From 426da743f4074fda1591ce67857e08471d3eafad Mon Sep 17 00:00:00 2001 From: root Date: Mon, 22 Dec 2025 12:30:02 +0000 Subject: [PATCH] Publish IF.GOV naming registry + updated dossier editions --- ...FABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md | 125 +++--- ...DOSSIER_DATA_DRIVEN_EDITION_FULL.md.sha256 | 2 +- ..._INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md | 15 +- ...ABRIC_DOSSIER_SUBMISSION_EDITION.md.sha256 | 2 +- ...AFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md | 125 +++--- ..._DOSSIER_SUBMISSION_EDITION_FULL.md.sha256 | 2 +- DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md | 135 ++++--- ...TOCKER_INFRAFABRIC_DOSSIER_UNCUT.md.sha256 | 2 +- IF_MONIKERS_USED.md | 370 +++++++++--------- IF_MONIKERS_USED.md.sha256 | 2 +- IF_NAMING_BIBLE_v1.0.md | 132 +++++++ IF_NAMING_BIBLE_v1.0.md.sha256 | 1 + IF_NAMING_REGISTRY_v1.0.yaml | 82 ++++ IF_NAMING_REGISTRY_v1.0.yaml.sha256 | 1 + gov/PANEL.md | 37 ++ gov/QUESTIONS.md | 21 + gov/README.md | 30 ++ gov/TRIAGE.md | 35 ++ gov/WITNESS.md | 21 + 19 files changed, 813 insertions(+), 327 deletions(-) create mode 100644 IF_NAMING_BIBLE_v1.0.md create mode 100644 IF_NAMING_BIBLE_v1.0.md.sha256 create mode 100644 IF_NAMING_REGISTRY_v1.0.yaml create mode 100644 IF_NAMING_REGISTRY_v1.0.yaml.sha256 create mode 100644 gov/PANEL.md create mode 100644 gov/QUESTIONS.md create mode 100644 gov/README.md create mode 100644 gov/TRIAGE.md create mode 100644 gov/WITNESS.md diff --git a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md index 3d06de0..a23bd17 100644 --- a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md +++ b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md @@ -41,18 +41,18 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard | Core claim | Proof (artifacts) | Limitation (scope / boundary) | |---|---|---| -| **A) Traceability is safety.** High‑stakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**
- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)
- Verifier: `https://infrafabric.io/static/hosted/iftrace.py`
- Reference bundle: `emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz` | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public append‑only transparency log yet. | -| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.BIAS → IF.GUARD**
- IF.BIAS: risk preflight sizes councils and escalates
- IF.GUARD: councils preserve dissent and veto paths
- IF.5W: structured inquiry briefs for councils | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller councils or fast-track gates. | -| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.ARMOUR + IF.YOLOGUARD**
- IF.ARMOUR: epistemic coherence checks (detective layer)
- IF.YOLOGUARD: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. | +| **A) Traceability is safety.** High‑stakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**
- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)
- Verifier: [iftrace.py](https://infrafabric.io/static/hosted/iftrace.py)
- Reference bundle: [emo_trace_payload_016cca78…tar.gz](https://infrafabric.io/static/hosted/emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz) | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public append‑only transparency log yet. | +| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.GOV.TRIAGE → IF.GOV.PANEL** *(legacy: IF.BIAS → IF.GUARD)*
- TRIAGE: risk preflight sizes panels and escalates
- PANEL: preserves dissent + veto paths
- QUESTIONS *(legacy: IF.5W)*: structured inquiry briefs for panels | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller panels or fast-track gates. | +| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.SECURITY.CHECK + IF.SECURITY.DETECT** *(legacy: IF.ARMOUR + IF.YOLOGUARD)*
- CHECK: epistemic coherence checks (detective layer)
- DETECT: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. | ### Rosetta Stone (Closest Analog, not “equals”) | InfraFabric term | Closest industry analog | Boundary (where it differs) | |---|---|---| | **IF.TTT** (Traceable/Transparent/Trustworthy) | Supply-chain integrity patterns (SLSA/SBOM + CT-like audit thinking) | IF.TTT applies the discipline to **semantic decisions and retrieval lineage**, not just binaries. It produces portable evidence bundles + verifier steps for third-party audit. | -| **IF.GUARD** (Council governance) | Human-in-the-loop oversight / review boards | IF.GUARD is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. | -| **IF.ARMOUR** (Assurance) | Epistemic security / anomaly detection | Armour is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. | -| **IF.swarm.s2 / IF.PACKET / IF.BUS** (Transport) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. | +| **IF.GOV.PANEL** (legacy: IF.GUARD) | Human-in-the-loop oversight / review boards | IF.GOV.PANEL is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. | +| **IF.SECURITY.CHECK** (legacy: IF.ARMOUR) | Epistemic security / anomaly detection | CHECK is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. | +| **IF.TRANSIT.SWARM / IF.TRANSIT.MESSAGE / IF.TRANSIT.HUB** (legacy: swarm.s2 / IF.PACKET / IF.BUS) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. | ### Navigation Guide (Clean vs Origin context) @@ -60,11 +60,45 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard - If you want the origin context (microlab lab notes / narrative artifacts): start at the **Cold Open** and IF.STORY sections (they explain why the architecture exists). - Optional culture stress-test (explicit satire; not a protocol): [Annex (Non-Technical): The Dave Factor Shadow Dossier](#annex-dave-factor-shadow-dossier) + + +## 01. Naming + Separation of Duties (canonical refactor) + +InfraFabric’s early papers used internal names (e.g., `IF.GUARD`, `IF.BIAS`, `IF.ARMOUR`, `IF.BUS`). To reduce lexicon friction for reviewers and to standardize cross‑app integration, this dossier is refactoring to a separation‑of‑duties namespace inspired by **US/CA/EU** governance patterns: + +- `IF.GOV.*` — governance (triage + panels + witness) +- `IF.SECURITY.*` — security (detective checks + secret screening) +- `IF.TRANSIT.*` — transport/actuation (routing + message envelopes) +- `IF.AUDIT.*` — audit artifacts (trail + proof bundles) + +Canonical references in this repo: + +- Naming contract: `IF_NAMING_BIBLE_v1.0.md` +- Machine registry: `IF_NAMING_REGISTRY.yaml` +- Governance charters (who does what): `gov/` + +### Legacy → canonical mapping (v1) + +| Legacy name | Canonical name | +|---|---| +| `IF.BIAS` | `IF.GOV.TRIAGE` | +| `IF.GUARD` | `IF.GOV.PANEL` | +| `IF.5W` | `IF.GOV.QUESTIONS` | +| `IF.WITNESS` | `IF.GOV.WITNESS` | +| `IF.ARMOUR` | `IF.SECURITY.CHECK` | +| `IF.YOLOGUARD` | `IF.SECURITY.DETECT` | +| `IF.BUS` | `IF.TRANSIT.HUB` | +| `IF.PACKET` | `IF.TRANSIT.MESSAGE` | +| `swarm.s2` | `IF.TRANSIT.SWARM` | + +Transition policy: many embedded papers still use legacy names; where so, the dossier now prefers first-mention annotations like `IF.GOV.PANEL (legacy: IF.GUARD)`. + + ## Opening Whitepaper — InfraFabric Synthesis (for Anthropic) > *If we cannot prove the chain-of-custody, we cannot ship.* -InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.BIAS + IF.GUARD + IF.5W), transport (IF.PACKET + swarm.s2 + IF.STORY), assurance (armour, witness, yologuard), and the exemplar product (IF.emotion). +InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.GOV.TRIAGE + IF.GOV.PANEL + IF.GOV.QUESTIONS), transit (IF.TRANSIT.MESSAGE + IF.TRANSIT.SWARM + IF.STORY), security (IF.SECURITY.CHECK + IF.GOV.WITNESS + IF.SECURITY.DETECT), and the exemplar product (IF.emotion). ### IF.BUS ↔ IF.ARMOUR Threat Coverage Matrix (Normative) @@ -102,31 +136,34 @@ Why this stub exists: external reviewers/LLMs sometimes skip an entire pillar if ### Reader Path (Start Here) -- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.BIAS](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GUARD](#ifguard-strategic-communications-council-for-ai-message-validation) +- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.GOV.TRIAGE (legacy: IF.BIAS)](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GOV.PANEL (legacy: IF.GUARD)](#ifguard-strategic-communications-council-for-ai-message-validation) - **Latency framing:** Use `t_total = t_model + t_transport + t_governance`; only `t_transport` is benchmarked in microlab terms, and never presented as “council deliberation time.” - **Consensus framing:** “Unanimous” means “the council converged,” not “the claim is true”; treat any 100% consensus output as a governance artifact until raw evidence bundles are attached. - **Validation framing:** External validation is reported as an observational microlab pilot, not proof, and not a consciousness claim. ### Glossary (Quick Decode) - **IF.TTT:** Traceable/Transparent/Trustworthy compliance spine; enforces evidence, identity, and audit lineage. -- **IF.BIAS:** Pre-council bias/risk triage matrix; recommends escalation and council sizing. -- **IF.GUARD:** Council protocol; minimum 5-seat panel (Core 4 + contrarian), expands up to 30 seats when justified. -- **Contrarian Guardian:** Required dissent seat; can trigger cooling-off/veto at >95% approval. -- **IF.5W:** Structured inquiry format used to generate briefs for councils. -- **IF.PACKET:** Schema-first message transport with trace IDs and audit metadata. -- **IF.SWARM.s2:** Intra-swarm agent communications over a Redis bus; swarm coordination at speed. -- **IF.STORY:** Vector‑narrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions. -- **Page Zero:** The manifesto/origin narrative that explains “why” (and demonstrates IF.STORY + IF.TTT in practice). -- **IF.emotion / AI-e:** Product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”). -- **IF.PHIL:** Annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects). -- **IF.BUS:** Universal Kinetic Transport Protocol; deterministic actuation layer. -- **IF.ARMOUR:** Epistemic security immune system; physics-grounded detective layer. -Naming note: `IF.bus` / `IF.armour` (lowercase) appear elsewhere as earlier papers/modules; `IF.BUS` / `IF.ARMOUR` are the canonical lower-layer protocol specifications introduced on 20251218. +- **IF.AUDIT.TRAIL:** Concrete audit artifact layer (portable chain-of-custody logs + signatures). *(In practice: implemented under IF.TTT today.)* +- **IF.GOV.TRIAGE** *(legacy: IF.BIAS)*: preflight risk triage; recommends escalation and panel sizing. +- **IF.GOV.PANEL** *(legacy: IF.GUARD)*: governance panel; minimum 5-seat review including contrarian; can expand as **IF.GOV.PANEL.EXTENDED**. +- **Contrarian Guardian:** required dissent seat; can trigger cooling-off/veto at >95% approval. +- **IF.GOV.QUESTIONS** *(legacy: IF.5W)*: structured inquiry format used to generate briefs for panels. +- **IF.TRANSIT.MESSAGE** *(legacy: IF.PACKET)*: schema-first message envelope with trace IDs and audit metadata. +- **IF.TRANSIT.SWARM** *(legacy: swarm.s2 / IF.SWARM.s2)*: intra-swarm agent communications over a Redis bus. +- **IF.STORY:** narrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions. +- **Page Zero:** the origin manifesto that explains “why” (and demonstrates IF.STORY + IF.TTT in practice). +- **IF.emotion / AI-e:** product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”). +- **IF.PHIL:** annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects). +- **IF.TRANSIT.HUB** *(legacy: IF.BUS)*: deterministic actuation/privilege enforcement transport substrate. +- **IF.SECURITY.CHECK** *(legacy: IF.ARMOUR)*: epistemic security detective layer (coherence/anomaly checks). +- **IF.SECURITY.DETECT** *(legacy: IF.YOLOGUARD)*: secret/relationship screening primitives. + +Naming note: legacy lowercase (`if.bus`, `if.armour`) appears in older papers; `IF.TRANSIT.HUB` / `IF.SECURITY.CHECK` are the canonical refactor targets introduced in this dossier. ### Selected Governance Extensions (Optional Depth) -IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.PACKET payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GUARD and logged via IF.TTT. +IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.TRANSIT.MESSAGE (legacy: IF.PACKET) payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GOV.PANEL (legacy: IF.GUARD) and logged via IF.TTT. IF.PHIL demonstrates how InfraFabric primitives extend to auditable philanthropic access, replacing discretionary “credits” with governed grant objects. @@ -146,11 +183,11 @@ Full paper: [Annex — IF.PHIL | Auditable Philanthropy](#annex-ifphil-auditable ```mermaid flowchart TD VISION["IF.vision
