-build) — `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`
- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier) — Full satire (optional): https://infrafabric.io/static/hosted/IF_DAVE_SHADOW_DOSSIER_FULL_SATIRE.md
- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier)
---

View file

@ -21,6 +21,17 @@
---
## 0.5) Naming (Refactor in progress)
This submission uses a refactor namespace to reduce lexicon friction:
- `IF.GOV.*` (governance), `IF.SECURITY.*` (security), `IF.TRANSIT.*` (transport), `IF.AUDIT.*` (audit artifacts)
- Legacy names may appear in embedded papers; first-mention annotations use the form `IF.GOV.PANEL (legacy: IF.GUARD)`
Canonical docs: `IF_NAMING_BIBLE_v1.0.md`, `IF_NAMING_REGISTRY.yaml`, and `gov/` (in the source repo).
---
## 1) Technical Disclosure (AI-Native Implementation)
This project follows an Operator-as-Architect workflow: I define constraints, interfaces, and verification hooks; LLMs generate implementation code under supervision. The system is therefore evaluated as:
@ -42,8 +53,8 @@ This project follows an Operator-as-Architect workflow: I define constraints, in
| Core claim | Proof (artifact) | Boundary / limitation |
|---|---|---|
| **A) Traceability is a safety primitive.** Highstakes agent actions require verifiable provenance. | IF.emotion trace protocol + evidence bundle + verifier (see §5). | **Microlab / single shard.** Guarantees begin at the backend witness boundary; edge completeness is future work. |
| **B) Governance needs structured dissent.** One-model “judge” patterns are brittle. | IF.BIAS (risk preflight) + IF.GUARD (council with required dissent seat) traced via IF.TTT. | **Cost/latency.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths stay fast. |
| **C) Context is a security control.** Static filters fail; provenance + coherence checks reduce unsafe drift. | IF.ARMOUR (coherence/detective layer) + IF.YOLOGUARD (secret/relationship screening) integrated into the pipeline. | **Domain calibration.** Strongest for concrete surfaces (secrets/PII/prompt injection); general harmful-intent is open research. |
| **B) Governance needs structured dissent.** One-model “judge” patterns are brittle. | IF.GOV.TRIAGE *(legacy: IF.BIAS)* + IF.GOV.PANEL *(legacy: IF.GUARD)* traced via IF.TTT / IF.AUDIT.TRAIL. | **Cost/latency.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths stay fast. |
| **C) Context is a security control.** Static filters fail; provenance + coherence checks reduce unsafe drift. | IF.SECURITY.CHECK *(legacy: IF.ARMOUR)* + IF.SECURITY.DETECT *(legacy: IF.YOLOGUARD)* integrated into the pipeline. | **Domain calibration.** Strongest for concrete surfaces (secrets/PII/prompt injection); general harmful-intent is open research. |
---

View file

@ -41,18 +41,18 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard
| Core claim | Proof (artifacts) | Limitation (scope / boundary) |
|---|---|---|
| **A) Traceability is safety.** Highstakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**<br/>- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)<br/>- Verifier: `https://infrafabric.io/static/hosted/iftrace.py`<br/>- Reference bundle: `emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz` | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public appendonly transparency log yet. |
| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.BIAS → IF.GUARD**<br/>- IF.BIAS: risk preflight sizes councils and escalates<br/>- IF.GUARD: councils preserve dissent and veto paths<br/>- IF.5W: structured inquiry briefs for councils | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller councils or fast-track gates. |
| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.ARMOUR + IF.YOLOGUARD**<br/>- IF.ARMOUR: epistemic coherence checks (detective layer)<br/>- IF.YOLOGUARD: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. |
| **A) Traceability is safety.** Highstakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**<br/>- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)<br/>- Verifier: [iftrace.py](https://infrafabric.io/static/hosted/iftrace.py)<br/>- Reference bundle: [emo_trace_payload_016cca78…tar.gz](https://infrafabric.io/static/hosted/emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz) | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public appendonly transparency log yet. |
| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.GOV.TRIAGE → IF.GOV.PANEL** *(legacy: IF.BIAS → IF.GUARD)*<br/>- TRIAGE: risk preflight sizes panels and escalates<br/>- PANEL: preserves dissent + veto paths<br/>- QUESTIONS *(legacy: IF.5W)*: structured inquiry briefs for panels | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller panels or fast-track gates. |
| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.SECURITY.CHECK + IF.SECURITY.DETECT** *(legacy: IF.ARMOUR + IF.YOLOGUARD)*<br/>- CHECK: epistemic coherence checks (detective layer)<br/>- DETECT: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. |
### Rosetta Stone (Closest Analog, not “equals”)
| InfraFabric term | Closest industry analog | Boundary (where it differs) |
|---|---|---|
| **IF.TTT** (Traceable/Transparent/Trustworthy) | Supply-chain integrity patterns (SLSA/SBOM + CT-like audit thinking) | IF.TTT applies the discipline to **semantic decisions and retrieval lineage**, not just binaries. It produces portable evidence bundles + verifier steps for third-party audit. |
| **IF.GUARD** (Council governance) | Human-in-the-loop oversight / review boards | IF.GUARD is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. |
| **IF.ARMOUR** (Assurance) | Epistemic security / anomaly detection | Armour is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. |
| **IF.swarm.s2 / IF.PACKET / IF.BUS** (Transport) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. |
| **IF.GOV.PANEL** (legacy: IF.GUARD) | Human-in-the-loop oversight / review boards | IF.GOV.PANEL is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. |
| **IF.SECURITY.CHECK** (legacy: IF.ARMOUR) | Epistemic security / anomaly detection | CHECK is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. |
| **IF.TRANSIT.SWARM / IF.TRANSIT.MESSAGE / IF.TRANSIT.HUB** (legacy: swarm.s2 / IF.PACKET / IF.BUS) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. |
### Navigation Guide (Clean vs Origin context)
@ -60,11 +60,45 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard
- If you want the origin context (microlab lab notes / narrative artifacts): start at the **Cold Open** and IF.STORY sections (they explain why the architecture exists).
