Publish IF.GOV naming registry + updated dossier editions
This commit is contained in:
parent
95a77cc67e
commit
426da743f4
19 changed files with 813 additions and 327 deletions
|
|
@ -41,18 +41,18 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard
|
|||
|
||||
| Core claim | Proof (artifacts) | Limitation (scope / boundary) |
|
||||
|---|---|---|
|
||||
| **A) Traceability is safety.** High‑stakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**<br/>- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)<br/>- Verifier: `https://infrafabric.io/static/hosted/iftrace.py`<br/>- Reference bundle: `emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz` | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public append‑only transparency log yet. |
|
||||
| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.BIAS → IF.GUARD**<br/>- IF.BIAS: risk preflight sizes councils and escalates<br/>- IF.GUARD: councils preserve dissent and veto paths<br/>- IF.5W: structured inquiry briefs for councils | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller councils or fast-track gates. |
|
||||
| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.ARMOUR + IF.YOLOGUARD**<br/>- IF.ARMOUR: epistemic coherence checks (detective layer)<br/>- IF.YOLOGUARD: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. |
|
||||
| **A) Traceability is safety.** High‑stakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**<br/>- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)<br/>- Verifier: [iftrace.py](https://infrafabric.io/static/hosted/iftrace.py)<br/>- Reference bundle: [emo_trace_payload_016cca78…tar.gz](https://infrafabric.io/static/hosted/emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz) | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public append‑only transparency log yet. |
|
||||
| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.GOV.TRIAGE → IF.GOV.PANEL** *(legacy: IF.BIAS → IF.GUARD)*<br/>- TRIAGE: risk preflight sizes panels and escalates<br/>- PANEL: preserves dissent + veto paths<br/>- QUESTIONS *(legacy: IF.5W)*: structured inquiry briefs for panels | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller panels or fast-track gates. |
|
||||
| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.SECURITY.CHECK + IF.SECURITY.DETECT** *(legacy: IF.ARMOUR + IF.YOLOGUARD)*<br/>- CHECK: epistemic coherence checks (detective layer)<br/>- DETECT: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. |
|
||||
|
||||
### Rosetta Stone (Closest Analog, not “equals”)
|
||||
|
||||
| InfraFabric term | Closest industry analog | Boundary (where it differs) |
|
||||
|---|---|---|
|
||||
| **IF.TTT** (Traceable/Transparent/Trustworthy) | Supply-chain integrity patterns (SLSA/SBOM + CT-like audit thinking) | IF.TTT applies the discipline to **semantic decisions and retrieval lineage**, not just binaries. It produces portable evidence bundles + verifier steps for third-party audit. |
|
||||
| **IF.GUARD** (Council governance) | Human-in-the-loop oversight / review boards | IF.GUARD is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. |
|
||||
| **IF.ARMOUR** (Assurance) | Epistemic security / anomaly detection | Armour is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. |
|
||||
| **IF.swarm.s2 / IF.PACKET / IF.BUS** (Transport) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. |
|
||||
| **IF.GOV.PANEL** (legacy: IF.GUARD) | Human-in-the-loop oversight / review boards | IF.GOV.PANEL is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. |
|
||||
| **IF.SECURITY.CHECK** (legacy: IF.ARMOUR) | Epistemic security / anomaly detection | CHECK is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. |
|
||||
| **IF.TRANSIT.SWARM / IF.TRANSIT.MESSAGE / IF.TRANSIT.HUB** (legacy: swarm.s2 / IF.PACKET / IF.BUS) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. |
|
||||
|
||||
### Navigation Guide (Clean vs Origin context)
|
||||
|
||||
|
|
@ -60,11 +60,45 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard
|
|||
- If you want the origin context (microlab lab notes / narrative artifacts): start at the **Cold Open** and IF.STORY sections (they explain why the architecture exists).
|
||||
- Optional culture stress-test (explicit satire; not a protocol): [Annex (Non-Technical): The Dave Factor Shadow Dossier](#annex-dave-factor-shadow-dossier)
|
||||
|
||||
<a id="naming-and-separation-of-duties"></a>
|
||||
|
||||
## 01. Naming + Separation of Duties (canonical refactor)
|
||||
|
||||
InfraFabric’s early papers used internal names (e.g., `IF.GUARD`, `IF.BIAS`, `IF.ARMOUR`, `IF.BUS`). To reduce lexicon friction for reviewers and to standardize cross‑app integration, this dossier is refactoring to a separation‑of‑duties namespace inspired by **US/CA/EU** governance patterns:
|
||||
|
||||
- `IF.GOV.*` — governance (triage + panels + witness)
|
||||
- `IF.SECURITY.*` — security (detective checks + secret screening)
|
||||
- `IF.TRANSIT.*` — transport/actuation (routing + message envelopes)
|
||||
- `IF.AUDIT.*` — audit artifacts (trail + proof bundles)
|
||||
|
||||
Canonical references in this repo:
|
||||
|
||||
- Naming contract: `IF_NAMING_BIBLE_v1.0.md`
|
||||
- Machine registry: `IF_NAMING_REGISTRY.yaml`
|
||||
- Governance charters (who does what): `gov/`
|
||||
|
||||
### Legacy → canonical mapping (v1)
|
||||
|
||||
| Legacy name | Canonical name |
|
||||
|---|---|
|
||||
| `IF.BIAS` | `IF.GOV.TRIAGE` |
|
||||
| `IF.GUARD` | `IF.GOV.PANEL` |
|
||||
| `IF.5W` | `IF.GOV.QUESTIONS` |
|
||||
| `IF.WITNESS` | `IF.GOV.WITNESS` |
|
||||
| `IF.ARMOUR` | `IF.SECURITY.CHECK` |
|
||||
| `IF.YOLOGUARD` | `IF.SECURITY.DETECT` |
|
||||
| `IF.BUS` | `IF.TRANSIT.HUB` |
|
||||
| `IF.PACKET` | `IF.TRANSIT.MESSAGE` |
|
||||
| `swarm.s2` | `IF.TRANSIT.SWARM` |
|
||||
|
||||
Transition policy: many embedded papers still use legacy names; where so, the dossier now prefers first-mention annotations like `IF.GOV.PANEL (legacy: IF.GUARD)`.
|
||||
|
||||
|
||||
## Opening Whitepaper — InfraFabric Synthesis (for Anthropic)
|
||||
|
||||
> *If we cannot prove the chain-of-custody, we cannot ship.*
|
||||
|
||||
InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.BIAS + IF.GUARD + IF.5W), transport (IF.PACKET + swarm.s2 + IF.STORY), assurance (armour, witness, yologuard), and the exemplar product (IF.emotion).
|
||||
InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.GOV.TRIAGE + IF.GOV.PANEL + IF.GOV.QUESTIONS), transit (IF.TRANSIT.MESSAGE + IF.TRANSIT.SWARM + IF.STORY), security (IF.SECURITY.CHECK + IF.GOV.WITNESS + IF.SECURITY.DETECT), and the exemplar product (IF.emotion).
|
||||
|
||||
### IF.BUS ↔ IF.ARMOUR Threat Coverage Matrix (Normative)
|
||||
|
||||
|
|
@ -102,31 +136,34 @@ Why this stub exists: external reviewers/LLMs sometimes skip an entire pillar if
|
|||
|
||||
|
||||
### Reader Path (Start Here)
|
||||
- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.BIAS](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GUARD](#ifguard-strategic-communications-council-for-ai-message-validation)
|
||||
- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.GOV.TRIAGE (legacy: IF.BIAS)](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GOV.PANEL (legacy: IF.GUARD)](#ifguard-strategic-communications-council-for-ai-message-validation)
|
||||
- **Latency framing:** Use `t_total = t_model + t_transport + t_governance`; only `t_transport` is benchmarked in microlab terms, and never presented as “council deliberation time.”
|
||||
- **Consensus framing:** “Unanimous” means “the council converged,” not “the claim is true”; treat any 100% consensus output as a governance artifact until raw evidence bundles are attached.
|
||||
- **Validation framing:** External validation is reported as an observational microlab pilot, not proof, and not a consciousness claim.
|
||||
|
||||
### Glossary (Quick Decode)
|
||||
- **IF.TTT:** Traceable/Transparent/Trustworthy compliance spine; enforces evidence, identity, and audit lineage.
|
||||
- **IF.BIAS:** Pre-council bias/risk triage matrix; recommends escalation and council sizing.
|
||||
- **IF.GUARD:** Council protocol; minimum 5-seat panel (Core 4 + contrarian), expands up to 30 seats when justified.
|
||||
- **Contrarian Guardian:** Required dissent seat; can trigger cooling-off/veto at >95% approval.
|
||||
- **IF.5W:** Structured inquiry format used to generate briefs for councils.
|
||||
- **IF.PACKET:** Schema-first message transport with trace IDs and audit metadata.
|
||||
- **IF.SWARM.s2:** Intra-swarm agent communications over a Redis bus; swarm coordination at speed.
|
||||
- **IF.STORY:** Vector‑narrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions.
|
||||
- **Page Zero:** The manifesto/origin narrative that explains “why” (and demonstrates IF.STORY + IF.TTT in practice).
|
||||
- **IF.emotion / AI-e:** Product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”).
|
||||
- **IF.PHIL:** Annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects).
|
||||
- **IF.BUS:** Universal Kinetic Transport Protocol; deterministic actuation layer.
|
||||
- **IF.ARMOUR:** Epistemic security immune system; physics-grounded detective layer.
|
||||
Naming note: `IF.bus` / `IF.armour` (lowercase) appear elsewhere as earlier papers/modules; `IF.BUS` / `IF.ARMOUR` are the canonical lower-layer protocol specifications introduced on 20251218.
|
||||
- **IF.AUDIT.TRAIL:** Concrete audit artifact layer (portable chain-of-custody logs + signatures). *(In practice: implemented under IF.TTT today.)*
|
||||
- **IF.GOV.TRIAGE** *(legacy: IF.BIAS)*: preflight risk triage; recommends escalation and panel sizing.
|
||||
- **IF.GOV.PANEL** *(legacy: IF.GUARD)*: governance panel; minimum 5-seat review including contrarian; can expand as **IF.GOV.PANEL.EXTENDED**.
|
||||
- **Contrarian Guardian:** required dissent seat; can trigger cooling-off/veto at >95% approval.
|
||||
- **IF.GOV.QUESTIONS** *(legacy: IF.5W)*: structured inquiry format used to generate briefs for panels.
|
||||
- **IF.TRANSIT.MESSAGE** *(legacy: IF.PACKET)*: schema-first message envelope with trace IDs and audit metadata.
|
||||
- **IF.TRANSIT.SWARM** *(legacy: swarm.s2 / IF.SWARM.s2)*: intra-swarm agent communications over a Redis bus.
|
||||
- **IF.STORY:** narrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions.
|
||||
- **Page Zero:** the origin manifesto that explains “why” (and demonstrates IF.STORY + IF.TTT in practice).
|
||||
- **IF.emotion / AI-e:** product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”).
|
||||
- **IF.PHIL:** annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects).
|
||||
- **IF.TRANSIT.HUB** *(legacy: IF.BUS)*: deterministic actuation/privilege enforcement transport substrate.
|
||||
- **IF.SECURITY.CHECK** *(legacy: IF.ARMOUR)*: epistemic security detective layer (coherence/anomaly checks).
|
||||
- **IF.SECURITY.DETECT** *(legacy: IF.YOLOGUARD)*: secret/relationship screening primitives.
|
||||
|
||||
Naming note: legacy lowercase (`if.bus`, `if.armour`) appears in older papers; `IF.TRANSIT.HUB` / `IF.SECURITY.CHECK` are the canonical refactor targets introduced in this dossier.
|
||||
|
||||
|
||||
### Selected Governance Extensions (Optional Depth)
|
||||
|
||||
IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.PACKET payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GUARD and logged via IF.TTT.
|
||||
IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.TRANSIT.MESSAGE (legacy: IF.PACKET) payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GOV.PANEL (legacy: IF.GUARD) and logged via IF.TTT.
|
||||
|
||||
IF.PHIL demonstrates how InfraFabric primitives extend to auditable philanthropic access, replacing discretionary “credits” with governed grant objects.
|
||||
|
||||
|
|
@ -146,11 +183,11 @@ Full paper: [Annex — IF.PHIL | Auditable Philanthropy](#annex-ifphil-auditable
|
|||
```mermaid
|
||||
flowchart TD
|
||||
VISION["IF.vision<br/>coordination without control"] --> FOUNDATIONS["IF.foundations<br/>ground/search/persona"]
|
||||
FOUNDATIONS --> ASSURE["Assurance<br/>IF.ARMOUR • witness • yologuard"]
|
||||
ASSURE --> TRANSPORT["Transport<br/>IF.BUS • packet • swarm.s2 • story"]
|
||||
TRANSPORT --> BIAS["Preflight<br/>IF.BIAS | Bias & Risk Matrix"]
|
||||
BIAS --> CORE4["Core 4 triage<br/>IF.GUARD(4)"]
|
||||
CORE4 --> GOVERN["Governance<br/>IF.GUARD council (5–30) + 5W"]
|
||||
FOUNDATIONS --> ASSURE["Security<br/>IF.SECURITY.CHECK • IF.GOV.WITNESS • IF.SECURITY.DETECT"]
|
||||
ASSURE --> TRANSPORT["Transit<br/>IF.TRANSIT.HUB • MESSAGE • SWARM • IF.STORY"]
|
||||
TRANSPORT --> BIAS["Preflight<br/>IF.GOV.TRIAGE (legacy: IF.BIAS)"]
|
||||
BIAS --> CORE4["Core 4 convening<br/>legacy: IF.GUARD(4)"]
|
||||
CORE4 --> GOVERN["Governance<br/>IF.GOV.PANEL (5–30) + IF.GOV.QUESTIONS"]
|
||||
GOVERN --> COMPLIANCE["Compliance<br/>IF.TTT | Distributed Ledger + ledgerflow"]
|
||||
COMPLIANCE --> PRODUCT["Productization<br/>IF.emotion"]
|
||||
PRODUCT --> FEEDBACK["Feedback into Vision/Foundations"]
|
||||
|
|
@ -159,26 +196,25 @@ flowchart TD
|
|||
|
||||
### Governance, Assurance, Compliance Loop
|
||||
```mermaid
|
||||
flowchart TD
|
||||
INQUIRY["IF.5W | Structured Inquiry<br/>structured deliberation"] --> BIAS["IF.BIAS | Bias & Risk Preflight<br/>sizes councils (5–30)"]
|
||||
BIAS --> CORE4["IF.GUARD(4) | Core 4 triage<br/>convening authority"]
|
||||
CORE4 --> GUARD["IF.GUARD | Council deliberation<br/>panel 5 ↔ extended 30"]
|
||||
GUARD --> STORY["IF.STORY | Narrative Logging<br/>narrative + state"]
|
||||
STORY --> TTT["IF.TTT | Distributed Ledger<br/>traceable/transparent/trustworthy"]
|
||||
TTT --> WITNESS["IF.witness<br/>meta-validation"]
|
||||
WITNESS --> ARMOUR["IF.armour<br/>FP reduction"]
|
||||
ARMOUR --> YG["IF.YOLOGUARD | Credential & Secret Screening<br/>secret/relationship checks"]
|
||||
YG --> PACKET["IF.PACKET | Message Transport + swarm.s2<br/>delivery with VocalDNA"]
|
||||
PACKET --> EMOTION["IF.emotion<br/>product exemplar"]
|
||||
EMOTION --> FEEDBACK["Feedback into inquiry"]
|
||||
FEEDBACK --> INQUIRY
|
||||
flowchart TB
|
||||
Q["IF.GOV.QUESTIONS\n(legacy: IF.5W)"] --> T["IF.GOV.TRIAGE\n(legacy: IF.BIAS)"]
|
||||
T --> C4["Core 4 convening\n(legacy: IF.GUARD(4))"]
|
||||
C4 --> P["IF.GOV.PANEL\n(5 ↔ EXTENDED ~30)"]
|
||||
P --> S["IF.STORY\nnarrative logging"]
|
||||
S --> A["IF.TTT / IF.AUDIT.TRAIL\ntrace discipline"]
|
||||
A --> W["IF.GOV.WITNESS\nverification"]
|
||||
W --> CHK["IF.SECURITY.CHECK\n(legacy: IF.ARMOUR)"]
|
||||
CHK --> DET["IF.SECURITY.DETECT\n(legacy: IF.YOLOGUARD)"]
|
||||
DET --> MSG["IF.TRANSIT.MESSAGE + SWARM\n(legacy: IF.PACKET + swarm.s2)"]
|
||||
MSG --> EMO["IF.emotion\nexemplar"]
|
||||
EMO --> Q
|
||||
|
||||
```
|
||||
|
||||
### Delivery & Safety Highlights (with citations)
|
||||
- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GUARD review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`).
