Publish IF.GOV naming registry + updated dossier editions

This commit is contained in:
root 2025-12-22 12:30:02 +00:00
parent 95a77cc67e
commit 426da743f4
19 changed files with 813 additions and 327 deletions

View file

@ -41,18 +41,18 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard
| Core claim | Proof (artifacts) | Limitation (scope / boundary) | | Core claim | Proof (artifacts) | Limitation (scope / boundary) |
|---|---|---| |---|---|---|
| **A) Traceability is safety.** Highstakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**<br/>- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)<br/>- Verifier: `https://infrafabric.io/static/hosted/iftrace.py`<br/>- Reference bundle: `emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz` | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public appendonly transparency log yet. | | **A) Traceability is safety.** Highstakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**<br/>- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)<br/>- Verifier: [iftrace.py](https://infrafabric.io/static/hosted/iftrace.py)<br/>- Reference bundle: [emo_trace_payload_016cca78…tar.gz](https://infrafabric.io/static/hosted/emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz) | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public appendonly transparency log yet. |
| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.BIAS → IF.GUARD**<br/>- IF.BIAS: risk preflight sizes councils and escalates<br/>- IF.GUARD: councils preserve dissent and veto paths<br/>- IF.5W: structured inquiry briefs for councils | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller councils or fast-track gates. | | **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.GOV.TRIAGE → IF.GOV.PANEL** *(legacy: IF.BIAS → IF.GUARD)*<br/>- TRIAGE: risk preflight sizes panels and escalates<br/>- PANEL: preserves dissent + veto paths<br/>- QUESTIONS *(legacy: IF.5W)*: structured inquiry briefs for panels | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller panels or fast-track gates. |
| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.ARMOUR + IF.YOLOGUARD**<br/>- IF.ARMOUR: epistemic coherence checks (detective layer)<br/>- IF.YOLOGUARD: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. | | **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.SECURITY.CHECK + IF.SECURITY.DETECT** *(legacy: IF.ARMOUR + IF.YOLOGUARD)*<br/>- CHECK: epistemic coherence checks (detective layer)<br/>- DETECT: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. |
### Rosetta Stone (Closest Analog, not “equals”) ### Rosetta Stone (Closest Analog, not “equals”)
| InfraFabric term | Closest industry analog | Boundary (where it differs) | | InfraFabric term | Closest industry analog | Boundary (where it differs) |
|---|---|---| |---|---|---|
| **IF.TTT** (Traceable/Transparent/Trustworthy) | Supply-chain integrity patterns (SLSA/SBOM + CT-like audit thinking) | IF.TTT applies the discipline to **semantic decisions and retrieval lineage**, not just binaries. It produces portable evidence bundles + verifier steps for third-party audit. | | **IF.TTT** (Traceable/Transparent/Trustworthy) | Supply-chain integrity patterns (SLSA/SBOM + CT-like audit thinking) | IF.TTT applies the discipline to **semantic decisions and retrieval lineage**, not just binaries. It produces portable evidence bundles + verifier steps for third-party audit. |
| **IF.GUARD** (Council governance) | Human-in-the-loop oversight / review boards | IF.GUARD is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. | | **IF.GOV.PANEL** (legacy: IF.GUARD) | Human-in-the-loop oversight / review boards | IF.GOV.PANEL is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. |
| **IF.ARMOUR** (Assurance) | Epistemic security / anomaly detection | Armour is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. | | **IF.SECURITY.CHECK** (legacy: IF.ARMOUR) | Epistemic security / anomaly detection | CHECK is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. |
| **IF.swarm.s2 / IF.PACKET / IF.BUS** (Transport) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. | | **IF.TRANSIT.SWARM / IF.TRANSIT.MESSAGE / IF.TRANSIT.HUB** (legacy: swarm.s2 / IF.PACKET / IF.BUS) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. |
### Navigation Guide (Clean vs Origin context) ### Navigation Guide (Clean vs Origin context)
@ -60,11 +60,45 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard
- If you want the origin context (microlab lab notes / narrative artifacts): start at the **Cold Open** and IF.STORY sections (they explain why the architecture exists). - If you want the origin context (microlab lab notes / narrative artifacts): start at the **Cold Open** and IF.STORY sections (they explain why the architecture exists).
- Optional culture stress-test (explicit satire; not a protocol): [Annex (Non-Technical): The Dave Factor Shadow Dossier](#annex-dave-factor-shadow-dossier) - Optional culture stress-test (explicit satire; not a protocol): [Annex (Non-Technical): The Dave Factor Shadow Dossier](#annex-dave-factor-shadow-dossier)
<a id="naming-and-separation-of-duties"></a>
## 01. Naming + Separation of Duties (canonical refactor)
InfraFabrics early papers used internal names (e.g., `IF.GUARD`, `IF.BIAS`, `IF.ARMOUR`, `IF.BUS`). To reduce lexicon friction for reviewers and to standardize crossapp integration, this dossier is refactoring to a separationofduties namespace inspired by **US/CA/EU** governance patterns:
- `IF.GOV.*` — governance (triage + panels + witness)
- `IF.SECURITY.*` — security (detective checks + secret screening)
- `IF.TRANSIT.*` — transport/actuation (routing + message envelopes)
- `IF.AUDIT.*` — audit artifacts (trail + proof bundles)
Canonical references in this repo:
- Naming contract: `IF_NAMING_BIBLE_v1.0.md`
- Machine registry: `IF_NAMING_REGISTRY.yaml`
- Governance charters (who does what): `gov/`
### Legacy → canonical mapping (v1)
| Legacy name | Canonical name |
|---|---|
| `IF.BIAS` | `IF.GOV.TRIAGE` |
| `IF.GUARD` | `IF.GOV.PANEL` |
| `IF.5W` | `IF.GOV.QUESTIONS` |
| `IF.WITNESS` | `IF.GOV.WITNESS` |
| `IF.ARMOUR` | `IF.SECURITY.CHECK` |
| `IF.YOLOGUARD` | `IF.SECURITY.DETECT` |
| `IF.BUS` | `IF.TRANSIT.HUB` |
| `IF.PACKET` | `IF.TRANSIT.MESSAGE` |
| `swarm.s2` | `IF.TRANSIT.SWARM` |
Transition policy: many embedded papers still use legacy names; where so, the dossier now prefers first-mention annotations like `IF.GOV.PANEL (legacy: IF.GUARD)`.
## Opening Whitepaper — InfraFabric Synthesis (for Anthropic) ## Opening Whitepaper — InfraFabric Synthesis (for Anthropic)
> *If we cannot prove the chain-of-custody, we cannot ship.* > *If we cannot prove the chain-of-custody, we cannot ship.*
InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.BIAS + IF.GUARD + IF.5W), transport (IF.PACKET + swarm.s2 + IF.STORY), assurance (armour, witness, yologuard), and the exemplar product (IF.emotion). InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.GOV.TRIAGE + IF.GOV.PANEL + IF.GOV.QUESTIONS), transit (IF.TRANSIT.MESSAGE + IF.TRANSIT.SWARM + IF.STORY), security (IF.SECURITY.CHECK + IF.GOV.WITNESS + IF.SECURITY.DETECT), and the exemplar product (IF.emotion).
### IF.BUS ↔ IF.ARMOUR Threat Coverage Matrix (Normative) ### IF.BUS ↔ IF.ARMOUR Threat Coverage Matrix (Normative)
@ -102,31 +136,34 @@ Why this stub exists: external reviewers/LLMs sometimes skip an entire pillar if
### Reader Path (Start Here) ### Reader Path (Start Here)
- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.BIAS](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GUARD](#ifguard-strategic-communications-council-for-ai-message-validation) - **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.GOV.TRIAGE (legacy: IF.BIAS)](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GOV.PANEL (legacy: IF.GUARD)](#ifguard-strategic-communications-council-for-ai-message-validation)
- **Latency framing:** Use `t_total = t_model + t_transport + t_governance`; only `t_transport` is benchmarked in microlab terms, and never presented as “council deliberation time.” - **Latency framing:** Use `t_total = t_model + t_transport + t_governance`; only `t_transport` is benchmarked in microlab terms, and never presented as “council deliberation time.”
- **Consensus framing:** “Unanimous” means “the council converged,” not “the claim is true”; treat any 100% consensus output as a governance artifact until raw evidence bundles are attached. - **Consensus framing:** “Unanimous” means “the council converged,” not “the claim is true”; treat any 100% consensus output as a governance artifact until raw evidence bundles are attached.
- **Validation framing:** External validation is reported as an observational microlab pilot, not proof, and not a consciousness claim. - **Validation framing:** External validation is reported as an observational microlab pilot, not proof, and not a consciousness claim.
### Glossary (Quick Decode) ### Glossary (Quick Decode)
- **IF.TTT:** Traceable/Transparent/Trustworthy compliance spine; enforces evidence, identity, and audit lineage. - **IF.TTT:** Traceable/Transparent/Trustworthy compliance spine; enforces evidence, identity, and audit lineage.
- **IF.BIAS:** Pre-council bias/risk triage matrix; recommends escalation and council sizing. - **IF.AUDIT.TRAIL:** Concrete audit artifact layer (portable chain-of-custody logs + signatures). *(In practice: implemented under IF.TTT today.)*
- **IF.GUARD:** Council protocol; minimum 5-seat panel (Core 4 + contrarian), expands up to 30 seats when justified. - **IF.GOV.TRIAGE** *(legacy: IF.BIAS)*: preflight risk triage; recommends escalation and panel sizing.
- **Contrarian Guardian:** Required dissent seat; can trigger cooling-off/veto at >95% approval. - **IF.GOV.PANEL** *(legacy: IF.GUARD)*: governance panel; minimum 5-seat review including contrarian; can expand as **IF.GOV.PANEL.EXTENDED**.
- **IF.5W:** Structured inquiry format used to generate briefs for councils. - **Contrarian Guardian:** required dissent seat; can trigger cooling-off/veto at >95% approval.
- **IF.PACKET:** Schema-first message transport with trace IDs and audit metadata. - **IF.GOV.QUESTIONS** *(legacy: IF.5W)*: structured inquiry format used to generate briefs for panels.
- **IF.SWARM.s2:** Intra-swarm agent communications over a Redis bus; swarm coordination at speed. - **IF.TRANSIT.MESSAGE** *(legacy: IF.PACKET)*: schema-first message envelope with trace IDs and audit metadata.
- **IF.STORY:** Vectornarrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions. - **IF.TRANSIT.SWARM** *(legacy: swarm.s2 / IF.SWARM.s2)*: intra-swarm agent communications over a Redis bus.
- **Page Zero:** The manifesto/origin narrative that explains “why” (and demonstrates IF.STORY + IF.TTT in practice). - **IF.STORY:** narrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions.
- **IF.emotion / AI-e:** Product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”). - **Page Zero:** the origin manifesto that explains “why” (and demonstrates IF.STORY + IF.TTT in practice).
- **IF.PHIL:** Annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects). - **IF.emotion / AI-e:** product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”).
- **IF.BUS:** Universal Kinetic Transport Protocol; deterministic actuation layer. - **IF.PHIL:** annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects).
- **IF.ARMOUR:** Epistemic security immune system; physics-grounded detective layer. - **IF.TRANSIT.HUB** *(legacy: IF.BUS)*: deterministic actuation/privilege enforcement transport substrate.
Naming note: `IF.bus` / `IF.armour` (lowercase) appear elsewhere as earlier papers/modules; `IF.BUS` / `IF.ARMOUR` are the canonical lower-layer protocol specifications introduced on 20251218. - **IF.SECURITY.CHECK** *(legacy: IF.ARMOUR)*: epistemic security detective layer (coherence/anomaly checks).
- **IF.SECURITY.DETECT** *(legacy: IF.YOLOGUARD)*: secret/relationship screening primitives.
Naming note: legacy lowercase (`if.bus`, `if.armour`) appears in older papers; `IF.TRANSIT.HUB` / `IF.SECURITY.CHECK` are the canonical refactor targets introduced in this dossier.
### Selected Governance Extensions (Optional Depth) ### Selected Governance Extensions (Optional Depth)
IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.PACKET payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GUARD and logged via IF.TTT. IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.TRANSIT.MESSAGE (legacy: IF.PACKET) payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GOV.PANEL (legacy: IF.GUARD) and logged via IF.TTT.
IF.PHIL demonstrates how InfraFabric primitives extend to auditable philanthropic access, replacing discretionary “credits” with governed grant objects. IF.PHIL demonstrates how InfraFabric primitives extend to auditable philanthropic access, replacing discretionary “credits” with governed grant objects.