- Optional culture stress-test (explicit satire; not a protocol): [Annex (Non-Technical): The Dave Factor Shadow Dossier](#annex-dave-factor-shadow-dossier)
<a id="naming-and-separation-of-duties"></a>
## 01. Naming + Separation of Duties (canonical refactor)
InfraFabrics early papers used internal names (e.g., `IF.GUARD`, `IF.BIAS`, `IF.ARMOUR`, `IF.BUS`). To reduce lexicon friction for reviewers and to standardize crossapp integration, this dossier is refactoring to a separationofduties namespace inspired by **US/CA/EU** governance patterns:
- `IF.GOV.*` — governance (triage + panels + witness)
- `IF.SECURITY.*` — security (detective checks + secret screening)
- `IF.TRANSIT.*` — transport/actuation (routing + message envelopes)
- `IF.AUDIT.*` — audit artifacts (trail + proof bundles)
Canonical references in this repo:
- Naming contract: `IF_NAMING_BIBLE_v1.0.md`
- Machine registry: `IF_NAMING_REGISTRY.yaml`
- Governance charters (who does what): `gov/`
### Legacy → canonical mapping (v1)
| Legacy name | Canonical name |
|---|---|
| `IF.BIAS` | `IF.GOV.TRIAGE` |
| `IF.GUARD` | `IF.GOV.PANEL` |
| `IF.5W` | `IF.GOV.QUESTIONS` |
| `IF.WITNESS` | `IF.GOV.WITNESS` |
| `IF.ARMOUR` | `IF.SECURITY.CHECK` |
| `IF.YOLOGUARD` | `IF.SECURITY.DETECT` |
| `IF.BUS` | `IF.TRANSIT.HUB` |
| `IF.PACKET` | `IF.TRANSIT.MESSAGE` |
| `swarm.s2` | `IF.TRANSIT.SWARM` |
Transition policy: many embedded papers still use legacy names; where so, the dossier now prefers first-mention annotations like `IF.GOV.PANEL (legacy: IF.GUARD)`.
## Opening Whitepaper — InfraFabric Synthesis (for Anthropic)
> *If we cannot prove the chain-of-custody, we cannot ship.*
InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.BIAS + IF.GUARD + IF.5W), transport (IF.PACKET + swarm.s2 + IF.STORY), assurance (armour, witness, yologuard), and the exemplar product (IF.emotion).
InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.GOV.TRIAGE + IF.GOV.PANEL + IF.GOV.QUESTIONS), transit (IF.TRANSIT.MESSAGE + IF.TRANSIT.SWARM + IF.STORY), security (IF.SECURITY.CHECK + IF.GOV.WITNESS + IF.SECURITY.DETECT), and the exemplar product (IF.emotion).
### IF.BUS ↔ IF.ARMOUR Threat Coverage Matrix (Normative)
@ -102,31 +136,34 @@ Why this stub exists: external reviewers/LLMs sometimes skip an entire pillar if
### Reader Path (Start Here)
- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.BIAS](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GUARD](#ifguard-strategic-communications-council-for-ai-message-validation)
- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.GOV.TRIAGE (legacy: IF.BIAS)](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GOV.PANEL (legacy: IF.GUARD)](#ifguard-strategic-communications-council-for-ai-message-validation)
- **Latency framing:** Use `t_total = t_model + t_transport + t_governance`; only `t_transport` is benchmarked in microlab terms, and never presented as “council deliberation time.”
- **Consensus framing:** “Unanimous” means “the council converged,” not “the claim is true”; treat any 100% consensus output as a governance artifact until raw evidence bundles are attached.
- **Validation framing:** External validation is reported as an observational microlab pilot, not proof, and not a consciousness claim.
### Glossary (Quick Decode)
- **IF.TTT:** Traceable/Transparent/Trustworthy compliance spine; enforces evidence, identity, and audit lineage.
- **IF.BIAS:** Pre-council bias/risk triage matrix; recommends escalation and council sizing.
- **IF.GUARD:** Council protocol; minimum 5-seat panel (Core 4 + contrarian), expands up to 30 seats when justified.
- **Contrarian Guardian:** Required dissent seat; can trigger cooling-off/veto at >95% approval.
- **IF.5W:** Structured inquiry format used to generate briefs for councils.
- **IF.PACKET:** Schema-first message transport with trace IDs and audit metadata.
- **IF.SWARM.s2:** Intra-swarm agent communications over a Redis bus; swarm coordination at speed.
- **IF.STORY:** Vectornarrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions.
- **Page Zero:** The manifesto/origin narrative that explains “why” (and demonstrates IF.STORY + IF.TTT in practice).
- **IF.emotion / AI-e:** Product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”).
- **IF.PHIL:** Annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects).
- **IF.BUS:** Universal Kinetic Transport Protocol; deterministic actuation layer.
- **IF.ARMOUR:** Epistemic security immune system; physics-grounded detective layer.
Naming note: `IF.bus` / `IF.armour` (lowercase) appear elsewhere as earlier papers/modules; `IF.BUS` / `IF.ARMOUR` are the canonical lower-layer protocol specifications introduced on 20251218.