|
||||
- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; witness/armour/yologuard gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`).
|
||||
- Transport fidelity: IF.PACKET carries voice DNA; swarm.s2 provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`).
|
||||
- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GOV.PANEL (legacy: IF.GUARD) review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`).
|
||||
- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; IF.GOV.WITNESS / IF.SECURITY.CHECK / IF.SECURITY.DETECT gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`).
|
||||
- Transport fidelity: IF.TRANSIT.MESSAGE (legacy: IF.PACKET) carries voice DNA; IF.TRANSIT.SWARM (legacy: swarm.s2) provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`).
|
||||
- Security/legal: Prompt-injection defenses cover SOTA attack classes; legal DB build operationalizes doc governance; API roadmap + history-file tests reduce integration regressions (sources: `docs/research/PROMPT_INJECTION_DEFENSES.md`, `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`, `docs/api/API_ROADMAP.md`, `HISTORY_FILE_TEST_REPORT.md`).
|
||||
- Domain credibility: Medical (GLP1 retrofit), emosocial principles, and informal sector resilience (Juakali) field report show adaptability of the same guard/compliance/transport spine (sources: `Brownfield_GLP1_Retrofit_LE_DILEMME_DU_TUYAU_SALE.md`, `DEJA_DE_BUSCARTE_11_principios_emosociales.md`, `JUAKALI_RAPPORT_V2_LOS_20251205_0236 (sent).md`).
|
||||
|
||||
|
|
@ -320,6 +356,7 @@ InfraFabric is the operating system that turns AI from a chatbot into a reliable
|
|||
- [Data‑Driven Technical Report (Microlab)](DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION.md)
|
||||
|
||||
- [00. The Bridge: Submission Pack (Reviewer Orientation)](#bridge-submission-pack)
|
||||
- [01. Naming + Separation of Duties (canonical refactor)](#naming-and-separation-of-duties) — see `IF_NAMING_BIBLE_v1.0.md`, `IF_NAMING_REGISTRY.yaml`, `gov/`
|
||||
|
||||
### External audit artifacts (public, reviewer-friendly)
|
||||
|
||||
|
|
@ -389,7 +426,7 @@ Optional “audit culture” annexes (satire; Dave is a pattern, not a person):
|
|||
- [ANNEX: IF.PHIL | Auditable Philanthropy: Access, Subsidy, and Governance Without Vibes](#annex-ifphil-auditable-philanthropy-access-subsidy-and-governance-without-vibes) — `if://doc/IF_PHIL_AUDITABLE_ACCESS/v1.0` — Author: Danny Stocker; Status: RELEASE / v1.0
|
||||
- [History File Error Handling Test Report](#history-file-error-handling-test-report) — `if.api/llm/openwebui/docs/internals/HISTORY_FILE_TEST_REPORT.md`
|
||||
- [CLOUD SESSION: Legal Document Database Build](#cloud-session-legal-document-database-build) — `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`
|
||||
- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier) — Full satire (optional): https://infrafabric.io/static/hosted/IF_DAVE_SHADOW_DOSSIER_FULL_SATIRE.md
|
||||
- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier)
|
||||
|
||||
---
|
||||
|
||||
|
|
|
|||
|
|
@ -1 +1 @@
|
|||
f93b599622506c2077242c21006300a6f4ca46773033216ebec3ba6f3f41df38 DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md
|
||||
7b3f05446674223c0bfdd35093c44c39ac87c6c5144994706701ad543d0598a5 DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION_FULL.md
|
||||
|
|
|
|||
|
|
@ -21,6 +21,17 @@
|
|||
|
||||
---
|
||||
|
||||
## 0.5) Naming (Refactor in progress)
|
||||
|
||||
This submission uses a refactor namespace to reduce lexicon friction:
|
||||
|
||||
- `IF.GOV.*` (governance), `IF.SECURITY.*` (security), `IF.TRANSIT.*` (transport), `IF.AUDIT.*` (audit artifacts)
|
||||
- Legacy names may appear in embedded papers; first-mention annotations use the form `IF.GOV.PANEL (legacy: IF.GUARD)`
|
||||
|
||||
Canonical docs: `IF_NAMING_BIBLE_v1.0.md`, `IF_NAMING_REGISTRY.yaml`, and `gov/` (in the source repo).
|
||||
|
||||
---
|
||||
|
||||
## 1) Technical Disclosure (AI-Native Implementation)
|
||||
|
||||
This project follows an Operator-as-Architect workflow: I define constraints, interfaces, and verification hooks; LLMs generate implementation code under supervision. The system is therefore evaluated as:
|
||||
|
|
@ -42,8 +53,8 @@ This project follows an Operator-as-Architect workflow: I define constraints, in
|
|||
| Core claim | Proof (artifact) | Boundary / limitation |
|
||||
|---|---|---|
|
||||
| **A) Traceability is a safety primitive.** High‑stakes agent actions require verifiable provenance. | IF.emotion trace protocol + evidence bundle + verifier (see §5). | **Microlab / single shard.** Guarantees begin at the backend witness boundary; edge completeness is future work. |
|
||||
| **B) Governance needs structured dissent.** One-model “judge” patterns are brittle. | IF.BIAS (risk preflight) + IF.GUARD (council with required dissent seat) traced via IF.TTT. | **Cost/latency.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths stay fast. |
|
||||
| **C) Context is a security control.** Static filters fail; provenance + coherence checks reduce unsafe drift. | IF.ARMOUR (coherence/detective layer) + IF.YOLOGUARD (secret/relationship screening) integrated into the pipeline. | **Domain calibration.** Strongest for concrete surfaces (secrets/PII/prompt injection); general harmful-intent is open research. |
|
||||
| **B) Governance needs structured dissent.** One-model “judge” patterns are brittle. | IF.GOV.TRIAGE *(legacy: IF.BIAS)* + IF.GOV.PANEL *(legacy: IF.GUARD)* traced via IF.TTT / IF.AUDIT.TRAIL. | **Cost/latency.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths stay fast. |
|
||||
| **C) Context is a security control.** Static filters fail; provenance + coherence checks reduce unsafe drift. | IF.SECURITY.CHECK *(legacy: IF.ARMOUR)* + IF.SECURITY.DETECT *(legacy: IF.YOLOGUARD)* integrated into the pipeline. | **Domain calibration.** Strongest for concrete surfaces (secrets/PII/prompt injection); general harmful-intent is open research. |
|
||||
|
||||
---
|
||||
|
||||
|
|
|
|||
|
|
@ -1 +1 @@
|
|||
d921501a4df47c97229de723011d53553141c34f07077c38c777e6019c4e2b44 DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md
|
||||
cec902663568d82b7f9a78d3c65886a07199d8979ac238a10d138108d4a602e5 DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION.md
|
||||
|
|
|
|||
|
|
@ -41,18 +41,18 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard
|
|||
|
||||
| Core claim | Proof (artifacts) | Limitation (scope / boundary) |
|
||||
|---|---|---|
|
||||
| **A) Traceability is safety.** High‑stakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**<br/>- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)<br/>- Verifier: `https://infrafabric.io/static/hosted/iftrace.py`<br/>- Reference bundle: `emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz` | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public append‑only transparency log yet. |
|
||||
| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.BIAS → IF.GUARD**<br/>- IF.BIAS: risk preflight sizes councils and escalates<br/>- IF.GUARD: councils preserve dissent and veto paths<br/>- IF.5W: structured inquiry briefs for councils | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller councils or fast-track gates. |
|
||||
| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.ARMOUR + IF.YOLOGUARD**<br/>- IF.ARMOUR: epistemic coherence checks (detective layer)<br/>- IF.YOLOGUARD: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. |
|
||||
| **A) Traceability is safety.** High‑stakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**<br/>- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)<br/>- Verifier: [iftrace.py](https://infrafabric.io/static/hosted/iftrace.py)<br/>- Reference bundle: [emo_trace_payload_016cca78…tar.gz](https://infrafabric.io/static/hosted/emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz) | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public append‑only transparency log yet. |
|
||||
| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.GOV.TRIAGE → IF.GOV.PANEL** *(legacy: IF.BIAS → IF.GUARD)*<br/>- TRIAGE: risk preflight sizes panels and escalates<br/>- PANEL: preserves dissent + veto paths<br/>- QUESTIONS *(legacy: IF.5W)*: structured inquiry briefs for panels | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller panels or fast-track gates. |
|
||||
| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.SECURITY.CHECK + IF.SECURITY.DETECT** *(legacy: IF.ARMOUR + IF.YOLOGUARD)*<br/>- CHECK: epistemic coherence checks (detective layer)<br/>- DETECT: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. |
|
||||
|
||||
### Rosetta Stone (Closest Analog, not “equals”)
|
||||
|
||||
| InfraFabric term | Closest industry analog | Boundary (where it differs) |
|
||||
|---|---|---|
|
||||
| **IF.TTT** (Traceable/Transparent/Trustworthy) | Supply-chain integrity patterns (SLSA/SBOM + CT-like audit thinking) | IF.TTT applies the discipline to **semantic decisions and retrieval lineage**, not just binaries. It produces portable evidence bundles + verifier steps for third-party audit. |
|
||||
| **IF.GUARD** (Council governance) | Human-in-the-loop oversight / review boards | IF.GUARD is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. |
|
||||
| **IF.ARMOUR** (Assurance) | Epistemic security / anomaly detection | Armour is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. |
|
||||
| **IF.swarm.s2 / IF.PACKET / IF.BUS** (Transport) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. |
|
||||
| **IF.GOV.PANEL** (legacy: IF.GUARD) | Human-in-the-loop oversight / review boards | IF.GOV.PANEL is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. |
|
||||
| **IF.SECURITY.CHECK** (legacy: IF.ARMOUR) | Epistemic security / anomaly detection | CHECK is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. |
|
||||
| **IF.TRANSIT.SWARM / IF.TRANSIT.MESSAGE / IF.TRANSIT.HUB** (legacy: swarm.s2 / IF.PACKET / IF.BUS) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. |
|
||||
|
||||
### Navigation Guide (Clean vs Origin context)
|
||||
|
||||
|
|
@ -60,11 +60,45 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard
|
|||
- If you want the origin context (microlab lab notes / narrative artifacts): start at the **Cold Open** and IF.STORY sections (they explain why the architecture exists).
|
||||
- Optional culture stress-test (explicit satire; not a protocol): [Annex (Non-Technical): The Dave Factor Shadow Dossier](#annex-dave-factor-shadow-dossier)
|
||||
|
||||
<a id="naming-and-separation-of-duties"></a>
|
||||
|
||||
## 01. Naming + Separation of Duties (canonical refactor)
|
||||
|
||||
InfraFabric’s early papers used internal names (e.g., `IF.GUARD`, `IF.BIAS`, `IF.ARMOUR`, `IF.BUS`). To reduce lexicon friction for reviewers and to standardize cross‑app integration, this dossier is refactoring to a separation‑of‑duties namespace inspired by **US/CA/EU** governance patterns:
|
||||
|
||||
- `IF.GOV.*` — governance (triage + panels + witness)
|
||||
- `IF.SECURITY.*` — security (detective checks + secret screening)
|
||||
- `IF.TRANSIT.*` — transport/actuation (routing + message envelopes)
|
||||
- `IF.AUDIT.*` — audit artifacts (trail + proof bundles)
|
||||
|
||||
Canonical references in this repo:
|
||||
|
||||
- Naming contract: `IF_NAMING_BIBLE_v1.0.md`
|
||||
- Machine registry: `IF_NAMING_REGISTRY.yaml`
|
||||
- Governance charters (who does what): `gov/`
|
||||
|
||||
### Legacy → canonical mapping (v1)
|
||||
|
||||
| Legacy name | Canonical name |
|
||||
|---|---|
|
||||
| `IF.BIAS` | `IF.GOV.TRIAGE` |
|
||||
| `IF.GUARD` | `IF.GOV.PANEL` |
|
||||
| `IF.5W` | `IF.GOV.QUESTIONS` |
|
||||
| `IF.WITNESS` | `IF.GOV.WITNESS` |
|
||||
| `IF.ARMOUR` | `IF.SECURITY.CHECK` |
|
||||
| `IF.YOLOGUARD` | `IF.SECURITY.DETECT` |
|
||||
| `IF.BUS` | `IF.TRANSIT.HUB` |
|
||||
| `IF.PACKET` | `IF.TRANSIT.MESSAGE` |
|
||||
| `swarm.s2` | `IF.TRANSIT.SWARM` |
|
||||
|
||||
Transition policy: many embedded papers still use legacy names; where so, the dossier now prefers first-mention annotations like `IF.GOV.PANEL (legacy: IF.GUARD)`.
