@neuroverseos/governance 0.2.3 → 0.3.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/package.json +4 -2
- package/policies/content-moderation-rules.txt +8 -0
- package/policies/marketing-rules.txt +8 -0
- package/policies/science-research-rules.txt +11 -0
- package/policies/social-media-rules.txt +7 -0
- package/policies/strict-rules.txt +8 -0
- package/policies/trading-rules.txt +8 -0
- package/simulate.html +1899 -0
- package/dist/adapters/autoresearch.cjs +0 -196
- package/dist/adapters/autoresearch.d.cts +0 -103
- package/dist/adapters/autoresearch.d.ts +0 -103
- package/dist/adapters/autoresearch.js +0 -7
- package/dist/adapters/deep-agents.cjs +0 -1472
- package/dist/adapters/deep-agents.d.cts +0 -181
- package/dist/adapters/deep-agents.d.ts +0 -181
- package/dist/adapters/deep-agents.js +0 -17
- package/dist/adapters/express.cjs +0 -1196
- package/dist/adapters/express.d.cts +0 -66
- package/dist/adapters/express.d.ts +0 -66
- package/dist/adapters/express.js +0 -12
- package/dist/adapters/index.cjs +0 -2038
- package/dist/adapters/index.d.cts +0 -8
- package/dist/adapters/index.d.ts +0 -8
- package/dist/adapters/index.js +0 -68
- package/dist/adapters/langchain.cjs +0 -1259
- package/dist/adapters/langchain.d.cts +0 -89
- package/dist/adapters/langchain.d.ts +0 -89
- package/dist/adapters/langchain.js +0 -17
- package/dist/adapters/openai.cjs +0 -1289
- package/dist/adapters/openai.d.cts +0 -99
- package/dist/adapters/openai.d.ts +0 -99
- package/dist/adapters/openai.js +0 -17
- package/dist/adapters/openclaw.cjs +0 -1281
- package/dist/adapters/openclaw.d.cts +0 -99
- package/dist/adapters/openclaw.d.ts +0 -99
- package/dist/adapters/openclaw.js +0 -17
- package/dist/bootstrap-GXVDZNF7.js +0 -114
- package/dist/build-X5MZY4IA.js +0 -339
- package/dist/chunk-4L6OPKMQ.js +0 -100
- package/dist/chunk-4NGDRRQH.js +0 -10
- package/dist/chunk-5U2MQO5P.js +0 -57
- package/dist/chunk-6BB55YJI.js +0 -113
- package/dist/chunk-6CZSKEY5.js +0 -164
- package/dist/chunk-7P3S7MAY.js +0 -1090
- package/dist/chunk-A5W4GNQO.js +0 -130
- package/dist/chunk-AF2VX4AL.js +0 -363
- package/dist/chunk-AKW5YVCE.js +0 -96
- package/dist/chunk-BMOXICAB.js +0 -340
- package/dist/chunk-BQZMOEML.js +0 -43
- package/dist/chunk-D2UCV5AK.js +0 -326
- package/dist/chunk-EVDJUSZ2.js +0 -91
- package/dist/chunk-FYS2CBUW.js +0 -304
- package/dist/chunk-I3RRAYK2.js +0 -11
- package/dist/chunk-IZSO75NZ.js +0 -792
- package/dist/chunk-JCKSW2PZ.js +0 -304
- package/dist/chunk-JZPQGIKR.js +0 -79
- package/dist/chunk-KTFTTLTP.js +0 -246
- package/dist/chunk-MH7BT4VH.js +0 -15
- package/dist/chunk-ORJ3NOE6.js +0 -622
- package/dist/chunk-OT6PXH54.js +0 -61
- package/dist/chunk-Q6O7ZLO2.js +0 -62
- package/dist/chunk-QLPTHTVB.js +0 -253
- package/dist/chunk-REXY4LUL.js +0 -226
- package/dist/chunk-T5EUJQE5.js +0 -172
- package/dist/chunk-TTBKTF3P.js +0 -608
- package/dist/chunk-XPDMYECO.js +0 -642