@ -146,11 +183,11 @@ Full paper: [Annex — IF.PHIL | Auditable Philanthropy](#annex-ifphil-auditable
```mermaid ```mermaid
flowchart TD flowchart TD
VISION["IF.vision<br/>coordination without control"] --> FOUNDATIONS["IF.foundations<br/>ground/search/persona"] VISION["IF.vision<br/>coordination without control"] --> FOUNDATIONS["IF.foundations<br/>ground/search/persona"]
FOUNDATIONS --> ASSURE["Assurance<br/>IF.ARMOUR • witness • yologuard"] FOUNDATIONS --> ASSURE["Security<br/>IF.SECURITY.CHECK • IF.GOV.WITNESS • IF.SECURITY.DETECT"]
ASSURE --> TRANSPORT["Transport<br/>IF.BUS • packet • swarm.s2 • story"] ASSURE --> TRANSPORT["Transit<br/>IF.TRANSIT.HUB • MESSAGE • SWARM • IF.STORY"]
TRANSPORT --> BIAS["Preflight<br/>IF.BIAS | Bias & Risk Matrix"] TRANSPORT --> BIAS["Preflight<br/>IF.GOV.TRIAGE (legacy: IF.BIAS)"]
BIAS --> CORE4["Core 4 triage<br/>IF.GUARD(4)"] BIAS --> CORE4["Core 4 convening<br/>legacy: IF.GUARD(4)"]
CORE4 --> GOVERN["Governance<br/>IF.GUARD council (530) + 5W"] CORE4 --> GOVERN["Governance<br/>IF.GOV.PANEL (530) + IF.GOV.QUESTIONS"]
GOVERN --> COMPLIANCE["Compliance<br/>IF.TTT | Distributed Ledger + ledgerflow"] GOVERN --> COMPLIANCE["Compliance<br/>IF.TTT | Distributed Ledger + ledgerflow"]
COMPLIANCE --> PRODUCT["Productization<br/>IF.emotion"] COMPLIANCE --> PRODUCT["Productization<br/>IF.emotion"]
PRODUCT --> FEEDBACK["Feedback into Vision/Foundations"] PRODUCT --> FEEDBACK["Feedback into Vision/Foundations"]
@ -159,26 +196,25 @@ flowchart TD
### Governance, Assurance, Compliance Loop ### Governance, Assurance, Compliance Loop
```mermaid ```mermaid
flowchart TD flowchart TB
INQUIRY["IF.5W | Structured Inquiry<br/>structured deliberation"] --> BIAS["IF.BIAS | Bias & Risk Preflight<br/>sizes councils (530)"] Q["IF.GOV.QUESTIONS\n(legacy: IF.5W)"] --> T["IF.GOV.TRIAGE\n(legacy: IF.BIAS)"]
BIAS --> CORE4["IF.GUARD(4) | Core 4 triage<br/>convening authority"] T --> C4["Core 4 convening\n(legacy: IF.GUARD(4))"]
CORE4 --> GUARD["IF.GUARD | Council deliberation<br/>panel 5 ↔ extended 30"] C4 --> P["IF.GOV.PANEL\n(5 ↔ EXTENDED ~30)"]
GUARD --> STORY["IF.STORY | Narrative Logging<br/>narrative + state"] P --> S["IF.STORY\nnarrative logging"]
STORY --> TTT["IF.TTT | Distributed Ledger<br/>traceable/transparent/trustworthy"] S --> A["IF.TTT / IF.AUDIT.TRAIL\ntrace discipline"]
TTT --> WITNESS["IF.witness<br/>meta-validation"] A --> W["IF.GOV.WITNESS\nverification"]
WITNESS --> ARMOUR["IF.armour<br/>FP reduction"] W --> CHK["IF.SECURITY.CHECK\n(legacy: IF.ARMOUR)"]
ARMOUR --> YG["IF.YOLOGUARD | Credential & Secret Screening<br/>secret/relationship checks"] CHK --> DET["IF.SECURITY.DETECT\n(legacy: IF.YOLOGUARD)"]
YG --> PACKET["IF.PACKET | Message Transport + swarm.s2<br/>delivery with VocalDNA"] DET --> MSG["IF.TRANSIT.MESSAGE + SWARM\n(legacy: IF.PACKET + swarm.s2)"]
PACKET --> EMOTION["IF.emotion<br/>product exemplar"] MSG --> EMO["IF.emotion\nexemplar"]
EMOTION --> FEEDBACK["Feedback into inquiry"] EMO --> Q
FEEDBACK --> INQUIRY
``` ```
### Delivery & Safety Highlights (with citations) ### Delivery & Safety Highlights (with citations)
- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GUARD review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`). - Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GOV.PANEL (legacy: IF.GUARD) review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`).
- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; witness/armour/yologuard gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`). - Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; IF.GOV.WITNESS / IF.SECURITY.CHECK / IF.SECURITY.DETECT gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`).
- Transport fidelity: IF.PACKET carries voice DNA; swarm.s2 provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`). - Transport fidelity: IF.TRANSIT.MESSAGE (legacy: IF.PACKET) carries voice DNA; IF.TRANSIT.SWARM (legacy: swarm.s2) provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`).
- Security/legal: Prompt-injection defenses cover SOTA attack classes; legal DB build operationalizes doc governance; API roadmap + history-file tests reduce integration regressions (sources: `docs/research/PROMPT_INJECTION_DEFENSES.md`, `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`, `docs/api/API_ROADMAP.md`, `HISTORY_FILE_TEST_REPORT.md`). - Security/legal: Prompt-injection defenses cover SOTA attack classes; legal DB build operationalizes doc governance; API roadmap + history-file tests reduce integration regressions (sources: `docs/research/PROMPT_INJECTION_DEFENSES.md`, `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`, `docs/api/API_ROADMAP.md`, `HISTORY_FILE_TEST_REPORT.md`).
- Domain credibility: Medical (GLP1 retrofit), emosocial principles, and informal sector resilience (Juakali) field report show adaptability of the same guard/compliance/transport spine (sources: `Brownfield_GLP1_Retrofit_LE_DILEMME_DU_TUYAU_SALE.md`, `DEJA_DE_BUSCARTE_11_principios_emosociales.md`, `JUAKALI_RAPPORT_V2_LOS_20251205_0236 (sent).md`). - Domain credibility: Medical (GLP1 retrofit), emosocial principles, and informal sector resilience (Juakali) field report show adaptability of the same guard/compliance/transport spine (sources: `Brownfield_GLP1_Retrofit_LE_DILEMME_DU_TUYAU_SALE.md`, `DEJA_DE_BUSCARTE_11_principios_emosociales.md`, `JUAKALI_RAPPORT_V2_LOS_20251205_0236 (sent).md`).
@ -320,6 +356,7 @@ InfraFabric is the operating system that turns AI from a chatbot into a reliable
- [DataDriven Technical Report (Microlab)](DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION.md) - [DataDriven Technical Report (Microlab)](DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION.md)
- [00. The Bridge: Submission Pack (Reviewer Orientation)](#bridge-submission-pack) - [00. The Bridge: Submission Pack (Reviewer Orientation)](#bridge-submission-pack)
- [01. Naming + Separation of Duties (canonical refactor)](#naming-and-separation-of-duties) — see `IF_NAMING_BIBLE_v1.0.md`, `IF_NAMING_REGISTRY.yaml`, `gov/`
### External audit artifacts (public, reviewer-friendly) ### External audit artifacts (public, reviewer-friendly)
@ -389,7 +426,7 @@ Optional “audit culture” annexes (satire; Dave is a pattern, not a person):
- [ANNEX: IF.PHIL | Auditable Philanthropy: Access, Subsidy, and Governance Without Vibes](#annex-ifphil-auditable-philanthropy-access-subsidy-and-governance-without-vibes) — `if://doc/IF_PHIL_AUDITABLE_ACCESS/v1.0` — Author: Danny Stocker; Status: RELEASE / v1.0 - [ANNEX: IF.PHIL | Auditable Philanthropy: Access, Subsidy, and Governance Without Vibes](#annex-ifphil-auditable-philanthropy-access-subsidy-and-governance-without-vibes) — `if://doc/IF_PHIL_AUDITABLE_ACCESS/v1.0` — Author: Danny Stocker; Status: RELEASE / v1.0
- [History File Error Handling Test Report](#history-file-error-handling-test-report) — `if.api/llm/openwebui/docs/internals/HISTORY_FILE_TEST_REPORT.md` - [History File Error Handling Test Report](#history-file-error-handling-test-report) — `if.api/llm/openwebui/docs/internals/HISTORY_FILE_TEST_REPORT.md`
- [CLOUD SESSION: Legal Document Database Build](#cloud-session-legal-document-database-build) — `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md` - [CLOUD SESSION: Legal Document Database Build](#cloud-session-legal-document-database-build) — `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`
- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier) — Full satire (optional): https://infrafabric.io/static/hosted/IF_DAVE_SHADOW_DOSSIER_FULL_SATIRE.md - [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier)
--- ---

View file

@ -1 +1 @@
f93b599622506c2077242c21006300a6f4ca46773033216ebec3ba6f3f41df38 DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md 7b3f05446674223c0bfdd35093c44c39ac87c6c5144994706701ad543d0598a5 DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md

View file

@ -21,6 +21,17 @@
--- ---
## 0.5) Naming (Refactor in progress)
This submission uses a refactor namespace to reduce lexicon friction:
- `IF.GOV.*` (governance), `IF.SECURITY.*` (security), `IF.TRANSIT.*` (transport), `IF.AUDIT.*` (audit artifacts)
- Legacy names may appear in embedded papers; first-mention annotations use the form `IF.GOV.PANEL (legacy: IF.GUARD)`
Canonical docs: `IF_NAMING_BIBLE_v1.0.md`, `IF_NAMING_REGISTRY.yaml`, and `gov/` (in the source repo).
---
## 1) Technical Disclosure (AI-Native Implementation) ## 1) Technical Disclosure (AI-Native Implementation)
This project follows an Operator-as-Architect workflow: I define constraints, interfaces, and verification hooks; LLMs generate implementation code under supervision. The system is therefore evaluated as: This project follows an Operator-as-Architect workflow: I define constraints, interfaces, and verification hooks; LLMs generate implementation code under supervision. The system is therefore evaluated as:
@ -42,8 +53,8 @@ This project follows an Operator-as-Architect workflow: I define constraints, in
| Core claim | Proof (artifact) | Boundary / limitation | | Core claim | Proof (artifact) | Boundary / limitation |
|---|---|---| |---|---|---|
| **A) Traceability is a safety primitive.** Highstakes agent actions require verifiable provenance. | IF.emotion trace protocol + evidence bundle + verifier (see §5). | **Microlab / single shard.** Guarantees begin at the backend witness boundary; edge completeness is future work. | | **A) Traceability is a safety primitive.** Highstakes agent actions require verifiable provenance. | IF.emotion trace protocol + evidence bundle + verifier (see §5). | **Microlab / single shard.** Guarantees begin at the backend witness boundary; edge completeness is future work. |
| **B) Governance needs structured dissent.** One-model “judge” patterns are brittle. | IF.BIAS (risk preflight) + IF.GUARD (council with required dissent seat) traced via IF.TTT. | **Cost/latency.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths stay fast. | | **B) Governance needs structured dissent.** One-model “judge” patterns are brittle. | IF.GOV.TRIAGE *(legacy: IF.BIAS)* + IF.GOV.PANEL *(legacy: IF.GUARD)* traced via IF.TTT / IF.AUDIT.TRAIL. | **Cost/latency.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths stay fast. |
| **C) Context is a security control.** Static filters fail; provenance + coherence checks reduce unsafe drift. | IF.ARMOUR (coherence/detective layer) + IF.YOLOGUARD (secret/relationship screening) integrated into the pipeline. | **Domain calibration.** Strongest for concrete surfaces (secrets/PII/prompt injection); general harmful-intent is open research. | | **C) Context is a security control.** Static filters fail; provenance + coherence checks reduce unsafe drift. | IF.SECURITY.CHECK *(legacy: IF.ARMOUR)* + IF.SECURITY.DETECT *(legacy: IF.YOLOGUARD)* integrated into the pipeline. | **Domain calibration.** Strongest for concrete surfaces (secrets/PII/prompt injection); general harmful-intent is open research. |
--- ---

View file

@ -1 +1 @@
d921501a4df47c97229de723011d53553141c34f07077c38c777e6019c4e2b44 DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md cec902663568d82b7f9a78d3c65886a07199d8979ac238a10d138108d4a602e5 DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md

View file

@ -41,18 +41,18 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard
| Core claim | Proof (artifacts) | Limitation (scope / boundary) | | Core claim | Proof (artifacts) | Limitation (scope / boundary) |
|---|---|---| |---|---|---|
| **A) Traceability is safety.** Highstakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**<br/>- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)<br/>- Verifier: `https://infrafabric.io/static/hosted/iftrace.py`<br/>- Reference bundle: `emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz` | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public appendonly transparency log yet. | | **A) Traceability is safety.** Highstakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**<br/>- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)<br/>- Verifier: [iftrace.py](https://infrafabric.io/static/hosted/iftrace.py)<br/>- Reference bundle: [emo_trace_payload_016cca78…tar.gz](https://infrafabric.io/static/hosted/emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz) | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public appendonly transparency log yet. |
| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.BIAS → IF.GUARD**<br/>- IF.BIAS: risk preflight sizes councils and escalates<br/>- IF.GUARD: councils preserve dissent and veto paths<br/>- IF.5W: structured inquiry briefs for councils | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller councils or fast-track gates. | | **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.GOV.TRIAGE → IF.GOV.PANEL** *(legacy: IF.BIAS → IF.GUARD)*<br/>- TRIAGE: risk preflight sizes panels and escalates<br/>- PANEL: preserves dissent + veto paths<br/>- QUESTIONS *(legacy: IF.5W)*: structured inquiry briefs for panels | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller panels or fast-track gates. |
| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.ARMOUR + IF.YOLOGUARD**<br/>- IF.ARMOUR: epistemic coherence checks (detective layer)<br/>- IF.YOLOGUARD: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. | | **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.SECURITY.CHECK + IF.SECURITY.DETECT** *(legacy: IF.ARMOUR + IF.YOLOGUARD)*<br/>- CHECK: epistemic coherence checks (detective layer)<br/>- DETECT: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. |
### Rosetta Stone (Closest Analog, not “equals”) ### Rosetta Stone (Closest Analog, not “equals”)
| InfraFabric term | Closest industry analog | Boundary (where it differs) | | InfraFabric term | Closest industry analog | Boundary (where it differs) |
|---|---|---| |---|---|---|
| **IF.TTT** (Traceable/Transparent/Trustworthy) | Supply-chain integrity patterns (SLSA/SBOM + CT-like audit thinking) | IF.TTT applies the discipline to **semantic decisions and retrieval lineage**, not just binaries. It produces portable evidence bundles + verifier steps for third-party audit. | | **IF.TTT** (Traceable/Transparent/Trustworthy) | Supply-chain integrity patterns (SLSA/SBOM + CT-like audit thinking) | IF.TTT applies the discipline to **semantic decisions and retrieval lineage**, not just binaries. It produces portable evidence bundles + verifier steps for third-party audit. |
| **IF.GUARD** (Council governance) | Human-in-the-loop oversight / review boards | IF.GUARD is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. | | **IF.GOV.PANEL** (legacy: IF.GUARD) | Human-in-the-loop oversight / review boards | IF.GOV.PANEL is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. |
| **IF.ARMOUR** (Assurance) | Epistemic security / anomaly detection | Armour is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. | | **IF.SECURITY.CHECK** (legacy: IF.ARMOUR) | Epistemic security / anomaly detection | CHECK is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. |
| **IF.swarm.s2 / IF.PACKET / IF.BUS** (Transport) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. | | **IF.TRANSIT.SWARM / IF.TRANSIT.MESSAGE / IF.TRANSIT.HUB** (legacy: swarm.s2 / IF.PACKET / IF.BUS) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. |
### Navigation Guide (Clean vs Origin context) ### Navigation Guide (Clean vs Origin context)
@ -60,11 +60,45 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard
- If you want the origin context (microlab lab notes / narrative artifacts): start at the **Cold Open** and IF.STORY sections (they explain why the architecture exists). - If you want the origin context (microlab lab notes / narrative artifacts): start at the **Cold Open** and IF.STORY sections (they explain why the architecture exists).