- **IF.AUDIT.TRAIL:** Concrete audit artifact layer (portable chain-of-custody logs + signatures). *(In practice: implemented under IF.TTT today.)*
- **IF.GOV.TRIAGE** *(legacy: IF.BIAS)*: preflight risk triage; recommends escalation and panel sizing.
- **IF.GOV.PANEL** *(legacy: IF.GUARD)*: governance panel; minimum 5-seat review including contrarian; can expand as **IF.GOV.PANEL.EXTENDED**.
- **Contrarian Guardian:** required dissent seat; can trigger cooling-off/veto at >95% approval.
- **IF.GOV.QUESTIONS** *(legacy: IF.5W)*: structured inquiry format used to generate briefs for panels.
- **IF.TRANSIT.MESSAGE** *(legacy: IF.PACKET)*: schema-first message envelope with trace IDs and audit metadata.
- **IF.TRANSIT.SWARM** *(legacy: swarm.s2 / IF.SWARM.s2)*: intra-swarm agent communications over a Redis bus.
- **IF.STORY:** narrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions.
- **Page Zero:** the origin manifesto that explains “why” (and demonstrates IF.STORY + IF.TTT in practice).
- **IF.emotion / AI-e:** product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”).
- **IF.PHIL:** annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects).
- **IF.TRANSIT.HUB** *(legacy: IF.BUS)*: deterministic actuation/privilege enforcement transport substrate.
- **IF.SECURITY.CHECK** *(legacy: IF.ARMOUR)*: epistemic security detective layer (coherence/anomaly checks).
- **IF.SECURITY.DETECT** *(legacy: IF.YOLOGUARD)*: secret/relationship screening primitives.
Naming note: legacy lowercase (`if.bus`, `if.armour`) appears in older papers; `IF.TRANSIT.HUB` / `IF.SECURITY.CHECK` are the canonical refactor targets introduced in this dossier.
### Selected Governance Extensions (Optional Depth)
IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.PACKET payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GUARD and logged via IF.TTT.
IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.TRANSIT.MESSAGE (legacy: IF.PACKET) payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GOV.PANEL (legacy: IF.GUARD) and logged via IF.TTT.
IF.PHIL demonstrates how InfraFabric primitives extend to auditable philanthropic access, replacing discretionary “credits” with governed grant objects.
@ -146,11 +183,11 @@ Full paper: [Annex — IF.PHIL | Auditable Philanthropy](#annex-ifphil-auditable
```mermaid
flowchart TD
VISION["IF.vision<br/>coordination without control"] --> FOUNDATIONS["IF.foundations<br/>ground/search/persona"]
FOUNDATIONS --> ASSURE["Assurance<br/>IF.ARMOUR • witness • yologuard"]
ASSURE --> TRANSPORT["Transport<br/>IF.BUS • packet • swarm.s2 • story"]
TRANSPORT --> BIAS["Preflight<br/>IF.BIAS | Bias & Risk Matrix"]
BIAS --> CORE4["Core 4 triage<br/>IF.GUARD(4)"]
CORE4 --> GOVERN["Governance<br/>IF.GUARD council (530) + 5W"]
FOUNDATIONS --> ASSURE["Security<br/>IF.SECURITY.CHECK • IF.GOV.WITNESS • IF.SECURITY.DETECT"]
ASSURE --> TRANSPORT["Transit<br/>IF.TRANSIT.HUB • MESSAGE • SWARM • IF.STORY"]
TRANSPORT --> BIAS["Preflight<br/>IF.GOV.TRIAGE (legacy: IF.BIAS)"]
BIAS --> CORE4["Core 4 convening<br/>legacy: IF.GUARD(4)"]
CORE4 --> GOVERN["Governance<br/>IF.GOV.PANEL (530) + IF.GOV.QUESTIONS"]
GOVERN --> COMPLIANCE["Compliance<br/>IF.TTT | Distributed Ledger + ledgerflow"]
COMPLIANCE --> PRODUCT["Productization<br/>IF.emotion"]
PRODUCT --> FEEDBACK["Feedback into Vision/Foundations"]
@ -159,26 +196,25 @@ flowchart TD
### Governance, Assurance, Compliance Loop
```mermaid
flowchart TD
INQUIRY["IF.5W | Structured Inquiry<br/>structured deliberation"] --> BIAS["IF.BIAS | Bias & Risk Preflight<br/>sizes councils (530)"]
BIAS --> CORE4["IF.GUARD(4) | Core 4 triage<br/>convening authority"]
CORE4 --> GUARD["IF.GUARD | Council deliberation<br/>panel 5 ↔ extended 30"]
GUARD --> STORY["IF.STORY | Narrative Logging<br/>narrative + state"]
STORY --> TTT["IF.TTT | Distributed Ledger<br/>traceable/transparent/trustworthy"]
TTT --> WITNESS["IF.witness<br/>meta-validation"]
WITNESS --> ARMOUR["IF.armour<br/>FP reduction"]
ARMOUR --> YG["IF.YOLOGUARD | Credential & Secret Screening<br/>secret/relationship checks"]
YG --> PACKET["IF.PACKET | Message Transport + swarm.s2<br/>delivery with VocalDNA"]
PACKET --> EMOTION["IF.emotion<br/>product exemplar"]
EMOTION --> FEEDBACK["Feedback into inquiry"]
FEEDBACK --> INQUIRY
flowchart TB
Q["IF.GOV.QUESTIONS\n(legacy: IF.5W)"] --> T["IF.GOV.TRIAGE\n(legacy: IF.BIAS)"]
T --> C4["Core 4 convening\n(legacy: IF.GUARD(4))"]
C4 --> P["IF.GOV.PANEL\n(5 ↔ EXTENDED ~30)"]
P --> S["IF.STORY\nnarrative logging"]
S --> A["IF.TTT / IF.AUDIT.TRAIL\ntrace discipline"]
A --> W["IF.GOV.WITNESS\nverification"]
W --> CHK["IF.SECURITY.CHECK\n(legacy: IF.ARMOUR)"]
CHK --> DET["IF.SECURITY.DETECT\n(legacy: IF.YOLOGUARD)"]
DET --> MSG["IF.TRANSIT.MESSAGE + SWARM\n(legacy: IF.PACKET + swarm.s2)"]
MSG --> EMO["IF.emotion\nexemplar"]
EMO --> Q
```
### Delivery & Safety Highlights (with citations)
- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GUARD review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`).
- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; witness/armour/yologuard gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`).
- Transport fidelity: IF.PACKET carries voice DNA; swarm.s2 provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`).
- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GOV.PANEL (legacy: IF.GUARD) review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`).
- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; IF.GOV.WITNESS / IF.SECURITY.CHECK / IF.SECURITY.DETECT gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`).
- Transport fidelity: IF.TRANSIT.MESSAGE (legacy: IF.PACKET) carries voice DNA; IF.TRANSIT.SWARM (legacy: swarm.s2) provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`).
- Security/legal: Prompt-injection defenses cover SOTA attack classes; legal DB build operationalizes doc governance; API roadmap + history-file tests reduce integration regressions (sources: `docs/research/PROMPT_INJECTION_DEFENSES.md`, `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`, `docs/api/API_ROADMAP.md`, `HISTORY_FILE_TEST_REPORT.md`).
- Domain credibility: Medical (GLP1 retrofit), emosocial principles, and informal sector resilience (Juakali) field report show adaptability of the same guard/compliance/transport spine (sources: `Brownfield_GLP1_Retrofit_LE_DILEMME_DU_TUYAU_SALE.md`, `DEJA_DE_BUSCARTE_11_principios_emosociales.md`, `JUAKALI_RAPPORT_V2_LOS_20251205_0236 (sent).md`).
@ -320,6 +356,7 @@ InfraFabric is the operating system that turns AI from a chatbot into a reliable
- [DataDriven Technical Report (Microlab)](DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION.md)
- [00. The Bridge: Submission Pack (Reviewer Orientation)](#bridge-submission-pack)
- [01. Naming + Separation of Duties (canonical refactor)](#naming-and-separation-of-duties) — see `IF_NAMING_BIBLE_v1.0.md`, `IF_NAMING_REGISTRY.yaml`, `gov/`
### External audit artifacts (public, reviewer-friendly)
@ -389,7 +426,7 @@ Optional “audit culture” annexes (satire; Dave is a pattern, not a person):
- [ANNEX: IF.PHIL | Auditable Philanthropy: Access, Subsidy, and Governance Without Vibes](#annex-ifphil-auditable-philanthropy-access-subsidy-and-governance-without-vibes) — `if://doc/IF_PHIL_AUDITABLE_ACCESS/v1.0` — Author: Danny Stocker; Status: RELEASE / v1.0
- [History File Error Handling Test Report](#history-file-error-handling-test-report) — `if.api/llm/openwebui/docs/internals/HISTORY_FILE_TEST_REPORT.md`
- [CLOUD SESSION: Legal Document Database Build](#cloud-session-legal-document-database-build) — `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`
- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier) — Full satire (optional): https://infrafabric.io/static/hosted/IF_DAVE_SHADOW_DOSSIER_FULL_SATIRE.md
- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier)
---

221
IF_MONIKERS_USED.md Normal file
View file

@ -0,0 +1,221 @@
# IF.* / if.* monikers found in `DANNY_STOCKER_INFRAFABRIC_DOSSIER.md`
## IF.* (protocol/moniker tokens)
Unique: 195
| Token | Count |
|---|---:|
| `IF.TTT` | 418 |
| `IF.emotion` | 264 |
| `IF.GUARD` | 153 |
| `IF.5W` | 105 |
| `IF.bus` | 66 |
| `IF.guard` | 62 |
| `IF.PACKET` | 60 |
| `IF.ground` | 58 |
| `IF.yologuard` | 58 |
| `IF.BIAS` | 56 |
| `IF.search` | 48 |
| `IF.Guard` | 46 |
| `IF.INTELLIGENCE` | 44 |
| `IF.armour` | 41 |
| `IF.persona` | 41 |
| `IF.ARBITRATE` | 41 |
| `IF.YOLOGUARD` | 38 |
| `IF.STORY` | 29 |
| `IF.witness` | 27 |
| `IF.optimise` | 27 |
| `IF.chase` | 24 |
| `IF.foundations` | 23 |
| `IF.arbitrate` | 22 |
| `IF.BUS` | 21 |
| `IF.CEO` | 21 |
| `IF.simplify` | 21 |
| `IF.garp` | 20 |
| `IF.guardian` | 19 |