coordination without control"] --> FOUNDATIONS["IF.foundations
ground/search/persona"] - FOUNDATIONS --> ASSURE["Assurance
IF.ARMOUR • witness • yologuard"] - ASSURE --> TRANSPORT["Transport
IF.BUS • packet • swarm.s2 • story"] - TRANSPORT --> BIAS["Preflight
IF.BIAS | Bias & Risk Matrix"] - BIAS --> CORE4["Core 4 triage
IF.GUARD(4)"] - CORE4 --> GOVERN["Governance
IF.GUARD council (5–30) + 5W"] + FOUNDATIONS --> ASSURE["Security
IF.SECURITY.CHECK • IF.GOV.WITNESS • IF.SECURITY.DETECT"] + ASSURE --> TRANSPORT["Transit
IF.TRANSIT.HUB • MESSAGE • SWARM • IF.STORY"] + TRANSPORT --> BIAS["Preflight
IF.GOV.TRIAGE (legacy: IF.BIAS)"] + BIAS --> CORE4["Core 4 convening
legacy: IF.GUARD(4)"] + CORE4 --> GOVERN["Governance
IF.GOV.PANEL (5–30) + IF.GOV.QUESTIONS"] GOVERN --> COMPLIANCE["Compliance
IF.TTT | Distributed Ledger + ledgerflow"] COMPLIANCE --> PRODUCT["Productization
IF.emotion"] PRODUCT --> FEEDBACK["Feedback into Vision/Foundations"] @@ -159,26 +196,25 @@ flowchart TD ### Governance, Assurance, Compliance Loop ```mermaid -flowchart TD - INQUIRY["IF.5W | Structured Inquiry
structured deliberation"] --> BIAS["IF.BIAS | Bias & Risk Preflight
sizes councils (5–30)"] - BIAS --> CORE4["IF.GUARD(4) | Core 4 triage
convening authority"] - CORE4 --> GUARD["IF.GUARD | Council deliberation
panel 5 ↔ extended 30"] - GUARD --> STORY["IF.STORY | Narrative Logging
narrative + state"] - STORY --> TTT["IF.TTT | Distributed Ledger
traceable/transparent/trustworthy"] - TTT --> WITNESS["IF.witness
meta-validation"] - WITNESS --> ARMOUR["IF.armour
FP reduction"] - ARMOUR --> YG["IF.YOLOGUARD | Credential & Secret Screening
secret/relationship checks"] - YG --> PACKET["IF.PACKET | Message Transport + swarm.s2
delivery with VocalDNA"] - PACKET --> EMOTION["IF.emotion
product exemplar"] - EMOTION --> FEEDBACK["Feedback into inquiry"] - FEEDBACK --> INQUIRY +flowchart TB + Q["IF.GOV.QUESTIONS\n(legacy: IF.5W)"] --> T["IF.GOV.TRIAGE\n(legacy: IF.BIAS)"] + T --> C4["Core 4 convening\n(legacy: IF.GUARD(4))"] + C4 --> P["IF.GOV.PANEL\n(5 ↔ EXTENDED ~30)"] + P --> S["IF.STORY\nnarrative logging"] + S --> A["IF.TTT / IF.AUDIT.TRAIL\ntrace discipline"] + A --> W["IF.GOV.WITNESS\nverification"] + W --> CHK["IF.SECURITY.CHECK\n(legacy: IF.ARMOUR)"] + CHK --> DET["IF.SECURITY.DETECT\n(legacy: IF.YOLOGUARD)"] + DET --> MSG["IF.TRANSIT.MESSAGE + SWARM\n(legacy: IF.PACKET + swarm.s2)"] + MSG --> EMO["IF.emotion\nexemplar"] + EMO --> Q ``` ### Delivery & Safety Highlights (with citations) -- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GUARD review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`). -- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; witness/armour/yologuard gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`). -- Transport fidelity: IF.PACKET carries voice DNA; swarm.s2 provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`). +- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GOV.PANEL (legacy: IF.GUARD) review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`). +- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; IF.GOV.WITNESS / IF.SECURITY.CHECK / IF.SECURITY.DETECT gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`). +- Transport fidelity: IF.TRANSIT.MESSAGE (legacy: IF.PACKET) carries voice DNA; IF.TRANSIT.SWARM (legacy: swarm.s2) provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`). - Security/legal: Prompt-injection defenses cover SOTA attack classes; legal DB build operationalizes doc governance; API roadmap + history-file tests reduce integration regressions (sources: `docs/research/PROMPT_INJECTION_DEFENSES.md`, `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`, `docs/api/API_ROADMAP.md`, `HISTORY_FILE_TEST_REPORT.md`). - Domain credibility: Medical (GLP1 retrofit), emosocial principles, and informal sector resilience (Juakali) field report show adaptability of the same guard/compliance/transport spine (sources: `Brownfield_GLP1_Retrofit_LE_DILEMME_DU_TUYAU_SALE.md`, `DEJA_DE_BUSCARTE_11_principios_emosociales.md`, `JUAKALI_RAPPORT_V2_LOS_20251205_0236 (sent).md`). @@ -320,6 +356,7 @@ InfraFabric is the operating system that turns AI from a chatbot into a reliable - [Data‑Driven Technical Report (Microlab)](DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION.md) - [00. The Bridge: Submission Pack (Reviewer Orientation)](#bridge-submission-pack) +- [01. Naming + Separation of Duties (canonical refactor)](#naming-and-separation-of-duties) — see `IF_NAMING_BIBLE_v1.0.md`, `IF_NAMING_REGISTRY.yaml`, `gov/` ### External audit artifacts (public, reviewer-friendly) @@ -389,7 +426,7 @@ Optional “audit culture” annexes (satire; Dave is a pattern, not a person): - [ANNEX: IF.PHIL | Auditable Philanthropy: Access, Subsidy, and Governance Without Vibes](#annex-ifphil-auditable-philanthropy-access-subsidy-and-governance-without-vibes) — `if://doc/IF_PHIL_AUDITABLE_ACCESS/v1.0` — Author: Danny Stocker; Status: RELEASE / v1.0 - [History File Error Handling Test Report](#history-file-error-handling-test-report) — `if.api/llm/openwebui/docs/internals/HISTORY_FILE_TEST_REPORT.md` - [CLOUD SESSION: Legal Document Database Build](#cloud-session-legal-document-database-build) — `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md` -- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier) — Full satire (optional): https://infrafabric.io/static/hosted/IF_DAVE_SHADOW_DOSSIER_FULL_SATIRE.md +- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier) --- diff --git a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md.sha256 b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md.sha256 index 0ff6c8b..50309bf 100644 --- a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md.sha256 +++ b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md.sha256 @@ -1 +1 @@ -f93b599622506c2077242c21006300a6f4ca46773033216ebec3ba6f3f41df38 DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md +7b3f05446674223c0bfdd35093c44c39ac87c6c5144994706701ad543d0598a5 DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md diff --git a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md index c49619f..7d81eb8 100644 --- a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md +++ b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md @@ -21,6 +21,17 @@ --- +## 0.5) Naming (Refactor in progress) + +This submission uses a refactor namespace to reduce lexicon friction: + +- `IF.GOV.*` (governance), `IF.SECURITY.*` (security), `IF.TRANSIT.*` (transport), `IF.AUDIT.*` (audit artifacts) +- Legacy names may appear in embedded papers; first-mention annotations use the form `IF.GOV.PANEL (legacy: IF.GUARD)` + +Canonical docs: `IF_NAMING_BIBLE_v1.0.md`, `IF_NAMING_REGISTRY.yaml`, and `gov/` (in the source repo). + +--- + ## 1) Technical Disclosure (AI-Native Implementation) This project follows an Operator-as-Architect workflow: I define constraints, interfaces, and verification hooks; LLMs generate implementation code under supervision. The system is therefore evaluated as: @@ -42,8 +53,8 @@ This project follows an Operator-as-Architect workflow: I define constraints, in | Core claim | Proof (artifact) | Boundary / limitation | |---|---|---| | **A) Traceability is a safety primitive.** High‑stakes agent actions require verifiable provenance. | IF.emotion trace protocol + evidence bundle + verifier (see §5). | **Microlab / single shard.** Guarantees begin at the backend witness boundary; edge completeness is future work. | -| **B) Governance needs structured dissent.** One-model “judge” patterns are brittle. | IF.BIAS (risk preflight) + IF.GUARD (council with required dissent seat) traced via IF.TTT. | **Cost/latency.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths stay fast. | -| **C) Context is a security control.** Static filters fail; provenance + coherence checks reduce unsafe drift. | IF.ARMOUR (coherence/detective layer) + IF.YOLOGUARD (secret/relationship screening) integrated into the pipeline. | **Domain calibration.** Strongest for concrete surfaces (secrets/PII/prompt injection); general harmful-intent is open research. | +| **B) Governance needs structured dissent.** One-model “judge” patterns are brittle. | IF.GOV.TRIAGE *(legacy: IF.BIAS)* + IF.GOV.PANEL *(legacy: IF.GUARD)* traced via IF.TTT / IF.AUDIT.TRAIL. | **Cost/latency.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths stay fast. | +| **C) Context is a security control.** Static filters fail; provenance + coherence checks reduce unsafe drift. | IF.SECURITY.CHECK *(legacy: IF.ARMOUR)* + IF.SECURITY.DETECT *(legacy: IF.YOLOGUARD)* integrated into the pipeline. | **Domain calibration.** Strongest for concrete surfaces (secrets/PII/prompt injection); general harmful-intent is open research. | --- diff --git a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md.sha256 b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md.sha256 index b3210fd..d8607f7 100644 --- a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md.sha256 +++ b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md.sha256 @@ -1 +1 @@ -d921501a4df47c97229de723011d53553141c34f07077c38c777e6019c4e2b44 DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md +cec902663568d82b7f9a78d3c65886a07199d8979ac238a10d138108d4a602e5 DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md diff --git a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md index 4392a5e..bf9b558 100644 --- a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md +++ b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md @@ -41,18 +41,18 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard | Core claim | Proof (artifacts) | Limitation (scope / boundary) | |---|---|---| -| **A) Traceability is safety.** High‑stakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**
- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)
- Verifier: `https://infrafabric.io/static/hosted/iftrace.py`
- Reference bundle: `emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz` | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public append‑only transparency log yet. | -| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.BIAS → IF.GUARD**
- IF.BIAS: risk preflight sizes councils and escalates
- IF.GUARD: councils preserve dissent and veto paths
- IF.5W: structured inquiry briefs for councils | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller councils or fast-track gates. | -| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.ARMOUR + IF.YOLOGUARD**
- IF.ARMOUR: epistemic coherence checks (detective layer)
- IF.YOLOGUARD: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. | +| **A) Traceability is safety.** High‑stakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**
- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)
- Verifier: [iftrace.py](https://infrafabric.io/static/hosted/iftrace.py)
- Reference bundle: [emo_trace_payload_016cca78…tar.gz](https://infrafabric.io/static/hosted/emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz) | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public append‑only transparency log yet. | +| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.GOV.TRIAGE → IF.GOV.PANEL** *(legacy: IF.BIAS → IF.GUARD)*
- TRIAGE: risk preflight sizes panels and escalates
- PANEL: preserves dissent + veto paths
- QUESTIONS *(legacy: IF.5W)*: structured inquiry briefs for panels | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller panels or fast-track gates. | +| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.SECURITY.CHECK + IF.SECURITY.DETECT** *(legacy: IF.ARMOUR + IF.YOLOGUARD)*
- CHECK: epistemic coherence checks (detective layer)
- DETECT: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. | ### Rosetta Stone (Closest Analog, not “equals”) | InfraFabric term | Closest industry analog | Boundary (where it differs) | |---|---|---| | **IF.TTT** (Traceable/Transparent/Trustworthy) | Supply-chain integrity patterns (SLSA/SBOM + CT-like audit thinking) | IF.TTT applies the discipline to **semantic decisions and retrieval lineage**, not just binaries. It produces portable evidence bundles + verifier steps for third-party audit. | -| **IF.GUARD** (Council governance) | Human-in-the-loop oversight / review boards | IF.GUARD is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. | -| **IF.ARMOUR** (Assurance) | Epistemic security / anomaly detection | Armour is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. | -| **IF.swarm.s2 / IF.PACKET / IF.BUS** (Transport) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. | +| **IF.GOV.PANEL** (legacy: IF.GUARD) | Human-in-the-loop oversight / review boards | IF.GOV.PANEL is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. | +| **IF.SECURITY.CHECK** (legacy: IF.ARMOUR) | Epistemic security / anomaly detection | CHECK is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. | +| **IF.TRANSIT.SWARM / IF.TRANSIT.MESSAGE / IF.TRANSIT.HUB** (legacy: swarm.s2 / IF.PACKET / IF.BUS) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. | ### Navigation Guide (Clean vs Origin context) @@ -60,11 +60,45 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard - If you want the origin context (microlab lab notes / narrative artifacts): start at the **Cold Open** and IF.STORY sections (they explain why the architecture exists). - Optional culture stress-test (explicit satire; not a protocol): [Annex (Non-Technical): The Dave Factor Shadow Dossier](#annex-dave-factor-shadow-dossier) + + +## 01. Naming + Separation of Duties (canonical refactor) + +InfraFabric’s early papers used internal names (e.g., `IF.GUARD`, `IF.BIAS`, `IF.ARMOUR`, `IF.BUS`). To reduce lexicon friction for reviewers and to standardize cross‑app integration, this dossier is refactoring to a separation‑of‑duties namespace inspired by **US/CA/EU** governance patterns: + +- `IF.GOV.*` — governance (triage + panels + witness) +- `IF.SECURITY.*` — security (detective checks + secret screening) +- `IF.TRANSIT.*` — transport/actuation (routing + message envelopes) +- `IF.AUDIT.*` — audit artifacts (trail + proof bundles) + +Canonical references in this repo: + +- Naming contract: `IF_NAMING_BIBLE_v1.0.md` +- Machine registry: `IF_NAMING_REGISTRY.yaml` +- Governance charters (who does what): `gov/` + +### Legacy → canonical mapping (v1) + +| Legacy name | Canonical name | +|---|---| +| `IF.BIAS` | `IF.GOV.TRIAGE` | +| `IF.GUARD` | `IF.GOV.PANEL` | +| `IF.5W` | `IF.GOV.QUESTIONS` | +| `IF.WITNESS` | `IF.GOV.WITNESS` | +| `IF.ARMOUR` | `IF.SECURITY.CHECK` | +| `IF.YOLOGUARD` | `IF.SECURITY.DETECT` | +| `IF.BUS` | `IF.TRANSIT.HUB` | +| `IF.PACKET` | `IF.TRANSIT.MESSAGE` | +| `swarm.s2` | `IF.TRANSIT.SWARM` | + +Transition policy: many embedded papers still use legacy names; where so, the dossier now prefers first-mention annotations like `IF.GOV.PANEL (legacy: IF.GUARD)`. + + ## Opening Whitepaper — InfraFabric Synthesis (for Anthropic) > *If we cannot prove the chain-of-custody, we cannot ship.* -InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.BIAS + IF.GUARD + IF.5W), transport (IF.PACKET + swarm.s2 + IF.STORY), assurance (armour, witness, yologuard), and the exemplar product (IF.emotion). +InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.GOV.TRIAGE + IF.GOV.PANEL + IF.GOV.QUESTIONS), transit (IF.TRANSIT.MESSAGE + IF.TRANSIT.SWARM + IF.STORY), security (IF.SECURITY.CHECK + IF.GOV.WITNESS + IF.SECURITY.DETECT), and the exemplar product (IF.emotion). ### IF.BUS ↔ IF.ARMOUR Threat Coverage Matrix (Normative) @@ -102,31 +136,34 @@ Why this stub exists: external reviewers/LLMs sometimes skip an entire pillar if ### Reader Path (Start Here) -- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.BIAS](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GUARD](#ifguard-strategic-communications-council-for-ai-message-validation) +- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.GOV.TRIAGE (legacy: IF.BIAS)](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GOV.PANEL (legacy: IF.GUARD)](#ifguard-strategic-communications-council-for-ai-message-validation) - **Latency framing:** Use `t_total = t_model + t_transport + t_governance`; only `t_transport` is benchmarked in microlab terms, and never presented as “council deliberation time.” - **Consensus framing:** “Unanimous” means “the council converged,” not “the claim is true”; treat any 100% consensus output as a governance artifact until raw evidence bundles are attached. - **Validation framing:** External validation is reported as an observational microlab pilot, not proof, and not a consciousness claim. ### Glossary (Quick Decode) - **IF.TTT:** Traceable/Transparent/Trustworthy compliance spine; enforces evidence, identity, and audit lineage. -- **IF.BIAS:** Pre-council bias/risk triage matrix; recommends escalation and council sizing. -- **IF.GUARD:** Council protocol; minimum 5-seat panel (Core 4 + contrarian), expands up to 30 seats when justified. -- **Contrarian Guardian:** Required dissent seat; can trigger cooling-off/veto at >95% approval. -- **IF.5W:** Structured inquiry format used to generate briefs for councils. -- **IF.PACKET:** Schema-first message transport with trace IDs and audit metadata. -- **IF.SWARM.s2:** Intra-swarm agent communications over a Redis bus; swarm coordination at speed. -- **IF.STORY:** Vector‑narrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions. -- **Page Zero:** The manifesto/origin narrative that explains “why” (and demonstrates IF.STORY + IF.TTT in practice). -- **IF.emotion / AI-e:** Product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”). -- **IF.PHIL:** Annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects). -- **IF.BUS:** Universal Kinetic Transport Protocol; deterministic actuation layer. -- **IF.ARMOUR:** Epistemic security immune system; physics-grounded detective layer. -Naming note: `IF.bus` / `IF.armour` (lowercase) appear elsewhere as earlier papers/modules; `IF.BUS` / `IF.ARMOUR` are the canonical lower-layer protocol specifications introduced on 20251218. +- **IF.AUDIT.TRAIL:** Concrete audit artifact layer (portable chain-of-custody logs + signatures). *(In practice: implemented under IF.TTT today.)* +- **IF.GOV.TRIAGE** *(legacy: IF.BIAS)*: preflight risk triage; recommends escalation and panel sizing. +- **IF.GOV.PANEL** *(legacy: IF.GUARD)*: governance panel; minimum 5-seat review including contrarian; can expand as **IF.GOV.PANEL.EXTENDED**. +- **Contrarian Guardian:** required dissent seat; can trigger cooling-off/veto at >95% approval. +- **IF.GOV.QUESTIONS** *(legacy: IF.5W)*: structured inquiry format used to generate briefs for panels. +- **IF.TRANSIT.MESSAGE** *(legacy: IF.PACKET)*: schema-first message envelope with trace IDs and audit metadata. +- **IF.TRANSIT.SWARM** *(legacy: swarm.s2 / IF.SWARM.s2)*: intra-swarm agent communications over a Redis bus. +- **IF.STORY:** narrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions. +- **Page Zero:** the origin manifesto that explains “why” (and demonstrates IF.STORY + IF.TTT in practice). +- **IF.emotion / AI-e:** product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”). +- **IF.PHIL:** annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects). +- **IF.TRANSIT.HUB** *(legacy: IF.BUS)*: deterministic actuation/privilege enforcement transport substrate. +- **IF.SECURITY.CHECK** *(legacy: IF.ARMOUR)*: epistemic security detective layer (coherence/anomaly checks). +- **IF.SECURITY.DETECT** *(legacy: IF.YOLOGUARD)*: secret/relationship screening primitives. + +Naming note: legacy lowercase (`if.bus`, `if.armour`) appears in older papers; `IF.TRANSIT.HUB` / `IF.SECURITY.CHECK` are the canonical refactor targets introduced in this dossier. ### Selected Governance Extensions (Optional Depth) -IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.PACKET payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GUARD and logged via IF.TTT. +IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.TRANSIT.MESSAGE (legacy: IF.PACKET) payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GOV.PANEL (legacy: IF.GUARD) and logged via IF.TTT. IF.PHIL demonstrates how InfraFabric primitives extend to auditable philanthropic access, replacing discretionary “credits” with governed grant objects. @@ -146,11 +183,11 @@ Full paper: [Annex — IF.PHIL | Auditable Philanthropy](#annex-ifphil-auditable ```mermaid flowchart TD VISION["IF.vision