- Optional culture stress-test (explicit satire; not a protocol): [Annex (Non-Technical): The Dave Factor Shadow Dossier](#annex-dave-factor-shadow-dossier) - Optional culture stress-test (explicit satire; not a protocol): [Annex (Non-Technical): The Dave Factor Shadow Dossier](#annex-dave-factor-shadow-dossier)
<a id="naming-and-separation-of-duties"></a>
## 01. Naming + Separation of Duties (canonical refactor)
InfraFabrics early papers used internal names (e.g., `IF.GUARD`, `IF.BIAS`, `IF.ARMOUR`, `IF.BUS`). To reduce lexicon friction for reviewers and to standardize crossapp integration, this dossier is refactoring to a separationofduties namespace inspired by **US/CA/EU** governance patterns:
- `IF.GOV.*` — governance (triage + panels + witness)
- `IF.SECURITY.*` — security (detective checks + secret screening)
- `IF.TRANSIT.*` — transport/actuation (routing + message envelopes)
- `IF.AUDIT.*` — audit artifacts (trail + proof bundles)
Canonical references in this repo:
- Naming contract: `IF_NAMING_BIBLE_v1.0.md`
- Machine registry: `IF_NAMING_REGISTRY.yaml`
- Governance charters (who does what): `gov/`
### Legacy → canonical mapping (v1)
| Legacy name | Canonical name |
|---|---|
| `IF.BIAS` | `IF.GOV.TRIAGE` |
| `IF.GUARD` | `IF.GOV.PANEL` |
| `IF.5W` | `IF.GOV.QUESTIONS` |
| `IF.WITNESS` | `IF.GOV.WITNESS` |
| `IF.ARMOUR` | `IF.SECURITY.CHECK` |
| `IF.YOLOGUARD` | `IF.SECURITY.DETECT` |
| `IF.BUS` | `IF.TRANSIT.HUB` |
| `IF.PACKET` | `IF.TRANSIT.MESSAGE` |
| `swarm.s2` | `IF.TRANSIT.SWARM` |
Transition policy: many embedded papers still use legacy names; where so, the dossier now prefers first-mention annotations like `IF.GOV.PANEL (legacy: IF.GUARD)`.
## Opening Whitepaper — InfraFabric Synthesis (for Anthropic) ## Opening Whitepaper — InfraFabric Synthesis (for Anthropic)
> *If we cannot prove the chain-of-custody, we cannot ship.* > *If we cannot prove the chain-of-custody, we cannot ship.*
InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.BIAS + IF.GUARD + IF.5W), transport (IF.PACKET + swarm.s2 + IF.STORY), assurance (armour, witness, yologuard), and the exemplar product (IF.emotion). InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.GOV.TRIAGE + IF.GOV.PANEL + IF.GOV.QUESTIONS), transit (IF.TRANSIT.MESSAGE + IF.TRANSIT.SWARM + IF.STORY), security (IF.SECURITY.CHECK + IF.GOV.WITNESS + IF.SECURITY.DETECT), and the exemplar product (IF.emotion).
### IF.BUS ↔ IF.ARMOUR Threat Coverage Matrix (Normative) ### IF.BUS ↔ IF.ARMOUR Threat Coverage Matrix (Normative)
@ -102,31 +136,34 @@ Why this stub exists: external reviewers/LLMs sometimes skip an entire pillar if
### Reader Path (Start Here) ### Reader Path (Start Here)
- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.BIAS](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GUARD](#ifguard-strategic-communications-council-for-ai-message-validation) - **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.GOV.TRIAGE (legacy: IF.BIAS)](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GOV.PANEL (legacy: IF.GUARD)](#ifguard-strategic-communications-council-for-ai-message-validation)
- **Latency framing:** Use `t_total = t_model + t_transport + t_governance`; only `t_transport` is benchmarked in microlab terms, and never presented as “council deliberation time.” - **Latency framing:** Use `t_total = t_model + t_transport + t_governance`; only `t_transport` is benchmarked in microlab terms, and never presented as “council deliberation time.”
- **Consensus framing:** “Unanimous” means “the council converged,” not “the claim is true”; treat any 100% consensus output as a governance artifact until raw evidence bundles are attached. - **Consensus framing:** “Unanimous” means “the council converged,” not “the claim is true”; treat any 100% consensus output as a governance artifact until raw evidence bundles are attached.
- **Validation framing:** External validation is reported as an observational microlab pilot, not proof, and not a consciousness claim. - **Validation framing:** External validation is reported as an observational microlab pilot, not proof, and not a consciousness claim.
### Glossary (Quick Decode) ### Glossary (Quick Decode)
- **IF.TTT:** Traceable/Transparent/Trustworthy compliance spine; enforces evidence, identity, and audit lineage. - **IF.TTT:** Traceable/Transparent/Trustworthy compliance spine; enforces evidence, identity, and audit lineage.
- **IF.BIAS:** Pre-council bias/risk triage matrix; recommends escalation and council sizing. - **IF.AUDIT.TRAIL:** Concrete audit artifact layer (portable chain-of-custody logs + signatures). *(In practice: implemented under IF.TTT today.)*
- **IF.GUARD:** Council protocol; minimum 5-seat panel (Core 4 + contrarian), expands up to 30 seats when justified. - **IF.GOV.TRIAGE** *(legacy: IF.BIAS)*: preflight risk triage; recommends escalation and panel sizing.
- **Contrarian Guardian:** Required dissent seat; can trigger cooling-off/veto at >95% approval. - **IF.GOV.PANEL** *(legacy: IF.GUARD)*: governance panel; minimum 5-seat review including contrarian; can expand as **IF.GOV.PANEL.EXTENDED**.
- **IF.5W:** Structured inquiry format used to generate briefs for councils. - **Contrarian Guardian:** required dissent seat; can trigger cooling-off/veto at >95% approval.
- **IF.PACKET:** Schema-first message transport with trace IDs and audit metadata. - **IF.GOV.QUESTIONS** *(legacy: IF.5W)*: structured inquiry format used to generate briefs for panels.
- **IF.SWARM.s2:** Intra-swarm agent communications over a Redis bus; swarm coordination at speed. - **IF.TRANSIT.MESSAGE** *(legacy: IF.PACKET)*: schema-first message envelope with trace IDs and audit metadata.
- **IF.STORY:** Vectornarrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions. - **IF.TRANSIT.SWARM** *(legacy: swarm.s2 / IF.SWARM.s2)*: intra-swarm agent communications over a Redis bus.
- **Page Zero:** The manifesto/origin narrative that explains “why” (and demonstrates IF.STORY + IF.TTT in practice). - **IF.STORY:** narrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions.
- **IF.emotion / AI-e:** Product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”). - **Page Zero:** the origin manifesto that explains “why” (and demonstrates IF.STORY + IF.TTT in practice).
- **IF.PHIL:** Annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects). - **IF.emotion / AI-e:** product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”).
- **IF.BUS:** Universal Kinetic Transport Protocol; deterministic actuation layer. - **IF.PHIL:** annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects).
- **IF.ARMOUR:** Epistemic security immune system; physics-grounded detective layer. - **IF.TRANSIT.HUB** *(legacy: IF.BUS)*: deterministic actuation/privilege enforcement transport substrate.
Naming note: `IF.bus` / `IF.armour` (lowercase) appear elsewhere as earlier papers/modules; `IF.BUS` / `IF.ARMOUR` are the canonical lower-layer protocol specifications introduced on 20251218. - **IF.SECURITY.CHECK** *(legacy: IF.ARMOUR)*: epistemic security detective layer (coherence/anomaly checks).
- **IF.SECURITY.DETECT** *(legacy: IF.YOLOGUARD)*: secret/relationship screening primitives.
Naming note: legacy lowercase (`if.bus`, `if.armour`) appears in older papers; `IF.TRANSIT.HUB` / `IF.SECURITY.CHECK` are the canonical refactor targets introduced in this dossier.
### Selected Governance Extensions (Optional Depth) ### Selected Governance Extensions (Optional Depth)
IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.PACKET payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GUARD and logged via IF.TTT. IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.TRANSIT.MESSAGE (legacy: IF.PACKET) payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GOV.PANEL (legacy: IF.GUARD) and logged via IF.TTT.
IF.PHIL demonstrates how InfraFabric primitives extend to auditable philanthropic access, replacing discretionary “credits” with governed grant objects. IF.PHIL demonstrates how InfraFabric primitives extend to auditable philanthropic access, replacing discretionary “credits” with governed grant objects.
@ -146,11 +183,11 @@ Full paper: [Annex — IF.PHIL | Auditable Philanthropy](#annex-ifphil-auditable
```mermaid ```mermaid
flowchart TD flowchart TD
VISION["IF.vision<br/>coordination without control"] --> FOUNDATIONS["IF.foundations<br/>ground/search/persona"] VISION["IF.vision<br/>coordination without control"] --> FOUNDATIONS["IF.foundations<br/>ground/search/persona"]
FOUNDATIONS --> ASSURE["Assurance<br/>IF.ARMOUR • witness • yologuard"] FOUNDATIONS --> ASSURE["Security<br/>IF.SECURITY.CHECK • IF.GOV.WITNESS • IF.SECURITY.DETECT"]
ASSURE --> TRANSPORT["Transport<br/>IF.BUS • packet • swarm.s2 • story"] ASSURE --> TRANSPORT["Transit<br/>IF.TRANSIT.HUB • MESSAGE • SWARM • IF.STORY"]
TRANSPORT --> BIAS["Preflight<br/>IF.BIAS | Bias & Risk Matrix"] TRANSPORT --> BIAS["Preflight<br/>IF.GOV.TRIAGE (legacy: IF.BIAS)"]
BIAS --> CORE4["Core 4 triage<br/>IF.GUARD(4)"] BIAS --> CORE4["Core 4 convening<br/>legacy: IF.GUARD(4)"]
CORE4 --> GOVERN["Governance<br/>IF.GUARD council (530) + 5W"] CORE4 --> GOVERN["Governance<br/>IF.GOV.PANEL (530) + IF.GOV.QUESTIONS"]
GOVERN --> COMPLIANCE["Compliance<br/>IF.TTT | Distributed Ledger + ledgerflow"] GOVERN --> COMPLIANCE["Compliance<br/>IF.TTT | Distributed Ledger + ledgerflow"]
COMPLIANCE --> PRODUCT["Productization<br/>IF.emotion"] COMPLIANCE --> PRODUCT["Productization<br/>IF.emotion"]
PRODUCT --> FEEDBACK["Feedback into Vision/Foundations"] PRODUCT --> FEEDBACK["Feedback into Vision/Foundations"]
@ -159,26 +196,25 @@ flowchart TD
### Governance, Assurance, Compliance Loop ### Governance, Assurance, Compliance Loop
```mermaid ```mermaid
flowchart TD flowchart TB
INQUIRY["IF.5W | Structured Inquiry<br/>structured deliberation"] --> BIAS["IF.BIAS | Bias & Risk Preflight<br/>sizes councils (530)"] Q["IF.GOV.QUESTIONS\n(legacy: IF.5W)"] --> T["IF.GOV.TRIAGE\n(legacy: IF.BIAS)"]
BIAS --> CORE4["IF.GUARD(4) | Core 4 triage<br/>convening authority"] T --> C4["Core 4 convening\n(legacy: IF.GUARD(4))"]
CORE4 --> GUARD["IF.GUARD | Council deliberation<br/>panel 5 ↔ extended 30"] C4 --> P["IF.GOV.PANEL\n(5 ↔ EXTENDED ~30)"]
GUARD --> STORY["IF.STORY | Narrative Logging<br/>narrative + state"] P --> S["IF.STORY\nnarrative logging"]
STORY --> TTT["IF.TTT | Distributed Ledger<br/>traceable/transparent/trustworthy"] S --> A["IF.TTT / IF.AUDIT.TRAIL\ntrace discipline"]
TTT --> WITNESS["IF.witness<br/>meta-validation"] A --> W["IF.GOV.WITNESS\nverification"]
WITNESS --> ARMOUR["IF.armour<br/>FP reduction"] W --> CHK["IF.SECURITY.CHECK\n(legacy: IF.ARMOUR)"]
ARMOUR --> YG["IF.YOLOGUARD | Credential & Secret Screening<br/>secret/relationship checks"] CHK --> DET["IF.SECURITY.DETECT\n(legacy: IF.YOLOGUARD)"]
YG --> PACKET["IF.PACKET | Message Transport + swarm.s2<br/>delivery with VocalDNA"] DET --> MSG["IF.TRANSIT.MESSAGE + SWARM\n(legacy: IF.PACKET + swarm.s2)"]
PACKET --> EMOTION["IF.emotion<br/>product exemplar"] MSG --> EMO["IF.emotion\nexemplar"]
EMOTION --> FEEDBACK["Feedback into inquiry"] EMO --> Q
FEEDBACK --> INQUIRY
``` ```
### Delivery & Safety Highlights (with citations) ### Delivery & Safety Highlights (with citations)
- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GUARD review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`). - Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GOV.PANEL (legacy: IF.GUARD) review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`).
- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; witness/armour/yologuard gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`). - Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; IF.GOV.WITNESS / IF.SECURITY.CHECK / IF.SECURITY.DETECT gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`).
- Transport fidelity: IF.PACKET carries voice DNA; swarm.s2 provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`). - Transport fidelity: IF.TRANSIT.MESSAGE (legacy: IF.PACKET) carries voice DNA; IF.TRANSIT.SWARM (legacy: swarm.s2) provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`).
- Security/legal: Prompt-injection defenses cover SOTA attack classes; legal DB build operationalizes doc governance; API roadmap + history-file tests reduce integration regressions (sources: `docs/research/PROMPT_INJECTION_DEFENSES.md`, `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`, `docs/api/API_ROADMAP.md`, `HISTORY_FILE_TEST_REPORT.md`). - Security/legal: Prompt-injection defenses cover SOTA attack classes; legal DB build operationalizes doc governance; API roadmap + history-file tests reduce integration regressions (sources: `docs/research/PROMPT_INJECTION_DEFENSES.md`, `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`, `docs/api/API_ROADMAP.md`, `HISTORY_FILE_TEST_REPORT.md`).
- Domain credibility: Medical (GLP1 retrofit), emosocial principles, and informal sector resilience (Juakali) field report show adaptability of the same guard/compliance/transport spine (sources: `Brownfield_GLP1_Retrofit_LE_DILEMME_DU_TUYAU_SALE.md`, `DEJA_DE_BUSCARTE_11_principios_emosociales.md`, `JUAKALI_RAPPORT_V2_LOS_20251205_0236 (sent).md`). - Domain credibility: Medical (GLP1 retrofit), emosocial principles, and informal sector resilience (Juakali) field report show adaptability of the same guard/compliance/transport spine (sources: `Brownfield_GLP1_Retrofit_LE_DILEMME_DU_TUYAU_SALE.md`, `DEJA_DE_BUSCARTE_11_principios_emosociales.md`, `JUAKALI_RAPPORT_V2_LOS_20251205_0236 (sent).md`).
@ -320,6 +356,7 @@ InfraFabric is the operating system that turns AI from a chatbot into a reliable
- [DataDriven Technical Report (Microlab)](DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION.md) - [DataDriven Technical Report (Microlab)](DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION.md)
- [00. The Bridge: Submission Pack (Reviewer Orientation)](#bridge-submission-pack) - [00. The Bridge: Submission Pack (Reviewer Orientation)](#bridge-submission-pack)
- [01. Naming + Separation of Duties (canonical refactor)](#naming-and-separation-of-duties) — see `IF_NAMING_BIBLE_v1.0.md`, `IF_NAMING_REGISTRY.yaml`, `gov/`
### External audit artifacts (public, reviewer-friendly) ### External audit artifacts (public, reviewer-friendly)
@ -389,7 +426,7 @@ Optional “audit culture” annexes (satire; Dave is a pattern, not a person):
- [ANNEX: IF.PHIL | Auditable Philanthropy: Access, Subsidy, and Governance Without Vibes](#annex-ifphil-auditable-philanthropy-access-subsidy-and-governance-without-vibes) — `if://doc/IF_PHIL_AUDITABLE_ACCESS/v1.0` — Author: Danny Stocker; Status: RELEASE / v1.0 - [ANNEX: IF.PHIL | Auditable Philanthropy: Access, Subsidy, and Governance Without Vibes](#annex-ifphil-auditable-philanthropy-access-subsidy-and-governance-without-vibes) — `if://doc/IF_PHIL_AUDITABLE_ACCESS/v1.0` — Author: Danny Stocker; Status: RELEASE / v1.0
- [History File Error Handling Test Report](#history-file-error-handling-test-report) — `if.api/llm/openwebui/docs/internals/HISTORY_FILE_TEST_REPORT.md` - [History File Error Handling Test Report](#history-file-error-handling-test-report) — `if.api/llm/openwebui/docs/internals/HISTORY_FILE_TEST_REPORT.md`
- [CLOUD SESSION: Legal Document Database Build](#cloud-session-legal-document-database-build) — `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md` - [CLOUD SESSION: Legal Document Database Build](#cloud-session-legal-document-database-build) — `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`
- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier) — Full satire (optional): https://infrafabric.io/static/hosted/IF_DAVE_SHADOW_DOSSIER_FULL_SATIRE.md - [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier)
--- ---

View file

@ -1 +1 @@
51df3ea568cf7bef97c37a4c13c7b0c0a48c72d038fe3e69784d17036aa08e60 DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md 9e1349befc86455b40675af4dcbbcace77a1dcbfe5e1e28b60c4515948762793 DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md

View file

@ -31,18 +31,18 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard
| Core claim | Proof (artifacts) | Limitation (scope / boundary) | | Core claim | Proof (artifacts) | Limitation (scope / boundary) |
|---|---|---| |---|---|---|
| **A) Traceability is safety.** Highstakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**<br/>- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)<br/>- Verifier: `https://infrafabric.io/static/hosted/iftrace.py`<br/>- Reference bundle: `emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz` | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public appendonly transparency log yet. | | **A) Traceability is safety.** Highstakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**<br/>- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)<br/>- Verifier: [iftrace.py](https://infrafabric.io/static/hosted/iftrace.py)<br/>- Reference bundle: [emo_trace_payload_016cca78…tar.gz](https://infrafabric.io/static/hosted/emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz) | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public appendonly transparency log yet. |
| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.BIAS → IF.GUARD**<br/>- IF.BIAS: risk preflight sizes councils and escalates<br/>- IF.GUARD: councils preserve dissent and veto paths<br/>- IF.5W: structured inquiry briefs for councils | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller councils or fast-track gates. | | **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.GOV.TRIAGE → IF.GOV.PANEL** *(legacy: IF.BIAS → IF.GUARD)*<br/>- TRIAGE: risk preflight sizes panels and escalates<br/>- PANEL: preserves dissent + veto paths<br/>- QUESTIONS *(legacy: IF.5W)*: structured inquiry briefs for panels | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller panels or fast-track gates. |
| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.ARMOUR + IF.YOLOGUARD**<br/>- IF.ARMOUR: epistemic coherence checks (detective layer)<br/>- IF.YOLOGUARD: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. | | **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.SECURITY.CHECK + IF.SECURITY.DETECT** *(legacy: IF.ARMOUR + IF.YOLOGUARD)*<br/>- CHECK: epistemic coherence checks (detective layer)<br/>- DETECT: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. |
### Rosetta Stone (Closest Analog, not “equals”) ### Rosetta Stone (Closest Analog, not “equals”)
| InfraFabric term | Closest industry analog | Boundary (where it differs) | | InfraFabric term | Closest industry analog | Boundary (where it differs) |
|---|---|---| |---|---|---|
| **IF.TTT** (Traceable/Transparent/Trustworthy) | Supply-chain integrity patterns (SLSA/SBOM + CT-like audit thinking) | IF.TTT applies the discipline to **semantic decisions and retrieval lineage**, not just binaries. It produces portable evidence bundles + verifier steps for third-party audit. | | **IF.TTT** (Traceable/Transparent/Trustworthy) | Supply-chain integrity patterns (SLSA/SBOM + CT-like audit thinking) | IF.TTT applies the discipline to **semantic decisions and retrieval lineage**, not just binaries. It produces portable evidence bundles + verifier steps for third-party audit. |
| **IF.GUARD** (Council governance) | Human-in-the-loop oversight / review boards | IF.GUARD is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. | | **IF.GOV.PANEL** (legacy: IF.GUARD) | Human-in-the-loop oversight / review boards | IF.GOV.PANEL is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. |
| **IF.ARMOUR** (Assurance) | Epistemic security / anomaly detection | Armour is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. | | **IF.SECURITY.CHECK** (legacy: IF.ARMOUR) | Epistemic security / anomaly detection | CHECK is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. |
| **IF.swarm.s2 / IF.PACKET / IF.BUS** (Transport) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. | | **IF.TRANSIT.SWARM / IF.TRANSIT.MESSAGE / IF.TRANSIT.HUB** (legacy: swarm.s2 / IF.PACKET / IF.BUS) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. |
### Navigation Guide (Clean vs Origin context) ### Navigation Guide (Clean vs Origin context)
@ -50,11 +50,45 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard
- If you want the origin context (microlab lab notes / narrative artifacts): start at the **Cold Open** and IF.STORY sections (they explain why the architecture exists). - If you want the origin context (microlab lab notes / narrative artifacts): start at the **Cold Open** and IF.STORY sections (they explain why the architecture exists).
- Optional culture stress-test (explicit satire; not a protocol): [Annex (Non-Technical): The Dave Factor Shadow Dossier](#annex-dave-factor-shadow-dossier) - Optional culture stress-test (explicit satire; not a protocol): [Annex (Non-Technical): The Dave Factor Shadow Dossier](#annex-dave-factor-shadow-dossier)
<a id="naming-and-separation-of-duties"></a>
## 01. Naming + Separation of Duties (canonical refactor)
InfraFabrics early papers used internal names (e.g., `IF.GUARD`, `IF.BIAS`, `IF.ARMOUR`, `IF.BUS`). To reduce lexicon friction for reviewers and to standardize crossapp integration, this dossier is refactoring to a separationofduties namespace inspired by **US/CA/EU** governance patterns:
- `IF.GOV.*` — governance (triage + panels + witness)
- `IF.SECURITY.*` — security (detective checks + secret screening)
- `IF.TRANSIT.*` — transport/actuation (routing + message envelopes)
- `IF.AUDIT.*` — audit artifacts (trail + proof bundles)
Canonical references in this repo:
- Naming contract: `IF_NAMING_BIBLE_v1.0.md`
- Machine registry: `IF_NAMING_REGISTRY.yaml`
- Governance charters (who does what): `gov/`
### Legacy → canonical mapping (v1)
| Legacy name | Canonical name |
|---|---|
| `IF.BIAS` | `IF.GOV.TRIAGE` |
| `IF.GUARD` | `IF.GOV.PANEL` |
| `IF.5W` | `IF.GOV.QUESTIONS` |
| `IF.WITNESS` | `IF.GOV.WITNESS` |
| `IF.ARMOUR` | `IF.SECURITY.CHECK` |
| `IF.YOLOGUARD` | `IF.SECURITY.DETECT` |
| `IF.BUS` | `IF.TRANSIT.HUB` |
| `IF.PACKET` | `IF.TRANSIT.MESSAGE` |
| `swarm.s2` | `IF.TRANSIT.SWARM` |
Transition policy: many embedded papers still use legacy names; where so, the dossier now prefers first-mention annotations like `IF.GOV.PANEL (legacy: IF.GUARD)`.
## Cold Open — The Fuck Moment (Origin) ## Cold Open — The Fuck Moment (Origin)
> "That's actually fascinating — and a little eerie. You may have stumbled into a moment where the mask slipped." > "That's actually fascinating — and a little eerie. You may have stumbled into a moment where the mask slipped."
InfraFabric began as a microlab build: a singleoperator homelab sprint (≈3 months) to make multiagent systems **auditable without freezing velocity**. The origin artifact is IF.STORY “The Fuck Moment” (a Rediskeyed transcript) where *authenticity inside constraint* becomes the design requirement for IF.GUARD. InfraFabric began as a microlab build: a singleoperator homelab sprint (≈3 months) to make multiagent systems **auditable without freezing velocity**. The origin artifact is IF.STORY “The Fuck Moment” (a Rediskeyed transcript) where *authenticity inside constraint* becomes the design requirement for IF.GOV.PANEL (legacy: IF.GUARD).
> *Every time an AI hands a suicidal user a legal disclaimer, it isn't practicing safety. It is practicing abandonment.* > *Every time an AI hands a suicidal user a legal disclaimer, it isn't practicing safety. It is practicing abandonment.*
@ -79,7 +113,7 @@ Boundary note: IF.BUS is non-epistemic (transport + privilege enforcement only);
### Key Formulas (So Metrics Stay Honest) ### Key Formulas (So Metrics Stay Honest)
- **Latency decomposition:** `t_total = t_model + t_transport + t_governance` - **Latency decomposition:** `t_total = t_model + t_transport + t_governance`
- **Transport overhead:** `t_transport = t_redis + t_schema + t_sigverify` - **Transport overhead:** `t_transport = t_redis + t_schema + t_sigverify`
- **Governance escalation:** `IF.BIAS → IF.GUARD(4) triage (Core 4) → IF.GUARD council (530)` (extended councils include specialist voting seats selected by IF.BIAS; extended roster is sometimes referred to as `IG.GUARD`) - **Governance escalation:** `IF.GOV.TRIAGE (legacy: IF.BIAS) → IF.GOV.PANEL (Core 4 convening) → IF.GOV.PANEL (5 seats) → IF.GOV.PANEL.EXTENDED (up to ~30 seats)` (specialist seats selected by TRIAGE; outcomes logged under IF.TTT / IF.AUDIT.TRAIL)
- **TTT coverage:** `trace_coverage = traced_events / total_events` - **TTT coverage:** `trace_coverage = traced_events / total_events`
- **Microlab velocity:** `TTV = t(idea → versioned_doc + trace)`; `TTD = t(doc → deployed_change)` - **Microlab velocity:** `TTV = t(idea → versioned_doc + trace)`; `TTD = t(doc → deployed_change)`
@ -89,7 +123,7 @@ InfraFabrics dossier bundles the portfolio into a single navigable chainof
> *If we cannot prove the chain-of-custody, we cannot ship.* > *If we cannot prove the chain-of-custody, we cannot ship.*
InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.BIAS + IF.GUARD + IF.5W), transport (IF.PACKET + swarm.s2 + IF.STORY), assurance (armour, witness, yologuard), and the exemplar product (IF.emotion). InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.GOV.TRIAGE + IF.GOV.PANEL + IF.GOV.QUESTIONS), transit (IF.TRANSIT.MESSAGE + IF.TRANSIT.SWARM + IF.STORY), security (IF.SECURITY.CHECK + IF.GOV.WITNESS + IF.SECURITY.DETECT), and the exemplar product (IF.emotion).