|
||||
|
||||
|
||||
## Opening Whitepaper — InfraFabric Synthesis (for Anthropic)
|
||||
|
||||
> *If we cannot prove the chain-of-custody, we cannot ship.*
|
||||
|
||||
InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.BIAS + IF.GUARD + IF.5W), transport (IF.PACKET + swarm.s2 + IF.STORY), assurance (armour, witness, yologuard), and the exemplar product (IF.emotion).
|
||||
InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.GOV.TRIAGE + IF.GOV.PANEL + IF.GOV.QUESTIONS), transit (IF.TRANSIT.MESSAGE + IF.TRANSIT.SWARM + IF.STORY), security (IF.SECURITY.CHECK + IF.GOV.WITNESS + IF.SECURITY.DETECT), and the exemplar product (IF.emotion).
|
||||
|
||||
### IF.BUS ↔ IF.ARMOUR Threat Coverage Matrix (Normative)
|
||||
|
||||
|
|
@ -102,31 +136,34 @@ Why this stub exists: external reviewers/LLMs sometimes skip an entire pillar if
|
|||
|
||||
|
||||
### Reader Path (Start Here)
|
||||
- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.BIAS](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GUARD](#ifguard-strategic-communications-council-for-ai-message-validation)
|
||||
- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.GOV.TRIAGE (legacy: IF.BIAS)](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GOV.PANEL (legacy: IF.GUARD)](#ifguard-strategic-communications-council-for-ai-message-validation)
|
||||
- **Latency framing:** Use `t_total = t_model + t_transport + t_governance`; only `t_transport` is benchmarked in microlab terms, and never presented as “council deliberation time.”
|
||||
- **Consensus framing:** “Unanimous” means “the council converged,” not “the claim is true”; treat any 100% consensus output as a governance artifact until raw evidence bundles are attached.
|
||||
- **Validation framing:** External validation is reported as an observational microlab pilot, not proof, and not a consciousness claim.
|
||||
|
||||
### Glossary (Quick Decode)
|
||||
- **IF.TTT:** Traceable/Transparent/Trustworthy compliance spine; enforces evidence, identity, and audit lineage.
|
||||
- **IF.BIAS:** Pre-council bias/risk triage matrix; recommends escalation and council sizing.
|
||||
- **IF.GUARD:** Council protocol; minimum 5-seat panel (Core 4 + contrarian), expands up to 30 seats when justified.
|
||||
- **Contrarian Guardian:** Required dissent seat; can trigger cooling-off/veto at >95% approval.
|
||||
- **IF.5W:** Structured inquiry format used to generate briefs for councils.
|
||||
- **IF.PACKET:** Schema-first message transport with trace IDs and audit metadata.
|
||||
- **IF.SWARM.s2:** Intra-swarm agent communications over a Redis bus; swarm coordination at speed.
|
||||
- **IF.STORY:** Vector‑narrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions.
|
||||
- **Page Zero:** The manifesto/origin narrative that explains “why” (and demonstrates IF.STORY + IF.TTT in practice).
|
||||
- **IF.emotion / AI-e:** Product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”).
|
||||
- **IF.PHIL:** Annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects).
|
||||
- **IF.BUS:** Universal Kinetic Transport Protocol; deterministic actuation layer.
|
||||
- **IF.ARMOUR:** Epistemic security immune system; physics-grounded detective layer.
|
||||
Naming note: `IF.bus` / `IF.armour` (lowercase) appear elsewhere as earlier papers/modules; `IF.BUS` / `IF.ARMOUR` are the canonical lower-layer protocol specifications introduced on 20251218.
|
||||
- **IF.AUDIT.TRAIL:** Concrete audit artifact layer (portable chain-of-custody logs + signatures). *(In practice: implemented under IF.TTT today.)*
|
||||
- **IF.GOV.TRIAGE** *(legacy: IF.BIAS)*: preflight risk triage; recommends escalation and panel sizing.
|
||||
- **IF.GOV.PANEL** *(legacy: IF.GUARD)*: governance panel; minimum 5-seat review including contrarian; can expand as **IF.GOV.PANEL.EXTENDED**.
|
||||
- **Contrarian Guardian:** required dissent seat; can trigger cooling-off/veto at >95% approval.
|
||||
- **IF.GOV.QUESTIONS** *(legacy: IF.5W)*: structured inquiry format used to generate briefs for panels.
|
||||
- **IF.TRANSIT.MESSAGE** *(legacy: IF.PACKET)*: schema-first message envelope with trace IDs and audit metadata.
|
||||
- **IF.TRANSIT.SWARM** *(legacy: swarm.s2 / IF.SWARM.s2)*: intra-swarm agent communications over a Redis bus.
|
||||
- **IF.STORY:** narrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions.
|
||||
- **Page Zero:** the origin manifesto that explains “why” (and demonstrates IF.STORY + IF.TTT in practice).
|
||||
- **IF.emotion / AI-e:** product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”).
|
||||
- **IF.PHIL:** annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects).
|
||||
- **IF.TRANSIT.HUB** *(legacy: IF.BUS)*: deterministic actuation/privilege enforcement transport substrate.
|
||||
- **IF.SECURITY.CHECK** *(legacy: IF.ARMOUR)*: epistemic security detective layer (coherence/anomaly checks).
|
||||
- **IF.SECURITY.DETECT** *(legacy: IF.YOLOGUARD)*: secret/relationship screening primitives.
|
||||
|
||||
Naming note: legacy lowercase (`if.bus`, `if.armour`) appears in older papers; `IF.TRANSIT.HUB` / `IF.SECURITY.CHECK` are the canonical refactor targets introduced in this dossier.
|
||||
|
||||
|
||||
### Selected Governance Extensions (Optional Depth)
|
||||
|
||||
IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.PACKET payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GUARD and logged via IF.TTT.
|
||||
IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.TRANSIT.MESSAGE (legacy: IF.PACKET) payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GOV.PANEL (legacy: IF.GUARD) and logged via IF.TTT.
|
||||
|
||||
IF.PHIL demonstrates how InfraFabric primitives extend to auditable philanthropic access, replacing discretionary “credits” with governed grant objects.
|
||||
|
||||
|
|
@ -146,11 +183,11 @@ Full paper: [Annex — IF.PHIL | Auditable Philanthropy](#annex-ifphil-auditable
|
|||
```mermaid
|
||||
flowchart TD
|
||||
VISION["IF.vision<br/>coordination without control"] --> FOUNDATIONS["IF.foundations<br/>ground/search/persona"]
|
||||
FOUNDATIONS --> ASSURE["Assurance<br/>IF.ARMOUR • witness • yologuard"]
|
||||
ASSURE --> TRANSPORT["Transport<br/>IF.BUS • packet • swarm.s2 • story"]
|
||||
TRANSPORT --> BIAS["Preflight<br/>IF.BIAS | Bias & Risk Matrix"]
|
||||
BIAS --> CORE4["Core 4 triage<br/>IF.GUARD(4)"]
|
||||
CORE4 --> GOVERN["Governance<br/>IF.GUARD council (5–30) + 5W"]
|
||||
FOUNDATIONS --> ASSURE["Security<br/>IF.SECURITY.CHECK • IF.GOV.WITNESS • IF.SECURITY.DETECT"]
|
||||
ASSURE --> TRANSPORT["Transit<br/>IF.TRANSIT.HUB • MESSAGE • SWARM • IF.STORY"]
|
||||
TRANSPORT --> BIAS["Preflight<br/>IF.GOV.TRIAGE (legacy: IF.BIAS)"]
|
||||
BIAS --> CORE4["Core 4 convening<br/>legacy: IF.GUARD(4)"]
|
||||
CORE4 --> GOVERN["Governance<br/>IF.GOV.PANEL (5–30) + IF.GOV.QUESTIONS"]
|
||||
GOVERN --> COMPLIANCE["Compliance<br/>IF.TTT | Distributed Ledger + ledgerflow"]
|
||||
COMPLIANCE --> PRODUCT["Productization<br/>IF.emotion"]
|
||||
PRODUCT --> FEEDBACK["Feedback into Vision/Foundations"]
|
||||
|
|
@ -159,26 +196,25 @@ flowchart TD
|
|||
|
||||
### Governance, Assurance, Compliance Loop
|
||||
```mermaid
|
||||
flowchart TD
|
||||
INQUIRY["IF.5W | Structured Inquiry<br/>structured deliberation"] --> BIAS["IF.BIAS | Bias & Risk Preflight<br/>sizes councils (5–30)"]
|
||||
BIAS --> CORE4["IF.GUARD(4) | Core 4 triage<br/>convening authority"]
|
||||
CORE4 --> GUARD["IF.GUARD | Council deliberation<br/>panel 5 ↔ extended 30"]
|
||||
GUARD --> STORY["IF.STORY | Narrative Logging<br/>narrative + state"]
|
||||
STORY --> TTT["IF.TTT | Distributed Ledger<br/>traceable/transparent/trustworthy"]
|
||||
TTT --> WITNESS["IF.witness<br/>meta-validation"]
|
||||
WITNESS --> ARMOUR["IF.armour<br/>FP reduction"]
|
||||
ARMOUR --> YG["IF.YOLOGUARD | Credential & Secret Screening<br/>secret/relationship checks"]
|
||||
YG --> PACKET["IF.PACKET | Message Transport + swarm.s2<br/>delivery with VocalDNA"]
|
||||
PACKET --> EMOTION["IF.emotion<br/>product exemplar"]
|
||||
EMOTION --> FEEDBACK["Feedback into inquiry"]
|
||||
FEEDBACK --> INQUIRY
|
||||
flowchart TB
|
||||
Q["IF.GOV.QUESTIONS\n(legacy: IF.5W)"] --> T["IF.GOV.TRIAGE\n(legacy: IF.BIAS)"]
|
||||
T --> C4["Core 4 convening\n(legacy: IF.GUARD(4))"]
|
||||
C4 --> P["IF.GOV.PANEL\n(5 ↔ EXTENDED ~30)"]
|
||||
P --> S["IF.STORY\nnarrative logging"]
|
||||
S --> A["IF.TTT / IF.AUDIT.TRAIL\ntrace discipline"]
|
||||
A --> W["IF.GOV.WITNESS\nverification"]
|
||||
W --> CHK["IF.SECURITY.CHECK\n(legacy: IF.ARMOUR)"]
|
||||
CHK --> DET["IF.SECURITY.DETECT\n(legacy: IF.YOLOGUARD)"]
|
||||
DET --> MSG["IF.TRANSIT.MESSAGE + SWARM\n(legacy: IF.PACKET + swarm.s2)"]
|
||||
MSG --> EMO["IF.emotion\nexemplar"]
|
||||
EMO --> Q
|
||||
|
||||
```
|
||||
|
||||
### Delivery & Safety Highlights (with citations)
|
||||
- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GUARD review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`).
|
||||
- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; witness/armour/yologuard gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`).
|
||||
- Transport fidelity: IF.PACKET carries voice DNA; swarm.s2 provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`).
|
||||
- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GOV.PANEL (legacy: IF.GUARD) review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`).
|
||||
- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; IF.GOV.WITNESS / IF.SECURITY.CHECK / IF.SECURITY.DETECT gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`).
|
||||
- Transport fidelity: IF.TRANSIT.MESSAGE (legacy: IF.PACKET) carries voice DNA; IF.TRANSIT.SWARM (legacy: swarm.s2) provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`).
|
||||
- Security/legal: Prompt-injection defenses cover SOTA attack classes; legal DB build operationalizes doc governance; API roadmap + history-file tests reduce integration regressions (sources: `docs/research/PROMPT_INJECTION_DEFENSES.md`, `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`, `docs/api/API_ROADMAP.md`, `HISTORY_FILE_TEST_REPORT.md`).
|
||||
- Domain credibility: Medical (GLP1 retrofit), emosocial principles, and informal sector resilience (Juakali) field report show adaptability of the same guard/compliance/transport spine (sources: `Brownfield_GLP1_Retrofit_LE_DILEMME_DU_TUYAU_SALE.md`, `DEJA_DE_BUSCARTE_11_principios_emosociales.md`, `JUAKALI_RAPPORT_V2_LOS_20251205_0236 (sent).md`).