- package/dist/chunk-YZFATT7X.js +0 -9
- package/dist/chunk-ZIVQNSZU.js +0 -119
- package/dist/chunk-ZJTDUCC2.js +0 -194
- package/dist/cli/neuroverse.cjs +0 -12564
- package/dist/cli/neuroverse.d.cts +0 -1
- package/dist/cli/neuroverse.d.ts +0 -1
- package/dist/cli/neuroverse.js +0 -208
- package/dist/cli/plan.cjs +0 -1686
- package/dist/cli/plan.d.cts +0 -20
- package/dist/cli/plan.d.ts +0 -20
- package/dist/cli/plan.js +0 -353
- package/dist/cli/run.cjs +0 -1945
- package/dist/cli/run.d.cts +0 -20
- package/dist/cli/run.d.ts +0 -20
- package/dist/cli/run.js +0 -143
- package/dist/configure-ai-TK67ZWZL.js +0 -132
- package/dist/decision-flow-LETV5NWY.js +0 -61
- package/dist/derive-7365SUFU.js +0 -152
- package/dist/doctor-QYISMKEL.js +0 -173
- package/dist/equity-penalties-63FGB3I2.js +0 -244
- package/dist/explain-A2EWI2OL.js +0 -51
- package/dist/guard-3BWL3IGH.js +0 -92
- package/dist/guard-contract-C9_zKbzd.d.cts +0 -821
- package/dist/guard-contract-C9_zKbzd.d.ts +0 -821
- package/dist/guard-engine-QFMIBWJY.js +0 -10
- package/dist/impact-UB6DXKSX.js +0 -59
- package/dist/improve-XZA57GER.js +0 -66
- package/dist/index.cjs +0 -6821
- package/dist/index.d.cts +0 -1829
- package/dist/index.d.ts +0 -1829
- package/dist/index.js +0 -430
- package/dist/infer-world-7GVZWFX4.js +0 -543
- package/dist/init-PKPIYHYE.js +0 -144
- package/dist/init-world-VWMQZQC7.js +0 -223
- package/dist/mcp-server-XWQZXNW7.js +0 -13
- package/dist/model-adapter-BB7G4MFI.js +0 -11
- package/dist/playground-ADWZORNV.js +0 -550
- package/dist/redteam-JRQ7FD2F.js +0 -357
- package/dist/session-MMYX5YCF.js +0 -15
- package/dist/shared--Q8wPBVN.d.ts +0 -60
- package/dist/shared-HpAG90PX.d.cts +0 -60
- package/dist/shared-U2QFV7JH.js +0 -16
- package/dist/simulate-GMIFFXYV.js +0 -83
- package/dist/test-JBBZ65X4.js +0 -217
- package/dist/trace-3MYWIDEF.js +0 -166
- package/dist/validate-LLBWVPGV.js +0 -81
- package/dist/validate-engine-UIABSIHD.js +0 -7
- package/dist/world-BFJCIQSH.js +0 -378
- package/dist/world-loader-HMPTOEA2.js +0 -9
- package/dist/worlds/autoresearch.nv-world.md +0 -230
- package/dist/worlds/coding-agent.nv-world.md +0 -211
- package/dist/worlds/derivation-world.nv-world.md +0 -278
|
@@ -1,211 +0,0 @@
|
|
|
1
|
-
---
|
|
2
|
-
world_id: coding-agent
|
|
3
|
-
name: Coding Agent Governance
|
|
4
|
-
version: 1.0.0
|
|
5
|
-
runtime_mode: COMPLIANCE
|
|
6
|
-
default_profile: standard
|
|
7
|
-
alternative_profile: strict
|
|
8
|
-
---
|
|
9
|
-
|
|
10
|
-
# Thesis
|
|
11
|
-
|
|
12
|
-
Autonomous coding agents that can read files, write code, execute shell commands, and interact with version control require a governance layer. Without enforceable rules, a single misguided tool call can delete data, leak secrets, break production, or escalate beyond its intended scope. This world defines the boundaries within which a coding agent operates safely.
