arscontexta 0.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (418) hide show
  1. package/.claude-plugin/marketplace.json +11 -0
  2. package/.claude-plugin/plugin.json +22 -0
  3. package/README.md +683 -0
  4. package/agents/knowledge-guide.md +49 -0
  5. package/bin/cli.mjs +66 -0
  6. package/generators/agents-md.md +240 -0
  7. package/generators/claude-md.md +379 -0
  8. package/generators/features/atomic-notes.md +124 -0
  9. package/generators/features/ethical-guardrails.md +58 -0
  10. package/generators/features/graph-analysis.md +188 -0
  11. package/generators/features/helper-functions.md +92 -0
  12. package/generators/features/maintenance.md +164 -0
  13. package/generators/features/methodology-knowledge.md +70 -0
  14. package/generators/features/mocs.md +144 -0
  15. package/generators/features/multi-domain.md +61 -0
  16. package/generators/features/personality.md +71 -0
  17. package/generators/features/processing-pipeline.md +428 -0
  18. package/generators/features/schema.md +149 -0
  19. package/generators/features/self-evolution.md +229 -0
  20. package/generators/features/self-space.md +78 -0
  21. package/generators/features/semantic-search.md +99 -0
  22. package/generators/features/session-rhythm.md +85 -0
  23. package/generators/features/templates.md +85 -0
  24. package/generators/features/wiki-links.md +88 -0
  25. package/generators/soul-md.md +121 -0
  26. package/hooks/hooks.json +45 -0
  27. package/hooks/scripts/auto-commit.sh +44 -0
  28. package/hooks/scripts/session-capture.sh +35 -0
  29. package/hooks/scripts/session-orient.sh +86 -0
  30. package/hooks/scripts/write-validate.sh +42 -0
  31. package/methodology/AI shifts knowledge systems from externalizing memory to externalizing attention.md +59 -0
  32. package/methodology/BM25 retrieval fails on full-length descriptions because query term dilution reduces match scores.md +39 -0
  33. package/methodology/IBIS framework maps claim-based architecture to structured argumentation.md +58 -0
  34. package/methodology/LLM attention degrades as context fills.md +49 -0
  35. package/methodology/MOC construction forces synthesis that automated generation from metadata cannot replicate.md +49 -0
  36. package/methodology/MOC maintenance investment compounds because orientation savings multiply across every future session.md +41 -0
  37. package/methodology/MOCs are attention management devices not just organizational tools.md +51 -0
  38. package/methodology/PKM failure follows a predictable cycle.md +50 -0
  39. package/methodology/ThreadMode to DocumentMode transformation is the core value creation step.md +52 -0
  40. package/methodology/WIP limits force processing over accumulation.md +53 -0
  41. package/methodology/Zeigarnik effect validates capture-first philosophy because open loops drain attention.md +42 -0
  42. package/methodology/academic research uses structured extraction with cross-source synthesis.md +566 -0
  43. package/methodology/adapt the four-phase processing pipeline to domain-specific throughput needs.md +197 -0
  44. package/methodology/agent notes externalize navigation intuition that search cannot discover and traversal cannot reconstruct.md +48 -0
  45. package/methodology/agent self-memory should be architecturally separate from user knowledge systems.md +48 -0
  46. package/methodology/agent session boundaries create natural automation checkpoints that human-operated systems lack.md +56 -0
  47. package/methodology/agent-cognition.md +107 -0
  48. package/methodology/agents are simultaneously methodology executors and subjects creating a unique trust asymmetry.md +66 -0
  49. package/methodology/aspect-oriented programming solved the same cross-cutting concern problem that hooks solve.md +39 -0
  50. package/methodology/associative ontologies beat hierarchical taxonomies because heterarchy adapts while hierarchy brittles.md +53 -0
  51. package/methodology/attention residue may have a minimum granularity that cannot be subdivided.md +46 -0
  52. package/methodology/auto-commit hooks eliminate prospective memory failures by converting remember-to-act into guaranteed execution.md +47 -0
  53. package/methodology/automated detection is always safe because it only reads state while automated remediation risks content corruption.md +42 -0
  54. package/methodology/automation should be retired when its false positive rate exceeds its true positive rate or it catches zero issues.md +56 -0
  55. package/methodology/backlinks implicitly define notes by revealing usage context.md +35 -0
  56. package/methodology/backward maintenance asks what would be different if written today.md +62 -0
  57. package/methodology/balance onboarding enforcement and questions to prevent premature complexity.md +229 -0
  58. package/methodology/basic level categorization determines optimal MOC granularity.md +51 -0
  59. package/methodology/batching by context similarity reduces switching costs in agent processing.md +43 -0
  60. package/methodology/behavioral anti-patterns matter more than tool selection.md +42 -0
  61. package/methodology/betweenness centrality identifies bridge notes connecting disparate knowledge domains.md +57 -0