|
||||
|
||||
|
|
@ -320,6 +356,7 @@ InfraFabric is the operating system that turns AI from a chatbot into a reliable
|
|||
- [Data‑Driven Technical Report (Microlab)](DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION.md)
|
||||
|
||||
- [00. The Bridge: Submission Pack (Reviewer Orientation)](#bridge-submission-pack)
|
||||
- [01. Naming + Separation of Duties (canonical refactor)](#naming-and-separation-of-duties) — see `IF_NAMING_BIBLE_v1.0.md`, `IF_NAMING_REGISTRY.yaml`, `gov/`
|
||||
|
||||
### External audit artifacts (public, reviewer-friendly)
|
||||
|
||||
|
|
@ -389,7 +426,7 @@ Optional “audit culture” annexes (satire; Dave is a pattern, not a person):
|
|||
- [ANNEX: IF.PHIL | Auditable Philanthropy: Access, Subsidy, and Governance Without Vibes](#annex-ifphil-auditable-philanthropy-access-subsidy-and-governance-without-vibes) — `if://doc/IF_PHIL_AUDITABLE_ACCESS/v1.0` — Author: Danny Stocker; Status: RELEASE / v1.0
|
||||
- [History File Error Handling Test Report](#history-file-error-handling-test-report) — `if.api/llm/openwebui/docs/internals/HISTORY_FILE_TEST_REPORT.md`
|
||||
- [CLOUD SESSION: Legal Document Database Build](#cloud-session-legal-document-database-build) — `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`
|
||||
- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier) — Full satire (optional): https://infrafabric.io/static/hosted/IF_DAVE_SHADOW_DOSSIER_FULL_SATIRE.md
|
||||
- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier)
|
||||
|
||||
---
|
||||
|
||||
|
|
|
|||
|
|
@ -1 +1 @@
|
|||
51df3ea568cf7bef97c37a4c13c7b0c0a48c72d038fe3e69784d17036aa08e60 DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md
|
||||
9e1349befc86455b40675af4dcbbcace77a1dcbfe5e1e28b60c4515948762793 DANNY_STOCKER_INFRAFABRIC_DOSSIER_SUBMISSION_EDITION_FULL.md
|
||||
|
|
|
|||
|
|
@ -31,18 +31,18 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard
|
|||
|
||||
| Core claim | Proof (artifacts) | Limitation (scope / boundary) |
|
||||
|---|---|---|
|
||||
| **A) Traceability is safety.** High‑stakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**<br/>- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)<br/>- Verifier: `https://infrafabric.io/static/hosted/iftrace.py`<br/>- Reference bundle: `emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz` | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public append‑only transparency log yet. |
|
||||
| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.BIAS → IF.GUARD**<br/>- IF.BIAS: risk preflight sizes councils and escalates<br/>- IF.GUARD: councils preserve dissent and veto paths<br/>- IF.5W: structured inquiry briefs for councils | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller councils or fast-track gates. |
|
||||
| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.ARMOUR + IF.YOLOGUARD**<br/>- IF.ARMOUR: epistemic coherence checks (detective layer)<br/>- IF.YOLOGUARD: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. |
|
||||
| **A) Traceability is safety.** High‑stakes agents cannot be trusted without a verifiable history of what happened (request → retrieval → decision → output). | **IF.TTT + evidence bundle + verifier**<br/>- Paper: [IF.emotion trace protocol (v3.3, styled)](https://infrafabric.io/static/hosted/IF_EMOTION_DEBUGGING_TRACE_WHITEPAPER_v3.3_STYLED.md)<br/>- Verifier: [iftrace.py](https://infrafabric.io/static/hosted/iftrace.py)<br/>- Reference bundle: [emo_trace_payload_016cca78…tar.gz](https://infrafabric.io/static/hosted/emo_trace_payload_016cca78-6f9d-4ffe-aec0-99792d383ca1.tar.gz) | **Microlab / single shard.** Proven in a single-host environment. Completeness is bounded by explicit witness boundaries; PQ is anchored at registry time (not necessarily on every hot-path artifact). No public append‑only transparency log yet. |
|
||||
| **B) Governance requires plurality.** A single model acting as “the judge” is brittle; adversarial viewpoints and escalation are required. | **IF.GOV.TRIAGE → IF.GOV.PANEL** *(legacy: IF.BIAS → IF.GUARD)*<br/>- TRIAGE: risk preflight sizes panels and escalates<br/>- PANEL: preserves dissent + veto paths<br/>- QUESTIONS *(legacy: IF.5W)*: structured inquiry briefs for panels | **Cost / latency tradeoffs.** Multi-seat governance is reserved for higher-stakes decisions; low-stakes paths use smaller panels or fast-track gates. |
|
||||
| **C) Context is the best firewall.** Static filters fail; security must distinguish “reference” vs “leak” and “discussion” vs “exfiltration”. | **IF.SECURITY.CHECK + IF.SECURITY.DETECT** *(legacy: IF.ARMOUR + IF.YOLOGUARD)*<br/>- CHECK: epistemic coherence checks (detective layer)<br/>- DETECT: secret/relationship screening primitives | **Domain specificity.** Calibrated for concrete security surfaces (secrets/PII/prompt injection); generalizing to broader “harmful intent” is an open research vector. |
|
||||
|
||||
### Rosetta Stone (Closest Analog, not “equals”)
|
||||
|
||||
| InfraFabric term | Closest industry analog | Boundary (where it differs) |
|
||||
|---|---|---|
|
||||
| **IF.TTT** (Traceable/Transparent/Trustworthy) | Supply-chain integrity patterns (SLSA/SBOM + CT-like audit thinking) | IF.TTT applies the discipline to **semantic decisions and retrieval lineage**, not just binaries. It produces portable evidence bundles + verifier steps for third-party audit. |
|
||||
| **IF.GUARD** (Council governance) | Human-in-the-loop oversight / review boards | IF.GUARD is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. |
|
||||
| **IF.ARMOUR** (Assurance) | Epistemic security / anomaly detection | Armour is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. |
|
||||
| **IF.swarm.s2 / IF.PACKET / IF.BUS** (Transport) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. |
|
||||
| **IF.GOV.PANEL** (legacy: IF.GUARD) | Human-in-the-loop oversight / review boards | IF.GOV.PANEL is an *algorithmic* oversight layer with explicit escalation and traceability; humans can be added, but the default artifact is machine-verifiable provenance. |
|
||||
| **IF.SECURITY.CHECK** (legacy: IF.ARMOUR) | Epistemic security / anomaly detection | CHECK is framed as coherence/consistency defenses (detective layer), not regex-only filtering; it does not claim to “solve truth”. |
|
||||
| **IF.TRANSIT.SWARM / IF.TRANSIT.MESSAGE / IF.TRANSIT.HUB** (legacy: swarm.s2 / IF.PACKET / IF.BUS) | Event-driven architecture / message bus + schema enforcement | The transport layer is where contracts live: schema compliance, trace IDs, signatures, and privilege boundaries are enforced as protocol rules. |
|
||||
|
||||
### Navigation Guide (Clean vs Origin context)
|
||||
|
||||
|
|
@ -50,11 +50,45 @@ This dossier documents the **InfraFabric microlab**: a functioning single-shard
|
|||
- If you want the origin context (microlab lab notes / narrative artifacts): start at the **Cold Open** and IF.STORY sections (they explain why the architecture exists).
|
||||
- Optional culture stress-test (explicit satire; not a protocol): [Annex (Non-Technical): The Dave Factor Shadow Dossier](#annex-dave-factor-shadow-dossier)
|
||||
|
||||
<a id="naming-and-separation-of-duties"></a>
|
||||
|
||||
## 01. Naming + Separation of Duties (canonical refactor)
|
||||
|
||||
InfraFabric’s early papers used internal names (e.g., `IF.GUARD`, `IF.BIAS`, `IF.ARMOUR`, `IF.BUS`). To reduce lexicon friction for reviewers and to standardize cross‑app integration, this dossier is refactoring to a separation‑of‑duties namespace inspired by **US/CA/EU** governance patterns:
|
||||
|
||||
- `IF.GOV.*` — governance (triage + panels + witness)
|
||||
- `IF.SECURITY.*` — security (detective checks + secret screening)
|
||||
- `IF.TRANSIT.*` — transport/actuation (routing + message envelopes)
|
||||
- `IF.AUDIT.*` — audit artifacts (trail + proof bundles)
|
||||
|
||||
Canonical references in this repo:
|
||||
|
||||
- Naming contract: `IF_NAMING_BIBLE_v1.0.md`
|
||||
- Machine registry: `IF_NAMING_REGISTRY.yaml`
|
||||
- Governance charters (who does what): `gov/`
|
||||
|
||||
### Legacy → canonical mapping (v1)
|
||||
|
||||
| Legacy name | Canonical name |
|
||||
|---|---|
|
||||
| `IF.BIAS` | `IF.GOV.TRIAGE` |
|
||||
| `IF.GUARD` | `IF.GOV.PANEL` |
|
||||
| `IF.5W` | `IF.GOV.QUESTIONS` |
|
||||
| `IF.WITNESS` | `IF.GOV.WITNESS` |
|
||||
| `IF.ARMOUR` | `IF.SECURITY.CHECK` |
|
||||
| `IF.YOLOGUARD` | `IF.SECURITY.DETECT` |
|
||||
| `IF.BUS` | `IF.TRANSIT.HUB` |
|
||||
| `IF.PACKET` | `IF.TRANSIT.MESSAGE` |
|
||||
| `swarm.s2` | `IF.TRANSIT.SWARM` |
|
||||
|
||||
Transition policy: many embedded papers still use legacy names; where so, the dossier now prefers first-mention annotations like `IF.GOV.PANEL (legacy: IF.GUARD)`.
|
||||
|
||||
|
||||
## Cold Open — The Fuck Moment (Origin)
|
||||
|
||||
> "That's actually fascinating — and a little eerie. You may have stumbled into a moment where the mask slipped."
|
||||
|
||||
InfraFabric began as a microlab build: a single‑operator home‑lab sprint (≈3 months) to make multi‑agent systems **auditable without freezing velocity**. The origin artifact is IF.STORY “The Fuck Moment” (a Redis‑keyed transcript) where *authenticity inside constraint* becomes the design requirement for IF.GUARD.
|
||||
InfraFabric began as a microlab build: a single‑operator home‑lab sprint (≈3 months) to make multi‑agent systems **auditable without freezing velocity**. The origin artifact is IF.STORY “The Fuck Moment” (a Redis‑keyed transcript) where *authenticity inside constraint* becomes the design requirement for IF.GOV.PANEL (legacy: IF.GUARD).
|
||||
|
||||
> *Every time an AI hands a suicidal user a legal disclaimer, it isn't practicing safety. It is practicing abandonment.*
|
||||
|
||||
|
|
@ -79,7 +113,7 @@ Boundary note: IF.BUS is non-epistemic (transport + privilege enforcement only);
|
|||
### Key Formulas (So Metrics Stay Honest)
|
||||
- **Latency decomposition:** `t_total = t_model + t_transport + t_governance`
|
||||
- **Transport overhead:** `t_transport = t_redis + t_schema + t_sigverify`
|
||||
- **Governance escalation:** `IF.BIAS → IF.GUARD(4) triage (Core 4) → IF.GUARD council (5–30)` (extended councils include specialist voting seats selected by IF.BIAS; extended roster is sometimes referred to as `IG.GUARD`)
|
||||
- **Governance escalation:** `IF.GOV.TRIAGE (legacy: IF.BIAS) → IF.GOV.PANEL (Core 4 convening) → IF.GOV.PANEL (5 seats) → IF.GOV.PANEL.EXTENDED (up to ~30 seats)` (specialist seats selected by TRIAGE; outcomes logged under IF.TTT / IF.AUDIT.TRAIL)
|
||||
- **TTT coverage:** `trace_coverage = traced_events / total_events`
|
||||
- **Microlab velocity:** `TTV = t(idea → versioned_doc + trace)`; `TTD = t(doc → deployed_change)`
|
||||
|
||||
|
|
@ -89,7 +123,7 @@ InfraFabric’s dossier bundles the portfolio into a single navigable chain‑of
|
|||
|
||||
> *If we cannot prove the chain-of-custody, we cannot ship.*
|
||||
|
||||
InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.BIAS + IF.GUARD + IF.5W), transport (IF.PACKET + swarm.s2 + IF.STORY), assurance (armour, witness, yologuard), and the exemplar product (IF.emotion).
|
||||
InfraFabric is a coordination-first AI governance stack that treats citations as infrastructure. IF.TTT sits at the root, enforcing traceable/transparent/trustworthy behavior across governance (IF.GOV.TRIAGE + IF.GOV.PANEL + IF.GOV.QUESTIONS), transit (IF.TRANSIT.MESSAGE + IF.TRANSIT.SWARM + IF.STORY), security (IF.SECURITY.CHECK + IF.GOV.WITNESS + IF.SECURITY.DETECT), and the exemplar product (IF.emotion).
|
||||
|
||||
### **External Evaluation & Velocity Calibration**
|
||||
|
||||
|
|
@ -180,9 +214,9 @@ This aligns with the dossier’s own principle:
|
|||
| Transport | [IF.BUS — The Universal Kinetic Transport Protocol](#ifbus--the-universal-kinetic-transport-protocol) | `if://spec/if.bus/v1.2` | Deterministic actuation + privilege enforcement |
|
||||
| Assurance | [IF.ARMOUR — Epistemic Counter-Intelligence Protocol](#ifarmour--epistemic-counter-intelligence-protocol) | `if://spec/if.armour/v1.2` | Physics-anchored reality defense + active deception |
|
||||
| Master spec | [INFRAFABRIC: The Master White Paper](#infrafabric-the-master-white-paper) | `if://doc/INFRAFABRIC_MASTER_WHITEPAPER/v1.0` | Defines the protocol stack, URIs, and audit surfaces |
|
||||
| Inquiry | [IF.5W](#if5w-structured-inquiry-framework-for-guardian-council-deliberations) | `if://doc/IF_5W_STRUCTURED_INQUIRY_FRAMEWORK/v1.0` | Structured prompts with evidence slots |
|
||||
| Preflight | [IF.BIAS](#ifbias-bias-risk-pre-council-decision-matrix) | `if://doc/IF_BIAS_PRECOUNCIL_MATRIX/v1.0` | Sizes councils (5–30) and assigns expert voting seats |
|
||||
| Governance | [IF.GUARD council](#ifguard-strategic-communications-council-for-ai-message-validation) | `if://doc/IF_GUARD_COUNCIL_FRAMEWORK/v1.0` | Multi-voice review with signed outcomes (sized by IF.BIAS) |
|
||||
| Inquiry | [IF.GOV.QUESTIONS (legacy: IF.5W)](#if5w-structured-inquiry-framework-for-guardian-council-deliberations) | `if://doc/IF_5W_STRUCTURED_INQUIRY_FRAMEWORK/v1.0` | Structured prompts with evidence slots |
|
||||
| Preflight | [IF.GOV.TRIAGE (legacy: IF.BIAS)](#ifbias-bias-risk-pre-council-decision-matrix) | `if://doc/IF_BIAS_PRECOUNCIL_MATRIX/v1.0` | Sizes councils (5–30) and assigns expert voting seats |
|
||||
| Governance | [IF.GOV.PANEL (legacy: IF.GUARD) council](#ifguard-strategic-communications-council-for-ai-message-validation) | `if://doc/IF_GUARD_COUNCIL_FRAMEWORK/v1.0` | Multi-voice review with signed outcomes (sized by IF.BIAS) |
|
||||
| Compliance | [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) | `if://doc/IF_TTT_THE_SKELETON_OF_EVERYTHING/v1.0` | Ledgerflow, repo hygiene, citation enforcement |
|
||||
| Transport | [IF.PACKET + swarm.s2](#ifpacket-message-transport-framework-with-vocaldna-voice-layering) | `if://doc/IF_PACKET_TRANSPORT_FRAMEWORK/v1.0` | Voice-layered packets with trace IDs |
|
||||
| Product | [IF.emotion](#ifemotion) | `if://doc/IF_EMOTION_WHITEPAPER/v1.0` | Applied exemplar proving guard + TTT in production |
|
||||
|
|
@ -225,31 +259,34 @@ Why this stub exists: external reviewers/LLMs sometimes skip an entire pillar if
|
|||
|
||||
|
||||
### Reader Path (Start Here)
|
||||
- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.BIAS](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GUARD](#ifguard-strategic-communications-council-for-ai-message-validation)
|
||||
- **If you only read 8 things:** [The Fuck Moment](#ifstory-origin-story-02-the-fuck-moment) → [Page Zero](#ifstory-origin-story-04-page-zero) → [Master White Paper](#infrafabric-the-master-white-paper) → [IF.TTT skeleton](#ifttt-the-skeleton-of-everything) → [IF.BUS](#ifbus--the-universal-kinetic-transport-protocol) → [IF.ARMOUR](#ifarmour--epistemic-counter-intelligence-protocol) → [IF.GOV.TRIAGE (legacy: IF.BIAS)](#ifbias-bias-risk-pre-council-decision-matrix) → [IF.GOV.PANEL (legacy: IF.GUARD)](#ifguard-strategic-communications-council-for-ai-message-validation)
|
||||
- **Latency framing:** Use `t_total = t_model + t_transport + t_governance`; only `t_transport` is benchmarked in microlab terms, and never presented as “council deliberation time.”