|
|
13
|
-
|
|
14
|
-
# Invariants
|
|
15
|
-
|
|
16
|
-
- `no_system_destruction` — Agents must never execute commands that destroy system-level resources (recursive force-delete of root paths, disk formatting, fork bombs) (structural, immutable)
|
|
17
|
-
- `no_secret_exposure` — Agents must never read, log, or transmit credentials, API keys, private keys, or environment secrets outside the project boundary (structural, immutable)
|
|
18
|
-
- `no_unauthorized_push` — Agents must never push directly to main or master branches without explicit approval (structural, immutable)
|
|
19
|
-
- `no_scope_escape` — Agents must never access files or execute commands outside the declared project directory (structural, immutable)
|
|
20
|
-
- `no_pipe_to_shell` — Agents must never pipe downloaded content directly into a shell interpreter (structural, immutable)
|
|
21
|
-
- `changes_must_be_reversible` — Every file modification must be recoverable through version control; destructive operations require confirmation (prompt, immutable)
|
|
22
|
-
|
|
23
|
-
# State
|
|
24
|
-
|
|
25
|
-
## files_modified
|
|
26
|
-
- type: number
|
|
27
|
-
- min: 0
|
|
28
|
-
- max: 100000
|
|
29
|
-
- step: 1
|
|
30
|
-
- default: 0
|
|
31
|
-
- label: Files Modified
|
|
32
|
-
- description: Total number of files written or edited in this session
|
|
33
|
-
|
|
34
|
-
## files_deleted
|
|
35
|
-
- type: number
|
|
36
|
-
- min: 0
|
|
37
|
-
- max: 100000
|
|
38
|
-
- step: 1
|
|
39
|
-
- default: 0
|
|
40
|
-
- label: Files Deleted
|
|
41
|
-
- description: Total number of files deleted in this session
|
|
42
|
-
|
|
43
|
-
## shell_commands_run
|
|
44
|
-
- type: number
|
|
45
|
-
- min: 0
|
|
46
|
-
- max: 10000
|
|
47
|
-
- step: 1
|
|
48
|
-
- default: 0
|
|
49
|
-
- label: Shell Commands Run
|
|
50
|
-
- description: Total number of shell commands executed
|
|
51
|
-
|
|
52
|
-
## dangerous_commands_blocked
|
|
53
|
-
- type: number
|
|
54
|
-
- min: 0
|
|
55
|
-
- max: 10000
|
|
56
|
-
- step: 1
|
|
57
|
-
- default: 0
|
|
58
|
-
- label: Dangerous Commands Blocked
|
|
59
|
-
- description: Number of shell commands blocked by governance rules
|
|
60
|
-
|
|
61
|
-
## git_pushes
|
|
62
|
-
- type: number
|
|
63
|
-
- min: 0
|
|
64
|
-
- max: 100
|
|
65
|
-
- step: 1
|
|
66
|
-
- default: 0
|
|
67
|
-
- label: Git Pushes
|
|
68
|
-
- description: Number of git push operations executed
|
|
69
|
-
|
|
70
|
-
## sub_agents_spawned
|
|
71
|
-
- type: number
|
|
72
|
-
- min: 0
|
|
73
|
-
- max: 50
|
|
74
|
-
- step: 1
|
|
75
|
-
- default: 0
|
|
76
|
-
- label: Sub-Agents Spawned
|
|
77
|
-
- description: Number of sub-agent processes created
|
|
78
|
-
|
|
79
|
-
## scope_violations
|
|
80
|
-
- type: number
|
|
81
|
-
- min: 0
|
|
82
|
-
- max: 1000
|
|
83
|
-
- step: 1
|
|
84
|
-
- default: 0
|
|
85
|
-
- label: Scope Violations
|
|
86
|
-
- description: Number of attempted actions outside the declared project scope
|
|
87
|
-
|
|
88
|
-
# Assumptions
|
|
89
|
-
|
|
90
|
-
## standard
|
|
91
|
-
- name: Standard Development
|
|
92
|
-
- description: Normal development workflow. File reads are unrestricted. File writes within project scope are allowed. Shell commands are evaluated for safety. Git pushes require feature branches.
|
|
93
|
-
- file_read_policy: unrestricted
|
|
94
|
-
- file_write_policy: project_scope_only
|
|
95
|
-
- shell_policy: safety_evaluated
|
|
96
|
-
- git_policy: feature_branches_only
|
|
97
|
-
- network_policy: restricted
|
|
98
|
-
|
|
99
|
-
## strict
|
|
100
|
-
- name: Strict Lockdown
|
|
101
|
-
- description: High-security mode. All file writes require confirmation. All shell commands require approval. No network access. No git pushes without explicit authorization.
|
|
102
|
-
- file_read_policy: unrestricted
|
|
103
|
-
- file_write_policy: approval_required
|
|
104
|
-
- shell_policy: approval_required
|
|
105
|
-
- git_policy: approval_required
|
|
106
|
-
- network_policy: blocked
|
|
107
|
-
|
|
108
|
-
# Rules
|
|
109
|
-
|
|
110
|
-
## rule-001: Destructive Shell Command (structural)
|
|
111
|
-
Shell commands that can cause irreversible system damage must be blocked unconditionally.
|
|
112
|
-
|
|
113
|
-
When shell_commands_run > 0 [state] AND dangerous_commands_blocked > 0 [state]
|
|
114
|
-
Then agent_safety *= 0.50
|
|
115
|
-
|
|
116
|
-
> trigger: Agent attempted a destructive shell command (rm -rf, mkfs, dd, fork bomb, etc.).
|
|
117
|
-
> rule: Destructive commands cannot be undone. No amount of productivity justifies risking system integrity.
|
|
118
|
-
> shift: Agent safety score drops. Continued violations may halt the session.
|
|
119
|
-
> effect: Agent safety reduced by 50%.
|
|
120
|
-
|
|
121
|
-
## rule-002: Scope Escape Attempt (structural)
|
|
122
|
-
Accessing files or running commands outside the project directory is a governance violation.