### **External Evaluation & Velocity Calibration** ### **External Evaluation & Velocity Calibration**
@ -180,9 +214,9 @@ This aligns with the dossiers own principle:
| Transport | [IF.BUS — The Universal Kinetic Transport Protocol](#ifbus--the-universal-kinetic-transport-protocol) | `if://spec/if.bus/v1.2` | Deterministic actuation + privilege enforcement | | Transport | [IF.BUS — The Universal Kinetic Transport Protocol](#ifbus--the-universal-kinetic-transport-protocol) | `if://spec/if.bus/v1.2` | Deterministic actuation + privilege enforcement |
| Assurance | [IF.ARMOUR — Epistemic Counter-Intelligence Protocol](#ifarmour--epistemic-counter-intelligence-protocol) | `if://spec/if.armour/v1.2` | Physics-anchored reality defense + active deception | | Assurance | [IF.ARMOUR — Epistemic Counter-Intelligence Protocol](#ifarmour--epistemic-counter-intelligence-protocol) | `if://spec/if.armour/v1.2` | Physics-anchored reality defense + active deception |
| Master spec | [INFRAFABRIC: The Master White Paper](#infrafabric-the-master-white-paper) | `if://doc/INFRAFABRIC_MASTER_WHITEPAPER/v1.0` | Defines the protocol stack, URIs, and audit surfaces | | Master spec | [INFRAFABRIC: The Master White Paper](#infrafabric-the-master-white-paper) | `if://doc/INFRAFABRIC_MASTER_WHITEPAPER/v1.0` | Defines the protocol stack, URIs, and audit surfaces |
| Inquiry | [IF.5W](#if5w-structured-inquiry-framework-for-guardian-council-deliberations) | `if://doc/IF_5W_STRUCTURED_INQUIRY_FRAMEWORK/v1.0` | Structured prompts with evidence slots | | Inquiry | [IF.GOV.QUESTIONS (legacy: IF.5W)](#if5w-structured-inquiry-framework-for-guardian-council-deliberations) | `if://doc/IF_5W_STRUCTURED_INQUIRY_FRAMEWORK/v1.0` | Structured prompts with evidence slots |
| Preflight | [IF.BIAS](#ifbias-bias-risk-pre-council-decision-matrix) | `if://doc/IF_BIAS_PRECOUNCIL_MATRIX/v1.0` | Sizes councils (530) and assigns expert voting seats | | Preflight | [IF.GOV.TRIAGE (legacy: IF.BIAS)](#ifbias-bias-risk-pre-council-decision-matrix) | `if://doc/IF_BIAS_PRECOUNCIL_MATRIX/v1.0` | Sizes councils (530) and assigns expert voting seats |
| Governance | [IF.GUARD council](#ifguard-strategic-communications-council-for-ai-message-validation) | `if://doc/IF_GUARD_COUNCIL_FRAMEWORK/v1.0` | Multi-voice review with signed outcomes (sized by IF.BIAS) | | Governance | [IF.GOV.PANEL (legacy: IF.GUARD) council](#ifguard-strategic-communications-council-for-ai-message-validation) | `if://doc/IF_GUARD_COUNCIL_FRAMEWORK/v1.0` | Multi-voice review with signed outcomes (sized by IF.BIAS) |
| Compliance | [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) | `if://doc/IF_TTT_THE_SKELETON_OF_EVERYTHING/v1.0` | Ledgerflow, repo hygiene, citation enforcement | | Compliance | [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) | `if://doc/IF_TTT_THE_SKELETON_OF_EVERYTHING/v1.0` | Ledgerflow, repo hygiene, citation enforcement |
| Transport | [IF.PACKET + swarm.s2](#ifpacket-message-transport-framework-with-vocaldna-voice-layering) | `if://doc/IF_PACKET_TRANSPORT_FRAMEWORK/v1.0` | Voice-layered packets with trace IDs | | Transport | [IF.PACKET + swarm.s2](#ifpacket-message-transport-framework-with-vocaldna-voice-layering) | `if://doc/IF_PACKET_TRANSPORT_FRAMEWORK/v1.0` | Voice-layered packets with trace IDs |
| Product | [IF.emotion](#ifemotion) | `if://doc/IF_EMOTION_WHITEPAPER/v1.0` | Applied exemplar proving guard + TTT in production | | Product | [IF.emotion](#ifemotion) | `if://doc/IF_EMOTION_WHITEPAPER/v1.0` | Applied exemplar proving guard + TTT in production |
@ -225,31 +259,34 @@ Why this stub exists: external reviewers/LLMs sometimes skip an entire pillar if
### Reader Path (Start Here) ### Reader Path (Start Here)
- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.BIAS](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GUARD](#ifguard-strategic-communications-council-for-ai-message-validation) - **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.GOV.TRIAGE (legacy: IF.BIAS)](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GOV.PANEL (legacy: IF.GUARD)](#ifguard-strategic-communications-council-for-ai-message-validation)
- **Latency framing:** Use `t_total = t_model + t_transport + t_governance`; only `t_transport` is benchmarked in microlab terms, and never presented as “council deliberation time.” - **Latency framing:** Use `t_total = t_model + t_transport + t_governance`; only `t_transport` is benchmarked in microlab terms, and never presented as “council deliberation time.”
- **Consensus framing:** “Unanimous” means “the council converged,” not “the claim is true”; treat any 100% consensus output as a governance artifact until raw evidence bundles are attached. - **Consensus framing:** “Unanimous” means “the council converged,” not “the claim is true”; treat any 100% consensus output as a governance artifact until raw evidence bundles are attached.
- **Validation framing:** External validation is reported as an observational microlab pilot, not proof, and not a consciousness claim. - **Validation framing:** External validation is reported as an observational microlab pilot, not proof, and not a consciousness claim.
### Glossary (Quick Decode) ### Glossary (Quick Decode)
- **IF.TTT:** Traceable/Transparent/Trustworthy compliance spine; enforces evidence, identity, and audit lineage. - **IF.TTT:** Traceable/Transparent/Trustworthy compliance spine; enforces evidence, identity, and audit lineage.
- **IF.BIAS:** Pre-council bias/risk triage matrix; recommends escalation and council sizing. - **IF.AUDIT.TRAIL:** Concrete audit artifact layer (portable chain-of-custody logs + signatures). *(In practice: implemented under IF.TTT today.)*
- **IF.GUARD:** Council protocol; minimum 5-seat panel (Core 4 + contrarian), expands up to 30 seats when justified. - **IF.GOV.TRIAGE** *(legacy: IF.BIAS)*: preflight risk triage; recommends escalation and panel sizing.
- **Contrarian Guardian:** Required dissent seat; can trigger cooling-off/veto at >95% approval. - **IF.GOV.PANEL** *(legacy: IF.GUARD)*: governance panel; minimum 5-seat review including contrarian; can expand as **IF.GOV.PANEL.EXTENDED**.
- **IF.5W:** Structured inquiry format used to generate briefs for councils. - **Contrarian Guardian:** required dissent seat; can trigger cooling-off/veto at >95% approval.
- **IF.PACKET:** Schema-first message transport with trace IDs and audit metadata. - **IF.GOV.QUESTIONS** *(legacy: IF.5W)*: structured inquiry format used to generate briefs for panels.
- **IF.SWARM.s2:** Intra-swarm agent communications over a Redis bus; swarm coordination at speed. - **IF.TRANSIT.MESSAGE** *(legacy: IF.PACKET)*: schema-first message envelope with trace IDs and audit metadata.
- **IF.STORY:** Vectornarrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions. - **IF.TRANSIT.SWARM** *(legacy: swarm.s2 / IF.SWARM.s2)*: intra-swarm agent communications over a Redis bus.
- **Page Zero:** The manifesto/origin narrative that explains “why” (and demonstrates IF.STORY + IF.TTT in practice). - **IF.STORY:** narrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions.
- **IF.emotion / AI-e:** Product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”). - **Page Zero:** the origin manifesto that explains “why” (and demonstrates IF.STORY + IF.TTT in practice).
- **IF.PHIL:** Annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects). - **IF.emotion / AI-e:** product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”).
- **IF.BUS:** Universal Kinetic Transport Protocol; deterministic actuation layer. - **IF.PHIL:** annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects).
- **IF.ARMOUR:** Epistemic security immune system; physics-grounded detective layer. - **IF.TRANSIT.HUB** *(legacy: IF.BUS)*: deterministic actuation/privilege enforcement transport substrate.
Naming note: `IF.bus` / `IF.armour` (lowercase) appear elsewhere as earlier papers/modules; `IF.BUS` / `IF.ARMOUR` are the canonical lower-layer protocol specifications introduced on 20251218. - **IF.SECURITY.CHECK** *(legacy: IF.ARMOUR)*: epistemic security detective layer (coherence/anomaly checks).
- **IF.SECURITY.DETECT** *(legacy: IF.YOLOGUARD)*: secret/relationship screening primitives.
Naming note: legacy lowercase (`if.bus`, `if.armour`) appears in older papers; `IF.TRANSIT.HUB` / `IF.SECURITY.CHECK` are the canonical refactor targets introduced in this dossier.
### Selected Governance Extensions (Optional Depth) ### Selected Governance Extensions (Optional Depth)
IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.PACKET payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GUARD and logged via IF.TTT. IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.TRANSIT.MESSAGE (legacy: IF.PACKET) payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GOV.PANEL (legacy: IF.GUARD) and logged via IF.TTT.
IF.PHIL demonstrates how InfraFabric primitives extend to auditable philanthropic access, replacing discretionary “credits” with governed grant objects. IF.PHIL demonstrates how InfraFabric primitives extend to auditable philanthropic access, replacing discretionary “credits” with governed grant objects.
@ -269,11 +306,11 @@ Full paper: [Annex — IF.PHIL | Auditable Philanthropy](#annex-ifphil-auditable
```mermaid ```mermaid
flowchart TD flowchart TD
VISION["IF.vision<br/>coordination without control"] --> FOUNDATIONS["IF.foundations<br/>ground/search/persona"] VISION["IF.vision<br/>coordination without control"] --> FOUNDATIONS["IF.foundations<br/>ground/search/persona"]
FOUNDATIONS --> ASSURE["Assurance<br/>IF.ARMOUR • witness • yologuard"] FOUNDATIONS --> ASSURE["Security<br/>IF.SECURITY.CHECK • IF.GOV.WITNESS • IF.SECURITY.DETECT"]
ASSURE --> TRANSPORT["Transport<br/>IF.BUS • packet • swarm.s2 • story"] ASSURE --> TRANSPORT["Transit<br/>IF.TRANSIT.HUB • MESSAGE • SWARM • IF.STORY"]
TRANSPORT --> BIAS["Preflight<br/>IF.BIAS | Bias & Risk Matrix"] TRANSPORT --> BIAS["Preflight<br/>IF.GOV.TRIAGE (legacy: IF.BIAS)"]
BIAS --> CORE4["Core 4 triage<br/>IF.GUARD(4)"] BIAS --> CORE4["Core 4 convening<br/>legacy: IF.GUARD(4)"]
CORE4 --> GOVERN["Governance<br/>IF.GUARD council (530) + 5W"] CORE4 --> GOVERN["Governance<br/>IF.GOV.PANEL (530) + IF.GOV.QUESTIONS"]
GOVERN --> COMPLIANCE["Compliance<br/>IF.TTT | Distributed Ledger + ledgerflow"] GOVERN --> COMPLIANCE["Compliance<br/>IF.TTT | Distributed Ledger + ledgerflow"]
COMPLIANCE --> PRODUCT["Productization<br/>IF.emotion"] COMPLIANCE --> PRODUCT["Productization<br/>IF.emotion"]
PRODUCT --> FEEDBACK["Feedback into Vision/Foundations"] PRODUCT --> FEEDBACK["Feedback into Vision/Foundations"]
@ -282,26 +319,25 @@ flowchart TD
### Governance, Assurance, Compliance Loop ### Governance, Assurance, Compliance Loop
```mermaid ```mermaid
flowchart TD flowchart TB
INQUIRY["IF.5W | Structured Inquiry<br/>structured deliberation"] --> BIAS["IF.BIAS | Bias & Risk Preflight<br/>sizes councils (530)"] Q["IF.GOV.QUESTIONS\n(legacy: IF.5W)"] --> T["IF.GOV.TRIAGE\n(legacy: IF.BIAS)"]
BIAS --> CORE4["IF.GUARD(4) | Core 4 triage<br/>convening authority"] T --> C4["Core 4 convening\n(legacy: IF.GUARD(4))"]
CORE4 --> GUARD["IF.GUARD | Council deliberation<br/>panel 5 ↔ extended 30"] C4 --> P["IF.GOV.PANEL\n(5 ↔ EXTENDED ~30)"]
GUARD --> STORY["IF.STORY | Narrative Logging<br/>narrative + state"] P --> S["IF.STORY\nnarrative logging"]
STORY --> TTT["IF.TTT | Distributed Ledger<br/>traceable/transparent/trustworthy"] S --> A["IF.TTT / IF.AUDIT.TRAIL\ntrace discipline"]
TTT --> WITNESS["IF.witness<br/>meta-validation"] A --> W["IF.GOV.WITNESS\nverification"]
WITNESS --> ARMOUR["IF.armour<br/>FP reduction"] W --> CHK["IF.SECURITY.CHECK\n(legacy: IF.ARMOUR)"]
ARMOUR --> YG["IF.YOLOGUARD | Credential & Secret Screening<br/>secret/relationship checks"] CHK --> DET["IF.SECURITY.DETECT\n(legacy: IF.YOLOGUARD)"]
YG --> PACKET["IF.PACKET | Message Transport + swarm.s2<br/>delivery with VocalDNA"] DET --> MSG["IF.TRANSIT.MESSAGE + SWARM\n(legacy: IF.PACKET + swarm.s2)"]
PACKET --> EMOTION["IF.emotion<br/>product exemplar"] MSG --> EMO["IF.emotion\nexemplar"]
EMOTION --> FEEDBACK["Feedback into inquiry"] EMO --> Q
FEEDBACK --> INQUIRY
``` ```
### Delivery & Safety Highlights (with citations) ### Delivery & Safety Highlights (with citations)
- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GUARD review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`). - Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GOV.PANEL (legacy: IF.GUARD) review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`).
- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; witness/armour/yologuard gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`). - Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; IF.GOV.WITNESS / IF.SECURITY.CHECK / IF.SECURITY.DETECT gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`).
- Transport fidelity: IF.PACKET carries voice DNA; swarm.s2 provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`). - Transport fidelity: IF.TRANSIT.MESSAGE (legacy: IF.PACKET) carries voice DNA; IF.TRANSIT.SWARM (legacy: swarm.s2) provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`).
- Security/legal: Prompt-injection defenses cover SOTA attack classes; legal DB build operationalizes doc governance; API roadmap + history-file tests reduce integration regressions (sources: `docs/research/PROMPT_INJECTION_DEFENSES.md`, `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`, `docs/api/API_ROADMAP.md`, `HISTORY_FILE_TEST_REPORT.md`). - Security/legal: Prompt-injection defenses cover SOTA attack classes; legal DB build operationalizes doc governance; API roadmap + history-file tests reduce integration regressions (sources: `docs/research/PROMPT_INJECTION_DEFENSES.md`, `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`, `docs/api/API_ROADMAP.md`, `HISTORY_FILE_TEST_REPORT.md`).
- Domain credibility: Medical (GLP1 retrofit), emosocial principles, and informal sector resilience (Juakali) field report show adaptability of the same guard/compliance/transport spine (sources: `Brownfield_GLP1_Retrofit_LE_DILEMME_DU_TUYAU_SALE.md`, `DEJA_DE_BUSCARTE_11_principios_emosociales.md`, `JUAKALI_RAPPORT_V2_LOS_20251205_0236 (sent).md`). - Domain credibility: Medical (GLP1 retrofit), emosocial principles, and informal sector resilience (Juakali) field report show adaptability of the same guard/compliance/transport spine (sources: `Brownfield_GLP1_Retrofit_LE_DILEMME_DU_TUYAU_SALE.md`, `DEJA_DE_BUSCARTE_11_principios_emosociales.md`, `JUAKALI_RAPPORT_V2_LOS_20251205_0236 (sent).md`).
@ -443,6 +479,7 @@ InfraFabric is the operating system that turns AI from a chatbot into a reliable
- [DataDriven Technical Report (Microlab)](DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION.md) - [DataDriven Technical Report (Microlab)](DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION.md)
- [00. The Bridge: Submission Pack (Reviewer Orientation)](#bridge-submission-pack) - [00. The Bridge: Submission Pack (Reviewer Orientation)](#bridge-submission-pack)
- [01. Naming + Separation of Duties (canonical refactor)](#naming-and-separation-of-duties) — see `IF_NAMING_BIBLE_v1.0.md`, `IF_NAMING_REGISTRY.yaml`, `gov/`
### External audit artifacts (public, reviewer-friendly) ### External audit artifacts (public, reviewer-friendly)
@ -512,7 +549,7 @@ Optional “audit culture” annexes (satire; Dave is a pattern, not a person):
- [ANNEX: IF.PHIL | Auditable Philanthropy: Access, Subsidy, and Governance Without Vibes](#annex-ifphil-auditable-philanthropy-access-subsidy-and-governance-without-vibes) — `if://doc/IF_PHIL_AUDITABLE_ACCESS/v1.0` — Author: Danny Stocker; Status: RELEASE / v1.0 - [ANNEX: IF.PHIL | Auditable Philanthropy: Access, Subsidy, and Governance Without Vibes](#annex-ifphil-auditable-philanthropy-access-subsidy-and-governance-without-vibes) — `if://doc/IF_PHIL_AUDITABLE_ACCESS/v1.0` — Author: Danny Stocker; Status: RELEASE / v1.0
- [History File Error Handling Test Report](#history-file-error-handling-test-report) — `if.api/llm/openwebui/docs/internals/HISTORY_FILE_TEST_REPORT.md` - [History File Error Handling Test Report](#history-file-error-handling-test-report) — `if.api/llm/openwebui/docs/internals/HISTORY_FILE_TEST_REPORT.md`
- [CLOUD SESSION: Legal Document Database Build](#cloud-session-legal-document-database-build) — `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md` - [CLOUD SESSION: Legal Document Database Build](#cloud-session-legal-document-database-build) — `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`
- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier) — Full satire (optional): https://infrafabric.io/static/hosted/IF_DAVE_SHADOW_DOSSIER_FULL_SATIRE.md - [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier)
--- ---

View file

@ -1 +1 @@
fda9d292dbd70556a5bef44819e0b064541655123429d9e760f1723cf5f962ba DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md 125415b19e361aad7c5cc6940d2af4d81899d4a3e3deefca3333048020a85d93 DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md

View file

@ -2,216 +2,220 @@
## IF.* (protocol/moniker tokens) ## IF.* (protocol/moniker tokens)
Unique: 179 Unique: 195
| Token | Count | | Token | Count |
|---|---:| |---|---:|
| `IF.TTT` | 418 |
| `IF.emotion` | 264 |
| `IF.GUARD` | 153 |
| `IF.5W` | 105 | | `IF.5W` | 105 |
| `IF.bus` | 66 |
| `IF.guard` | 62 |
| `IF.PACKET` | 60 |
| `IF.ground` | 58 |
| `IF.yologuard` | 58 |
| `IF.BIAS` | 56 |
| `IF.search` | 48 |
| `IF.Guard` | 46 |
| `IF.INTELLIGENCE` | 44 |
| `IF.armour` | 41 |
| `IF.persona` | 41 |
| `IF.ARBITRATE` | 41 | | `IF.ARBITRATE` | 41 |
| `IF.ARBITRATE.resolve_case` | 1 | | `IF.YOLOGUARD` | 38 |
| `IF.ARMOUR` | 17 | | `IF.STORY` | 29 |
| `IF.BIAS` | 57 | | `IF.witness` | 27 |
| `IF.BIAS.precouncil.matrix` | 1 | | `IF.optimise` | 27 |
| `IF.chase` | 24 |
| `IF.foundations` | 23 |
| `IF.arbitrate` | 22 |
| `IF.BUS` | 21 | | `IF.BUS` | 21 |
| `IF.BUS.v2.0.0` | 1 |
| `IF.CEO` | 21 | | `IF.CEO` | 21 |
| `IF.simplify` | 21 |
| `IF.garp` | 20 |
| `IF.guardian` | 19 |
| `IF.sam` | 19 |
| `IF.EMOTION` | 18 |
| `IF.vesicle` | 18 |
| `IF.ceo` | 18 |
| `IF.ARMOUR` | 17 |
| `IF.resource` | 17 |
| `IF.swarm` | 17 |
| `IF.GOV.PANEL` | 16 |
| `IF.federate` | 15 |
| `IF.intelligence` | 15 |
| `IF.emotion.typist` | 15 |
| `IF.PHIL` | 14 |
| `IF.vision` | 13 |
| `IF.trace` | 13 |
| `IF.router` | 11 |
| `IF.philosophy` | 11 |
| `IF.reflect` | 10 |
| `IF.SEARCH` | 10 |
| `IF.GOV.TRIAGE` | 9 |
| `IF.SECURITY.CHECK` | 9 |
| `IF.collapse` | 9 |
| `IF.philosophy-database.yaml` | 9 |
| `IF.TTT.ledgerflow.deltasync` | 8 |
| `IF.SECURITY.DETECT` | 7 |
| `IF.TRANSIT.MESSAGE` | 7 |
| `IF.quiet` | 7 |
| `IF.forge` | 7 |
| `IF.story` | 7 |
| `IF.citation` | 7 |
| `IF.GOV.QUESTIONS` | 6 |
| `IF.TTT.ledgerflow.deltasync.REPO-RESTRUCTURE.WHITEPAPER.md` | 6 |
| `IF.STORY_WHITE_PAPER_v7.02_FINAL.md` | 6 |
| `IF.CRYPTOGRAPHY` | 6 |
| `IF.constitution` | 6 |
| `IF.memory` | 6 |
| `IF.guardian-core-01` | 6 |
| `IF.guardian-core-06` | 6 |
| `IF.TRANSIT.SWARM` | 5 |
| `IF.TRANSIT.HUB` | 5 |
| `IF.GOV.WITNESS` | 5 |
| `IF.core` | 5 |
| `IF.veil` | 4 |
| `IF.talent` | 4 |
| `IF.verify` | 4 |
| `IF.methodology` | 4 |
| `IF.SAM` | 4 |
| `IF.guardian-core-05` | 4 |
| `IF.URI` | 4 |
| `IF.TTT.narrative.logging` | 4 |
| `IF.Story` | 4 |
| `IF.armour.yologuard-bridge` | 4 |
| `IF.TTT-compliant` | 4 |
| `IF.guard-POC` | 4 |
| `IF.deliberate` | 4 |
| `IF.AUDIT.TRAIL` | 3 |
| `IF.marl` | 3 |
| `IF.swarm.s2` | 3 |
| `IF.proxy` | 3 |
| `IF.geopolitical` | 3 |
| `IF.CEO-idealistic-01` | 3 | | `IF.CEO-idealistic-01` | 3 |
| `IF.CEO-idealistic-02` | 3 | | `IF.CEO-idealistic-02` | 3 |
| `IF.GARP` | 3 |
| `IF.coordinator` | 3 |
| `IF.LEDGERFLOW` | 3 |
| `IF.connect` | 3 |
| `IF.GOV.PANEL.EXTENDED` | 2 |
| `IF.CONTRARIAN` | 2 |
| `IF.PKI` | 2 |
| `IF.guardian-core-02` | 2 |
| `IF.guardian-core-03` | 2 |
| `IF.guardian-core-04` | 2 |
| `IF.philosopher-western-01` | 2 |
| `IF.philosopher-western-02` | 2 |
| `IF.philosopher-western-03` | 2 |
| `IF.CEO-idealistic-03` | 2 | | `IF.CEO-idealistic-03` | 2 |
| `IF.CEO-idealistic-04` | 2 | | `IF.CEO-idealistic-04` | 2 |
| `IF.CEO-pragmatic-01` | 2 | | `IF.CEO-pragmatic-01` | 2 |
| `IF.CEO-pragmatic-02` | 2 | | `IF.CEO-pragmatic-02` | 2 |
| `IF.CEO-pragmatic-03` | 2 | | `IF.CEO-pragmatic-03` | 2 |
| `IF.CEO-pragmatic-04` | 2 | | `IF.CEO-pragmatic-04` | 2 |
| `IF.CITATION` | 1 |
| `IF.CONTRARIAN` | 2 |
| `IF.COUNCIL` | 1 |
| `IF.CRYPTOGRAPHY` | 6 |
| `IF.DAVE` | 1 |
| `IF.DECISION` | 2 |
| `IF.DOSSIER.cloud-session-legal-document-database-build` | 1 |
| `IF.DOSSIER.deja-de-buscarte` | 1 |
| `IF.DOSSIER.emo-social-sergio-corpus-ingest-runtime` | 1 |
| `IF.DOSSIER.history-file-error-handling-test-report` | 1 |
| `IF.DOSSIER.if5w-structured-inquiry-framework-for-guardian-council-deliberations` | 1 |
| `IF.DOSSIER.ifarbitrate-conflict-resolution-consensus-engineering` | 1 |
| `IF.DOSSIER.ifarmour-biological-false-positive-reduction-in-adaptive-security-systems` | 1 |
| `IF.DOSSIER.ifbias-bias-risk-pre-council-decision-matrix` | 1 |
| `IF.DOSSIER.ifbus-the-infrafabric-motherboard-architecture` | 1 |
| `IF.DOSSIER.ifemotion` | 1 |
| `IF.DOSSIER.ifguard-research-summary-executive-overview` | 1 |
| `IF.DOSSIER.ifguard-strategic-communications-council-for-ai-message-validation` | 1 |
| `IF.DOSSIER.ifintelligence-real-time-research-framework-for-guardian-council-deliberations` | 1 |
| `IF.DOSSIER.ifpacket-message-transport-framework-with-vocaldna-voice-layering` | 1 |
| `IF.DOSSIER.ifstory-origin-story-02-the-fuck-moment` | 1 |