  62. package/methodology/blueprints that teach construction outperform downloads that provide pre-built code for platform-dependent modules.md +42 -0
  63. package/methodology/bootstrapping principle enables self-improving systems.md +62 -0
  64. package/methodology/build automatic memory through cognitive offloading and session handoffs.md +285 -0
  65. package/methodology/capture the reaction to content not just the content itself.md +41 -0
  66. package/methodology/claims must be specific enough to be wrong.md +36 -0
  67. package/methodology/closure rituals create clean breaks that prevent attention residue bleed.md +44 -0
  68. package/methodology/cognitive offloading is the architectural foundation for vault design.md +46 -0
  69. package/methodology/cognitive outsourcing risk in agent-operated systems.md +55 -0
  70. package/methodology/coherence maintains consistency despite inconsistent inputs.md +96 -0
  71. package/methodology/coherent architecture emerges from wiki links spreading activation and small-world topology.md +48 -0
  72. package/methodology/community detection algorithms can inform when MOCs should split or merge.md +52 -0
  73. package/methodology/complete navigation requires four complementary types that no single mechanism provides.md +43 -0
  74. package/methodology/complex systems evolve from simple working systems.md +59 -0
  75. package/methodology/composable knowledge architecture builds systems from independent toggleable modules not monolithic templates.md +61 -0
  76. package/methodology/compose multi-domain systems through separate templates and shared graph.md +372 -0
  77. package/methodology/concept-orientation beats source-orientation for cross-domain connections.md +51 -0
  78. package/methodology/confidence thresholds gate automated action between the mechanical and judgment zones.md +50 -0
  79. package/methodology/configuration dimensions interact so choices in one create pressure on others.md +58 -0
  80. package/methodology/configuration paralysis emerges when derivation surfaces too many decisions.md +44 -0
  81. package/methodology/context files function as agent operating systems through self-referential self-extension.md +46 -0
  82. package/methodology/context phrase clarity determines how deep a navigation hierarchy can scale.md +46 -0
  83. package/methodology/continuous small-batch processing eliminates review dread.md +48 -0
  84. package/methodology/controlled disorder engineers serendipity through semantic rather than topical linking.md +51 -0
  85. package/methodology/creative writing uses worldbuilding consistency with character tracking.md +672 -0
  86. package/methodology/cross-links between MOC territories indicate creative leaps and integration depth.md +43 -0
  87. package/methodology/dangling links reveal which notes want to exist.md +62 -0
  88. package/methodology/data exit velocity measures how quickly content escapes vendor lock-in.md +74 -0
  89. package/methodology/decontextualization risk means atomicity may strip meaning that cannot be recovered.md +48 -0
  90. package/methodology/dense interlinked research claims enable derivation while sparse references only enable templating.md +47 -0
  91. package/methodology/dependency resolution through topological sort makes module composition transparent and verifiable.md +56 -0
  92. package/methodology/derivation generates knowledge systems from composable research claims not template customization.md +63 -0
  93. package/methodology/derivation-engine.md +27 -0
  94. package/methodology/derived systems follow a seed-evolve-reseed lifecycle.md +56 -0
  95. package/methodology/description quality for humans diverges from description quality for keyword search.md +73 -0
  96. package/methodology/descriptions are retrieval filters not summaries.md +112 -0
  97. package/methodology/design MOCs as attention management devices with lifecycle governance.md +318 -0
  98. package/methodology/design-dimensions.md +66 -0
  99. package/methodology/digital mutability enables note evolution that physical permanence forbids.md +54 -0
  100. package/methodology/discovery-retrieval.md +48 -0
  101. package/methodology/distinctiveness scoring treats description quality as measurable.md +69 -0
  102. package/methodology/does agent processing recover what fast capture loses.md +43 -0
  103. package/methodology/domain-compositions.md +37 -0
  104. package/methodology/dual-coding with visual elements could enhance agent traversal.md +55 -0
  105. package/methodology/each module must be describable in one sentence under 200 characters or it does too many things.md +45 -0
  106. package/methodology/each new note compounds value by creating traversal paths.md +55 -0
  107. package/methodology/eight configuration dimensions parameterize the space of possible knowledge systems.md +56 -0
  108. package/methodology/elaborative encoding is the quality gate for new notes.md +55 -0
  109. package/methodology/enforce schema with graduated strictness across capture processing and query zones.md +221 -0
  110. package/methodology/enforcing atomicity can create paralysis when ideas resist decomposition.md +43 -0