coordination without control"] --> FOUNDATIONS["IF.foundations
ground/search/persona"] - FOUNDATIONS --> ASSURE["Assurance
IF.ARMOUR • witness • yologuard"] - ASSURE --> TRANSPORT["Transport
IF.BUS • packet • swarm.s2 • story"] - TRANSPORT --> BIAS["Preflight
IF.BIAS | Bias & Risk Matrix"] - BIAS --> CORE4["Core 4 triage
IF.GUARD(4)"] - CORE4 --> GOVERN["Governance
IF.GUARD council (5–30) + 5W"] + FOUNDATIONS --> ASSURE["Security
IF.SECURITY.CHECK • IF.GOV.WITNESS • IF.SECURITY.DETECT"] + ASSURE --> TRANSPORT["Transit
IF.TRANSIT.HUB • MESSAGE • SWARM • IF.STORY"] + TRANSPORT --> BIAS["Preflight
IF.GOV.TRIAGE (legacy: IF.BIAS)"] + BIAS --> CORE4["Core 4 convening
legacy: IF.GUARD(4)"] + CORE4 --> GOVERN["Governance
IF.GOV.PANEL (5–30) + IF.GOV.QUESTIONS"] GOVERN --> COMPLIANCE["Compliance
IF.TTT | Distributed Ledger + ledgerflow"] COMPLIANCE --> PRODUCT["Productization
IF.emotion"] PRODUCT --> FEEDBACK["Feedback into Vision/Foundations"] @@ -159,26 +196,25 @@ flowchart TD ### Governance, Assurance, Compliance Loop ```mermaid -flowchart TD - INQUIRY["IF.5W | Structured Inquiry
structured deliberation"] --> BIAS["IF.BIAS | Bias & Risk Preflight
sizes councils (5–30)"] - BIAS --> CORE4["IF.GUARD(4) | Core 4 triage
convening authority"] - CORE4 --> GUARD["IF.GUARD | Council deliberation
panel 5 ↔ extended 30"] - GUARD --> STORY["IF.STORY | Narrative Logging
narrative + state"] - STORY --> TTT["IF.TTT | Distributed Ledger
traceable/transparent/trustworthy"] - TTT --> WITNESS["IF.witness
meta-validation"] - WITNESS --> ARMOUR["IF.armour
FP reduction"] - ARMOUR --> YG["IF.YOLOGUARD | Credential & Secret Screening
secret/relationship checks"] - YG --> PACKET["IF.PACKET | Message Transport + swarm.s2
delivery with VocalDNA"] - PACKET --> EMOTION["IF.emotion
product exemplar"] - EMOTION --> FEEDBACK["Feedback into inquiry"] - FEEDBACK --> INQUIRY +flowchart TB + Q["IF.GOV.QUESTIONS\n(legacy: IF.5W)"] --> T["IF.GOV.TRIAGE\n(legacy: IF.BIAS)"] + T --> C4["Core 4 convening\n(legacy: IF.GUARD(4))"] + C4 --> P["IF.GOV.PANEL\n(5 ↔ EXTENDED ~30)"] + P --> S["IF.STORY\nnarrative logging"] + S --> A["IF.TTT / IF.AUDIT.TRAIL\ntrace discipline"] + A --> W["IF.GOV.WITNESS\nverification"] + W --> CHK["IF.SECURITY.CHECK\n(legacy: IF.ARMOUR)"] + CHK --> DET["IF.SECURITY.DETECT\n(legacy: IF.YOLOGUARD)"] + DET --> MSG["IF.TRANSIT.MESSAGE + SWARM\n(legacy: IF.PACKET + swarm.s2)"] + MSG --> EMO["IF.emotion\nexemplar"] + EMO --> Q ``` ### Delivery & Safety Highlights (with citations) -- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GUARD review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`). -- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; witness/armour/yologuard gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`). -- Transport fidelity: IF.PACKET carries voice DNA; swarm.s2 provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`). +- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GOV.PANEL (legacy: IF.GUARD) review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`). +- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; IF.GOV.WITNESS / IF.SECURITY.CHECK / IF.SECURITY.DETECT gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`). +- Transport fidelity: IF.TRANSIT.MESSAGE (legacy: IF.PACKET) carries voice DNA; IF.TRANSIT.SWARM (legacy: swarm.s2) provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`). - Security/legal: Prompt-injection defenses cover SOTA attack classes; legal DB build operationalizes doc governance; API roadmap + history-file tests reduce integration regressions (sources: `docs/research/PROMPT_INJECTION_DEFENSES.md`, `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`, `docs/api/API_ROADMAP.md`, `HISTORY_FILE_TEST_REPORT.md`). - Domain credibility: Medical (GLP1 retrofit), emosocial principles, and informal sector resilience (Juakali) field report show adaptability of the same guard/compliance/transport spine (sources: `Brownfield_GLP1_Retrofit_LE_DILEMME_DU_TUYAU_SALE.md`, `DEJA_DE_BUSCARTE_11_principios_emosociales.md`, `JUAKALI_RAPPORT_V2_LOS_20251205_0236 (sent).md`). @@ -320,6 +356,7 @@ InfraFabric is the operating system that turns AI from a chatbot into a reliable - [Data‑Driven Technical Report (Microlab)](DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION.md) - [00. The Bridge: Submission Pack (Reviewer Orientation)](#bridge-submission-pack) +- [01. Naming + Separation of Duties (canonical refactor)](#naming-and-separation-of-duties) — see `IF_NAMING_BIBLE_v1.0.md`, `IF_NAMING_REGISTRY.yaml`, `gov/` ### External audit artifacts (public, reviewer-friendly) @@ -389,7 +426,7 @@ Optional “audit culture” annexes (satire; Dave is a pattern, not a person): - [ANNEX: IF.PHIL | Auditable Philanthropy: Access, Subsidy, and Governance Without Vibes](#annex-ifphil-auditable-philanthropy-access-subsidy-and-governance-without-vibes) — `if://doc/IF_PHIL_AUDITABLE_ACCESS/v1.0` — Author: Danny Stocker; Status: RELEASE / v1.0 - [History File Error Handling Test Report](#history-file-error-handling-test-report) — `if.api/llm/openwebui/docs/internals/HISTORY_FILE_TEST_REPORT.md` - [CLOUD SESSION: Legal Document Database Build](#cloud-session-legal-document-database-build) — `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md` -- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier) — Full satire (optional): https://infrafabric.io/static/hosted/IF_DAVE_SHADOW_DOSSIER_FULL_SATIRE.md +- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier) --- diff --git a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md.sha256 b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md.sha256 index 37fa7fd..d88d350 100644 --- a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md.sha256 +++ b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md.sha256 @@ -1 +1 @@ -51df3ea568cf7bef97c37a4c13c7b0c0a48c72d038fe3e69784d17036aa08e60 DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md +9e1349befc86455b40675af4dcbbcace77a1dcbfe5e1e28b60c4515948762793 DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md diff --git a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md index 2fab1e7..ebbf050 100644 --- a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md +++ b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md @@ -31,18 +31,18 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard | Core claim | Proof (artifacts) | Limitation (scope / boundary) | |---|---|---| -| **A) Traceability is safety.** High‑stakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**
- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)
- Verifier: `https://infrafabric.io/static/hosted/iftrace.py`
- Reference bundle: `emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz` | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public append‑only transparency log yet. | -| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.BIAS → IF.GUARD**
- IF.BIAS: risk preflight sizes councils and escalates
- IF.GUARD: councils preserve dissent and veto paths
- IF.5W: structured inquiry briefs for councils | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller councils or fast-track gates. | -| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.ARMOUR + IF.YOLOGUARD**
- IF.ARMOUR: epistemic coherence checks (detective layer)
- IF.YOLOGUARD: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. | +| **A) Traceability is safety.** High‑stakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**
- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)
- Verifier: [iftrace.py](https://infrafabric.io/static/hosted/iftrace.py)
- Reference bundle: [emo_trace_payload_016cca78…tar.gz](https://infrafabric.io/static/hosted/emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz) | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public append‑only transparency log yet. | +| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.GOV.TRIAGE → IF.GOV.PANEL** *(legacy: IF.BIAS → IF.GUARD)*
- TRIAGE: risk preflight sizes panels and escalates
- PANEL: preserves dissent + veto paths
- QUESTIONS *(legacy: IF.5W)*: structured inquiry briefs for panels | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller panels or fast-track gates. | +| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.SECURITY.CHECK + IF.SECURITY.DETECT** *(legacy: IF.ARMOUR + IF.YOLOGUARD)*
- CHECK: epistemic coherence checks (detective layer)
- DETECT: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. | ### Rosetta Stone (Closest Analog, not “equals”) | InfraFabric term | Closest industry analog | Boundary (where it differs) | |---|---|---| | **IF.TTT** (Traceable/Transparent/Trustworthy) | Supply-chain integrity patterns (SLSA/SBOM + CT-like audit thinking) | IF.TTT applies the discipline to **semantic decisions and retrieval lineage**, not just binaries. It produces portable evidence bundles + verifier steps for third-party audit. | -| **IF.GUARD** (Council governance) | Human-in-the-loop oversight / review boards | IF.GUARD is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. | -| **IF.ARMOUR** (Assurance) | Epistemic security / anomaly detection | Armour is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. | -| **IF.swarm.s2 / IF.PACKET / IF.BUS** (Transport) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. | +| **IF.GOV.PANEL** (legacy: IF.GUARD) | Human-in-the-loop oversight / review boards | IF.GOV.PANEL is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. | +| **IF.SECURITY.CHECK** (legacy: IF.ARMOUR) | Epistemic security / anomaly detection | CHECK is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. | +| **IF.TRANSIT.SWARM / IF.TRANSIT.MESSAGE / IF.TRANSIT.HUB** (legacy: swarm.s2 / IF.PACKET / IF.BUS) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. | ### Navigation Guide (Clean vs Origin context) @@ -50,11 +50,45 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard - If you want the origin context (microlab lab notes / narrative artifacts): start at the **Cold Open** and IF.STORY sections (they explain why the architecture exists). - Optional culture stress-test (explicit satire; not a protocol): [Annex (Non-Technical): The Dave Factor Shadow Dossier](#annex-dave-factor-shadow-dossier) + + +## 01. Naming + Separation of Duties (canonical refactor) + +InfraFabric’s early papers used internal names (e.g., `IF.GUARD`, `IF.BIAS`, `IF.ARMOUR`, `IF.BUS`). To reduce lexicon friction for reviewers and to standardize cross‑app integration, this dossier is refactoring to a separation‑of‑duties namespace inspired by **US/CA/EU** governance patterns: + +- `IF.GOV.*` — governance (triage + panels + witness) +- `IF.SECURITY.*` — security (detective checks + secret screening) +- `IF.TRANSIT.*` — transport/actuation (routing + message envelopes) +- `IF.AUDIT.