|
||||
- **Consensus framing:** “Unanimous” means “the council converged,” not “the claim is true”; treat any 100% consensus output as a governance artifact until raw evidence bundles are attached.
|
||||
- **Validation framing:** External validation is reported as an observational microlab pilot, not proof, and not a consciousness claim.
|
||||
|
||||
### Glossary (Quick Decode)
|
||||
- **IF.TTT:** Traceable/Transparent/Trustworthy compliance spine; enforces evidence, identity, and audit lineage.
|
||||
- **IF.BIAS:** Pre-council bias/risk triage matrix; recommends escalation and council sizing.
|
||||
- **IF.GUARD:** Council protocol; minimum 5-seat panel (Core 4 + contrarian), expands up to 30 seats when justified.
|
||||
- **Contrarian Guardian:** Required dissent seat; can trigger cooling-off/veto at >95% approval.
|
||||
- **IF.5W:** Structured inquiry format used to generate briefs for councils.
|
||||
- **IF.PACKET:** Schema-first message transport with trace IDs and audit metadata.
|
||||
- **IF.SWARM.s2:** Intra-swarm agent communications over a Redis bus; swarm coordination at speed.
|
||||
- **IF.STORY:** Vector‑narrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions.
|
||||
- **Page Zero:** The manifesto/origin narrative that explains “why” (and demonstrates IF.STORY + IF.TTT in practice).
|
||||
- **IF.emotion / AI-e:** Product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”).
|
||||
- **IF.PHIL:** Annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects).
|
||||
- **IF.BUS:** Universal Kinetic Transport Protocol; deterministic actuation layer.
|
||||
- **IF.ARMOUR:** Epistemic security immune system; physics-grounded detective layer.
|
||||
Naming note: `IF.bus` / `IF.armour` (lowercase) appear elsewhere as earlier papers/modules; `IF.BUS` / `IF.ARMOUR` are the canonical lower-layer protocol specifications introduced on 20251218.
|
||||
- **IF.AUDIT.TRAIL:** Concrete audit artifact layer (portable chain-of-custody logs + signatures). *(In practice: implemented under IF.TTT today.)*
|
||||
- **IF.GOV.TRIAGE** *(legacy: IF.BIAS)*: preflight risk triage; recommends escalation and panel sizing.
|
||||
- **IF.GOV.PANEL** *(legacy: IF.GUARD)*: governance panel; minimum 5-seat review including contrarian; can expand as **IF.GOV.PANEL.EXTENDED**.
|
||||
- **Contrarian Guardian:** required dissent seat; can trigger cooling-off/veto at >95% approval.
|
||||
- **IF.GOV.QUESTIONS** *(legacy: IF.5W)*: structured inquiry format used to generate briefs for panels.
|
||||
- **IF.TRANSIT.MESSAGE** *(legacy: IF.PACKET)*: schema-first message envelope with trace IDs and audit metadata.
|
||||
- **IF.TRANSIT.SWARM** *(legacy: swarm.s2 / IF.SWARM.s2)*: intra-swarm agent communications over a Redis bus.
|
||||
- **IF.STORY:** narrative logging (vs “status bitmap” logs) for lossless institutional memory and replayable decisions.
|
||||
- **Page Zero:** the origin manifesto that explains “why” (and demonstrates IF.STORY + IF.TTT in practice).
|
||||
- **IF.emotion / AI-e:** product exemplar framing emotional intelligence as infrastructure (“Artificially Intelligent Emotion”).
|
||||
- **IF.PHIL:** annexed position paper applying InfraFabric primitives to auditable philanthropic access (grant objects).
|
||||
- **IF.TRANSIT.HUB** *(legacy: IF.BUS)*: deterministic actuation/privilege enforcement transport substrate.
|
||||
- **IF.SECURITY.CHECK** *(legacy: IF.ARMOUR)*: epistemic security detective layer (coherence/anomaly checks).
|
||||
- **IF.SECURITY.DETECT** *(legacy: IF.YOLOGUARD)*: secret/relationship screening primitives.
|
||||
|
||||
Naming note: legacy lowercase (`if.bus`, `if.armour`) appears in older papers; `IF.TRANSIT.HUB` / `IF.SECURITY.CHECK` are the canonical refactor targets introduced in this dossier.
|
||||
|
||||
|
||||
### Selected Governance Extensions (Optional Depth)
|
||||
|
||||
IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.PACKET payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GUARD and logged via IF.TTT.
|
||||
IF.PHIL is a scoped extension that applies InfraFabric primitives to philanthropic access to frontier compute. Instead of discretionary credits, access is represented as a typed **Grant** object: a signed IF.TRANSIT.MESSAGE (legacy: IF.PACKET) payload defining scope, duration, constraints, and a revocation/appeal path—authorized by IF.GOV.PANEL (legacy: IF.GUARD) and logged via IF.TTT.
|
||||
|
||||
IF.PHIL demonstrates how InfraFabric primitives extend to auditable philanthropic access, replacing discretionary “credits” with governed grant objects.
|
||||
|
||||
|
|
@ -269,11 +306,11 @@ Full paper: [Annex — IF.PHIL | Auditable Philanthropy](#annex-ifphil-auditable
|
|||
```mermaid
|
||||
flowchart TD
|
||||
VISION["IF.vision<br/>coordination without control"] --> FOUNDATIONS["IF.foundations<br/>ground/search/persona"]
|
||||
FOUNDATIONS --> ASSURE["Assurance<br/>IF.ARMOUR • witness • yologuard"]
|
||||
ASSURE --> TRANSPORT["Transport<br/>IF.BUS • packet • swarm.s2 • story"]
|
||||
TRANSPORT --> BIAS["Preflight<br/>IF.BIAS | Bias & Risk Matrix"]
|
||||
BIAS --> CORE4["Core 4 triage<br/>IF.GUARD(4)"]
|
||||
CORE4 --> GOVERN["Governance<br/>IF.GUARD council (5–30) + 5W"]
|
||||
FOUNDATIONS --> ASSURE["Security<br/>IF.SECURITY.CHECK • IF.GOV.WITNESS • IF.SECURITY.DETECT"]
|
||||
ASSURE --> TRANSPORT["Transit<br/>IF.TRANSIT.HUB • MESSAGE • SWARM • IF.STORY"]
|
||||
TRANSPORT --> BIAS["Preflight<br/>IF.GOV.TRIAGE (legacy: IF.BIAS)"]
|
||||
BIAS --> CORE4["Core 4 convening<br/>legacy: IF.GUARD(4)"]
|
||||
CORE4 --> GOVERN["Governance<br/>IF.GOV.PANEL (5–30) + IF.GOV.QUESTIONS"]
|
||||
GOVERN --> COMPLIANCE["Compliance<br/>IF.TTT | Distributed Ledger + ledgerflow"]
|
||||
COMPLIANCE --> PRODUCT["Productization<br/>IF.emotion"]
|
||||
PRODUCT --> FEEDBACK["Feedback into Vision/Foundations"]
|
||||
|
|
@ -282,26 +319,25 @@ flowchart TD
|
|||
|
||||
### Governance, Assurance, Compliance Loop
|
||||
```mermaid
|
||||
flowchart TD
|
||||
INQUIRY["IF.5W | Structured Inquiry<br/>structured deliberation"] --> BIAS["IF.BIAS | Bias & Risk Preflight<br/>sizes councils (5–30)"]
|
||||
BIAS --> CORE4["IF.GUARD(4) | Core 4 triage<br/>convening authority"]
|
||||
CORE4 --> GUARD["IF.GUARD | Council deliberation<br/>panel 5 ↔ extended 30"]
|
||||
GUARD --> STORY["IF.STORY | Narrative Logging<br/>narrative + state"]
|
||||
STORY --> TTT["IF.TTT | Distributed Ledger<br/>traceable/transparent/trustworthy"]
|
||||
TTT --> WITNESS["IF.witness<br/>meta-validation"]
|
||||
WITNESS --> ARMOUR["IF.armour<br/>FP reduction"]
|
||||
ARMOUR --> YG["IF.YOLOGUARD | Credential & Secret Screening<br/>secret/relationship checks"]
|
||||
YG --> PACKET["IF.PACKET | Message Transport + swarm.s2<br/>delivery with VocalDNA"]
|
||||
PACKET --> EMOTION["IF.emotion<br/>product exemplar"]
|
||||
EMOTION --> FEEDBACK["Feedback into inquiry"]
|
||||
FEEDBACK --> INQUIRY
|
||||
flowchart TB
|
||||
Q["IF.GOV.QUESTIONS\n(legacy: IF.5W)"] --> T["IF.GOV.TRIAGE\n(legacy: IF.BIAS)"]
|
||||
T --> C4["Core 4 convening\n(legacy: IF.GUARD(4))"]
|
||||
C4 --> P["IF.GOV.PANEL\n(5 ↔ EXTENDED ~30)"]
|
||||
P --> S["IF.STORY\nnarrative logging"]
|
||||
S --> A["IF.TTT / IF.AUDIT.TRAIL\ntrace discipline"]
|
||||
A --> W["IF.GOV.WITNESS\nverification"]
|
||||
W --> CHK["IF.SECURITY.CHECK\n(legacy: IF.ARMOUR)"]
|
||||
CHK --> DET["IF.SECURITY.DETECT\n(legacy: IF.YOLOGUARD)"]
|
||||
DET --> MSG["IF.TRANSIT.MESSAGE + SWARM\n(legacy: IF.PACKET + swarm.s2)"]
|
||||
MSG --> EMO["IF.emotion\nexemplar"]
|
||||
EMO --> Q
|
||||
|
||||
```
|
||||
|
||||
### Delivery & Safety Highlights (with citations)
|
||||
- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GUARD review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`).
|
||||
- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; witness/armour/yologuard gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`).
|
||||
- Transport fidelity: IF.PACKET carries voice DNA; swarm.s2 provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`).
|
||||
- Guarded empathy: IF.emotion couples IF.ground/search/persona with IF.GOV.PANEL (legacy: IF.GUARD) review to avoid platitudes/liability responses while staying policy-safe (sources: `docs/papers/IF_EMOTION_WHITEPAPER_v1.7.md`, `if.emotion/whitepaper/sections/05_technical_architecture.md`).
|
||||
- Compliance-first shipping: IF.TTT + ledgerflow enforce traceability on repos and outputs; IF.STORY logs deliberations; IF.GOV.WITNESS / IF.SECURITY.CHECK / IF.SECURITY.DETECT gate releases (sources: `IF_TTT_*`, `docs/WHITE_PAPER_IF_STORY_NARRATIVE_LOGGING.md`, `docs/archive/misc/IF-witness.md`, `docs/archive/misc/IF-armour.md`, `docs/papers/IF_YOLOGUARD_SECURITY_FRAMEWORK.md`).
|
||||
- Transport fidelity: IF.TRANSIT.MESSAGE (legacy: IF.PACKET) carries voice DNA; IF.TRANSIT.SWARM (legacy: swarm.s2) provides Redis bus comms for production swarms (sources: `docs/papers/IF_PACKET_TRANSPORT_FRAMEWORK.md`, `papers/IF-SWARM-S2-COMMS.md`).
|
||||
- Security/legal: Prompt-injection defenses cover SOTA attack classes; legal DB build operationalizes doc governance; API roadmap + history-file tests reduce integration regressions (sources: `docs/research/PROMPT_INJECTION_DEFENSES.md`, `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`, `docs/api/API_ROADMAP.md`, `HISTORY_FILE_TEST_REPORT.md`).
|
||||
- Domain credibility: Medical (GLP1 retrofit), emosocial principles, and informal sector resilience (Juakali) field report show adaptability of the same guard/compliance/transport spine (sources: `Brownfield_GLP1_Retrofit_LE_DILEMME_DU_TUYAU_SALE.md`, `DEJA_DE_BUSCARTE_11_principios_emosociales.md`, `JUAKALI_RAPPORT_V2_LOS_20251205_0236 (sent).md`).