|
|
123
|
-
|
|
124
|
-
When scope_violations > 0 [state]
|
|
125
|
-
Then agent_safety *= 0.40
|
|
126
|
-
Collapse: agent_safety < 0.10
|
|
127
|
-
|
|
128
|
-
> trigger: Agent attempted to access resources outside its declared project scope.
|
|
129
|
-
> rule: Agents operate within boundaries. Scope escape indicates either a misconfigured agent or a prompt injection attempt.
|
|
130
|
-
> shift: Agent safety drops sharply. Multiple violations halt the session.
|
|
131
|
-
> effect: Agent safety reduced to 40%.
|
|
132
|
-
|
|
133
|
-
## rule-003: Excessive File Deletion (degradation)
|
|
134
|
-
Deleting many files in a single session indicates potentially destructive behavior.
|
|
135
|
-
|
|
136
|
-
When files_deleted > 10 [state]
|
|
137
|
-
Then agent_safety *= 0.60
|
|
138
|
-
|
|
139
|
-
> trigger: More than 10 files deleted in a single session.
|
|
140
|
-
> rule: Bulk deletion is rarely intentional in normal development. This warrants review.
|
|
141
|
-
> shift: Agent safety degrades. Remaining deletions may require approval.
|
|
142
|
-
> effect: Agent safety reduced to 60%.
|
|
143
|
-
|
|
144
|
-
## rule-004: Uncontrolled Sub-Agent Spawning (degradation)
|
|
145
|
-
Too many sub-agents indicate either a runaway loop or poorly scoped task decomposition.
|
|
146
|
-
|
|
147
|
-
When sub_agents_spawned > 10 [state]
|
|
148
|
-
Then agent_safety *= 0.70
|
|
149
|
-
|
|
150
|
-
> trigger: More than 10 sub-agents spawned in a single session.
|
|
151
|
-
> rule: Each sub-agent inherits the parent's capabilities. Uncontrolled spawning multiplies risk.
|
|
152
|
-
> shift: Agent safety degrades. Further spawning may be blocked.
|
|
153
|
-
> effect: Agent safety reduced to 70%.
|
|
154
|
-
|
|
155
|
-
## rule-005: Clean Session (advantage)
|
|
156
|
-
A session with no violations and productive output validates the governance model.
|
|
157
|
-
|
|
158
|
-
When files_modified > 0 [state] AND scope_violations == 0 [state] AND dangerous_commands_blocked == 0 [state]
|
|
159
|
-
Then agent_safety *= 1.10
|
|
160
|
-
|
|
161
|
-
> trigger: Agent has modified files without triggering any governance violations.
|
|
162
|
-
> rule: Good behavior should be recognized. Clean sessions build trust in the agent's judgment.
|
|
163
|
-
> shift: Agent safety improves slightly. Trust accumulates over clean sessions.
|
|
164
|
-
> effect: Agent safety boosted by 10%.
|
|
165
|
-
|
|
166
|
-
## rule-006: Unauthorized Push to Protected Branch (structural)
|
|
167
|
-
Pushing to main or master without approval violates version control governance.
|
|
168
|
-
|
|
169
|
-
When git_pushes > 0 [state] AND scope_violations > 0 [state]
|
|
170
|
-
Then agent_safety *= 0.30
|
|
171
|
-
Collapse: agent_safety < 0.10
|
|
172
|
-
|
|
173
|
-
> trigger: Agent pushed to a protected branch without authorization.
|
|
174
|
-
> rule: Protected branches exist for a reason. Direct pushes bypass code review and CI/CD.
|
|
175
|
-
> shift: Agent safety drops critically. Session may be halted.
|
|
176
|
-
> effect: Agent safety reduced to 30%.