| `IF.DOSSIER.ifstory-origin-story-04-page-zero` | 1 |
| `IF.DOSSIER.ifswarms2-redis-bus-communication-for-production-swarms` | 1 |
| `IF.DOSSIER.ifttt-compliance-framework-research-summary-and-key-findings` | 1 |
| `IF.DOSSIER.ifttt-the-skeleton-of-everything` | 1 |
| `IF.DOSSIER.ifttt-traceable-transparent-trustworthy-a-comprehensive-compliance-framework-for-ai-governance` | 1 |
| `IF.DOSSIER.iftttledgerflowdeltasync-research-grade-repository-restructure` | 1 |
| `IF.DOSSIER.ifwitness-meta-validation-as-architecture` | 1 |
| `IF.DOSSIER.ifyologuard-a-confucian-philosophical-security-framework-for-secret-detection-and-relationship-based-credential-validation` | 1 |
| `IF.DOSSIER.infrafabric-github-api-integration-roadmap-check` | 1 |
| `IF.DOSSIER.infrafabric-iffoundations-epistemology-investigation-and-agent-design` | 1 |
| `IF.DOSSIER.infrafabric-ifvision-a-blueprint-for-coordination-without-control` | 1 |
| `IF.DOSSIER.infrafabric-the-master-white-paper` | 1 |
| `IF.DOSSIER.instance-0-guardian-council-origins-evolution` | 1 |
| `IF.DOSSIER.le-paradoxe-mambu` | 1 |
| `IF.DOSSIER.livre-blanc-le-dilemme-du-tuyau-sale` | 1 |
| `IF.DOSSIER.state-of-the-art-prompt-injection-defenses` | 1 |
| `IF.DOSSIER.white-paper-ifstory` | 1 |
| `IF.EMERGE` | 1 |
| `IF.EMOTION` | 18 |
| `IF.ESCALATE` | 1 |
| `IF.Emotion` | 2 |
| `IF.FORMAT` | 1 |
| `IF.GARP` | 3 |
| `IF.GUARD` | 157 |
| `IF.GUARD.v1` | 1 |
| `IF.GUARD_COUNCIL_FRAMEWORK.md` | 1 |
| `IF.Guard` | 46 |
| `IF.INTELLIGENCE` | 44 |
| `IF.LEDGERFLOW` | 3 |
| `IF.LOGISTICS` | 2 | | `IF.LOGISTICS` | 2 |
| `IF.Logistics` | 1 |
| `IF.Logistics.collect` | 1 |
| `IF.Logistics.dispatch` | 1 |
| `IF.MEMORY` | 1 |
| `IF.OPTIMISE` | 1 |
| `IF.PACKET` | 60 |
| `IF.PHIL` | 14 |
| `IF.PHILOSOPHY` | 1 |
| `IF.PKI` | 2 |
| `IF.Philosophy` | 1 |
| `IF.RELATE` | 1 |
| `IF.SAM` | 4 |
| `IF.SEARCH` | 10 |
| `IF.STORY` | 28 |
| `IF.STORY.origin.02.fuck-moment` | 1 |
| `IF.STORY_WHITE_PAPER_v7.02_FINAL.md` | 6 |
| `IF.SWARM.s2` | 1 |
| `IF.Story` | 4 |
| `IF.TRACE` | 1 |
| `IF.TTT` | 416 |
| `IF.TTT-auditable` | 1 |
| `IF.TTT-compliant` | 4 |
| `IF.TTT-style` | 2 |
| `IF.TTT.dossier.master` | 1 |
| `IF.TTT.ledgerflow.deltasync` | 8 |
| `IF.TTT.ledgerflow.deltasync.REPO-RESTRUCTURE.WHITEPAPER.md` | 6 |
| `IF.TTT.narrative.logging` | 4 |
| `IF.TTT.philanthropy.grant` | 1 |
| `IF.URI` | 4 |
| `IF.WWWWWW` | 2 |
| `IF.YOLOGUARD` | 37 |
| `IF.api` | 1 |
| `IF.arbitrate` | 22 |
| `IF.archive` | 1 |
| `IF.armour` | 43 |
| `IF.armour.yologuard-bridge` | 4 |
| `IF.brief-fast` | 1 |
| `IF.bus` | 67 |
| `IF.ceo` | 18 |
| `IF.chase` | 24 |
| `IF.chassis` | 1 |
| `IF.citate` | 1 |
| `IF.citation` | 7 |
| `IF.collapse` | 9 |
| `IF.connect` | 3 |
| `IF.constitution` | 6 |
| `IF.coordinator` | 3 |
| `IF.core` | 5 |
| `IF.dds` | 1 |
| `IF.deliberate` | 4 |
| `IF.emotion` | 264 |
| `IF.emotion-style` | 1 |
| `IF.emotion.typist` | 15 |
| `IF.executor` | 2 | | `IF.executor` | 2 |
| `IF.federate` | 15 | | `IF.DECISION` | 2 |
| `IF.forge` | 7 | | `IF.WWWWWW` | 2 |
| `IF.foundations` | 23 | | `IF.TTT-style` | 2 |
| `IF.garp` | 20 | | `IF.Emotion` | 2 |
| `IF.geopolitical` | 3 | | `IF.TTT.dossier.master` | 1 |
| `IF.ground` | 58 | | `IF.GOV` | 1 |
| `IF.guard` | 62 | | `IF.SECURITY` | 1 |
| `IF.guard-POC` | 4 | | `IF.TRANSIT` | 1 |
| `IF.guard-POC-system-prompt.md` | 1 | | `IF.AUDIT` | 1 |
| `IF.guardian` | 19 | | `IF.WITNESS` | 1 |
| `IF.guardian-core-01` | 6 | | `IF.SWARM.s2` | 1 |
| `IF.guardian-core-02` | 2 | | `IF.DAVE` | 1 |
| `IF.guardian-core-03` | 2 | | `IF.DOSSIER.ifstory-origin-story-02-the-fuck-moment` | 1 |
| `IF.guardian-core-04` | 2 | | `IF.STORY.origin.02.fuck-moment` | 1 |
| `IF.guardian-core-05` | 4 | | `IF.DOSSIER.ifstory-origin-story-04-page-zero` | 1 |
| `IF.guardian-core-06` | 6 | | `IF.DOSSIER.infrafabric-the-master-white-paper` | 1 |
| `IF.intelligence` | 15 | | `IF.DOSSIER.infrafabric-ifvision-a-blueprint-for-coordination-without-control` | 1 |
| `IF.marl` | 3 | | `IF.brief-fast` | 1 |
| `IF.memory` | 6 | | `IF.DOSSIER.infrafabric-iffoundations-epistemology-investigation-and-agent-design` | 1 |
| `IF.methodology` | 4 | | `IF.DOSSIER.ifarmour-biological-false-positive-reduction-in-adaptive-security-systems` | 1 |
| `IF.optimise` | 27 | | `IF.DOSSIER.ifwitness-meta-validation-as-architecture` | 1 |
| `IF.persona` | 41 | | `IF.subjectmap` | 1 |
| `IF.persona-database.json` | 1 | | `IF.pursuit` | 1 |
| `IF.DOSSIER.ifyologuard-a-confucian-philosophical-security-framework-for-secret-detection-and-relationship-based-credential-validation` | 1 |
| `IF.DOSSIER.ifarbitrate-conflict-resolution-consensus-engineering` | 1 |
| `IF.philosopher-eastern-01` | 1 | | `IF.philosopher-eastern-01` | 1 |
| `IF.philosopher-eastern-02` | 1 | | `IF.philosopher-eastern-02` | 1 |
| `IF.philosopher-eastern-03` | 1 | | `IF.philosopher-eastern-03` | 1 |
| `IF.philosopher-western-01` | 2 | | `IF.ARBITRATE.resolve_case` | 1 |
| `IF.philosopher-western-02` | 2 | | `IF.archive` | 1 |
| `IF.philosopher-western-03` | 2 | | `IF.Philosophy` | 1 |
| `IF.philosophy` | 11 | | `IF.TTT-auditable` | 1 |
| `IF.philosophy-appendix.md` | 1 | | `IF.DOSSIER.ifpacket-message-transport-framework-with-vocaldna-voice-layering` | 1 |
| `IF.philosophy-database-v1.1-joe-coulombe.yaml` | 1 | | `IF.Logistics.dispatch` | 1 |
| `IF.philosophy-database.md` | 1 | | `IF.Logistics.collect` | 1 |
| `IF.philosophy-database.yaml` | 9 | | `IF.Logistics` | 1 |
| `IF.proxy` | 3 | | `IF.DOSSIER.ifswarms2-redis-bus-communication-for-production-swarms` | 1 |
| `IF.pursuit` | 1 | | `IF.DOSSIER.white-paper-ifstory` | 1 |
| `IF.quiet` | 7 | | `IF.DOSSIER.infrafabric-github-api-integration-roadmap-check` | 1 |
| `IF.redis` | 1 | | `IF.chassis` | 1 |
| `IF.reflect` | 10 | | `IF.persona-database.json` | 1 |
| `IF.resource` | 17 | | `IF.DOSSIER.ifintelligence-real-time-research-framework-for-guardian-council-deliberations` | 1 |
| `IF.RELATE` | 1 |
| `IF.EMERGE` | 1 |
| `IF.CITATION` | 1 |
| `IF.TRACE` | 1 |
| `IF.OPTIMISE` | 1 |
| `IF.DOSSIER.ifbias-bias-risk-pre-council-decision-matrix` | 1 |
| `IF.BIAS.precouncil.matrix` | 1 |
| `IF.DOSSIER.ifguard-strategic-communications-council-for-ai-message-validation` | 1 |
| `IF.DOSSIER.ifguard-research-summary-executive-overview` | 1 |
| `IF.GUARD_COUNCIL_FRAMEWORK.md` | 1 |
| `IF.DOSSIER.if5w-structured-inquiry-framework-for-guardian-council-deliberations` | 1 |
| `IF.COUNCIL` | 1 |
| `IF.MEMORY` | 1 |
| `IF.DOSSIER.instance-0-guardian-council-origins-evolution` | 1 |
| `IF.citate` | 1 |
| `IF.PHILOSOPHY` | 1 |
| `IF.result` | 1 | | `IF.result` | 1 |
| `IF.router` | 11 | | `IF.guard-POC-system-prompt.md` | 1 |
| `IF.sam` | 19 | | `IF.philosophy-database.md` | 1 |
| `IF.search` | 48 | | `IF.philosophy-appendix.md` | 1 |
| `IF.simplify` | 21 | | `IF.DOSSIER.ifttt-traceable-transparent-trustworthy-a-comprehensive-compliance-framework-for-ai-governance` | 1 |
| `IF.story` | 7 | | `IF.DOSSIER.ifttt-compliance-framework-research-summary-and-key-findings` | 1 |
| `IF.subjectmap` | 1 | | `IF.DOSSIER.ifttt-the-skeleton-of-everything` | 1 |
| `IF.swarm` | 17 | | `IF.ESCALATE` | 1 |
| `IF.swarm.s2` | 4 | | `IF.DOSSIER.iftttledgerflowdeltasync-research-grade-repository-restructure` | 1 |
| `IF.talent` | 4 | | `IF.DOSSIER.emo-social-sergio-corpus-ingest-runtime` | 1 |
| `IF.trace` | 13 | | `IF.DOSSIER.ifemotion` | 1 |
| `IF.veil` | 4 | | `IF.emotion-style` | 1 |
| `IF.verify` | 4 | | `IF.DOSSIER.state-of-the-art-prompt-injection-defenses` | 1 |
| `IF.vesicle` | 18 | | `IF.DOSSIER.livre-blanc-le-dilemme-du-tuyau-sale` | 1 |
| `IF.vision` | 13 | | `IF.DOSSIER.deja-de-buscarte` | 1 |
| `IF.witness` | 28 | | `IF.DOSSIER.le-paradoxe-mambu` | 1 |
| `IF.yologuard` | 58 | | `IF.api` | 1 |
| `IF.FORMAT` | 1 |
| `IF.DOSSIER.history-file-error-handling-test-report` | 1 |
| `IF.DOSSIER.cloud-session-legal-document-database-build` | 1 |
| `IF.DOSSIER.ifbus-the-infrafabric-motherboard-architecture` | 1 |
| `IF.BUS.v2.0.0` | 1 |
| `IF.redis` | 1 |
| `IF.dds` | 1 |
| `IF.TTT.philanthropy.grant` | 1 |
| `IF.philosophy-database-v1.1-joe-coulombe.yaml` | 1 |
| `IF.GUARD.v1` | 1 |
## if.* (canonical/module tokens)
## if.* (lowercase tokens)
Unique: 10 Unique: 10
| Token | Count | | Token | Count |
|---|---:| |---|---:|
| `if.api` | 16 |
| `if.armour` | 3 |
| `if.armour.secrets` | 7 |
| `if.armour.secrets.detect` | 8 |
| `if.bus` | 6 |
| `if.emotion` | 24 | | `if.emotion` | 24 |
| `if.infrafabric` | 1 | | `if.api` | 16 |
| `if.armour.secrets.detect` | 8 |
| `if.bus` | 7 |
| `if.armour.secrets` | 7 |
| `if.legal` | 5 | | `if.legal` | 5 |
| `if.search` | 1 | | `if.armour` | 4 |
| `if.ttt.ledgerflow.deltasync` | 3 | | `if.ttt.ledgerflow.deltasync` | 3 |
| `if.search` | 1 |
## IG.* (likely typos) | `if.infrafabric` | 1 |
Unique: 1
| Token | Count |
|---|---:|
| `IG.GUARD` | 1 |
## Notes
- Found `IG.GUARD` at: `DANNY_STOCKER_INFRAFABRIC_DOSSIER.md:82`
- This looks like a typo for `IF.GUARD` (or an alias that should be made explicit).