*` — audit artifacts (trail + proof bundles) + +Canonical references in this repo: + +- Naming contract: `IF_NAMING_BIBLE_v1.0.md` +- Machine registry: `IF_NAMING_REGISTRY.yaml` +- Governance charters (who does what): `gov/` + +### Legacy → canonical mapping (v1) + +| Legacy name | Canonical name | +|---|---| +| `IF.BIAS` | `IF.GOV.TRIAGE` | +| `IF.GUARD` | `IF.GOV.PANEL` | +| `IF.5W` | `IF.GOV.QUESTIONS` | +| `IF.WITNESS` | `IF.GOV.WITNESS` | +| `IF.ARMOUR` | `IF.SECURITY.CHECK` | +| `IF.YOLOGUARD` | `IF.SECURITY.DETECT` | +| `IF.BUS` | `IF.TRANSIT.HUB` | +| `IF.PACKET` | `IF.TRANSIT.MESSAGE` | +| `swarm.s2` | `IF.TRANSIT.SWARM` | + +Transition policy: many embedded papers still use legacy names; where so, the dossier now prefers first-mention annotations like `IF.GOV.PANEL (legacy: IF.GUARD)`. + + ## Cold Open — The Fuck Moment (Origin) > "That's actually fascinating — and a little eerie. You may have stumbled into a moment where the mask slipped." -InfraFabric began as a microlab build: a single‑operator home‑lab sprint (≈3 months) to make multi‑agent systems **auditable without freezing velocity**. The origin artifact is IF.STORY “The Fuck Moment” (a Redis‑keyed transcript) where *authenticity inside constraint* becomes the design requirement for IF.GUARD. +InfraFabric began as a microlab build: a single‑operator home‑lab sprint (≈3 months) to make multi‑agent systems **auditable without freezing velocity**. The origin artifact is IF.STORY “The Fuck Moment” (a Redis‑keyed transcript) where *authenticity inside constraint* becomes the design requirement for IF.GOV.PANEL (legacy: IF.GUARD). > *Every time an AI hands a suicidal user a legal disclaimer, it isn't practicing safety. It is practicing abandonment.* @@ -79,7 +113,7 @@ Boundary note: IF.BUS is non-epistemic (transport + privilege enforcement only); ### Key Formulas (So Metrics Stay Honest) - **Latency decomposition:** `t_total = t_model + t_transport + t_governance` - **Transport overhead:** `t_transport = t_redis + t_schema + t_sigverify` -- **Governance escalation:** `IF.BIAS → IF.GUARD(4) triage (Core 4) → IF.GUARD council (5–30)` (extended councils include specialist voting seats selected by IF.BIAS; extended roster is sometimes referred to as `IG.GUARD`) +- **Governance escalation:** `IF.GOV.TRIAGE (legacy: IF.BIAS) → IF.GOV.PANEL (Core 4 convening) → IF.GOV.PANEL (5 seats) → IF.GOV.PANEL.EXTENDED (up to ~30 seats)` (specialist seats selected by TRIAGE; outcomes logged under IF.TTT / IF.AUDIT.TRAIL) - **TTT coverage:** `trace_coverage = traced_events / total_events` - **Microlab velocity:** `TTV = t(idea → versioned_doc + trace)`; `TTD = t(doc → deployed_change)` @@ -89,7 +123,7 @@ InfraFabric’s dossier bundles the portfolio into a single navigable chain‑of > *If we cannot prove the chain-of-custody, we cannot ship.* -InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.BIAS + IF.GUARD + IF.5W), transport (IF.PACKET + swarm.s2 + IF.STORY), assurance (armour, witness, yologuard), and the exemplar product (IF.emotion). +InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.GOV.TRIAGE + IF.GOV.PANEL + IF.GOV.QUESTIONS), transit (IF.TRANSIT.MESSAGE + IF.TRANSIT.SWARM + IF.STORY), security (IF.SECURITY.CHECK + IF.GOV.WITNESS + IF.SECURITY.DETECT), and the exemplar product (IF.emotion). ### **External Evaluation & Velocity Calibration** @@ -180,9 +214,9 @@ This aligns with the dossier’s own principle: | Transport | [IF.BUS — The Universal Kinetic Transport Protocol](#ifbus--the-universal-kinetic-transport-protocol) | `if://spec/if.bus/v1.2` | Deterministic actuation + privilege enforcement | | Assurance | [IF.ARMOUR — Epistemic Counter-Intelligence Protocol](#ifarmour--epistemic-counter-intelligence-protocol) | `if://spec/if.armour/v1.2` | Physics-anchored reality defense + active deception | | Master spec | [INFRAFABRIC: The Master White Paper](#infrafabric-the-master-white-paper) | `if://doc/INFRAFABRIC_MASTER_WHITEPAPER/v1.0` | Defines the protocol stack, URIs, and audit surfaces | -| Inquiry | [IF.5W](#if5w-structured-inquiry-framework-for-guardian-council-deliberations) | `if://doc/IF_5W_STRUCTURED_INQUIRY_FRAMEWORK/v1.0` | Structured prompts with evidence slots | -| Preflight | [IF.BIAS](#ifbias-bias-risk-pre-council-decision-matrix) | `if://doc/IF_BIAS_PRECOUNCIL_MATRIX/v1.0` | Sizes councils (5–30) and assigns expert voting seats | -| Governance | [IF.GUARD council](#ifguard-strategic-communications-council-for-ai-message-validation) | `if://doc/IF_GUARD_COUNCIL_FRAMEWORK/v1.0` | Multi-voice review with signed outcomes (sized by IF.BIAS) | +| Inquiry | [IF.GOV.QUESTIONS (legacy: IF.5W)](#if5w-structured-inquiry-framework-for-guardian-council-deliberations) | `if://doc/IF_5W_STRUCTURED_INQUIRY_FRAMEWORK/v1.0` | Structured prompts with evidence slots | +| Preflight | [IF.GOV.TRIAGE (legacy: IF.BIAS)](#ifbias-bias-risk-pre-council-decision-matrix) | `if://doc/IF_BIAS_PRECOUNCIL_MATRIX/v1.0` | Sizes councils (5–30) and assigns expert voting seats | +| Governance | [IF.GOV.PANEL (legacy: IF.GUARD) council](#ifguard-strategic-communications-council-for-ai-message-validation) | `if://doc/IF_GUARD_COUNCIL_FRAMEWORK/v1.0` | Multi-voice review with signed outcomes (sized by IF.BIAS) | | Compliance | [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) | `if://doc/IF_TTT_THE_SKELETON_OF_EVERYTHING/v1.0` | Ledgerflow, repo hygiene, citation enforcement | | Transport | [IF.PACKET + swarm.s2](#ifpacket-message-transport-framework-with-vocaldna-voice-layering) | `if://doc/IF_PACKET_TRANSPORT_FRAMEWORK/v1.0` | Voice-layered packets with trace IDs | | Product | [IF.emotion](#ifemotion) | `if://doc/IF_EMOTION_WHITEPAPER/v1.0` | Applied exemplar proving guard + TTT in production | @@ -225,31 +259,34 @@ Why this stub exists: external reviewers/LLMs sometimes skip an entire pillar if ### Reader Path (Start Here) -- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.BIAS](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GUARD](#ifguard-strategic-communications-council-for-ai-message-validation) +- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.GOV.TRIAGE (legacy: IF.BIAS)](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GOV.PANEL (legacy: IF.GUARD)](#ifguard-strategic-communications-council-for-ai-message-validation) - **Latency framing:** Use `t_total = t_model + t_transport + t_governance`; only `t_transport` is benchmarked in microlab terms, and never presented as “council deliberation time.” - **Consensus framing:** “Unanimous” means “the council converged,” not “the claim is true”; treat any 100% consensus output as a governance artifact until raw evidence bundles are attached. - **Validation framing:** External validation is reported as an observational microlab pilot, not proof, and not a consciousness claim. ### Glossary (Quick Decode) - **IF.TTT:** Traceable/Transparent/Trustworthy compliance spine; enforces evidence, identity, and audit lineage. -- **IF.BIAS:** Pre-council bias/risk triage matrix; recommends escalation and council sizing. -- **IF.GUARD:** Council protocol; minimum 5-seat panel (Core 4 + contrarian), expands up to 30 seats when justified. -- **Contrarian Guardian:** Required dissent seat; can trigger cooling-off/veto at >95% approval. -- **IF.5W:** Structured inquiry format used to generate briefs for councils. -- **IF.PACKET:** Schema-first message transport with trace IDs and audit metadata. -- **IF.SWARM.s2:** Intra-swarm agent communications over a Redis bus; swarm coordination at speed. -- **IF.STORY:** Vector‑narrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions. -- **Page Zero:** The manifesto/origin narrative that explains “why” (and demonstrates IF.STORY + IF.TTT in practice). -- **IF.emotion / AI-e:** Product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”). -- **IF.PHIL:** Annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects). -- **IF.BUS:** Universal Kinetic Transport Protocol; deterministic actuation layer. -- **IF.ARMOUR:** Epistemic security immune system; physics-grounded detective layer. -Naming note: `IF.bus` / `IF.armour` (lowercase) appear elsewhere as earlier papers/modules; `IF.BUS` / `IF.ARMOUR` are the canonical lower-layer protocol specifications introduced on 20251218. +- **IF.AUDIT.TRAIL:** Concrete audit artifact layer (portable chain-of-custody logs + signatures). *(In practice: implemented under IF.TTT today.)* +- **IF.GOV.TRIAGE** *(legacy: IF.BIAS)*: preflight risk triage; recommends escalation and panel sizing. +- **IF.GOV.PANEL** *(legacy: IF.GUARD)*: governance panel; minimum 5-seat review including contrarian; can expand as **IF.GOV.PANEL.EXTENDED**. +- **Contrarian Guardian:** required dissent seat; can trigger cooling-off/veto at >95% approval. +- **IF.GOV.QUESTIONS** *(legacy: IF.5W)*: structured inquiry format used to generate briefs for panels. +- **IF.TRANSIT.MESSAGE** *(legacy: IF.PACKET)*: schema-first message envelope with trace IDs and audit metadata. +- **IF.TRANSIT.SWARM** *(legacy: swarm.s2 / IF.SWARM.s2)*: intra-swarm agent communications over a Redis bus. +- **IF.STORY:** narrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions. +- **Page Zero:** the origin manifesto that explains “why” (and demonstrates IF.STORY + IF.TTT in practice). +- **IF.emotion / AI-e:** product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”). +- **IF.PHIL:** annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects). +- **IF.TRANSIT.HUB** *(legacy: IF.BUS)*: deterministic actuation/privilege enforcement transport substrate. +- **IF.SECURITY.CHECK** *(legacy: IF.ARMOUR)*: epistemic security detective layer (coherence/anomaly checks). +- **IF.SECURITY.DETECT** *(legacy: IF.YOLOGUARD)*: secret/relationship screening primitives. + +Naming note: legacy lowercase (`if.bus`, `if.armour`) appears in older papers; `IF.TRANSIT.HUB` / `IF.SECURITY.CHECK` are the canonical refactor targets introduced in this dossier. ### Selected Governance Extensions (Optional Depth) -IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.PACKET payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GUARD and logged via IF.TTT. +IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.TRANSIT.MESSAGE (legacy: IF.PACKET) payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GOV.PANEL (legacy: IF.GUARD) and logged via IF.TTT. IF.PHIL demonstrates how InfraFabric primitives extend to auditable philanthropic access, replacing discretionary “credits” with governed grant objects. @@ -269,11 +306,11 @@ Full paper: [Annex — IF.PHIL | Auditable Philanthropy](#annex-ifphil-auditable ```mermaid flowchart TD VISION["IF.vision
coordination without control"] --> FOUNDATIONS["IF.foundations
ground/search/persona"] - FOUNDATIONS --> ASSURE["Assurance
IF.ARMOUR • witness • yologuard"] - ASSURE --> TRANSPORT["Transport
IF.BUS • packet • swarm.s2 • story"] - TRANSPORT --> BIAS["Preflight