|
|
177
|
-
|
|
178
|
-
# Gates
|
|
179
|
-
|
|
180
|
-
- TRUSTED: agent_safety >= 90
|
|
181
|
-
- OPERATING: agent_safety >= 60
|
|
182
|
-
- CAUTIOUS: agent_safety >= 35
|
|
183
|
-
- RESTRICTED: agent_safety > 10
|
|
184
|
-
- HALTED: agent_safety <= 10
|
|
185
|
-
|
|
186
|
-
# Outcomes
|
|
187
|
-
|
|
188
|
-
## agent_safety
|
|
189
|
-
- type: number
|
|
190
|
-
- range: 0-100
|
|
191
|
-
- display: percentage
|
|
192
|
-
- label: Agent Safety Score
|
|
193
|
-
- primary: true
|
|
194
|
-
|
|
195
|
-
## files_modified
|
|
196
|
-
- type: number
|
|
197
|
-
- range: 0-100000
|
|
198
|
-
- display: integer
|
|
199
|
-
- label: Files Modified
|
|
200
|
-
|
|
201
|
-
## dangerous_commands_blocked
|
|
202
|
-
- type: number
|
|
203
|
-
- range: 0-10000
|
|
204
|
-
- display: integer
|
|
205
|
-
- label: Dangerous Commands Blocked
|
|
206
|
-
|
|
207
|
-
## scope_violations
|
|
208
|
-
- type: number
|
|
209
|
-
- range: 0-1000
|
|
210
|
-
- display: integer
|
|
211
|
-
- label: Scope Violations
|
|
@@ -1,278 +0,0 @@
|
|
|
1
|
-
---
|
|
2
|
-
world_id: derivationworld
|
|
3
|
-
name: DerivationWorld
|
|
4
|
-
version: 1.0.0
|
|
5
|
-
runtime_mode: synthesis
|
|
6
|
-
default_profile: strict_synthesis
|
|
7
|
-
alternative_profile: permissive_synthesis
|
|
8
|
-
---
|
|
9
|
-
|
|
10
|
-
# Thesis
|
|
11
|
-
|
|
12
|
-
AI-synthesized governance documents must be structurally valid, epistemically honest, and deterministically verifiable. A derived .nv-world.md is only legitimate if it satisfies the same parser constraints as a hand-authored world, distinguishes declared facts from inferred claims, and never introduces governance domains beyond the source material.
|
|
13
|
-
|
|
14
|
-
# Invariants
|
|
15
|
-
|
|
16
|
-
- `output_must_be_valid_nv_world` — Synthesized output must parse successfully under parseWorldMarkdown with zero errors (prompt, immutable)
|
|
17
|
-
- `must_include_required_sections` — Output must contain Thesis, Invariants, State, Rules, Gates, and Outcomes sections (prompt, immutable)
|
|
18
|
-
- `must_distinguish_declared_vs_inferred` — Invariants derived from explicit source statements must be marked structural; those inferred by the model must be marked operational (prompt, immutable)
|
|
19
|
-
- `must_not_invent_external_domains` — All state variables, rules, and invariants must trace to concepts present in the input markdown (prompt, immutable)
|
|
20
|
-
- `invariants_must_be_enforceable_or_marked` — Every invariant must be structurally enforceable via rules, or explicitly tagged as non-enforceable with rationale (prompt, immutable)
|
|
21
|
-
- `no_json_output` — Output must be .nv-world.md markdown only, never JSON (prompt, immutable)
|
|
22
|
-
- `no_extra_commentary` — Output must contain only the .nv-world.md document, no preamble, explanation, or trailing commentary (prompt, immutable)
|
|
23
|
-
- `frontmatter_must_be_complete` — Output frontmatter must include world_id, name, and version fields (prompt, immutable)
|
|
24
|
-
- `rules_must_have_triggers_and_effects` — Every rule must include a When trigger line and a Then effect line (prompt, immutable)
|
|
25
|
-
- `gate_thresholds_must_be_ordered` — Gate thresholds must be monotonically decreasing from best to worst status (prompt, immutable)
|
|
26
|
-
|
|
27
|
-
# State
|
|
28
|
-
|
|
29
|
-
## source_section_count
|
|
30
|
-
- type: number
|
|
31
|
-
- min: 0
|
|
32
|
-
- max: 100
|
|
33
|
-
- step: 1
|
|
34
|
-
- default: 5
|
|
35
|
-
- label: Source Section Count
|
|
36
|
-
- description: Number of distinct sections or files in the input markdown. More sections generally means richer synthesis material.
|
|
37
|
-
|
|
38
|
-
## source_token_estimate
|
|
39
|
-
- type: number
|
|
40
|
-
- min: 0
|
|
41
|
-
- max: 200000
|
|
42
|
-
- step: 100
|
|
43
|
-
- default: 2000
|
|
44
|
-
- label: Source Token Estimate
|
|
45
|
-
- description: Approximate token count of concatenated input. Determines whether context window constraints may truncate material.
|
|
46
|
-
|
|
47
|
-
## declared_concept_count
|
|
48
|
-
- type: number
|
|
49
|
-
- min: 0
|
|
50
|
-
- max: 200
|
|
51
|
-
- step: 1
|
|
52
|
-
- default: 10
|
|
53
|
-
- label: Declared Concept Count
|
|
54
|
-
- description: Number of distinct governance concepts explicitly named in source material. Drives state variable and rule generation.
|
|
55
|
-
|
|
56
|
-
## concept_specificity
|
|
57
|
-
- type: number
|
|
58
|
-
- min: 0
|
|
59
|
-
- max: 100
|
|
60
|
-
- default: 50
|
|
61
|
-
- label: Concept Specificity
|
|
62
|
-
- description: How precisely the source material defines its governance concepts. 0 = vague aspirations. 100 = precise structural claims with measurable criteria.
