Canonical Specifications
Deterministic execution standards, conformance profiles, and RFCs that define what "trustworthy" means in machine-readable terms.
Execution Authority
Who is allowed to execute? Effect-typed tools, two-phase commit for irreversible actions, signed Decision Records, and memory provenance gating.
Authority Court Protocol
The deterministic evaluation protocol. Six-stage pipeline: contract pinning β ceiling checks β counterfactuals β invariants β preflight β emit. Hard schemas, versioned, replayable.
Evidence Economics
Cryptographic evidence with economic incentives. Evidence packs, retention policies, reward structures, and market mechanisms for verifiable autonomy.
Conformance Ladder
Structured Output
Actions are typed proposals. Every tool call returns a deterministic JSON envelope with schema validation.
Cryptographic Identity & ProofGraph Generation
Every action produces a hash-linked receipt chain. Proofs form a directed acyclic graph anchored to the session root.
Hardware Root of Trust & Attested Execution
Execution runs in a TEE. Attestation reports are bound to the ProofGraph, making receipts tamper-evident at the silicon level.