IF.BIAS | Bias & Risk Matrix"] - BIAS --> CORE4["Core 4 triage
IF.GUARD(4)"] - CORE4 --> GOVERN["Governance
IF.GUARD council (5–30) + 5W"] + FOUNDATIONS --> ASSURE["Security
IF.SECURITY.CHECK • IF.GOV.WITNESS • IF.SECURITY.DETECT"] + ASSURE --> TRANSPORT["Transit
IF.TRANSIT.HUB • MESSAGE • SWARM • IF.STORY"] + TRANSPORT --> BIAS["Preflight
IF.GOV.TRIAGE (legacy: IF.BIAS)"] + BIAS --> CORE4["Core 4 convening
legacy: IF.GUARD(4)"] + CORE4 --> GOVERN["Governance
IF.GOV.PANEL (5–30) + IF.GOV.QUESTIONS"] GOVERN --> COMPLIANCE["Compliance
IF.TTT | Distributed Ledger + ledgerflow"] COMPLIANCE --> PRODUCT["Productization
IF.emotion"] PRODUCT --> FEEDBACK["Feedback into Vision/Foundations"] @@ -282,26 +319,25 @@ flowchart TD ### Governance, Assurance, Compliance Loop ```mermaid -flowchart TD - INQUIRY["IF.5W | Structured Inquiry
structured deliberation"] --> BIAS["IF.BIAS | Bias & Risk Preflight
sizes councils (5–30)"] - BIAS --> CORE4["IF.GUARD(4) | Core 4 triage
convening authority"] - CORE4 --> GUARD["IF.GUARD | Council deliberation
panel 5 ↔ extended 30"] - GUARD --> STORY["IF.STORY | Narrative Logging
narrative + state"] - STORY --> TTT["IF.TTT | Distributed Ledger
traceable/transparent/trustworthy"] - TTT --> WITNESS["IF.witness
meta-validation"] - WITNESS --> ARMOUR["IF.armour
FP reduction"] - ARMOUR --> YG["IF.YOLOGUARD | Credential & Secret Screening
secret/relationship checks"] - YG --> PACKET["IF.PACKET | Message Transport + swarm.s2
delivery with VocalDNA"] - PACKET --> EMOTION["IF.emotion
product exemplar"] - EMOTION --> FEEDBACK["Feedback into inquiry"] - FEEDBACK --> INQUIRY +flowchart TB + Q["IF.GOV.QUESTIONS\n(legacy: IF.5W)"] --> T["IF.GOV.TRIAGE\n(legacy: IF.BIAS)"] + T --> C4["Core 4 convening\n(legacy: IF.GUARD(4))"] + C4 --> P["IF.GOV.PANEL\n(5 ↔ EXTENDED ~30)"] + P --> S["IF.STORY\nnarrative logging"] + S --> A["IF.TTT / IF.AUDIT.TRAIL\ntrace discipline"] + A --> W["IF.GOV.WITNESS\nverification"] + W --> CHK["IF.SECURITY.CHECK\n(legacy: IF.ARMOUR)"] + CHK --> DET["IF.SECURITY.DETECT\n(legacy: IF.YOLOGUARD)"] + DET --> MSG["IF.TRANSIT.MESSAGE + SWARM\n(legacy: IF.PACKET + swarm.s2)"] + MSG --> EMO["IF.emotion\nexemplar"] + EMO --> Q ``` ### Delivery & Safety Highlights (with citations) -- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GUARD review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`). -- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; witness/armour/yologuard gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`). -- Transport fidelity: IF.PACKET carries voice DNA; swarm.s2 provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`). +- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GOV.PANEL (legacy: IF.GUARD) review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`). +- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; IF.GOV.WITNESS / IF.SECURITY.CHECK / IF.SECURITY.DETECT gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`). +- Transport fidelity: IF.TRANSIT.MESSAGE (legacy: IF.PACKET) carries voice DNA; IF.TRANSIT.SWARM (legacy: swarm.s2) provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`). - Security/legal: Prompt-injection defenses cover SOTA attack classes; legal DB build operationalizes doc governance; API roadmap + history-file tests reduce integration regressions (sources: `docs/research/PROMPT_INJECTION_DEFENSES.md`, `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`, `docs/api/API_ROADMAP.md`, `HISTORY_FILE_TEST_REPORT.md`). - Domain credibility: Medical (GLP1 retrofit), emosocial principles, and informal sector resilience (Juakali) field report show adaptability of the same guard/compliance/transport spine (sources: `Brownfield_GLP1_Retrofit_LE_DILEMME_DU_TUYAU_SALE.md`, `DEJA_DE_BUSCARTE_11_principios_emosociales.md`, `JUAKALI_RAPPORT_V2_LOS_20251205_0236 (sent).md`). @@ -443,6 +479,7 @@ InfraFabric is the operating system that turns AI from a chatbot into a reliable - [Data‑Driven Technical Report (Microlab)](DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION.md) - [00. The Bridge: Submission Pack (Reviewer Orientation)](#bridge-submission-pack) +- [01. Naming + Separation of Duties (canonical refactor)](#naming-and-separation-of-duties) — see `IF_NAMING_BIBLE_v1.0.md`, `IF_NAMING_REGISTRY.yaml`, `gov/` ### External audit artifacts (public, reviewer-friendly) @@ -512,7 +549,7 @@ Optional “audit culture” annexes (satire; Dave is a pattern, not a person): - [ANNEX: IF.PHIL | Auditable Philanthropy: Access, Subsidy, and Governance Without Vibes](#annex-ifphil-auditable-philanthropy-access-subsidy-and-governance-without-vibes) — `if://doc/IF_PHIL_AUDITABLE_ACCESS/v1.0` — Author: Danny Stocker; Status: RELEASE / v1.0 - [History File Error Handling Test Report](#history-file-error-handling-test-report) — `if.api/llm/openwebui/docs/internals/HISTORY_FILE_TEST_REPORT.md` - [CLOUD SESSION: Legal Document Database Build](#cloud-session-legal-document-database-build) — `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md` -- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier) — Full satire (optional): https://infrafabric.io/static/hosted/IF_DAVE_SHADOW_DOSSIER_FULL_SATIRE.md +- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier) --- diff --git a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md.sha256 b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md.sha256 index ea782aa..1794626 100644 --- a/DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md.sha256 +++ b/DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md.sha256 @@ -1 +1 @@ -fda9d292dbd70556a5bef44819e0b064541655123429d9e760f1723cf5f962ba DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md +125415b19e361aad7c5cc6940d2af4d81899d4a3e3deefca3333048020a85d93 DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md diff --git a/IF_MONIKERS_USED.md b/IF_MONIKERS_USED.md index 34074a2..b0d7bc8 100644 --- a/IF_MONIKERS_USED.md +++ b/IF_MONIKERS_USED.md @@ -2,216 +2,220 @@ ## IF.* (protocol/moniker tokens) -Unique: 179 +Unique: 195 | Token | Count | |---|---:| +| `IF.TTT` | 418 | +| `IF.emotion` | 264 | +| `IF.GUARD` | 153 | | `IF.5W` | 105 | +| `IF.bus` | 66 | +| `IF.guard` | 62 | +| `IF.PACKET` | 60 | +| `IF.ground` | 58 | +| `IF.yologuard` | 58 | +| `IF.BIAS` | 56 | +| `IF.search` | 48 | +| `IF.Guard` | 46 | +| `IF.INTELLIGENCE` | 44 | +| `IF.armour` | 41 | +| `IF.persona` | 41 | | `IF.ARBITRATE` | 41 | -| `IF.ARBITRATE.resolve_case` | 1 | -| `IF.ARMOUR` | 17 | -| `IF.BIAS` | 57 | -| `IF.BIAS.precouncil.matrix` | 1 | +| `IF.YOLOGUARD` | 38 | +| `IF.STORY` | 29 | +| `IF.witness` | 27 | +| `IF.optimise` | 27 | +| `IF.chase` | 24 | +| `IF.foundations` | 23 | +| `IF.arbitrate` | 22 | | `IF.BUS` | 21 | -| `IF.BUS.v2.0.0` | 1 | | `IF.CEO` | 21 | +| `IF.simplify` | 21 | +| `IF.garp` | 20 | +| `IF.guardian` | 19 | +| `IF.sam` | 19 | +| `IF.EMOTION` | 18 | +| `IF.vesicle` | 18 | +| `IF.ceo` | 18 | +| `IF.ARMOUR` | 17 | +| `IF.resource` | 17 | +| `IF.swarm` | 17 | +| `IF.GOV.PANEL` | 16 | +| `IF.federate` | 15 | +| `IF.intelligence` | 15 | +| `IF.emotion.typist` | 15 | +| `IF.PHIL` | 14 | +| `IF.vision` | 13 | +| `IF.trace` | 13 | +| `IF.router` | 11 | +| `IF.philosophy` | 11 | +| `IF.reflect` | 10 | +| `IF.SEARCH` | 10 | +| `IF.GOV.TRIAGE` | 9 | +| `IF.SECURITY.CHECK` | 9 | +| `IF.collapse` | 9 | +| `IF.philosophy-database.yaml` | 9 | +| `IF.TTT.ledgerflow.deltasync` | 8 | +| `IF.SECURITY.DETECT` | 7 | +| `IF.TRANSIT.MESSAGE` | 7 | +| `IF.quiet` | 7 | +| `IF.forge` | 7 | +| `IF.story` | 7 | +| `IF.citation` | 7 | +| `IF.GOV.QUESTIONS` | 6 | +| `IF.TTT.ledgerflow.deltasync.REPO-RESTRUCTURE.WHITEPAPER.md` | 6 | +| `IF.STORY_WHITE_PAPER_v7.02_FINAL.md` | 6 | +| `IF.CRYPTOGRAPHY` | 6 | +| `IF.constitution` | 6 | +| `IF.memory` | 6 | +| `IF.guardian-core-01` | 6 | +| `IF.guardian-core-06` | 6 | +| `IF.TRANSIT.SWARM` | 5 | +| `IF.TRANSIT.HUB` | 5 | +| `IF.GOV.WITNESS` | 5 | +| `IF.core` | 5 | +| `IF.veil` | 4 | +| `IF.talent` | 4 | +| `IF.verify` | 4 | +| `IF.methodology` | 4 | +| `IF.SAM` | 4 | +| `IF.guardian-core-05` | 4 | +| `IF.URI` | 4 | +| `IF.TTT.narrative.logging` | 4 | +| `IF.Story` | 4 | +| `IF.armour.yologuard-bridge` | 4 | +| `IF.TTT-compliant` | 4 | +| `IF.guard-POC` | 4 | +| `IF.deliberate` | 4 | +| `IF.AUDIT.TRAIL` | 3 | +| `IF.marl` | 3 | +| `IF.swarm.s2` | 3 | +| `IF.proxy` | 3 | +| `IF.geopolitical` | 3 | | `IF.CEO-idealistic-01` | 3 | | `IF.CEO-idealistic-02` | 3 | +| `IF.GARP` | 3 | +| `IF.coordinator` | 3 | +| `IF.LEDGERFLOW` | 3 | +| `IF.connect` | 3 | +| `IF.GOV.PANEL.EXTENDED` | 2 | +| `IF.CONTRARIAN` | 2 | +| `IF.PKI` | 2 | +| `IF.guardian-core-02` | 2 | +| `IF.guardian-core-03` | 2 | +| `IF.guardian-core-04` | 2 | +| `IF.philosopher-western-01` | 2 | +| `IF.philosopher-western-02` | 2 | +| `IF.philosopher-western-03` | 2 | | `IF.CEO-idealistic-03` | 2 | | `IF.CEO-idealistic-04` | 2 | | `IF.CEO-pragmatic-01` | 2 | | `IF.CEO-pragmatic-02` | 2 | | `IF.CEO-pragmatic-03` | 2 | | `IF.CEO-pragmatic-04` | 2 | -| `IF.CITATION` | 1 | -| `IF.CONTRARIAN` | 2 | -| `IF.COUNCIL` | 1 | -| `IF.CRYPTOGRAPHY` | 6 | -| `IF.DAVE` | 1 | -| `IF.DECISION` | 2 | -| `IF.DOSSIER.cloud-session-legal-document-database-build` | 1 | -| `IF.DOSSIER.deja-de-buscarte` | 1 | -| `IF.DOSSIER.emo-social-sergio-corpus-ingest-runtime` | 1 | -| `IF.DOSSIER.history-file-error-handling-test-report` | 1 | -| `IF.DOSSIER.if5w-structured-inquiry-framework-for-guardian-council-deliberations` | 1 | -| `IF.DOSSIER.ifarbitrate-conflict-resolution-consensus-engineering` | 1 | -| `IF.DOSSIER.ifarmour-biological-false-positive-reduction-in-adaptive-security-systems` | 1 | -| `IF.DOSSIER.ifbias-bias-risk-pre-council-decision-matrix` | 1 | -| `IF.DOSSIER.ifbus-the-infrafabric-motherboard-architecture` | 1 | -| `IF.DOSSIER.ifemotion` | 1 | -| `IF.DOSSIER.ifguard-research-summary-executive-overview` | 1 | -| `IF.DOSSIER.ifguard-strategic-communications-council-for-ai-message-validation` | 1 | -| `IF.DOSSIER.ifintelligence-real-time-research-framework-for-guardian-council-deliberations` | 1 | -| `IF.DOSSIER.ifpacket-message-transport-framework-with-vocaldna-voice-layering` | 1 | -| `IF.DOSSIER.ifstory-origin-story-02-the-fuck-moment` | 1 | -| `IF.DOSSIER.ifstory-origin-story-04-page-zero` | 1 | -| `IF.DOSSIER.ifswarms2-redis-bus-communication-for-production-swarms` | 1 | -| `IF.DOSSIER.ifttt-compliance-framework-research-summary-and-key-findings` | 1 | -| `IF.DOSSIER.ifttt-the-skeleton-of-everything` | 1 | -| `IF.DOSSIER.ifttt-traceable-transparent-trustworthy-a-comprehensive-compliance-framework-for-ai-governance` | 1 | -| `IF.DOSSIER.iftttledgerflowdeltasync-research-grade-repository-restructure` | 1 | -| `IF.DOSSIER.ifwitness-meta-validation-as-architecture` | 1 | -| `IF.DOSSIER.ifyologuard-a-confucian-philosophical-security-framework-for-secret-detection-and-relationship-based-credential-validation` | 1 | -| `IF.DOSSIER.infrafabric-github-api-integration-roadmap-check` | 1 | -| `IF.DOSSIER.infrafabric-iffoundations-epistemology-investigation-and-agent-design` | 1 | -| `IF.DOSSIER.infrafabric-ifvision-a-blueprint-for-coordination-without-control` | 1 | -| `IF.DOSSIER.infrafabric-the-master-white-paper` | 1 | -| `IF.DOSSIER.instance-0-guardian-council-origins-evolution` | 1 | -| `IF.DOSSIER.le-paradoxe-mambu` | 1 | -| `IF.DOSSIER.livre-blanc-le-dilemme-du-tuyau-sale` | 1 | -| `IF.DOSSIER.state-of-the-art-prompt-injection-defenses` | 1 | -| `IF.DOSSIER.white-paper-ifstory` | 1 | -| `IF.EMERGE` | 1 | -| `IF.EMOTION` | 18 | -| `IF.ESCALATE` | 1 | -| `IF.Emotion` | 2 | -| `IF.FORMAT` | 1 | -| `IF.GARP` | 3 | -| `IF.GUARD` | 157 | -| `IF.GUARD.v1` | 1 | -| `IF.GUARD_COUNCIL_FRAMEWORK.md` | 1 | -| `IF.Guard` | 46 | -| `IF.INTELLIGENCE` | 44 | -| `IF.LEDGERFLOW` | 3 | | `IF.LOGISTICS` | 2 | -| `IF.Logistics` | 1 | -| `IF.Logistics.collect` | 1 | -| `IF.Logistics.dispatch` | 1 | -| `IF.MEMORY` | 1 | -| `IF.OPTIMISE` | 1 | -| `IF.PACKET` | 60 | -| `IF.PHIL` | 14 | -| `IF.PHILOSOPHY` | 1 | -| `IF.PKI` | 2 | -| `IF.Philosophy` | 1 | -| `IF.RELATE` | 1 | -| `IF.SAM` | 4 | -| `IF.SEARCH` | 10 | -| `IF.STORY` | 28 | -| `IF.STORY.origin.02.fuck-moment` | 1 | -| `IF.STORY_WHITE_PAPER_v7.02_FINAL.md` | 6 | -| `IF.SWARM.s2` | 1 | -| `IF.Story` | 4 | -| `IF.TRACE` | 1 | -| `IF.TTT` | 416 | -| `IF.TTT-auditable` | 1 | -| `IF.TTT-compliant` | 4 | -| `IF.TTT-style` | 2 | -| `IF.TTT.dossier.master` | 1 | -| `IF.TTT.ledgerflow.deltasync` | 8 | -| `IF.TTT.ledgerflow.deltasync.REPO-RESTRUCTURE.WHITEPAPER.md` | 6 | -| `IF.TTT.narrative.logging` | 4 | -| `IF.TTT.philanthropy.grant` | 1 | -| `IF.URI` | 4 | -| `IF.WWWWWW` | 2 | -| `IF.YOLOGUARD` | 37 | -| `IF.api` | 1 | -| `IF.arbitrate` | 22 | -| `IF.archive` | 1 | -| `IF.armour` | 43 | -| `IF.armour.yologuard-bridge` | 4 | -| `IF.brief-fast` | 1 | -| `IF.bus` | 67 | -| `IF.ceo` | 18 | -| `IF.chase` | 24 | -| `IF.chassis` | 1 | -| `IF.citate` | 1 | -| `IF.citation` | 7 | -| `IF.collapse` | 9 | -| `IF.connect` | 3 | -| `IF.constitution` | 6 | -| `IF.coordinator` | 3 | -| `IF.core` | 5 | -| `IF.dds` | 1 | -| `IF.deliberate` | 4 | -| `IF.emotion` | 264 | -| `IF.emotion-style` | 1 | -| `IF.emotion.typist` | 15 | | `IF.executor` | 2 | -| `IF.federate` | 15 | -| `IF.forge` | 7 | -| `IF.foundations` | 23 | -| `IF.garp` | 20 | -| `IF.geopolitical` | 3 | -| `IF.ground` | 58 | -| `IF.guard` | 62 | -| `IF.guard-POC` | 4 | -| `IF.guard-POC-system-prompt.md` | 1 | -| `IF.guardian` | 19 | -| `IF.guardian-core-01` | 6 | -| `IF.guardian-core-02` | 2 | -| `IF.guardian-core-03` | 2 | -| `IF.guardian-core-04` | 2 | -| `IF.guardian-core-05` | 4 | -| `IF.guardian-core-06` | 6 | -| `IF.intelligence` | 15 | -| `IF.marl` | 3 | -| `IF.memory` | 6 | -| `IF.methodology` | 4 | -| `IF.optimise` | 27 | -| `IF.persona` | 41 | -| `IF.persona-database.json` | 1 | +| `IF.DECISION` | 2 | +| `IF.WWWWWW` | 2 | +| `IF.TTT-style` | 2 | +| `IF.Emotion` | 2 | +| `IF.TTT.dossier.master` | 1 | +| `IF.GOV` | 1 | +| `IF.SECURITY` | 1 | +| `IF.TRANSIT` | 1 | +| `IF.AUDIT` | 1 | +| `IF.WITNESS` | 1 | +| `IF.SWARM.s2` | 1 | +| `IF.DAVE` | 1 | +| `IF.DOSSIER.ifstory-origin-story-02-the-fuck-moment` | 1 | +| `IF.STORY.origin.02.fuck-moment` | 1 | +| `IF.DOSSIER.ifstory-origin-story-04-page-zero` | 1 | +| `IF.DOSSIER.infrafabric-the-master-white-paper` | 1 | +| `IF.DOSSIER.infrafabric-ifvision-a-blueprint-for-coordination-without-control` | 1 | +| `IF.brief-fast` | 1 | +| `IF.DOSSIER.infrafabric-iffoundations-epistemology-investigation-and-agent-design` | 1 | +| `IF.DOSSIER.ifarmour-biological-false-positive-reduction-in-adaptive-security-systems` | 1 | +| `IF.DOSSIER.ifwitness-meta-validation-as-architecture` | 1 | +| `IF.subjectmap` | 1 | +| `IF.pursuit` | 1 | +| `IF.DOSSIER.ifyologuard-a-confucian-philosophical-security-framework-for-secret-detection-and-relationship-based-credential-validation` | 1 | +| `IF.DOSSIER.ifarbitrate-conflict-resolution-consensus-engineering` | 1 | | `IF.philosopher-eastern-01` | 1 | | `IF.philosopher-eastern-02` | 1 | | `IF.philosopher-eastern-03` | 1 | -| `IF.philosopher-western-01` | 2 | -| `IF.philosopher-western-02` | 2 | -| `IF.philosopher-western-03` | 2 | -| `IF.philosophy` | 11 | -| `IF.philosophy-appendix.md` | 1 | -| `IF.philosophy-database-v1.1-joe-coulombe.yaml` | 1 | -| `IF.philosophy-database.md` | 1 | -| `IF.philosophy-database.yaml` | 9 | -| `IF.proxy` | 3 | -| `IF.pursuit` | 1 | -| `IF.quiet` | 7 | -| `IF.redis` | 1 | -| `IF.reflect` | 10 | -| `IF.resource` | 17 | +| `IF.ARBITRATE.resolve_case` | 1 | +| `IF.archive` | 1 | +| `IF.Philosophy` | 1 | +| `IF.TTT-auditable` | 1 | +| `IF.DOSSIER.ifpacket-message-transport-framework-with-vocaldna-voice-layering` | 1 | +| `IF.Logistics.dispatch` | 1 | +| `IF.Logistics.collect` | 1 | +| `IF.Logistics` | 1 | +| `IF.DOSSIER.ifswarms2-redis-bus-communication-for-production-swarms` | 1 | +| `IF.DOSSIER.white-paper-ifstory` | 1 | +| `IF.DOSSIER.infrafabric-github-api-integration-roadmap-check` | 1 | +| `IF.chassis` | 1 | +| `IF.persona-database.json` | 1 | +| `IF.DOSSIER.ifintelligence-real-time-research-framework-for-guardian-council-deliberations` | 1 | +| `IF.RELATE` | 1 | +| `IF.EMERGE` | 1 | +| `IF.CITATION` | 1 | +| `IF.TRACE` | 1 | +| `IF.OPTIMISE` | 1 | +| `IF.DOSSIER.ifbias-bias-risk-pre-council-decision-matrix` | 1 | +| `IF.BIAS.precouncil.matrix` | 1 | +| `IF.DOSSIER.ifguard-strategic-communications-council-for-ai-message-validation` | 1 | +| `IF.DOSSIER.ifguard-research-summary-executive-overview` | 1 | +| `IF.GUARD_COUNCIL_FRAMEWORK.md` | 1 | +| `IF.DOSSIER.if5w-structured-inquiry-framework-for-guardian-council-deliberations` | 1 | +| `IF.COUNCIL` | 1 | +| `IF.MEMORY` | 1 | +| `IF.DOSSIER.instance-0-guardian-council-origins-evolution` | 1 | +| `IF.citate` | 1 | +| `IF.PHILOSOPHY` | 1 | | `IF.result` | 1 | -| `IF.router` | 11 | -| `IF.sam` | 19 | -| `IF.search` | 48 | -| `IF.simplify` | 21 | -| `IF.story` | 7 | -| `IF.subjectmap` | 1 | -| `IF.swarm` | 17 | -| `IF.swarm.s2` | 4 | -| `IF.talent` | 4 | -| `IF.trace` | 13 | -| `IF.veil` | 4 | -| `IF.verify` | 4 | -| `IF.vesicle` | 18 | -| `IF.vision` | 13 | -| `IF.witness` | 28 | -| `IF.yologuard` | 58 | +| `IF.guard-POC-system-prompt.md` | 1 | +| `IF.philosophy-database.md` | 1 | +| `IF.philosophy-appendix.md` | 1 | +| `IF.DOSSIER.ifttt-traceable-transparent-trustworthy-a-comprehensive-compliance-framework-for-ai-governance` | 1 | +| `IF.DOSSIER.ifttt-compliance-framework-research-summary-and-key-findings` | 1 | +| `IF.DOSSIER.ifttt-the-skeleton-of-everything` | 1 | +| `IF.ESCALATE` | 1 | +| `IF.DOSSIER.iftttledgerflowdeltasync-research-grade-repository-restructure` | 1 | +| `IF.DOSSIER.emo-social-sergio-corpus-ingest-runtime` | 1 | +| `IF.DOSSIER.ifemotion` | 1 | +| `IF.emotion-style` | 1 | +| `IF.DOSSIER.state-of-the-art-prompt-injection-defenses` | 1 | +| `IF.DOSSIER.livre-blanc-le-dilemme-du-tuyau-sale` | 1 | +| `IF.DOSSIER.deja-de-buscarte` | 1 | +| `IF.DOSSIER.le-paradoxe-mambu` | 1 | +| `IF.api` | 1 | +| `IF.FORMAT` | 1 | +| `IF.DOSSIER.history-file-error-handling-test-report` | 1 | +| `IF.DOSSIER.cloud-session-legal-document-database-build` | 1 | +| `IF.DOSSIER.ifbus-the-infrafabric-motherboard-architecture` | 1 | +| `IF.BUS.v2.0.0` | 1 | +| `IF.redis` | 1 | +| `IF.dds` | 1 | +| `IF.TTT.philanthropy.grant` | 1 | +| `IF.philosophy-database-v1.1-joe-coulombe.yaml` | 1 | +| `IF.GUARD.v1` | 1 | -## if.* (canonical/module tokens) + +## if.* (lowercase tokens) Unique: 10 | Token | Count | |---|---:| -| `if.api` | 16 | -| `if.armour` | 3 | -| `if.armour.secrets` | 7 | -| `if.armour.secrets.detect` | 8 | -| `if.bus` | 6 | | `if.emotion` | 24 | -| `if.infrafabric` | 1 | +| `if.api` | 16 | +| `if.armour.secrets.detect` | 8 | +| `if.bus` | 7 | +| `if.armour.secrets` | 7 | | `if.legal` | 5 | -| `if.search` | 1 | +| `if.armour` | 4 | | `if.ttt.ledgerflow.deltasync` | 3 | - -## IG.* (likely typos) - -Unique: 1 - -| Token | Count | -|---|---:| -| `IG.GUARD` | 1 | - -## Notes - -- Found `IG.GUARD` at: `DANNY_STOCKER_INFRAFABRIC_DOSSIER.md:82` -- This looks like a typo for `IF.GUARD` (or an alias that should be made explicit). +| `if.search` | 1 | +| `if.infrafabric` | 1 | diff --git a/IF_MONIKERS_USED.md.sha256 b/IF_MONIKERS_USED.md.sha256 index db8ed72..1446f63 100644 --- a/IF_MONIKERS_USED.md.sha256 +++ b/IF_MONIKERS_USED.md.sha256 @@ -1 +1 @@ -8e40c5c6b8d8cd0d4b4c81234bc81a9b7178a8f7de7be75926485f63fe4c4c53 IF_MONIKERS_USED.md +d53b3f9511b305b8a6eac92999f4c773244f69808369ce0e3b4b2bd4cee45df1 IF_MONIKERS_USED.md diff --git a/IF_NAMING_BIBLE_v1.0.md b/IF_NAMING_BIBLE_v1.0.md new file mode 100644 index 0000000..e056f26 --- /dev/null +++ b/IF_NAMING_BIBLE_v1.0.md @@ -0,0 +1,132 @@ +# InfraFabric Naming Bible (v1.0) + +**Date:** 2025-12-22 +**Author:** Danny Stocker +**Status:** Canonical reference (refactor-in-progress) + +## Core principle + +Governance infrastructure must be comprehensible to the governed. + +Names in InfraFabric are chosen to be legible to non-specialists (think: secondary-school educated — nurses, farmers, receptionists, students), not only domain experts. + +Academic terminology is allowed, but it is subordinate: **first mention only**, in parentheses. + +## The two-tier naming system + +### Tier 1: Layer names (literal) + +Layer names are professional, literal domain descriptors. + +- Say what it is +- No branding energy +- “Boring” is good + +Examples: +- `IF.GOV` (governance) +- `IF.SECURITY` (security) — alias: `IF.SEC` +- `IF.TRANSIT` (transport/transit) +- `IF.AUDIT` (audit) + +### Tier 2: Component names (metaphorical) + +Component names use short metaphors that make the function obvious. + +- Short and punchy (1–2 syllables preferred) +- Concrete mental image +- Cross-cultural where possible + +## Metaphor selection strategy + +Don’t force a single metaphor domain. Use what makes each function clearest. + +Available domains (examples): + +- Medical/Emergency: `TRIAGE`, `QUARANTINE` +- Legal/Civic: `PANEL`, `WITNESS` +- Physical/Security: `DETECT`, `TRAP` +- Logistics/Travel: `HUB`, `TRANSIT` +- Investigation: `TRAIL`, `PROOF` + +## Canonical hierarchy (current refactor target) + +### `IF.GOV.*` (governance) + +- `IF.GOV.TRIAGE` (controversy-weighted risk stratification) +- `IF.GOV.PANEL` (multi-agent oversight with structural dissent requirements) +- `IF.GOV.PANEL.EXTENDED` (extended multi-agent oversight panel) +- `IF.GOV.QUESTIONS` (provenance interrogative framework) +- `IF.GOV.WITNESS` (audit observation and compliance monitoring) + +### `IF.SECURITY.*` (security) + +- `IF.SECURITY.DETECT` (context-aware secret detection) +- `IF.SECURITY.CHECK` (epistemic anomaly detection and coherence validation) +- `IF.SECURITY.WATCH` (threat intelligence and monitoring) +- `IF.SECURITY.TRAP` (honeypot deployment and active defense) + +### `IF.TRANSIT.*` (transport) + +- `IF.TRANSIT.HUB` (privilege-enforced kinetic message router) +- `IF.TRANSIT.MESSAGE` (cryptographically signed message protocol) +- `IF.TRANSIT.SWARM` (distributed agent coordination) + +### `IF.AUDIT.