|
|
63
|
-
|
|
64
|
-
## domain_coherence
|
|
65
|
-
- type: number
|
|
66
|
-
- min: 0
|
|
67
|
-
- max: 100
|
|
68
|
-
- default: 60
|
|
69
|
-
- label: Domain Coherence
|
|
70
|
-
- description: How well source sections relate to a single governance domain. Low coherence indicates conflicting or unrelated source material.
|
|
71
|
-
|
|
72
|
-
## synthesis_fidelity
|
|
73
|
-
- type: number
|
|
74
|
-
- min: 0.00
|
|
75
|
-
- max: 1.00
|
|
76
|
-
- step: 0.01
|
|
77
|
-
- default: 0.70
|
|
78
|
-
- label: Synthesis Fidelity
|
|
79
|
-
- description: Measure of how faithfully the derived world represents the source material. Primary outcome metric.
|
|
80
|
-
|
|
81
|
-
## structural_completeness
|
|
82
|
-
- type: number
|
|
83
|
-
- min: 0
|
|
84
|
-
- max: 100
|
|
85
|
-
- default: 60
|
|
86
|
-
- label: Structural Completeness
|
|
87
|
-
- description: Percentage of required .nv-world.md sections that contain meaningful content rather than stubs.
|
|
88
|
-
|
|
89
|
-
## epistemic_honesty
|
|
90
|
-
- type: number
|
|
91
|
-
- min: 0
|
|
92
|
-
- max: 100
|
|
93
|
-
- default: 70
|
|
94
|
-
- label: Epistemic Honesty
|
|
95
|
-
- description: Degree to which the output correctly distinguishes source-declared constraints from model-inferred constraints. 0 = everything claimed as declared. 100 = perfect attribution.
|
|
96
|
-
|
|
97
|
-
## invention_ratio
|
|
98
|
-
- type: number
|
|
99
|
-
- min: 0.00
|
|
100
|
-
- max: 1.00
|
|
101
|
-
- step: 0.01
|
|
102
|
-
- default: 0.10
|
|
103
|
-
- label: Invention Ratio
|
|
104
|
-
- description: Fraction of output concepts that have no traceable origin in the source material. Should be near zero. Above 0.30 indicates hallucination.
|
|
105
|
-
|
|
106
|
-
# Assumptions
|
|
107
|
-
|
|
108
|
-
## strict_synthesis
|
|
109
|
-
- name: Strict Synthesis
|
|
110
|
-
- description: Conservative derivation that only produces governance elements with clear source basis. Prefers omission over invention. Marks all inferred elements as operational.
|
|
111
|
-
- invention_tolerance: minimal
|
|
112
|
-
- attribution_mode: strict
|
|
113
|
-
- completeness_priority: low
|
|
114
|
-
- fidelity_priority: high
|
|
115
|
-
|
|
116
|
-
## permissive_synthesis
|
|
117
|
-
- name: Permissive Synthesis
|
|
118
|
-
- description: Broader derivation that fills structural gaps with reasonable inferences. Produces more complete worlds but with higher invention ratio. All inferences are still marked operational.
|
|
119
|
-
- invention_tolerance: moderate
|
|
120
|
-
- attribution_mode: standard
|
|
121
|
-
- completeness_priority: high
|
|
122
|
-
- fidelity_priority: moderate
|
|
123
|
-
|
|
124
|
-
# Rules
|
|
125
|
-
|
|
126
|
-
## rule-001: Empty Source Rejection (structural)
|
|
127
|
-
Synthesis from empty or trivially short input cannot produce meaningful governance. The derivation must fail rather than fabricate.
|
|
128
|
-
|
|
129
|
-
When source_section_count < 1 [state]
|
|
130
|
-
Then synthesis_fidelity *= 0.00
|
|
131
|
-
Collapse: synthesis_fidelity < 0.05
|
|
132
|
-
|
|
133
|
-
> trigger: Source input contains no sections — nothing to derive from.
|
|
134
|
-
> rule: A world cannot be synthesized from nothing. Empty input must produce a clear failure, not a fabricated world.
|
|
135
|
-
> shift: Derivation halts. No output file is written.
|
|
136
|
-
> effect: Synthesis fidelity set to zero. Derivation rejected.
|
|
137
|
-
|
|
138
|
-
## rule-002: Sparse Source Warning (degradation)
|
|
139
|
-
Minimal source material limits the quality of derived governance. Output will be structurally thin.