  111. package/methodology/engineering uses technical decision tracking with architectural memory.md +766 -0
  112. package/methodology/every knowledge domain shares a four-phase processing skeleton that diverges only in the process step.md +53 -0
  113. package/methodology/evolution observations provide actionable signals for system adaptation.md +67 -0
  114. package/methodology/external memory shapes cognition more than base model.md +60 -0
  115. package/methodology/faceted classification treats notes as multi-dimensional objects rather than folder contents.md +65 -0
  116. package/methodology/failure-modes.md +27 -0
  117. package/methodology/false universalism applies same processing logic regardless of domain.md +49 -0
  118. package/methodology/federated wiki pattern enables multi-agent divergence as feature not bug.md +59 -0
  119. package/methodology/flat files break at retrieval scale.md +75 -0
  120. package/methodology/forced engagement produces weak connections.md +48 -0
  121. package/methodology/four abstraction layers separate platform-agnostic from platform-dependent knowledge system features.md +47 -0
  122. package/methodology/fresh context per task preserves quality better than chaining phases.md +44 -0
  123. package/methodology/friction reveals architecture.md +63 -0
  124. package/methodology/friction-driven module adoption prevents configuration debt by adding complexity only at pain points.md +48 -0
  125. package/methodology/gardening cycle implements tend prune fertilize operations.md +41 -0
  126. package/methodology/generation effect gate blocks processing without transformation.md +40 -0
  127. package/methodology/goal-driven memory orchestration enables autonomous domain learning through directed compute allocation.md +41 -0
  128. package/methodology/good descriptions layer heuristic then mechanism then implication.md +57 -0
  129. package/methodology/graph-structure.md +65 -0
  130. package/methodology/guided notes might outperform post-hoc structuring for high-volume capture.md +37 -0
  131. package/methodology/health wellness uses symptom-trigger correlation with multi-dimensional tracking.md +819 -0
  132. package/methodology/hook composition creates emergent methodology from independent single-concern components.md +47 -0
  133. package/methodology/hook enforcement guarantees quality while instruction enforcement merely suggests it.md +51 -0
  134. package/methodology/hook-driven learning loops create self-improving methodology through observation accumulation.md +62 -0
  135. package/methodology/hooks are the agent habit system that replaces the missing basal ganglia.md +40 -0
  136. package/methodology/hooks cannot replace genuine cognitive engagement yet more automation is always tempting.md +87 -0
  137. package/methodology/hooks enable context window efficiency by delegating deterministic checks to external processes.md +47 -0
  138. package/methodology/idempotent maintenance operations are safe to automate because running them twice produces the same result as running them once.md +44 -0
  139. package/methodology/implement condition-based maintenance triggers for derived systems.md +255 -0
  140. package/methodology/implicit dependencies create distributed monoliths that fail silently across configurations.md +58 -0
  141. package/methodology/implicit knowledge emerges from traversal.md +55 -0
  142. package/methodology/incremental formalization happens through repeated touching of old notes.md +60 -0
  143. package/methodology/incremental reading enables cross-source connection finding.md +39 -0
  144. package/methodology/index.md +32 -0
  145. package/methodology/inline links carry richer relationship data than metadata fields.md +91 -0
  146. package/methodology/insight accretion differs from productivity in knowledge systems.md +41 -0
  147. package/methodology/intermediate packets enable assembly over creation.md +52 -0
  148. package/methodology/intermediate representation pattern enables reliable vault operations beyond regex.md +62 -0
  149. package/methodology/justification chains enable forward backward and evolution reasoning about configuration decisions.md +46 -0
  150. package/methodology/knowledge system architecture is parameterized by platform capabilities not fixed by methodology.md +51 -0
  151. package/methodology/knowledge systems become communication partners through complexity and memory humans cannot sustain.md +47 -0
  152. package/methodology/knowledge systems share universal operations and structural components across all methodology traditions.md +46 -0
  153. package/methodology/legal case management uses precedent chains with regulatory change propagation.md +892 -0
  154. package/methodology/live index via periodic regeneration keeps discovery current.md +58 -0
  155. package/methodology/local-first file formats are inherently agent-native.md +69 -0
  156. package/methodology/logic column pattern separates reasoning from procedure.md +35 -0
  157. package/methodology/maintenance operations are more universal than creative pipelines because structural health is domain-invariant.md +47 -0
  158. package/methodology/maintenance scheduling frequency should match consequence speed not detection capability.md +50 -0