| `IF.sam` | 19 |
| `IF.EMOTION` | 18 |
| `IF.vesicle` | 18 |
| `IF.ceo` | 18 |
| `IF.ARMOUR` | 17 |
| `IF.resource` | 17 |
| `IF.swarm` | 17 |
| `IF.GOV.PANEL` | 16 |
| `IF.federate` | 15 |
| `IF.intelligence` | 15 |
| `IF.emotion.typist` | 15 |
| `IF.PHIL` | 14 |
| `IF.vision` | 13 |
| `IF.trace` | 13 |
| `IF.router` | 11 |
| `IF.philosophy` | 11 |
| `IF.reflect` | 10 |
| `IF.SEARCH` | 10 |
| `IF.GOV.TRIAGE` | 9 |
| `IF.SECURITY.CHECK` | 9 |
| `IF.collapse` | 9 |
| `IF.philosophy-database.yaml` | 9 |
| `IF.TTT.ledgerflow.deltasync` | 8 |
| `IF.SECURITY.DETECT` | 7 |
| `IF.TRANSIT.MESSAGE` | 7 |
| `IF.quiet` | 7 |
| `IF.forge` | 7 |
| `IF.story` | 7 |
| `IF.citation` | 7 |
| `IF.GOV.QUESTIONS` | 6 |
| `IF.TTT.ledgerflow.deltasync.REPO-RESTRUCTURE.WHITEPAPER.md` | 6 |
| `IF.STORY_WHITE_PAPER_v7.02_FINAL.md` | 6 |
| `IF.CRYPTOGRAPHY` | 6 |
| `IF.constitution` | 6 |
| `IF.memory` | 6 |
| `IF.guardian-core-01` | 6 |
| `IF.guardian-core-06` | 6 |
| `IF.TRANSIT.SWARM` | 5 |
| `IF.TRANSIT.HUB` | 5 |
| `IF.GOV.WITNESS` | 5 |
| `IF.core` | 5 |
| `IF.veil` | 4 |
| `IF.talent` | 4 |
| `IF.verify` | 4 |
| `IF.methodology` | 4 |
| `IF.SAM` | 4 |
| `IF.guardian-core-05` | 4 |
| `IF.URI` | 4 |
| `IF.TTT.narrative.logging` | 4 |
| `IF.Story` | 4 |
| `IF.armour.yologuard-bridge` | 4 |
| `IF.TTT-compliant` | 4 |
| `IF.guard-POC` | 4 |
| `IF.deliberate` | 4 |
| `IF.AUDIT.TRAIL` | 3 |
| `IF.marl` | 3 |
| `IF.swarm.s2` | 3 |
| `IF.proxy` | 3 |
| `IF.geopolitical` | 3 |
| `IF.CEO-idealistic-01` | 3 |
| `IF.CEO-idealistic-02` | 3 |
| `IF.GARP` | 3 |
| `IF.coordinator` | 3 |
| `IF.LEDGERFLOW` | 3 |
| `IF.connect` | 3 |
| `IF.GOV.PANEL.EXTENDED` | 2 |
| `IF.CONTRARIAN` | 2 |
| `IF.PKI` | 2 |
| `IF.guardian-core-02` | 2 |
| `IF.guardian-core-03` | 2 |
| `IF.guardian-core-04` | 2 |
| `IF.philosopher-western-01` | 2 |
| `IF.philosopher-western-02` | 2 |
| `IF.philosopher-western-03` | 2 |
| `IF.CEO-idealistic-03` | 2 |
| `IF.CEO-idealistic-04` | 2 |
| `IF.CEO-pragmatic-01` | 2 |
| `IF.CEO-pragmatic-02` | 2 |
| `IF.CEO-pragmatic-03` | 2 |
| `IF.CEO-pragmatic-04` | 2 |
| `IF.LOGISTICS` | 2 |
| `IF.executor` | 2 |
| `IF.DECISION` | 2 |
| `IF.WWWWWW` | 2 |
| `IF.TTT-style` | 2 |
| `IF.Emotion` | 2 |
| `IF.TTT.dossier.master` | 1 |
| `IF.GOV` | 1 |
| `IF.SECURITY` | 1 |
| `IF.TRANSIT` | 1 |
| `IF.AUDIT` | 1 |
| `IF.WITNESS` | 1 |
| `IF.SWARM.s2` | 1 |
| `IF.DAVE` | 1 |
| `IF.DOSSIER.ifstory-origin-story-02-the-fuck-moment` | 1 |
| `IF.STORY.origin.02.fuck-moment` | 1 |
| `IF.DOSSIER.ifstory-origin-story-04-page-zero` | 1 |
| `IF.DOSSIER.infrafabric-the-master-white-paper` | 1 |
| `IF.DOSSIER.infrafabric-ifvision-a-blueprint-for-coordination-without-control` | 1 |
| `IF.brief-fast` | 1 |
| `IF.DOSSIER.infrafabric-iffoundations-epistemology-investigation-and-agent-design` | 1 |
| `IF.DOSSIER.ifarmour-biological-false-positive-reduction-in-adaptive-security-systems` | 1 |
| `IF.DOSSIER.ifwitness-meta-validation-as-architecture` | 1 |
| `IF.subjectmap` | 1 |
| `IF.pursuit` | 1 |
| `IF.DOSSIER.ifyologuard-a-confucian-philosophical-security-framework-for-secret-detection-and-relationship-based-credential-validation` | 1 |
| `IF.DOSSIER.ifarbitrate-conflict-resolution-consensus-engineering` | 1 |
| `IF.philosopher-eastern-01` | 1 |
| `IF.philosopher-eastern-02` | 1 |
| `IF.philosopher-eastern-03` | 1 |
| `IF.ARBITRATE.resolve_case` | 1 |
| `IF.archive` | 1 |
| `IF.Philosophy` | 1 |
| `IF.TTT-auditable` | 1 |
| `IF.DOSSIER.ifpacket-message-transport-framework-with-vocaldna-voice-layering` | 1 |
| `IF.Logistics.dispatch` | 1 |
| `IF.Logistics.collect` | 1 |
| `IF.Logistics` | 1 |