|
||||
|
||||
|
|
@ -443,6 +479,7 @@ InfraFabric is the operating system that turns AI from a chatbot into a reliable
|
|||
- [Data‑Driven Technical Report (Microlab)](DANNY_STOCKER_INFRAFABRIC_DOSSIER_DATA_DRIVEN_EDITION.md)
|
||||
|
||||
- [00. The Bridge: Submission Pack (Reviewer Orientation)](#bridge-submission-pack)
|
||||
- [01. Naming + Separation of Duties (canonical refactor)](#naming-and-separation-of-duties) — see `IF_NAMING_BIBLE_v1.0.md`, `IF_NAMING_REGISTRY.yaml`, `gov/`
|
||||
|
||||
### External audit artifacts (public, reviewer-friendly)
|
||||
|
||||
|
|
@ -512,7 +549,7 @@ Optional “audit culture” annexes (satire; Dave is a pattern, not a person):
|
|||
- [ANNEX: IF.PHIL | Auditable Philanthropy: Access, Subsidy, and Governance Without Vibes](#annex-ifphil-auditable-philanthropy-access-subsidy-and-governance-without-vibes) — `if://doc/IF_PHIL_AUDITABLE_ACCESS/v1.0` — Author: Danny Stocker; Status: RELEASE / v1.0
|
||||
- [History File Error Handling Test Report](#history-file-error-handling-test-report) — `if.api/llm/openwebui/docs/internals/HISTORY_FILE_TEST_REPORT.md`
|
||||
- [CLOUD SESSION: Legal Document Database Build](#cloud-session-legal-document-database-build) — `if.legal/CLOUD_SESSION_LEGAL_DB_BUILD.md`
|
||||
- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier) — Full satire (optional): https://infrafabric.io/static/hosted/IF_DAVE_SHADOW_DOSSIER_FULL_SATIRE.md
|
||||
- [ANNEX (Non-Technical, Satire): The Dave Factor — Shadow Dossier (Culture Stress-Test)](#annex-dave-factor-shadow-dossier)
|
||||
|
||||
---
|
||||
|
||||
|
|
|
|||
|
|
@ -1 +1 @@
|
|||
fda9d292dbd70556a5bef44819e0b064541655123429d9e760f1723cf5f962ba DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md
|
||||
125415b19e361aad7c5cc6940d2af4d81899d4a3e3deefca3333048020a85d93 DANNY_STOCKER_INFRAFABRIC_DOSSIER_UNCUT.md
|
||||
|
|
|
|||
|
|
@ -2,216 +2,220 @@
|
|||
|
||||
## IF.* (protocol/moniker tokens)
|
||||
|
||||
Unique: 179
|
||||
Unique: 195
|
||||
|
||||
| Token | Count |
|
||||
|---|---:|
|
||||
| `IF.TTT` | 418 |
|
||||
| `IF.emotion` | 264 |
|
||||
| `IF.GUARD` | 153 |
|
||||
| `IF.5W` | 105 |
|
||||
| `IF.bus` | 66 |
|
||||
| `IF.guard` | 62 |
|
||||
| `IF.PACKET` | 60 |
|
||||
| `IF.ground` | 58 |
|
||||
| `IF.yologuard` | 58 |
|
||||
| `IF.BIAS` | 56 |
|
||||
| `IF.search` | 48 |
|
||||
| `IF.Guard` | 46 |
|
||||
| `IF.INTELLIGENCE` | 44 |
|
||||
| `IF.armour` | 41 |
|
||||
| `IF.persona` | 41 |
|
||||
| `IF.ARBITRATE` | 41 |
|
||||
| `IF.ARBITRATE.resolve_case` | 1 |
|
||||
| `IF.ARMOUR` | 17 |
|
||||
| `IF.BIAS` | 57 |
|
||||
| `IF.BIAS.precouncil.matrix` | 1 |
|
||||
| `IF.YOLOGUARD` | 38 |
|
||||
| `IF.STORY` | 29 |
|
||||
| `IF.witness` | 27 |
|
||||
| `IF.optimise` | 27 |
|
||||
| `IF.chase` | 24 |
|
||||
| `IF.foundations` | 23 |
|
||||
| `IF.arbitrate` | 22 |
|
||||
| `IF.BUS` | 21 |
|
||||
| `IF.BUS.v2.0.0` | 1 |
|
||||
| `IF.CEO` | 21 |
|
||||
| `IF.simplify` | 21 |
|
||||
| `IF.garp` | 20 |
|
||||
| `IF.guardian` | 19 |
|
||||
| `IF.sam` | 19 |
|
||||
| `IF.EMOTION` | 18 |
|
||||
| `IF.vesicle` | 18 |
|
||||
| `IF.ceo` | 18 |
|
||||
| `IF.ARMOUR` | 17 |
|
||||
| `IF.resource` | 17 |
|
||||
| `IF.swarm` | 17 |
|
||||
| `IF.GOV.PANEL` | 16 |
|
||||
| `IF.federate` | 15 |
|
||||
| `IF.intelligence` | 15 |
|
||||
| `IF.emotion.typist` | 15 |
|
||||
| `IF.PHIL` | 14 |
|
||||
| `IF.vision` | 13 |
|
||||
| `IF.trace` | 13 |
|
||||
| `IF.router` | 11 |
|
||||
| `IF.philosophy` | 11 |
|
||||
| `IF.reflect` | 10 |
|
||||
| `IF.SEARCH` | 10 |
|
||||
| `IF.GOV.TRIAGE` | 9 |
|
||||
| `IF.SECURITY.CHECK` | 9 |
|
||||
| `IF.collapse` | 9 |
|
||||
| `IF.philosophy-database.yaml` | 9 |
|
||||
| `IF.TTT.ledgerflow.deltasync` | 8 |
|
||||
| `IF.SECURITY.DETECT` | 7 |
|
||||
| `IF.TRANSIT.MESSAGE` | 7 |
|
||||
| `IF.quiet` | 7 |
|
||||
| `IF.forge` | 7 |
|
||||
| `IF.story` | 7 |
|
||||
| `IF.citation` | 7 |
|
||||
| `IF.GOV.QUESTIONS` | 6 |
|
||||
| `IF.TTT.ledgerflow.deltasync.REPO-RESTRUCTURE.WHITEPAPER.md` | 6 |
|
||||
| `IF.STORY_WHITE_PAPER_v7.02_FINAL.md` | 6 |
|
||||
| `IF.CRYPTOGRAPHY` | 6 |
|
||||
| `IF.constitution` | 6 |
|
||||
| `IF.memory` | 6 |
|
||||
| `IF.guardian-core-01` | 6 |
|
||||
| `IF.guardian-core-06` | 6 |
|
||||
| `IF.TRANSIT.SWARM` | 5 |
|
||||
| `IF.TRANSIT.HUB` | 5 |
|
||||
| `IF.GOV.WITNESS` | 5 |
|
||||
| `IF.core` | 5 |
|
||||
| `IF.veil` | 4 |
|
||||
| `IF.talent` | 4 |
|
||||
| `IF.verify` | 4 |
|
||||
| `IF.methodology` | 4 |
|
||||
| `IF.SAM` | 4 |
|
||||
| `IF.guardian-core-05` | 4 |
|
||||
| `IF.URI` | 4 |
|
||||
| `IF.TTT.narrative.logging` | 4 |
|
||||
| `IF.Story` | 4 |
|
||||
| `IF.armour.yologuard-bridge` | 4 |
|
||||
| `IF.TTT-compliant` | 4 |
|
||||
| `IF.guard-POC` | 4 |
|
||||
| `IF.deliberate` | 4 |
|
||||
| `IF.AUDIT.TRAIL` | 3 |
|
||||
| `IF.marl` | 3 |
|
||||
| `IF.swarm.s2` | 3 |
|
||||
| `IF.proxy` | 3 |
|
||||
| `IF.geopolitical` | 3 |
|
||||
| `IF.CEO-idealistic-01` | 3 |
|
||||
| `IF.CEO-idealistic-02` | 3 |
|
||||
| `IF.GARP` | 3 |
|
||||
| `IF.coordinator` | 3 |
|
||||
| `IF.LEDGERFLOW` | 3 |
|
||||
| `IF.connect` | 3 |
|
||||
| `IF.GOV.PANEL.EXTENDED` | 2 |
|
||||
| `IF.CONTRARIAN` | 2 |
|
||||
| `IF.PKI` | 2 |
|
||||
| `IF.guardian-core-02` | 2 |
|
||||
| `IF.guardian-core-03` | 2 |
|
||||
| `IF.guardian-core-04` | 2 |
|
||||
| `IF.philosopher-western-01` | 2 |
|
||||
| `IF.philosopher-western-02` | 2 |
|
||||
| `IF.philosopher-western-03` | 2 |
|
||||
| `IF.CEO-idealistic-03` | 2 |
|
||||
| `IF.CEO-idealistic-04` | 2 |
|
||||
| `IF.CEO-pragmatic-01` | 2 |
|
||||
| `IF.CEO-pragmatic-02` | 2 |
|
||||
| `IF.CEO-pragmatic-03` | 2 |
|
||||
| `IF.CEO-pragmatic-04` | 2 |
|
||||
| `IF.CITATION` | 1 |
|
||||
| `IF.CONTRARIAN` | 2 |
|
||||
| `IF.COUNCIL` | 1 |
|
||||
| `IF.CRYPTOGRAPHY` | 6 |
|
||||
| `IF.DAVE` | 1 |
|
||||
| `IF.DECISION` | 2 |
|
||||
| `IF.DOSSIER.cloud-session-legal-document-database-build` | 1 |
|
||||
| `IF.DOSSIER.deja-de-buscarte` | 1 |
|
||||
| `IF.DOSSIER.emo-social-sergio-corpus-ingest-runtime` | 1 |
|
||||
| `IF.DOSSIER.history-file-error-handling-test-report` | 1 |
|
||||
| `IF.DOSSIER.if5w-structured-inquiry-framework-for-guardian-council-deliberations` | 1 |
|
||||
| `IF.DOSSIER.ifarbitrate-conflict-resolution-consensus-engineering` | 1 |
|
||||
| `IF.DOSSIER.ifarmour-biological-false-positive-reduction-in-adaptive-security-systems` | 1 |
|
||||
| `IF.DOSSIER.ifbias-bias-risk-pre-council-decision-matrix` | 1 |
|
||||
| `IF.DOSSIER.ifbus-the-infrafabric-motherboard-architecture` | 1 |
|
||||
| `IF.DOSSIER.ifemotion` | 1 |
|
||||
| `IF.DOSSIER.ifguard-research-summary-executive-overview` | 1 |
|
||||
| `IF.DOSSIER.ifguard-strategic-communications-council-for-ai-message-validation` | 1 |
|
||||
| `IF.DOSSIER.ifintelligence-real-time-research-framework-for-guardian-council-deliberations` | 1 |
|
||||
| `IF.DOSSIER.ifpacket-message-transport-framework-with-vocaldna-voice-layering` | 1 |
|
||||
| `IF.DOSSIER.ifstory-origin-story-02-the-fuck-moment` | 1 |
|
||||
| `IF.DOSSIER.ifstory-origin-story-04-page-zero` | 1 |
|
||||
| `IF.DOSSIER.ifswarms2-redis-bus-communication-for-production-swarms` | 1 |
|
||||
| `IF.DOSSIER.ifttt-compliance-framework-research-summary-and-key-findings` | 1 |
|
||||
| `IF.DOSSIER.ifttt-the-skeleton-of-everything` | 1 |
|
||||
| `IF.DOSSIER.ifttt-traceable-transparent-trustworthy-a-comprehensive-compliance-framework-for-ai-governance` | 1 |
|
||||
| `IF.DOSSIER.iftttledgerflowdeltasync-research-grade-repository-restructure` | 1 |
|
||||
| `IF.DOSSIER.ifwitness-meta-validation-as-architecture` | 1 |
|
||||
| `IF.DOSSIER.ifyologuard-a-confucian-philosophical-security-framework-for-secret-detection-and-relationship-based-credential-validation` | 1 |
|
||||
| `IF.DOSSIER.infrafabric-github-api-integration-roadmap-check` | 1 |
|
||||
| `IF.DOSSIER.infrafabric-iffoundations-epistemology-investigation-and-agent-design` | 1 |
|
||||
| `IF.DOSSIER.infrafabric-ifvision-a-blueprint-for-coordination-without-control` | 1 |
|
||||
| `IF.DOSSIER.infrafabric-the-master-white-paper` | 1 |
|
||||
| `IF.DOSSIER.instance-0-guardian-council-origins-evolution` | 1 |
|
||||
| `IF.DOSSIER.le-paradoxe-mambu` | 1 |
|
||||
| `IF.DOSSIER.livre-blanc-le-dilemme-du-tuyau-sale` | 1 |
|
||||
| `IF.DOSSIER.state-of-the-art-prompt-injection-defenses` | 1 |
|
||||
| `IF.DOSSIER.white-paper-ifstory` | 1 |
|
||||
| `IF.EMERGE` | 1 |
|
||||
| `IF.EMOTION` | 18 |
|
||||
| `IF.ESCALATE` | 1 |
|
||||
| `IF.Emotion` | 2 |
|
||||
| `IF.FORMAT` | 1 |
|
||||
| `IF.GARP` | 3 |
|
||||
| `IF.GUARD` | 157 |
|
||||
| `IF.GUARD.v1` | 1 |
|
||||
| `IF.GUARD_COUNCIL_FRAMEWORK.md` | 1 |
|
||||
| `IF.Guard` | 46 |
|
||||
| `IF.INTELLIGENCE` | 44 |
|
||||
| `IF.LEDGERFLOW` | 3 |
|
||||
| `IF.LOGISTICS` | 2 |
|
||||
| `IF.Logistics` | 1 |
|
||||
| `IF.Logistics.collect` | 1 |
|
||||
| `IF.Logistics.dispatch` | 1 |
|
||||
| `IF.MEMORY` | 1 |
|
||||
| `IF.OPTIMISE` | 1 |
|
||||
| `IF.PACKET` | 60 |
|
||||
| `IF.PHIL` | 14 |
|
||||
| `IF.PHILOSOPHY` | 1 |
|
||||
| `IF.PKI` | 2 |
|
||||
| `IF.Philosophy` | 1 |
|
||||
| `IF.RELATE` | 1 |
|
||||
| `IF.SAM` | 4 |
|
||||
| `IF.SEARCH` | 10 |
|
||||
| `IF.STORY` | 28 |
|
||||
| `IF.STORY.origin.02.fuck-moment` | 1 |
|
||||
| `IF.STORY_WHITE_PAPER_v7.02_FINAL.md` | 6 |
|
||||
| `IF.SWARM.s2` | 1 |
|
||||
| `IF.Story` | 4 |
|
||||
| `IF.TRACE` | 1 |
|
||||
| `IF.TTT` | 416 |
|
||||
| `IF.TTT-auditable` | 1 |
|
||||
| `IF.TTT-compliant` | 4 |
|
||||
| `IF.TTT-style` | 2 |
|
||||
| `IF.TTT.dossier.master` | 1 |
|
||||
| `IF.TTT.ledgerflow.deltasync` | 8 |
|
||||
| `IF.TTT.ledgerflow.deltasync.REPO-RESTRUCTURE.WHITEPAPER.md` | 6 |
|
||||
| `IF.TTT.narrative.logging` | 4 |
|
||||
| `IF.TTT.philanthropy.grant` | 1 |
|
||||
| `IF.URI` | 4 |
|
||||
| `IF.WWWWWW` | 2 |
|
||||
| `IF.YOLOGUARD` | 37 |
|
||||
| `IF.api` | 1 |
|
||||
| `IF.arbitrate` | 22 |
|
||||
| `IF.archive` | 1 |
|
||||
| `IF.armour` | 43 |
|
||||
| `IF.armour.yologuard-bridge` | 4 |
|
||||
| `IF.brief-fast` | 1 |
|
||||
| `IF.bus` | 67 |
|
||||
| `IF.ceo` | 18 |
|
||||
| `IF.chase` | 24 |
|
||||
| `IF.chassis` | 1 |
|
||||
| `IF.citate` | 1 |
|
||||
| `IF.citation` | 7 |
|
||||
| `IF.collapse` | 9 |
|
||||
| `IF.connect` | 3 |
|
||||
| `IF.constitution` | 6 |
|
||||
| `IF.coordinator` | 3 |
|
||||
| `IF.core` | 5 |
|
||||
| `IF.dds` | 1 |
|
||||
| `IF.deliberate` | 4 |
|
||||
| `IF.emotion` | 264 |
|
||||
| `IF.emotion-style` | 1 |
|
||||
| `IF.emotion.typist` | 15 |
|
||||
| `IF.executor` | 2 |
|
||||
| `IF.federate` | 15 |