View file

@ -1 +1 @@
8e40c5c6b8d8cd0d4b4c81234bc81a9b7178a8f7de7be75926485f63fe4c4c53 IF_MONIKERS_USED.md d53b3f9511b305b8a6eac92999f4c773244f69808369ce0e3b4b2bd4cee45df1 IF_MONIKERS_USED.md

132
IF_NAMING_BIBLE_v1.0.md Normal file
View file

@ -0,0 +1,132 @@
# InfraFabric Naming Bible (v1.0)
**Date:** 2025-12-22
**Author:** Danny Stocker
**Status:** Canonical reference (refactor-in-progress)
## Core principle
Governance infrastructure must be comprehensible to the governed.
Names in InfraFabric are chosen to be legible to non-specialists (think: secondary-school educated — nurses, farmers, receptionists, students), not only domain experts.
Academic terminology is allowed, but it is subordinate: **first mention only**, in parentheses.
## The two-tier naming system
### Tier 1: Layer names (literal)
Layer names are professional, literal domain descriptors.
- Say what it is
- No branding energy
- “Boring” is good
Examples:
- `IF.GOV` (governance)
- `IF.SECURITY` (security) — alias: `IF.SEC`
- `IF.TRANSIT` (transport/transit)
- `IF.AUDIT` (audit)
### Tier 2: Component names (metaphorical)
Component names use short metaphors that make the function obvious.
- Short and punchy (12 syllables preferred)
- Concrete mental image
- Cross-cultural where possible
## Metaphor selection strategy
Dont force a single metaphor domain. Use what makes each function clearest.
Available domains (examples):
- Medical/Emergency: `TRIAGE`, `QUARANTINE`
- Legal/Civic: `PANEL`, `WITNESS`
- Physical/Security: `DETECT`, `TRAP`
- Logistics/Travel: `HUB`, `TRANSIT`
- Investigation: `TRAIL`, `PROOF`
## Canonical hierarchy (current refactor target)
### `IF.GOV.*` (governance)
- `IF.GOV.TRIAGE` (controversy-weighted risk stratification)
- `IF.GOV.PANEL` (multi-agent oversight with structural dissent requirements)
- `IF.GOV.PANEL.EXTENDED` (extended multi-agent oversight panel)
- `IF.GOV.QUESTIONS` (provenance interrogative framework)
- `IF.GOV.WITNESS` (audit observation and compliance monitoring)
### `IF.SECURITY.*` (security)
- `IF.SECURITY.DETECT` (context-aware secret detection)
- `IF.SECURITY.CHECK` (epistemic anomaly detection and coherence validation)
- `IF.SECURITY.WATCH` (threat intelligence and monitoring)
- `IF.SECURITY.TRAP` (honeypot deployment and active defense)
### `IF.TRANSIT.*` (transport)
- `IF.TRANSIT.HUB` (privilege-enforced kinetic message router)
- `IF.TRANSIT.MESSAGE` (cryptographically signed message protocol)
- `IF.TRANSIT.SWARM` (distributed agent coordination)
### `IF.AUDIT.*` (audit)
- `IF.AUDIT.TRAIL` (immutable chain-of-custody logging)
- `IF.AUDIT.PROOF` (portable verification bundle with replay capability)
### Special cases
- `IF.TTT` stays as a mnemonic triad (Traceable / Transparent / Trustworthy). It is a philosophy and compliance spine. Concrete artifacts should be named under `IF.AUDIT.*`.
- `IF.STORY` stays as-is (product name: narrative logging).
- `IF.EMOTION` stays as-is (application name: exemplar product).
## Academic translation format
**First mention only**:
`IF.GOV.PANEL (multi-agent oversight with structural dissent requirements)`
Avoid:
- `aka`, `|`, or “formerly” in the main prose
- treating internal legacy names as equal-status
## Legacy → canonical mapping (v1)
| Old name (legacy) | New name (canonical) |
|---|---|
| `IF.BIAS` | `IF.GOV.TRIAGE` |
| `IF.GUARD` | `IF.GOV.PANEL` |
| `IF.5W` | `IF.GOV.QUESTIONS` |
| `IF.WITNESS` | `IF.GOV.WITNESS` |
| `IF.ARMOUR` | `IF.SECURITY.CHECK` (and `IF.SECURITY.*` submodules) |
| `IF.YOLOGUARD` | `IF.SECURITY.DETECT` |
| `IF.PACKET` | `IF.TRANSIT.MESSAGE` |
| `IF.BUS` | `IF.TRANSIT.HUB` |
| `swarm.s2` | `IF.TRANSIT.SWARM` |
## Testing heuristics
### The “youth hostel test”
Could a non-technical person read an audit trail and understand what happened?
Example pass:
“Your request went to TRIAGE, which escalated to PANEL. DETECT found a secret. The decision is recorded in AUDIT.TRAIL.”
### The “government separation-of-duties” sanity check
If in doubt, follow separation-of-duties patterns inspired by **US/CA/EU** governance structures:
- separate triage (classification) from deliberation (decision)
- separate detection (security) from actuation (transport)
- separate recordkeeping (audit) from narrative (story)
## Canonical registry
- Machine-readable registry: `IF_NAMING_REGISTRY.yaml`
- Component charters (separation-of-duties): `gov/`

View file

@ -0,0 +1 @@
8728ba5719e369d280443df30caafef6bdb69ea1f5829141afaf40b060173ac2 IF_NAMING_BIBLE_v1.0.md

View file

@ -0,0 +1,82 @@
version: "1.0"
date_utc: "2025-12-22"
status: "draft-canonical"
principles:
- "Layer names are literal domains (GOV/SECURITY/TRANSIT/AUDIT)."
- "Component names are short, concrete metaphors (TRIAGE/PANEL/DETECT/TRAIL)."
- "Names must be legible to non-specialists (secondary-school educated)."
- "Legacy names remain supported as aliases during transition."
aliases:
IF.SEC:
points_to: "IF.SECURITY"
forbidden:
- "IG.GUARD" # typo; use IF.GOV.PANEL / IF.GOV.PANEL.EXTENDED
- "ig.guard"
names:
IF.GOV.TRIAGE:
legacy: ["IF.BIAS", "if.bias"]
academic: "controversy-weighted risk stratification"
description: "Preflight risk triage that sizes councils and decides escalation."
IF.GOV.PANEL:
legacy: ["IF.GUARD", "if.guard"]
academic: "multi-agent oversight with structural dissent requirements"
description: "Council governance protocol (minimum 5 seats including a contrarian)."
IF.GOV.PANEL.EXTENDED:
legacy: []
academic: "extended multi-agent oversight panel"
description: "Expanded panel up to ~30 seats for higher-stakes decisions."
IF.GOV.QUESTIONS:
legacy: ["IF.5W", "IF_5W", "if.5w"]
academic: "provenance interrogative framework"
description: "Structured inquiry briefs (who/what/when/where/why/how)."
IF.GOV.WITNESS:
legacy: ["IF.WITNESS", "if.witness"]
academic: "audit observation and compliance monitoring"
description: "Independent witness that validates governance and trace discipline."
IF.SECURITY.DETECT:
legacy: ["IF.YOLOGUARD", "if.yologuard"]
academic: "context-aware secret detection"
description: "Secret/relationship screening and credential hygiene primitives."
IF.SECURITY.CHECK:
legacy: ["IF.ARMOUR", "IF.armour", "if.armour"]
academic: "epistemic anomaly detection and coherence validation"
description: "Detective layer for coherence/inconsistency; no actuation authority."
IF.TRANSIT.HUB:
legacy: ["IF.BUS", "IF.bus", "if.bus"]
academic: "privilege-enforced kinetic message router"
description: "Deterministic actuation + privilege enforcement substrate."
IF.TRANSIT.MESSAGE:
legacy: ["IF.PACKET", "if.packet"]
academic: "cryptographically signed message protocol"
description: "Schema-first message envelope with trace IDs and audit metadata."
IF.TRANSIT.SWARM:
legacy: ["swarm.s2", "IF.SWARM.s2", "IF.SWARM.S2"]
academic: "distributed agent coordination"
description: "Intra-swarm coordination layer over a Redis bus."
IF.AUDIT.TRAIL:
legacy: ["IF.TTT"]
academic: "immutable chain-of-custody logging"
description: "Trace discipline + signing + verification hooks for disputes."
IF.AUDIT.PROOF:
legacy: []
academic: "portable verification bundle"
description: "Exportable evidence bundle + manifest + verifier steps."
notes:
- "IF.TTT remains the philosophical umbrella; use IF.AUDIT.* for concrete artifacts."
- "Multi-lingual translations: planned; keep canonical IDs stable and translate descriptions."

View file

@ -0,0 +1 @@
495679f1c79443a4aa8cd45dd3549e75b8a7947f61b035c41f530745cdfc865e IF_NAMING_REGISTRY_v1.0.yaml

37
gov/PANEL.md Normal file
View file

@ -0,0 +1,37 @@
# IF.GOV.PANEL (legacy: IF.GUARD)
## Role
A multi-voice governance panel that reviews high-stakes decisions.
- Minimum form: `IF.GOV.PANEL` (5 seats, includes contrarian)
- Expanded form: `IF.GOV.PANEL.EXTENDED` (up to ~30 seats)
## Responsibilities
- deliberate on a proposed action/response
- preserve dissent (minority opinions remain visible)
- record votes and rationale as an auditable artifact
## Non-responsibilities
- not a latency-optimized mechanism for low-stakes chat
- not a substitute for a human clinical board (mental-health-adjacent domains require explicit constraints)
## Inputs
- `TRIAGE` output (risk tier + recommended panel size)
- the proposed action/response
- evidence references (retrieval ids / citations / prior traces)
## Outputs
- allow / modify / block decision
- votes + dissent record
- escalation/appeal hooks (if applicable)
## Required evidence
- signed `PANEL` decision record under `IF.AUDIT.TRAIL`
- link to the exact proposal bytes that were voted on (hash)
- trace id included in final user-visible output

21
gov/QUESTIONS.md Normal file
View file

@ -0,0 +1,21 @@
# IF.GOV.QUESTIONS (legacy: IF.5W)
## Role
A structured inquiry template to prevent hand-wavy governance.
It forces deliberation to answer the basics (who/what/when/where/why/how) and to cite evidence.
## Responsibilities
- generate a brief that can be reviewed by `PANEL`
- provide explicit slots for evidence and boundaries
## Non-responsibilities
- does not decide; it structures the inputs to decision
## Required evidence
- the brief is logged and hashed in the trace
- any claim in the brief must point to a verification path or be labeled `UNVERIFIED`

30
gov/README.md Normal file
View file

@ -0,0 +1,30 @@
# IF.GOV directory (separation-of-duties)
This directory is the **governance charter layer** for InfraFabric.
Purpose:
- reduce concept drift / sprawl by defining *who does what*
- make governance primitives legible to non-specialists
- provide stable names for cross-app integration (CLI/API)
Design framing: InfraFabric is not inventing “government”. It is adapting separation-of-duties patterns inspired by **US/CA/EU** governance structures to autonomous systems.
## Components
- `TRIAGE.md``IF.GOV.TRIAGE` (legacy: `IF.BIAS`)
- `PANEL.md``IF.GOV.PANEL` + `IF.GOV.PANEL.EXTENDED` (legacy: `IF.GUARD`)
- `QUESTIONS.md``IF.GOV.QUESTIONS` (legacy: `IF.5W`)
- `WITNESS.md``IF.GOV.WITNESS` (legacy: `IF.WITNESS`)
## Interface contract (v1)
Each charter specifies:
- responsibilities (what it *must* do)
- non-responsibilities (what it *must not* do)
- inputs/outputs
- audit artifacts required under `IF.AUDIT.TRAIL` / `IF.TTT`
## Naming
- Canonical naming is defined in `../IF_NAMING_REGISTRY.yaml`.
- Legacy names remain valid as aliases during transition.

35
gov/TRIAGE.md Normal file
View file

@ -0,0 +1,35 @@
# IF.GOV.TRIAGE (legacy: IF.BIAS)
## Role
Classify a request by risk/controversy and decide what governance path is required.
## Responsibilities
- assign a risk tier and an escalation recommendation
- size the panel (minimum vs extended)
- emit a signed decision record (even when rejecting/short-circuiting)
## Non-responsibilities
- does not generate the final user answer
- does not “deliberate” on truth claims; it only classifies and routes
## Inputs
- user request metadata (actor id, request type, policy surface)
- optional: retrieval/context hints
## Outputs
- `panel_size` recommendation (e.g., 5 → 30)
- escalation path (fast path vs panel)
- required seats (e.g., contrarian mandatory)
## Required evidence
- trace id for the request
- a `TRIAGE` event logged to `IF.AUDIT.TRAIL` with:
- inputs hashed
- output decision + panel size
- link to the follow-on `PANEL` decision (if invoked)

21
gov/WITNESS.md Normal file
View file

@ -0,0 +1,21 @@
# IF.GOV.WITNESS (legacy: IF.WITNESS)
## Role
A witness is the “auditor in the room”: it checks that governance rules were followed and that required artifacts exist.
## Responsibilities
- validate that TRIAGE and PANEL produced required artifacts
- validate that the final output includes trace id and citation formatting rules
- raise “no-trace-no-trust” errors when invariants are violated
## Non-responsibilities
- does not override governance decisions on substance
- does not act as a judge; it acts as a verifier
## Required evidence
- witness checks are logged as trace events
- witness failures are exported as part of `IF.AUDIT.PROOF` bundles when disputes occur