| `IF.DOSSIER.ifswarms2-redis-bus-communication-for-production-swarms` | 1 |
| `IF.DOSSIER.white-paper-ifstory` | 1 |
| `IF.DOSSIER.infrafabric-github-api-integration-roadmap-check` | 1 |
| `IF.chassis` | 1 |
| `IF.persona-database.json` | 1 |
| `IF.DOSSIER.ifintelligence-real-time-research-framework-for-guardian-council-deliberations` | 1 |
| `IF.RELATE` | 1 |
| `IF.EMERGE` | 1 |
| `IF.CITATION` | 1 |
| `IF.TRACE` | 1 |
| `IF.OPTIMISE` | 1 |
| `IF.DOSSIER.ifbias-bias-risk-pre-council-decision-matrix` | 1 |
| `IF.BIAS.precouncil.matrix` | 1 |
| `IF.DOSSIER.ifguard-strategic-communications-council-for-ai-message-validation` | 1 |
| `IF.DOSSIER.ifguard-research-summary-executive-overview` | 1 |
| `IF.GUARD_COUNCIL_FRAMEWORK.md` | 1 |
| `IF.DOSSIER.if5w-structured-inquiry-framework-for-guardian-council-deliberations` | 1 |
| `IF.COUNCIL` | 1 |
| `IF.MEMORY` | 1 |
| `IF.DOSSIER.instance-0-guardian-council-origins-evolution` | 1 |
| `IF.citate` | 1 |
| `IF.PHILOSOPHY` | 1 |
| `IF.result` | 1 |
| `IF.guard-POC-system-prompt.md` | 1 |
| `IF.philosophy-database.md` | 1 |
| `IF.philosophy-appendix.md` | 1 |
| `IF.DOSSIER.ifttt-traceable-transparent-trustworthy-a-comprehensive-compliance-framework-for-ai-governance` | 1 |
| `IF.DOSSIER.ifttt-compliance-framework-research-summary-and-key-findings` | 1 |
| `IF.DOSSIER.ifttt-the-skeleton-of-everything` | 1 |
| `IF.ESCALATE` | 1 |
| `IF.DOSSIER.iftttledgerflowdeltasync-research-grade-repository-restructure` | 1 |
| `IF.DOSSIER.emo-social-sergio-corpus-ingest-runtime` | 1 |
| `IF.DOSSIER.ifemotion` | 1 |
| `IF.emotion-style` | 1 |
| `IF.DOSSIER.state-of-the-art-prompt-injection-defenses` | 1 |
| `IF.DOSSIER.livre-blanc-le-dilemme-du-tuyau-sale` | 1 |
| `IF.DOSSIER.deja-de-buscarte` | 1 |
| `IF.DOSSIER.le-paradoxe-mambu` | 1 |
| `IF.api` | 1 |
| `IF.FORMAT` | 1 |
| `IF.DOSSIER.history-file-error-handling-test-report` | 1 |
| `IF.DOSSIER.cloud-session-legal-document-database-build` | 1 |
| `IF.DOSSIER.ifbus-the-infrafabric-motherboard-architecture` | 1 |
| `IF.BUS.v2.0.0` | 1 |
| `IF.redis` | 1 |
| `IF.dds` | 1 |
| `IF.TTT.philanthropy.grant` | 1 |
| `IF.philosophy-database-v1.1-joe-coulombe.yaml` | 1 |
| `IF.GUARD.v1` | 1 |
## if.* (lowercase tokens)
Unique: 10
| Token | Count |
|---|---:|
| `if.emotion` | 24 |
| `if.api` | 16 |
| `if.armour.secrets.detect` | 8 |
| `if.bus` | 7 |
| `if.armour.secrets` | 7 |
| `if.legal` | 5 |
| `if.armour` | 4 |
| `if.ttt.ledgerflow.deltasync` | 3 |
| `if.search` | 1 |
| `if.infrafabric` | 1 |

132
IF_NAMING_BIBLE_v1.0.md Normal file
View file

@ -0,0 +1,132 @@
# InfraFabric Naming Bible (v1.0)
**Date:** 2025-12-22
**Author:** Danny Stocker
**Status:** Canonical reference (refactor-in-progress)
## Core principle
Governance infrastructure must be comprehensible to the governed.
Names in InfraFabric are chosen to be legible to non-specialists (think: secondary-school educated — nurses, farmers, receptionists, students), not only domain experts.
Academic terminology is allowed, but it is subordinate: **first mention only**, in parentheses.
## The two-tier naming system
### Tier 1: Layer names (literal)
Layer names are professional, literal domain descriptors.
- Say what it is
- No branding energy
- “Boring” is good
Examples:
- `IF.GOV` (governance)
- `IF.SECURITY` (security) — alias: `IF.SEC`
- `IF.TRANSIT` (transport/transit)
- `IF.AUDIT` (audit)
### Tier 2: Component names (metaphorical)
Component names use short metaphors that make the function obvious.
- Short and punchy (12 syllables preferred)
- Concrete mental image
- Cross-cultural where possible
## Metaphor selection strategy
Dont force a single metaphor domain. Use what makes each function clearest.