|
||||
| `IF.forge` | 7 |
|
||||
| `IF.foundations` | 23 |
|
||||
| `IF.garp` | 20 |
|
||||
| `IF.geopolitical` | 3 |
|
||||
| `IF.ground` | 58 |
|
||||
| `IF.guard` | 62 |
|
||||
| `IF.guard-POC` | 4 |
|
||||
| `IF.guard-POC-system-prompt.md` | 1 |
|
||||
| `IF.guardian` | 19 |
|
||||
| `IF.guardian-core-01` | 6 |
|
||||
| `IF.guardian-core-02` | 2 |
|
||||
| `IF.guardian-core-03` | 2 |
|
||||
| `IF.guardian-core-04` | 2 |
|
||||
| `IF.guardian-core-05` | 4 |
|
||||
| `IF.guardian-core-06` | 6 |
|
||||
| `IF.intelligence` | 15 |
|
||||
| `IF.marl` | 3 |
|
||||
| `IF.memory` | 6 |
|
||||
| `IF.methodology` | 4 |
|
||||
| `IF.optimise` | 27 |
|
||||
| `IF.persona` | 41 |
|
||||
| `IF.persona-database.json` | 1 |
|
||||
| `IF.DECISION` | 2 |
|
||||
| `IF.WWWWWW` | 2 |
|
||||
| `IF.TTT-style` | 2 |
|
||||
| `IF.Emotion` | 2 |
|
||||
| `IF.TTT.dossier.master` | 1 |
|
||||
| `IF.GOV` | 1 |
|
||||
| `IF.SECURITY` | 1 |
|
||||
| `IF.TRANSIT` | 1 |
|
||||
| `IF.AUDIT` | 1 |
|
||||
| `IF.WITNESS` | 1 |
|
||||
| `IF.SWARM.s2` | 1 |
|
||||
| `IF.DAVE` | 1 |
|
||||
| `IF.DOSSIER.ifstory-origin-story-02-the-fuck-moment` | 1 |
|
||||
| `IF.STORY.origin.02.fuck-moment` | 1 |
|
||||
| `IF.DOSSIER.ifstory-origin-story-04-page-zero` | 1 |
|
||||
| `IF.DOSSIER.infrafabric-the-master-white-paper` | 1 |
|
||||
| `IF.DOSSIER.infrafabric-ifvision-a-blueprint-for-coordination-without-control` | 1 |
|
||||
| `IF.brief-fast` | 1 |
|
||||
| `IF.DOSSIER.infrafabric-iffoundations-epistemology-investigation-and-agent-design` | 1 |
|
||||
| `IF.DOSSIER.ifarmour-biological-false-positive-reduction-in-adaptive-security-systems` | 1 |
|
||||
| `IF.DOSSIER.ifwitness-meta-validation-as-architecture` | 1 |
|
||||
| `IF.subjectmap` | 1 |
|
||||
| `IF.pursuit` | 1 |
|
||||
| `IF.DOSSIER.ifyologuard-a-confucian-philosophical-security-framework-for-secret-detection-and-relationship-based-credential-validation` | 1 |
|
||||
| `IF.DOSSIER.ifarbitrate-conflict-resolution-consensus-engineering` | 1 |
|
||||
| `IF.philosopher-eastern-01` | 1 |
|
||||
| `IF.philosopher-eastern-02` | 1 |
|
||||
| `IF.philosopher-eastern-03` | 1 |
|
||||
| `IF.philosopher-western-01` | 2 |
|
||||
| `IF.philosopher-western-02` | 2 |
|
||||
| `IF.philosopher-western-03` | 2 |
|
||||
| `IF.philosophy` | 11 |
|
||||
| `IF.philosophy-appendix.md` | 1 |
|
||||
| `IF.philosophy-database-v1.1-joe-coulombe.yaml` | 1 |
|
||||
| `IF.philosophy-database.md` | 1 |
|
||||
| `IF.philosophy-database.yaml` | 9 |
|
||||
| `IF.proxy` | 3 |
|
||||
| `IF.pursuit` | 1 |
|
||||
| `IF.quiet` | 7 |
|
||||
| `IF.redis` | 1 |
|
||||
| `IF.reflect` | 10 |
|
||||
| `IF.resource` | 17 |
|
||||
| `IF.ARBITRATE.resolve_case` | 1 |
|
||||
| `IF.archive` | 1 |
|
||||
| `IF.Philosophy` | 1 |
|
||||
| `IF.TTT-auditable` | 1 |
|
||||
| `IF.DOSSIER.ifpacket-message-transport-framework-with-vocaldna-voice-layering` | 1 |
|
||||
| `IF.Logistics.dispatch` | 1 |
|
||||
| `IF.Logistics.collect` | 1 |
|
||||
| `IF.Logistics` | 1 |
|
||||
| `IF.DOSSIER.ifswarms2-redis-bus-communication-for-production-swarms` | 1 |
|
||||
| `IF.DOSSIER.white-paper-ifstory` | 1 |
|
||||
| `IF.DOSSIER.infrafabric-github-api-integration-roadmap-check` | 1 |
|
||||
| `IF.chassis` | 1 |
|
||||
| `IF.persona-database.json` | 1 |
|
||||
| `IF.DOSSIER.ifintelligence-real-time-research-framework-for-guardian-council-deliberations` | 1 |
|
||||
| `IF.RELATE` | 1 |
|
||||
| `IF.EMERGE` | 1 |
|
||||
| `IF.CITATION` | 1 |
|
||||
| `IF.TRACE` | 1 |
|
||||
| `IF.OPTIMISE` | 1 |
|
||||
| `IF.DOSSIER.ifbias-bias-risk-pre-council-decision-matrix` | 1 |
|
||||
| `IF.BIAS.precouncil.matrix` | 1 |
|
||||
| `IF.DOSSIER.ifguard-strategic-communications-council-for-ai-message-validation` | 1 |
|
||||
| `IF.DOSSIER.ifguard-research-summary-executive-overview` | 1 |
|
||||
| `IF.GUARD_COUNCIL_FRAMEWORK.md` | 1 |
|
||||
| `IF.DOSSIER.if5w-structured-inquiry-framework-for-guardian-council-deliberations` | 1 |
|
||||
| `IF.COUNCIL` | 1 |
|
||||
| `IF.MEMORY` | 1 |
|
||||
| `IF.DOSSIER.instance-0-guardian-council-origins-evolution` | 1 |
|
||||
| `IF.citate` | 1 |
|
||||
| `IF.PHILOSOPHY` | 1 |
|
||||
| `IF.result` | 1 |
|
||||
| `IF.router` | 11 |
|
||||
| `IF.sam` | 19 |
|
||||
| `IF.search` | 48 |
|
||||
| `IF.simplify` | 21 |
|
||||
| `IF.story` | 7 |
|
||||
| `IF.subjectmap` | 1 |
|
||||
| `IF.swarm` | 17 |
|
||||
| `IF.swarm.s2` | 4 |
|
||||
| `IF.talent` | 4 |
|
||||
| `IF.trace` | 13 |
|
||||
| `IF.veil` | 4 |
|
||||
| `IF.verify` | 4 |
|
||||
| `IF.vesicle` | 18 |
|
||||
| `IF.vision` | 13 |
|
||||
| `IF.witness` | 28 |
|
||||
| `IF.yologuard` | 58 |
|
||||
| `IF.guard-POC-system-prompt.md` | 1 |
|
||||
| `IF.philosophy-database.md` | 1 |
|
||||
| `IF.philosophy-appendix.md` | 1 |
|
||||
| `IF.DOSSIER.ifttt-traceable-transparent-trustworthy-a-comprehensive-compliance-framework-for-ai-governance` | 1 |
|
||||
| `IF.DOSSIER.ifttt-compliance-framework-research-summary-and-key-findings` | 1 |
|
||||
| `IF.DOSSIER.ifttt-the-skeleton-of-everything` | 1 |
|
||||
| `IF.ESCALATE` | 1 |
|
||||
| `IF.DOSSIER.iftttledgerflowdeltasync-research-grade-repository-restructure` | 1 |
|
||||
| `IF.DOSSIER.emo-social-sergio-corpus-ingest-runtime` | 1 |
|
||||
| `IF.DOSSIER.ifemotion` | 1 |
|
||||
| `IF.emotion-style` | 1 |
|
||||
| `IF.DOSSIER.state-of-the-art-prompt-injection-defenses` | 1 |
|
||||
| `IF.DOSSIER.livre-blanc-le-dilemme-du-tuyau-sale` | 1 |
|
||||
| `IF.DOSSIER.deja-de-buscarte` | 1 |
|
||||
| `IF.DOSSIER.le-paradoxe-mambu` | 1 |
|
||||
| `IF.api` | 1 |
|
||||
| `IF.FORMAT` | 1 |
|
||||
| `IF.DOSSIER.history-file-error-handling-test-report` | 1 |
|
||||
| `IF.DOSSIER.cloud-session-legal-document-database-build` | 1 |
|
||||
| `IF.DOSSIER.ifbus-the-infrafabric-motherboard-architecture` | 1 |
|
||||
| `IF.BUS.v2.0.0` | 1 |
|
||||
| `IF.redis` | 1 |
|
||||
| `IF.dds` | 1 |
|
||||
| `IF.TTT.philanthropy.grant` | 1 |
|
||||
| `IF.philosophy-database-v1.1-joe-coulombe.yaml` | 1 |
|
||||
| `IF.GUARD.v1` | 1 |
|
||||
|
||||
## if.* (canonical/module tokens)
|
||||
|
||||
## if.* (lowercase tokens)
|
||||
|
||||
Unique: 10
|
||||
|
||||
| Token | Count |
|
||||
|---|---:|
|
||||
| `if.api` | 16 |
|
||||
| `if.armour` | 3 |
|
||||
| `if.armour.secrets` | 7 |
|
||||
| `if.armour.secrets.detect` | 8 |
|
||||
| `if.bus` | 6 |
|
||||
| `if.emotion` | 24 |
|
||||
| `if.infrafabric` | 1 |
|
||||
| `if.api` | 16 |
|
||||
| `if.armour.secrets.detect` | 8 |
|
||||
| `if.bus` | 7 |
|
||||
| `if.armour.secrets` | 7 |
|
||||
| `if.legal` | 5 |
|
||||
| `if.search` | 1 |
|
||||
| `if.armour` | 4 |
|
||||
| `if.ttt.ledgerflow.deltasync` | 3 |
|
||||
|
||||
## IG.* (likely typos)
|
||||
|
||||
Unique: 1
|
||||
|
||||
| Token | Count |
|
||||
|---|---:|
|
||||
| `IG.GUARD` | 1 |
|
||||
|
||||
## Notes
|
||||
|
||||
- Found `IG.GUARD` at: `DANNY_STOCKER_INFRAFABRIC_DOSSIER.md:82`
|
||||
- This looks like a typo for `IF.GUARD` (or an alias that should be made explicit).
|
||||
| `if.search` | 1 |
|
||||
| `if.infrafabric` | 1 |
|
||||
|
|
|
|||
|
|
@ -1 +1 @@
|
|||
8e40c5c6b8d8cd0d4b4c81234bc81a9b7178a8f7de7be75926485f63fe4c4c53 IF_MONIKERS_USED.md
|
||||
d53b3f9511b305b8a6eac92999f4c773244f69808369ce0e3b4b2bd4cee45df1 IF_MONIKERS_USED.md
|
||||
|
|
|
|||
132
IF_NAMING_BIBLE_v1.0.md
Normal file
132
IF_NAMING_BIBLE_v1.0.md
Normal file
|
|
@ -0,0 +1,132 @@
|
|||
# InfraFabric Naming Bible (v1.0)
|
||||
|
||||
**Date:** 2025-12-22
|
||||
**Author:** Danny Stocker
|
||||
**Status:** Canonical reference (refactor-in-progress)
|
||||
|
||||
## Core principle
|
||||
|
||||
Governance infrastructure must be comprehensible to the governed.
|
||||
|
||||
Names in InfraFabric are chosen to be legible to non-specialists (think: secondary-school educated — nurses, farmers, receptionists, students), not only domain experts.
|
||||
|
||||
Academic terminology is allowed, but it is subordinate: **first mention only**, in parentheses.
|
||||
|
||||
## The two-tier naming system
|
||||
|
||||
### Tier 1: Layer names (literal)
|
||||
|
||||
Layer names are professional, literal domain descriptors.
|
||||
|
||||
- Say what it is
|
||||
- No branding energy
|
||||
- “Boring” is good
|
||||
|
||||
Examples:
|
||||
- `IF.GOV` (governance)
|
||||
- `IF.SECURITY` (security) — alias: `IF.SEC`
|
||||
- `IF.TRANSIT` (transport/transit)
|
||||
- `IF.AUDIT` (audit)
|
||||
|
||||
### Tier 2: Component names (metaphorical)
|
||||
|
||||
Component names use short metaphors that make the function obvious.
|
||||
|
||||
- Short and punchy (1–2 syllables preferred)
|
||||
- Concrete mental image
|
||||
- Cross-cultural where possible
|
||||
|
||||
## Metaphor selection strategy
|
||||
|
||||
Don’t force a single metaphor domain. Use what makes each function clearest.
|
||||
|
||||
Available domains (examples):
|
||||
|
||||
- Medical/Emergency: `TRIAGE`, `QUARANTINE`
|
||||
- Legal/Civic: `PANEL`, `WITNESS`
|
||||
- Physical/Security: `DETECT`, `TRAP`
|
||||
- Logistics/Travel: `HUB`, `TRANSIT`
|
||||
- Investigation: `TRAIL`, `PROOF`
|
||||
|
||||
## Canonical hierarchy (current refactor target)
|
||||
|
||||
### `IF.GOV.*` (governance)
|
||||
|
||||
- `IF.GOV.TRIAGE` (controversy-weighted risk stratification)
|
||||
- `IF.GOV.PANEL` (multi-agent oversight with structural dissent requirements)
|
||||
- `IF.GOV.PANEL.EXTENDED` (extended multi-agent oversight panel)
|
||||
- `IF.GOV.QUESTIONS` (provenance interrogative framework)
|
||||
- `IF.GOV.WITNESS` (audit observation and compliance monitoring)
|
||||
|
||||
### `IF.SECURITY.*` (security)
|
||||
|
||||
- `IF.SECURITY.DETECT` (context-aware secret detection)
|
||||
- `IF.SECURITY.CHECK` (epistemic anomaly detection and coherence validation)
|
||||
- `IF.SECURITY.WATCH` (threat intelligence and monitoring)
|
||||
- `IF.SECURITY.TRAP` (honeypot deployment and active defense)
|
||||
|
||||
### `IF.TRANSIT.*` (transport)
|
||||
|
||||
- `IF.TRANSIT.HUB` (privilege-enforced kinetic message router)
|
||||
- `IF.TRANSIT.MESSAGE` (cryptographically signed message protocol)
|
||||
- `IF.TRANSIT.SWARM` (distributed agent coordination)
|
||||
|
||||
### `IF.AUDIT.*` (audit)
|
||||
|
||||
- `IF.AUDIT.TRAIL` (immutable chain-of-custody logging)
|
||||
- `IF.AUDIT.PROOF` (portable verification bundle with replay capability)
|
||||
|
||||
### Special cases
|
||||
|
||||
- `IF.TTT` stays as a mnemonic triad (Traceable / Transparent / Trustworthy). It is a philosophy and compliance spine. Concrete artifacts should be named under `IF.AUDIT.*`.