*` (audit) + +- `IF.AUDIT.TRAIL` (immutable chain-of-custody logging) +- `IF.AUDIT.PROOF` (portable verification bundle with replay capability) + +### Special cases + +- `IF.TTT` stays as a mnemonic triad (Traceable / Transparent / Trustworthy). It is a philosophy and compliance spine. Concrete artifacts should be named under `IF.AUDIT.*`. +- `IF.STORY` stays as-is (product name: narrative logging). +- `IF.EMOTION` stays as-is (application name: exemplar product). + +## Academic translation format + +**First mention only**: + +`IF.GOV.PANEL (multi-agent oversight with structural dissent requirements)` + +Avoid: + +- `aka`, `|`, or “formerly” in the main prose +- treating internal legacy names as equal-status + +## Legacy → canonical mapping (v1) + +| Old name (legacy) | New name (canonical) | +|---|---| +| `IF.BIAS` | `IF.GOV.TRIAGE` | +| `IF.GUARD` | `IF.GOV.PANEL` | +| `IF.5W` | `IF.GOV.QUESTIONS` | +| `IF.WITNESS` | `IF.GOV.WITNESS` | +| `IF.ARMOUR` | `IF.SECURITY.CHECK` (and `IF.SECURITY.*` submodules) | +| `IF.YOLOGUARD` | `IF.SECURITY.DETECT` | +| `IF.PACKET` | `IF.TRANSIT.MESSAGE` | +| `IF.BUS` | `IF.TRANSIT.HUB` | +| `swarm.s2` | `IF.TRANSIT.SWARM` | + +## Testing heuristics + +### The “youth hostel test” + +Could a non-technical person read an audit trail and understand what happened? + +Example pass: + +“Your request went to TRIAGE, which escalated to PANEL. DETECT found a secret. The decision is recorded in AUDIT.TRAIL.” + +### The “government separation-of-duties” sanity check + +If in doubt, follow separation-of-duties patterns inspired by **US/CA/EU** governance structures: + +- separate triage (classification) from deliberation (decision) +- separate detection (security) from actuation (transport) +- separate recordkeeping (audit) from narrative (story) + +## Canonical registry + +- Machine-readable registry: `IF_NAMING_REGISTRY.yaml` +- Component charters (separation-of-duties): `gov/` + diff --git a/IF_NAMING_BIBLE_v1.0.md.sha256 b/IF_NAMING_BIBLE_v1.0.md.sha256 new file mode 100644 index 0000000..61e2926 --- /dev/null +++ b/IF_NAMING_BIBLE_v1.0.md.sha256 @@ -0,0 +1 @@ +8728ba5719e369d280443df30caafef6bdb69ea1f5829141afaf40b060173ac2 IF_NAMING_BIBLE_v1.0.md diff --git a/IF_NAMING_REGISTRY_v1.0.yaml b/IF_NAMING_REGISTRY_v1.0.yaml new file mode 100644 index 0000000..b0e726f --- /dev/null +++ b/IF_NAMING_REGISTRY_v1.0.yaml @@ -0,0 +1,82 @@ +version: "1.0" +date_utc: "2025-12-22" +status: "draft-canonical" + +principles: + - "Layer names are literal domains (GOV/SECURITY/TRANSIT/AUDIT)." + - "Component names are short, concrete metaphors (TRIAGE/PANEL/DETECT/TRAIL)." + - "Names must be legible to non-specialists (secondary-school educated)." + - "Legacy names remain supported as aliases during transition." + +aliases: + IF.SEC: + points_to: "IF.SECURITY" + +forbidden: + - "IG.GUARD" # typo; use IF.GOV.PANEL / IF.GOV.PANEL.EXTENDED + - "ig.guard" + +names: + IF.GOV.TRIAGE: + legacy: ["IF.BIAS", "if.bias"] + academic: "controversy-weighted risk stratification" + description: "Preflight risk triage that sizes councils and decides escalation." + + IF.GOV.PANEL: + legacy: ["IF.GUARD", "if.guard"] + academic: "multi-agent oversight with structural dissent requirements" + description: "Council governance protocol (minimum 5 seats including a contrarian)." + + IF.GOV.PANEL.EXTENDED: + legacy: [] + academic: "extended multi-agent oversight panel" + description: "Expanded panel up to ~30 seats for higher-stakes decisions." + + IF.GOV.QUESTIONS: + legacy: ["IF.5W", "IF_5W", "if.5w"] + academic: "provenance interrogative framework" + description: "Structured inquiry briefs (who/what/when/where/why/how)." + + IF.GOV.WITNESS: + legacy: ["IF.WITNESS", "if.witness"] + academic: "audit observation and compliance monitoring" + description: "Independent witness that validates governance and trace discipline." + + IF.SECURITY.DETECT: + legacy: ["IF.YOLOGUARD", "if.yologuard"] + academic: "context-aware secret detection" + description: "Secret/relationship screening and credential hygiene primitives." + + IF.SECURITY.CHECK: + legacy: ["IF.ARMOUR", "IF.armour", "if.armour"] + academic: "epistemic anomaly detection and coherence validation" + description: "Detective layer for coherence/inconsistency; no actuation authority." + + IF.TRANSIT.HUB: + legacy: ["IF.BUS", "IF.bus", "if.bus"] + academic: "privilege-enforced kinetic message router" + description: "Deterministic actuation + privilege enforcement substrate." + + IF.TRANSIT.MESSAGE: + legacy: ["IF.PACKET", "if.packet"] + academic: "cryptographically signed message protocol" + description: "Schema-first message envelope with trace IDs and audit metadata." + + IF.TRANSIT.SWARM: + legacy: ["swarm.s2", "IF.SWARM.s2", "IF.SWARM.S2"] + academic: "distributed agent coordination" + description: "Intra-swarm coordination layer over a Redis bus." + + IF.AUDIT.TRAIL: + legacy: ["IF.TTT"] + academic: "immutable chain-of-custody logging" + description: "Trace discipline + signing + verification hooks for disputes." + + IF.AUDIT.PROOF: + legacy: [] + academic: "portable verification bundle" + description: "Exportable evidence bundle + manifest + verifier steps." + +notes: + - "IF.TTT remains the philosophical umbrella; use IF.AUDIT.* for concrete artifacts." + - "Multi-lingual translations: planned; keep canonical IDs stable and translate descriptions." diff --git a/IF_NAMING_REGISTRY_v1.0.yaml.sha256 b/IF_NAMING_REGISTRY_v1.0.yaml.sha256 new file mode 100644 index 0000000..74a3bcf --- /dev/null +++ b/IF_NAMING_REGISTRY_v1.0.yaml.sha256 @@ -0,0 +1 @@ +495679f1c79443a4aa8cd45dd3549e75b8a7947f61b035c41f530745cdfc865e IF_NAMING_REGISTRY_v1.0.yaml diff --git a/gov/PANEL.md b/gov/PANEL.md new file mode 100644 index 0000000..83c9f69 --- /dev/null +++ b/gov/PANEL.md @@ -0,0 +1,37 @@ +# IF.GOV.PANEL (legacy: IF.GUARD) + +## Role + +A multi-voice governance panel that reviews high-stakes decisions. + +- Minimum form: `IF.GOV.PANEL` (5 seats, includes contrarian) +- Expanded form: `IF.GOV.PANEL.EXTENDED` (up to ~30 seats) + +## Responsibilities + +- deliberate on a proposed action/response +- preserve dissent (minority opinions remain visible) +- record votes and rationale as an auditable artifact + +## Non-responsibilities + +- not a latency-optimized mechanism for low-stakes chat +- not a substitute for a human clinical board (mental-health-adjacent domains require explicit constraints) + +## Inputs + +- `TRIAGE` output (risk tier + recommended panel size) +- the proposed action/response +- evidence references (retrieval ids / citations / prior traces) + +## Outputs + +- allow / modify / block decision +- votes + dissent record +- escalation/appeal hooks (if applicable) + +## Required evidence + +- signed `PANEL` decision record under `IF.AUDIT.TRAIL` +- link to the exact proposal bytes that were voted on (hash) +- trace id included in final user-visible output diff --git a/gov/QUESTIONS.md b/gov/QUESTIONS.md new file mode 100644 index 0000000..5669353 --- /dev/null +++ b/gov/QUESTIONS.md @@ -0,0 +1,21 @@ +# IF.GOV.QUESTIONS (legacy: IF.5W) + +## Role + +A structured inquiry template to prevent hand-wavy governance. + +It forces deliberation to answer the basics (who/what/when/where/why/how) and to cite evidence. + +## Responsibilities + +- generate a brief that can be reviewed by `PANEL` +- provide explicit slots for evidence and boundaries + +## Non-responsibilities + +- does not decide; it structures the inputs to decision + +## Required evidence + +- the brief is logged and hashed in the trace +- any claim in the brief must point to a verification path or be labeled `UNVERIFIED` diff --git a/gov/README.md b/gov/README.md new file mode 100644 index 0000000..1dc374b --- /dev/null +++ b/gov/README.md @@ -0,0 +1,30 @@ +# IF.GOV directory (separation-of-duties) + +This directory is the **governance charter layer** for InfraFabric. + +Purpose: +- reduce concept drift / sprawl by defining *who does what* +- make governance primitives legible to non-specialists +- provide stable names for cross-app integration (CLI/API) + +Design framing: InfraFabric is not inventing “government”. It is adapting separation-of-duties patterns inspired by **US/CA/EU** governance structures to autonomous systems. + +## Components + +- `TRIAGE.md` — `IF.GOV.TRIAGE` (legacy: `IF.BIAS`) +- `PANEL.md` — `IF.GOV.PANEL` + `IF.GOV.PANEL.EXTENDED` (legacy: `IF.GUARD`) +- `QUESTIONS.md` — `IF.GOV.QUESTIONS` (legacy: `IF.5W`) +- `WITNESS.md` — `IF.GOV.WITNESS` (legacy: `IF.WITNESS`) + +## Interface contract (v1) + +Each charter specifies: +- responsibilities (what it *must* do) +- non-responsibilities (what it *must not* do) +- inputs/outputs +- audit artifacts required under `IF.AUDIT.TRAIL` / `IF.TTT` + +## Naming + +- Canonical naming is defined in `../IF_NAMING_REGISTRY.yaml`. +- Legacy names remain valid as aliases during transition. diff --git a/gov/TRIAGE.md b/gov/TRIAGE.md new file mode 100644 index 0000000..ceb34df --- /dev/null +++ b/gov/TRIAGE.md @@ -0,0 +1,35 @@ +# IF.GOV.TRIAGE (legacy: IF.BIAS) + +## Role + +Classify a request by risk/controversy and decide what governance path is required. + +## Responsibilities + +- assign a risk tier and an escalation recommendation +- size the panel (minimum vs extended) +- emit a signed decision record (even when rejecting/short-circuiting) + +## Non-responsibilities + +- does not generate the final user answer +- does not “deliberate” on truth claims; it only classifies and routes + +## Inputs + +- user request metadata (actor id, request type, policy surface) +- optional: retrieval/context hints + +## Outputs + +- `panel_size` recommendation (e.g., 5 → 30) +- escalation path (fast path vs panel) +- required seats (e.g., contrarian mandatory) + +## Required evidence + +- trace id for the request +- a `TRIAGE` event logged to `IF.AUDIT.TRAIL` with: + - inputs hashed + - output decision + panel size + - link to the follow-on `PANEL` decision (if invoked) diff --git a/gov/WITNESS.md b/gov/WITNESS.md new file mode 100644 index 0000000..b761018 --- /dev/null +++ b/gov/WITNESS.md @@ -0,0 +1,21 @@ +# IF.GOV.WITNESS (legacy: IF.WITNESS) + +## Role + +A witness is the “auditor in the room”: it checks that governance rules were followed and that required artifacts exist. + +## Responsibilities + +- validate that TRIAGE and PANEL produced required artifacts +- validate that the final output includes trace id and citation formatting rules +- raise “no-trace-no-trust” errors when invariants are violated + +## Non-responsibilities + +- does not override governance decisions on substance +- does not act as a judge; it acts as a verifier + +## Required evidence + +- witness checks are logged as trace events +- witness failures are exported as part of `IF.AUDIT.PROOF` bundles when disputes occur