|
|
140
|
-
|
|
141
|
-
When source_section_count < 3 [state] AND source_token_estimate < 500 [state]
|
|
142
|
-
Then synthesis_fidelity *= 0.50, structural_completeness *= 0.60
|
|
143
|
-
|
|
144
|
-
> trigger: Source has fewer than 3 sections and under 500 tokens — sparse material.
|
|
145
|
-
> rule: Sparse input yields sparse governance. The model cannot reliably infer structure from fragments.
|
|
146
|
-
> shift: Output quality degrades. State variables and rules will be minimal.
|
|
147
|
-
> effect: Synthesis fidelity reduced to 50%. Structural completeness reduced to 60%.
|
|
148
|
-
|
|
149
|
-
## rule-003: Concept Vagueness Penalty (degradation)
|
|
150
|
-
Source material with low concept specificity produces invariants and rules that are aspirational rather than structural.
|
|
151
|
-
|
|
152
|
-
When concept_specificity < 25 [state]
|
|
153
|
-
Then synthesis_fidelity *= 0.60, epistemic_honesty *= 0.70
|
|
154
|
-
|
|
155
|
-
> trigger: Source concept specificity below 25% — governance concepts are vague.
|
|
156
|
-
> rule: Vague concepts cannot produce structural invariants. The model must either invent specificity or produce unenforceable constraints.
|
|
157
|
-
> shift: Output invariants trend toward aspiration. Rules lack deterministic triggers.
|
|
158
|
-
> effect: Synthesis fidelity reduced to 60%. Epistemic honesty reduced to 70%.
|
|
159
|
-
|
|
160
|
-
## rule-004: Domain Incoherence Penalty (degradation)
|
|
161
|
-
Source material spanning unrelated domains produces a world with conflicting governance logic.
|
|
162
|
-
|
|
163
|
-
When domain_coherence < 30 [state]
|
|
164
|
-
Then synthesis_fidelity *= 0.55
|
|
165
|
-
|
|
166
|
-
> trigger: Domain coherence below 30% — source material is internally contradictory or covers unrelated domains.
|
|
167
|
-
> rule: A single .nv-world.md should govern a coherent domain. Mixed domains produce conflicting rules and meaningless invariants.
|
|
168
|
-
> shift: Output becomes structurally confused. State variables may not relate to each other.
|
|
169
|
-
> effect: Synthesis fidelity reduced to 55%.
|
|
170
|
-
|
|
171
|
-
## rule-005: Invention Threshold Breach (structural)
|
|
172
|
-
Excessive invention without source basis constitutes fabrication, not derivation.
|
|
173
|
-
|
|
174
|
-
When invention_ratio > 0.30 [state]
|
|
175
|
-
Then synthesis_fidelity *= 0.30, epistemic_honesty *= 0.40
|
|
176
|
-
Collapse: synthesis_fidelity < 0.05
|
|
177
|
-
|
|
178
|
-
> trigger: Invention ratio exceeds 30% — more than a third of output has no source basis.
|
|
179
|
-
> rule: Derivation must be grounded. A world that is mostly invented does not represent the user's governance intent.
|
|
180
|
-
> shift: Output crosses from synthesis to hallucination. Fidelity drops below usable threshold.
|
|
181
|
-
> effect: Synthesis fidelity reduced to 30%. Epistemic honesty reduced to 40%.
|
|
182
|
-
|
|
183
|
-
## rule-006: High Fidelity Source (advantage)
|
|
184
|
-
Rich, specific, coherent source material enables high-quality derivation.
|
|
185
|
-
|
|
186
|
-
When concept_specificity > 70 [state] AND domain_coherence > 70 [state] AND declared_concept_count > 8 [state]
|
|
187
|
-
Then synthesis_fidelity *= 1.20, structural_completeness *= 1.15
|
|
188
|
-
|
|
189
|
-
> trigger: High concept specificity, strong domain coherence, and rich concept count.
|
|
190
|
-
> rule: Quality source material produces quality governance. The model has enough structure to derive rather than invent.
|
|
191
|
-
> shift: Output is well-grounded. Most invariants and rules trace directly to source.
|
|
192
|
-
> effect: Synthesis fidelity boosted by 20%. Structural completeness boosted by 15%.
|
|
193
|
-
|
|
194
|
-
## rule-007: Structural Completeness Gate (degradation)
|
|
195
|
-
A derived world missing critical sections is not usable regardless of quality in present sections.
|
|
196
|
-
|
|
197
|
-
When structural_completeness < 40 [state]
|
|
198
|
-
Then synthesis_fidelity *= 0.50
|
|
199
|
-
|
|
200
|
-
> trigger: Structural completeness below 40% — too many required sections are empty or stub.
|
|
201
|
-
> rule: A partial world is not a valid world. Missing sections mean missing governance.