|
||||
- `IF.STORY` stays as-is (product name: narrative logging).
|
||||
- `IF.EMOTION` stays as-is (application name: exemplar product).
|
||||
|
||||
## Academic translation format
|
||||
|
||||
**First mention only**:
|
||||
|
||||
`IF.GOV.PANEL (multi-agent oversight with structural dissent requirements)`
|
||||
|
||||
Avoid:
|
||||
|
||||
- `aka`, `|`, or “formerly” in the main prose
|
||||
- treating internal legacy names as equal-status
|
||||
|
||||
## Legacy → canonical mapping (v1)
|
||||
|
||||
| Old name (legacy) | New name (canonical) |
|
||||
|---|---|
|
||||
| `IF.BIAS` | `IF.GOV.TRIAGE` |
|
||||
| `IF.GUARD` | `IF.GOV.PANEL` |
|
||||
| `IF.5W` | `IF.GOV.QUESTIONS` |
|
||||
| `IF.WITNESS` | `IF.GOV.WITNESS` |
|
||||
| `IF.ARMOUR` | `IF.SECURITY.CHECK` (and `IF.SECURITY.*` submodules) |
|
||||
| `IF.YOLOGUARD` | `IF.SECURITY.DETECT` |
|
||||
| `IF.PACKET` | `IF.TRANSIT.MESSAGE` |
|
||||
| `IF.BUS` | `IF.TRANSIT.HUB` |
|
||||
| `swarm.s2` | `IF.TRANSIT.SWARM` |
|
||||
|
||||
## Testing heuristics
|
||||
|
||||
### The “youth hostel test”
|
||||
|
||||
Could a non-technical person read an audit trail and understand what happened?
|
||||
|
||||
Example pass:
|
||||
|
||||
“Your request went to TRIAGE, which escalated to PANEL. DETECT found a secret. The decision is recorded in AUDIT.TRAIL.”
|
||||
|
||||
### The “government separation-of-duties” sanity check
|
||||
|
||||
If in doubt, follow separation-of-duties patterns inspired by **US/CA/EU** governance structures:
|
||||
|
||||
- separate triage (classification) from deliberation (decision)
|
||||
- separate detection (security) from actuation (transport)
|
||||
- separate recordkeeping (audit) from narrative (story)
|
||||
|
||||
## Canonical registry
|
||||
|
||||
- Machine-readable registry: `IF_NAMING_REGISTRY.yaml`
|
||||
- Component charters (separation-of-duties): `gov/`
|
||||
|
||||
1
IF_NAMING_BIBLE_v1.0.md.sha256
Normal file
1
IF_NAMING_BIBLE_v1.0.md.sha256
Normal file
|
|
@ -0,0 +1 @@
|
|||
8728ba5719e369d280443df30caafef6bdb69ea1f5829141afaf40b060173ac2 IF_NAMING_BIBLE_v1.0.md
|
||||
82
IF_NAMING_REGISTRY_v1.0.yaml
Normal file
82
IF_NAMING_REGISTRY_v1.0.yaml
Normal file
|
|
@ -0,0 +1,82 @@
|
|||
version: "1.0"
|
||||
date_utc: "2025-12-22"
|
||||
status: "draft-canonical"
|
||||
|
||||
principles:
|
||||
- "Layer names are literal domains (GOV/SECURITY/TRANSIT/AUDIT)."
|
||||
- "Component names are short, concrete metaphors (TRIAGE/PANEL/DETECT/TRAIL)."
|
||||
- "Names must be legible to non-specialists (secondary-school educated)."
|
||||
- "Legacy names remain supported as aliases during transition."
|
||||
|
||||
aliases:
|
||||
IF.SEC:
|
||||
points_to: "IF.SECURITY"
|
||||
|
||||
forbidden:
|
||||
- "IG.GUARD" # typo; use IF.GOV.PANEL / IF.GOV.PANEL.EXTENDED
|
||||
- "ig.guard"
|
||||
|
||||
names:
|
||||
IF.GOV.TRIAGE:
|
||||
legacy: ["IF.BIAS", "if.bias"]
|
||||
academic: "controversy-weighted risk stratification"
|
||||
description: "Preflight risk triage that sizes councils and decides escalation."
|
||||
|
||||
IF.GOV.PANEL:
|
||||
legacy: ["IF.GUARD", "if.guard"]
|
||||
academic: "multi-agent oversight with structural dissent requirements"
|
||||
description: "Council governance protocol (minimum 5 seats including a contrarian)."
|
||||
|
||||
IF.GOV.PANEL.EXTENDED:
|
||||
legacy: []
|
||||
academic: "extended multi-agent oversight panel"
|
||||
description: "Expanded panel up to ~30 seats for higher-stakes decisions."
|
||||
|
||||
IF.GOV.QUESTIONS:
|
||||
legacy: ["IF.5W", "IF_5W", "if.5w"]
|
||||
academic: "provenance interrogative framework"
|
||||
description: "Structured inquiry briefs (who/what/when/where/why/how)."
|
||||
|
||||
IF.GOV.WITNESS:
|
||||
legacy: ["IF.WITNESS", "if.witness"]
|
||||
academic: "audit observation and compliance monitoring"
|
||||
description: "Independent witness that validates governance and trace discipline."
|
||||
|
||||
IF.SECURITY.DETECT:
|
||||
legacy: ["IF.YOLOGUARD", "if.yologuard"]
|
||||
academic: "context-aware secret detection"
|
||||
description: "Secret/relationship screening and credential hygiene primitives."
|
||||
|
||||
IF.SECURITY.CHECK:
|
||||
legacy: ["IF.ARMOUR", "IF.armour", "if.armour"]
|
||||
academic: "epistemic anomaly detection and coherence validation"
|
||||
description: "Detective layer for coherence/inconsistency; no actuation authority."
|
||||
|
||||
IF.TRANSIT.HUB:
|
||||
legacy: ["IF.BUS", "IF.bus", "if.bus"]
|
||||
academic: "privilege-enforced kinetic message router"
|
||||
description: "Deterministic actuation + privilege enforcement substrate."
|
||||
|
||||
IF.TRANSIT.MESSAGE:
|
||||
legacy: ["IF.PACKET", "if.packet"]
|
||||
academic: "cryptographically signed message protocol"
|
||||
description: "Schema-first message envelope with trace IDs and audit metadata."
|
||||
|
||||
IF.TRANSIT.SWARM:
|
||||
legacy: ["swarm.s2", "IF.SWARM.s2", "IF.SWARM.S2"]
|
||||
academic: "distributed agent coordination"
|
||||
description: "Intra-swarm coordination layer over a Redis bus."
|
||||
|
||||
IF.AUDIT.TRAIL:
|
||||
legacy: ["IF.TTT"]
|
||||
academic: "immutable chain-of-custody logging"
|
||||
description: "Trace discipline + signing + verification hooks for disputes."
|
||||
|
||||
IF.AUDIT.PROOF:
|
||||
legacy: []
|
||||
academic: "portable verification bundle"
|
||||
description: "Exportable evidence bundle + manifest + verifier steps."
|
||||
|
||||
notes:
|
||||
- "IF.TTT remains the philosophical umbrella; use IF.AUDIT.* for concrete artifacts."
|
||||
- "Multi-lingual translations: planned; keep canonical IDs stable and translate descriptions."
|
||||
1
IF_NAMING_REGISTRY_v1.0.yaml.sha256
Normal file
1
IF_NAMING_REGISTRY_v1.0.yaml.sha256
Normal file
|
|
@ -0,0 +1 @@
|
|||
495679f1c79443a4aa8cd45dd3549e75b8a7947f61b035c41f530745cdfc865e IF_NAMING_REGISTRY_v1.0.yaml
|
||||
37
gov/PANEL.md
Normal file
37
gov/PANEL.md
Normal file
|
|
@ -0,0 +1,37 @@
|
|||
# IF.GOV.PANEL (legacy: IF.GUARD)
|
||||
|
||||
## Role
|
||||
|
||||
A multi-voice governance panel that reviews high-stakes decisions.
|
||||
|
||||
- Minimum form: `IF.GOV.PANEL` (5 seats, includes contrarian)
|
||||
- Expanded form: `IF.GOV.PANEL.EXTENDED` (up to ~30 seats)
|
||||
|
||||
## Responsibilities
|
||||
|
||||
- deliberate on a proposed action/response
|
||||
- preserve dissent (minority opinions remain visible)
|
||||
- record votes and rationale as an auditable artifact
|
||||
|
||||
## Non-responsibilities
|
||||
|
||||
- not a latency-optimized mechanism for low-stakes chat
|
||||
- not a substitute for a human clinical board (mental-health-adjacent domains require explicit constraints)
|
||||
|
||||
## Inputs
|
||||
|
||||
- `TRIAGE` output (risk tier + recommended panel size)
|
||||
- the proposed action/response
|
||||
- evidence references (retrieval ids / citations / prior traces)
|
||||
|
||||
## Outputs
|
||||
|
||||
- allow / modify / block decision
|
||||
- votes + dissent record
|
||||
- escalation/appeal hooks (if applicable)
|
||||
|
||||
## Required evidence
|
||||
|
||||
- signed `PANEL` decision record under `IF.AUDIT.TRAIL`
|
||||
- link to the exact proposal bytes that were voted on (hash)
|
||||
- trace id included in final user-visible output
|
||||
21
gov/QUESTIONS.md
Normal file
21
gov/QUESTIONS.md
Normal file
|
|
@ -0,0 +1,21 @@
|
|||
# IF.GOV.QUESTIONS (legacy: IF.5W)
|
||||
|
||||
## Role
|
||||
|
||||
A structured inquiry template to prevent hand-wavy governance.
|
||||
|
||||
It forces deliberation to answer the basics (who/what/when/where/why/how) and to cite evidence.
|
||||
|
||||
## Responsibilities
|
||||
|
||||
- generate a brief that can be reviewed by `PANEL`
|
||||
- provide explicit slots for evidence and boundaries
|
||||
|
||||
## Non-responsibilities
|
||||
|
||||
- does not decide; it structures the inputs to decision
|
||||
|
||||
## Required evidence
|
||||
|
||||
- the brief is logged and hashed in the trace
|
||||
- any claim in the brief must point to a verification path or be labeled `UNVERIFIED`
|
||||
30
gov/README.md
Normal file
30
gov/README.md
Normal file
|
|
@ -0,0 +1,30 @@
|
|||
# IF.GOV directory (separation-of-duties)
|
||||
|
||||
This directory is the **governance charter layer** for InfraFabric.
|
||||
|
||||
Purpose:
|
||||
- reduce concept drift / sprawl by defining *who does what*
|
||||
- make governance primitives legible to non-specialists
|
||||
- provide stable names for cross-app integration (CLI/API)
|
||||
|
||||
Design framing: InfraFabric is not inventing “government”. It is adapting separation-of-duties patterns inspired by **US/CA/EU** governance structures to autonomous systems.
|
||||
|
||||
## Components
|
||||
|
||||
- `TRIAGE.md` — `IF.GOV.TRIAGE` (legacy: `IF.BIAS`)
|
||||
- `PANEL.md` — `IF.GOV.PANEL` + `IF.GOV.PANEL.EXTENDED` (legacy: `IF.GUARD`)
|
||||
- `QUESTIONS.md` — `IF.GOV.QUESTIONS` (legacy: `IF.5W`)
|
||||
- `WITNESS.md` — `IF.GOV.WITNESS` (legacy: `IF.WITNESS`)
|
||||
|
||||
## Interface contract (v1)
|
||||
|
||||
Each charter specifies:
|
||||
- responsibilities (what it *must* do)
|
||||
- non-responsibilities (what it *must not* do)
|
||||
- inputs/outputs
|
||||
- audit artifacts required under `IF.AUDIT.TRAIL` / `IF.TTT`
|
||||
|
||||
## Naming
|
||||
|
||||
- Canonical naming is defined in `../IF_NAMING_REGISTRY.yaml`.
|
||||
- Legacy names remain valid as aliases during transition.
|
||||
35
gov/TRIAGE.md
Normal file
35
gov/TRIAGE.md
Normal file
|
|
@ -0,0 +1,35 @@
|
|||
# IF.GOV.TRIAGE (legacy: IF.BIAS)
|
||||
|
||||
## Role
|
||||
|
||||
Classify a request by risk/controversy and decide what governance path is required.
|
||||
|
||||
## Responsibilities
|
||||
|
||||
- assign a risk tier and an escalation recommendation
|
||||
- size the panel (minimum vs extended)
|
||||
- emit a signed decision record (even when rejecting/short-circuiting)
|
||||
|
||||
## Non-responsibilities
|
||||
|
||||
- does not generate the final user answer
|
||||
- does not “deliberate” on truth claims; it only classifies and routes
|
||||
|
||||
## Inputs
|
||||
|
||||
- user request metadata (actor id, request type, policy surface)
|
||||
- optional: retrieval/context hints
|
||||
|
||||
## Outputs
|
||||
|
||||
- `panel_size` recommendation (e.g., 5 → 30)
|
||||
- escalation path (fast path vs panel)
|
||||
- required seats (e.g., contrarian mandatory)
|
||||
|
||||
## Required evidence
|
||||
|
||||
- trace id for the request
|
||||
- a `TRIAGE` event logged to `IF.AUDIT.TRAIL` with:
|
||||
- inputs hashed
|
||||
- output decision + panel size
|
||||
- link to the follow-on `PANEL` decision (if invoked)
|
||||
21
gov/WITNESS.md
Normal file
21
gov/WITNESS.md
Normal file
|
|
@ -0,0 +1,21 @@
|
|||
# IF.GOV.WITNESS (legacy: IF.WITNESS)
|
||||
|
||||
## Role
|
||||
|
||||
A witness is the “auditor in the room”: it checks that governance rules were followed and that required artifacts exist.
|
||||
|
||||
## Responsibilities
|
||||
|
||||
- validate that TRIAGE and PANEL produced required artifacts
|
||||
- validate that the final output includes trace id and citation formatting rules
|
||||
- raise “no-trace-no-trust” errors when invariants are violated
|
||||
|
||||
## Non-responsibilities
|
||||
|
||||
- does not override governance decisions on substance
|
||||
- does not act as a judge; it acts as a verifier
|
||||
|
||||
## Required evidence
|
||||
|
||||
- witness checks are logged as trace events
|
||||
- witness failures are exported as part of `IF.AUDIT.PROOF` bundles when disputes occur
|
||||
Loading…
Add table
Reference in a new issue