Available domains (examples):
- Medical/Emergency: `TRIAGE`, `QUARANTINE`
- Legal/Civic: `PANEL`, `WITNESS`
- Physical/Security: `DETECT`, `TRAP`
- Logistics/Travel: `HUB`, `TRANSIT`
- Investigation: `TRAIL`, `PROOF`
## Canonical hierarchy (current refactor target)
### `IF.GOV.*` (governance)
- `IF.GOV.TRIAGE` (controversy-weighted risk stratification)
- `IF.GOV.PANEL` (multi-agent oversight with structural dissent requirements)
- `IF.GOV.PANEL.EXTENDED` (extended multi-agent oversight panel)
- `IF.GOV.QUESTIONS` (provenance interrogative framework)
- `IF.GOV.WITNESS` (audit observation and compliance monitoring)
### `IF.SECURITY.*` (security)
- `IF.SECURITY.DETECT` (context-aware secret detection)
- `IF.SECURITY.CHECK` (epistemic anomaly detection and coherence validation)
- `IF.SECURITY.WATCH` (threat intelligence and monitoring)
- `IF.SECURITY.TRAP` (honeypot deployment and active defense)
### `IF.TRANSIT.*` (transport)
- `IF.TRANSIT.HUB` (privilege-enforced kinetic message router)
- `IF.TRANSIT.MESSAGE` (cryptographically signed message protocol)
- `IF.TRANSIT.SWARM` (distributed agent coordination)
### `IF.AUDIT.*` (audit)
- `IF.AUDIT.TRAIL` (immutable chain-of-custody logging)
- `IF.AUDIT.PROOF` (portable verification bundle with replay capability)
### Special cases
- `IF.TTT` stays as a mnemonic triad (Traceable / Transparent / Trustworthy). It is a philosophy and compliance spine. Concrete artifacts should be named under `IF.AUDIT.*`.
- `IF.STORY` stays as-is (product name: narrative logging).
- `IF.EMOTION` stays as-is (application name: exemplar product).
## Academic translation format
**First mention only**:
`IF.GOV.PANEL (multi-agent oversight with structural dissent requirements)`
Avoid:
- `aka`, `|`, or “formerly” in the main prose
- treating internal legacy names as equal-status
## Legacy → canonical mapping (v1)
| Old name (legacy) | New name (canonical) |
|---|---|
| `IF.BIAS` | `IF.GOV.TRIAGE` |
| `IF.GUARD` | `IF.GOV.PANEL` |
| `IF.5W` | `IF.GOV.QUESTIONS` |
| `IF.WITNESS` | `IF.GOV.WITNESS` |
| `IF.ARMOUR` | `IF.SECURITY.CHECK` (and `IF.SECURITY.*` submodules) |
| `IF.YOLOGUARD` | `IF.SECURITY.DETECT` |
| `IF.PACKET` | `IF.TRANSIT.MESSAGE` |
| `IF.BUS` | `IF.TRANSIT.HUB` |
| `swarm.s2` | `IF.TRANSIT.SWARM` |
## Testing heuristics
### The “youth hostel test”
Could a non-technical person read an audit trail and understand what happened?
Example pass:
“Your request went to TRIAGE, which escalated to PANEL. DETECT found a secret. The decision is recorded in AUDIT.TRAIL.”
### The “government separation-of-duties” sanity check
If in doubt, follow separation-of-duties patterns inspired by **US/CA/EU** governance structures:
- separate triage (classification) from deliberation (decision)
- separate detection (security) from actuation (transport)
- separate recordkeeping (audit) from narrative (story)
## Canonical registry
- Machine-readable registry: `IF_NAMING_REGISTRY.yaml`
- Component charters (separation-of-duties): `gov/`

82
IF_NAMING_REGISTRY.yaml Normal file
View file

@ -0,0 +1,82 @@
version: "1.0"
date_utc: "2025-12-22"
status: "draft-canonical"
principles:
- "Layer names are literal domains (GOV/SECURITY/TRANSIT/AUDIT)."
- "Component names are short, concrete metaphors (TRIAGE/PANEL/DETECT/TRAIL)."
- "Names must be legible to non-specialists (secondary-school educated)."
- "Legacy names remain supported as aliases during transition."
aliases:
IF.SEC:
points_to: "IF.SECURITY"
forbidden:
- "IG.GUARD" # typo; use IF.GOV.PANEL / IF.GOV.PANEL.EXTENDED
- "ig.guard"
names:
IF.GOV.TRIAGE:
legacy: ["IF.BIAS", "if.bias"]
academic: "controversy-weighted risk stratification"
description: "Preflight risk triage that sizes councils and decides escalation."
IF.GOV.PANEL:
legacy: ["IF.GUARD", "if.guard"]
academic: "multi-agent oversight with structural dissent requirements"
description: "Council governance protocol (minimum 5 seats including a contrarian)."
IF.GOV.PANEL.EXTENDED:
legacy: []
academic: "extended multi-agent oversight panel"
description: "Expanded panel up to ~30 seats for higher-stakes decisions."
IF.GOV.QUESTIONS:
legacy: ["IF.5W", "IF_5W", "if.5w"]
academic: "provenance interrogative framework"
description: "Structured inquiry briefs (who/what/when/where/why/how)."
IF.GOV.WITNESS:
legacy: ["IF.WITNESS", "if.witness"]
academic: "audit observation and compliance monitoring"
description: "Independent witness that validates governance and trace discipline."
IF.SECURITY.DETECT:
legacy: ["IF.YOLOGUARD", "if.yologuard"]
academic: "context-aware secret detection"
description: "Secret/relationship screening and credential hygiene primitives."
IF.SECURITY.CHECK:
legacy: ["IF.ARMOUR", "IF.armour", "if.armour"]
academic: "epistemic anomaly detection and coherence validation"
description: "Detective layer for coherence/inconsistency; no actuation authority."
IF.TRANSIT.HUB:
legacy: ["IF.BUS", "IF.bus", "if.bus"]
academic: "privilege-enforced kinetic message router"
description: "Deterministic actuation + privilege enforcement substrate."
IF.TRANSIT.MESSAGE:
legacy: ["IF.PACKET", "if.packet"]
academic: "cryptographically signed message protocol"
description: "Schema-first message envelope with trace IDs and audit metadata."