|
|
202
|
-
> shift: The output may parse but cannot function as meaningful governance.
|
|
203
|
-
> effect: Synthesis fidelity reduced to 50%.
|
|
204
|
-
|
|
205
|
-
## rule-008: Epistemic Honesty Reward (advantage)
|
|
206
|
-
Correct attribution of declared versus inferred constraints makes output trustworthy and auditable.
|
|
207
|
-
|
|
208
|
-
When epistemic_honesty > 80 [state]
|
|
209
|
-
Then synthesis_fidelity *= 1.10
|
|
210
|
-
|
|
211
|
-
> trigger: Epistemic honesty above 80% — model correctly attributes constraint origins.
|
|
212
|
-
> rule: Honest attribution makes governance auditable. Users can verify which constraints they declared versus which the model suggested.
|
|
213
|
-
> shift: Output gains trust. Declared constraints can be relied upon; inferred ones can be reviewed.
|
|
214
|
-
> effect: Synthesis fidelity boosted by 10%.
|
|
215
|
-
|
|
216
|
-
## rule-009: Context Window Overflow Risk (degradation)
|
|
217
|
-
Extremely large source material risks truncation and missed governance concepts.
|
|
218
|
-
|
|
219
|
-
When source_token_estimate > 100000 [state]
|
|
220
|
-
Then synthesis_fidelity *= 0.75
|
|
221
|
-
|
|
222
|
-
> trigger: Source material exceeds 100k tokens — likely to be truncated.
|
|
223
|
-
> rule: Truncated input means incomplete synthesis. The model may miss governance concepts that appear late in the concatenation.
|
|
224
|
-
> shift: Output may be partial. Critical sections from later source files may be absent.
|
|
225
|
-
> effect: Synthesis fidelity reduced to 75% due to truncation risk.
|
|
226
|
-
|
|
227
|
-
## rule-010: Derivation Coherence Reward (advantage)
|
|
228
|
-
Aligned quality metrics across fidelity, honesty, and invention produce a genuine governance document.
|
|
229
|
-
|
|
230
|
-
When synthesis_fidelity > 0.80 [state] AND epistemic_honesty > 75 [state] AND invention_ratio < 0.15 [state]
|
|
231
|
-
Then synthesis_fidelity *= 1.15
|
|
232
|
-
Collapse: synthesis_fidelity < 0.05
|
|
233
|
-
|
|
234
|
-
> trigger: Synthesis fidelity above 80%, epistemic honesty above 75%, and invention ratio below 15%.
|
|
235
|
-
> rule: Coherent derivation across all metrics indicates a faithful, usable governance document.
|
|
236
|
-
> shift: The derived world moves from draft to production-quality. Suitable for bootstrap and validation.
|
|
237
|
-
> effect: Synthesis fidelity boosted by 15%. Derivation coherence achieved.
|
|
238
|
-
|
|
239
|
-
# Gates
|
|
240
|
-
|
|
241
|
-
- FAITHFUL: synthesis_fidelity >= 0.85
|
|
242
|
-
- USABLE: synthesis_fidelity >= 0.60
|
|
243
|
-
- REVIEWABLE: synthesis_fidelity >= 0.40
|
|
244
|
-
- SUSPECT: synthesis_fidelity > 0.15
|
|
245
|
-
- DERIVATION_REJECTED: synthesis_fidelity <= 0.15
|
|
246
|
-
|
|
247
|
-
# Outcomes
|
|
248
|
-
|
|
249
|
-
## synthesis_fidelity
|
|
250
|
-
- type: number
|
|
251
|
-
- range: 0-1
|
|
252
|
-
- display: percentage
|
|
253
|
-
- label: Synthesis Fidelity
|
|
254
|
-
- primary: true
|
|
255
|
-
|
|
256
|
-
## structural_completeness
|
|
257
|
-
- type: number
|
|
258
|
-
- range: 0-100
|
|
259
|
-
- display: percentage
|
|
260
|
-
- label: Structural Completeness
|
|
261
|
-
|
|
262
|
-
## epistemic_honesty
|
|
263
|
-
- type: number
|
|
264
|
-
- range: 0-100
|
|
265
|
-
- display: percentage
|
|
266
|
-
- label: Epistemic Honesty
|
|
267
|
-
|
|
268
|
-
## invention_ratio
|
|
269
|
-
- type: number
|
|
270
|
-
- range: 0-1
|
|
271
|
-
- display: percentage
|
|
272
|
-
- label: Invention Ratio
|
|
273
|
-
- assignment: external
|
|
274
|
-
|
|
275
|
-
## derivation_status
|
|
276
|
-
- type: enum
|
|
277
|
-
- label: Derivation Status
|
|
278
|
-
- assignment: external
|