IF.TRANSIT.SWARM:
legacy: ["swarm.s2", "IF.SWARM.s2", "IF.SWARM.S2"]
academic: "distributed agent coordination"
description: "Intra-swarm coordination layer over a Redis bus."
IF.AUDIT.TRAIL:
legacy: ["IF.TTT"]
academic: "immutable chain-of-custody logging"
description: "Trace discipline + signing + verification hooks for disputes."
IF.AUDIT.PROOF:
legacy: []
academic: "portable verification bundle"
description: "Exportable evidence bundle + manifest + verifier steps."
notes:
- "IF.TTT remains the philosophical umbrella; use IF.AUDIT.* for concrete artifacts."
- "Multi-lingual translations: planned; keep canonical IDs stable and translate descriptions."

37
gov/PANEL.md Normal file
View file

@ -0,0 +1,37 @@
# IF.GOV.PANEL (legacy: IF.GUARD)
## Role
A multi-voice governance panel that reviews high-stakes decisions.
- Minimum form: `IF.GOV.PANEL` (5 seats, includes contrarian)
- Expanded form: `IF.GOV.PANEL.EXTENDED` (up to ~30 seats)
## Responsibilities
- deliberate on a proposed action/response
- preserve dissent (minority opinions remain visible)
- record votes and rationale as an auditable artifact
## Non-responsibilities
- not a latency-optimized mechanism for low-stakes chat
- not a substitute for a human clinical board (mental-health-adjacent domains require explicit constraints)
## Inputs
- `TRIAGE` output (risk tier + recommended panel size)
- the proposed action/response
- evidence references (retrieval ids / citations / prior traces)
## Outputs
- allow / modify / block decision
- votes + dissent record
- escalation/appeal hooks (if applicable)
## Required evidence
- signed `PANEL` decision record under `IF.AUDIT.TRAIL`
- link to the exact proposal bytes that were voted on (hash)
- trace id included in final user-visible output

21
gov/QUESTIONS.md Normal file
View file

@ -0,0 +1,21 @@
# IF.GOV.QUESTIONS (legacy: IF.5W)
## Role
A structured inquiry template to prevent hand-wavy governance.
It forces deliberation to answer the basics (who/what/when/where/why/how) and to cite evidence.
## Responsibilities
- generate a brief that can be reviewed by `PANEL`
- provide explicit slots for evidence and boundaries
## Non-responsibilities
- does not decide; it structures the inputs to decision
## Required evidence
- the brief is logged and hashed in the trace
- any claim in the brief must point to a verification path or be labeled `UNVERIFIED`

30
gov/README.md Normal file
View file

@ -0,0 +1,30 @@
# IF.GOV directory (separation-of-duties)
This directory is the **governance charter layer** for InfraFabric.
Purpose:
- reduce concept drift / sprawl by defining *who does what*
- make governance primitives legible to non-specialists
- provide stable names for cross-app integration (CLI/API)
Design framing: InfraFabric is not inventing “government”. It is adapting separation-of-duties patterns inspired by **US/CA/EU** governance structures to autonomous systems.
## Components
- `TRIAGE.md``IF.GOV.TRIAGE` (legacy: `IF.BIAS`)
- `PANEL.md``IF.GOV.PANEL` + `IF.GOV.PANEL.EXTENDED` (legacy: `IF.GUARD`)
- `QUESTIONS.md``IF.GOV.QUESTIONS` (legacy: `IF.5W`)
- `WITNESS.md``IF.GOV.WITNESS` (legacy: `IF.WITNESS`)
## Interface contract (v1)
Each charter specifies:
- responsibilities (what it *must* do)
- non-responsibilities (what it *must not* do)
- inputs/outputs
- audit artifacts required under `IF.AUDIT.TRAIL` / `IF.TTT`
## Naming
- Canonical naming is defined in `../IF_NAMING_REGISTRY.yaml`.
- Legacy names remain valid as aliases during transition.

35
gov/TRIAGE.md Normal file
View file

@ -0,0 +1,35 @@
# IF.GOV.TRIAGE (legacy: IF.BIAS)
## Role
Classify a request by risk/controversy and decide what governance path is required.
## Responsibilities
- assign a risk tier and an escalation recommendation
- size the panel (minimum vs extended)
- emit a signed decision record (even when rejecting/short-circuiting)
## Non-responsibilities
- does not generate the final user answer
- does not “deliberate” on truth claims; it only classifies and routes
## Inputs
- user request metadata (actor id, request type, policy surface)
- optional: retrieval/context hints
## Outputs
- `panel_size` recommendation (e.g., 5 → 30)
- escalation path (fast path vs panel)
- required seats (e.g., contrarian mandatory)
## Required evidence
- trace id for the request
- a `TRIAGE` event logged to `IF.AUDIT.TRAIL` with:
- inputs hashed
- output decision + panel size
- link to the follow-on `PANEL` decision (if invoked)

21
gov/WITNESS.md Normal file
View file

@ -0,0 +1,21 @@
# IF.GOV.WITNESS (legacy: IF.WITNESS)
## Role
A witness is the “auditor in the room”: it checks that governance rules were followed and that required artifacts exist.
## Responsibilities
- validate that TRIAGE and PANEL produced required artifacts
- validate that the final output includes trace id and citation formatting rules
- raise “no-trace-no-trust” errors when invariants are violated
## Non-responsibilities
- does not override governance decisions on substance
- does not act as a judge; it acts as a verifier
## Required evidence
- witness checks are logged as trace events
- witness failures are exported as part of `IF.AUDIT.PROOF` bundles when disputes occur