  159. package/methodology/maintenance targeting should prioritize mechanism and theory notes.md +26 -0
  160. package/methodology/maintenance-patterns.md +72 -0
  161. package/methodology/markdown plus YAML plus ripgrep implements a queryable graph database without infrastructure.md +55 -0
  162. package/methodology/maturity field enables agent context prioritization.md +33 -0
  163. package/methodology/memory-architecture.md +27 -0
  164. package/methodology/metacognitive confidence can diverge from retrieval capability.md +42 -0
  165. package/methodology/metadata reduces entropy enabling precision over recall.md +91 -0
  166. package/methodology/methodology development should follow the trajectory from documentation to skill to hook as understanding hardens.md +80 -0
  167. package/methodology/methodology traditions are named points in a shared configuration space not competing paradigms.md +64 -0
  168. package/methodology/mnemonic medium embeds verification into navigation.md +46 -0
  169. package/methodology/module communication through shared YAML fields creates loose coupling without direct dependencies.md +44 -0
  170. package/methodology/module deactivation must account for structural artifacts that survive the toggle.md +49 -0
  171. package/methodology/multi-domain systems compose through separate templates and shared graph.md +61 -0
  172. package/methodology/multi-domain-composition.md +27 -0
  173. package/methodology/narrow folksonomy optimizes for single-operator retrieval unlike broad consensus tagging.md +53 -0
  174. package/methodology/navigation infrastructure passes through distinct scaling regimes that require qualitative strategy shifts.md +48 -0
  175. package/methodology/navigational vertigo emerges in pure association systems without local hierarchy.md +54 -0
  176. package/methodology/note titles should function as APIs enabling sentence transclusion.md +51 -0
  177. package/methodology/note-design.md +57 -0
  178. package/methodology/notes are skills /342/200/224 curated knowledge injected when relevant.md" +62 -0
  179. package/methodology/notes function as cognitive anchors that stabilize attention during complex tasks.md +41 -0
  180. package/methodology/novel domains derive by mapping knowledge type to closest reference domain then adapting.md +50 -0
  181. package/methodology/nudge theory explains graduated hook enforcement as choice architecture for agents.md +59 -0
  182. package/methodology/observation and tension logs function as dead-letter queues for failed automation.md +51 -0
  183. package/methodology/operational memory and knowledge memory serve different functions in agent architecture.md +48 -0
  184. package/methodology/operational wisdom requires contextual observation.md +52 -0
  185. package/methodology/orchestrated vault creation transforms arscontexta from tool to autonomous knowledge factory.md +40 -0
  186. package/methodology/organic emergence versus active curation creates a fundamental vault governance tension.md +68 -0
  187. package/methodology/orphan notes are seeds not failures.md +38 -0
  188. package/methodology/over-automation corrupts quality when hooks encode judgment rather than verification.md +62 -0
  189. package/methodology/people relationships uses Dunbar-layered graphs with interaction tracking.md +659 -0
  190. package/methodology/personal assistant uses life area management with review automation.md +610 -0
  191. package/methodology/platform adapter translation is semantic not mechanical because hook event meanings differ.md +40 -0
  192. package/methodology/platform capability tiers determine which knowledge system features can be implemented.md +48 -0
  193. package/methodology/platform fragmentation means identical conceptual operations require different implementations across agent environments.md +44 -0
  194. package/methodology/premature complexity is the most common derivation failure mode.md +45 -0
  195. package/methodology/prevent domain-specific failure modes through the vulnerability matrix.md +336 -0
  196. package/methodology/processing effort should follow retrieval demand.md +57 -0
  197. package/methodology/processing-workflows.md +75 -0
  198. package/methodology/product management uses feedback pipelines with experiment tracking.md +789 -0
  199. package/methodology/productivity porn risk in meta-system building.md +30 -0
  200. package/methodology/programmable notes could enable property-triggered workflows.md +64 -0
  201. package/methodology/progressive disclosure means reading right not reading less.md +69 -0
  202. package/methodology/progressive schema validates only what active modules require not the full system schema.md +49 -0
  203. package/methodology/project management uses decision tracking with stakeholder context.md +776 -0
  204. package/methodology/propositional link semantics transform wiki links from associative to reasoned.md +87 -0
  205. package/methodology/prospective memory requires externalization.md +53 -0
  206. package/methodology/provenance tracks where beliefs come from.md +62 -0
  207. package/methodology/queries evolve during search so agents should checkpoint.md +35 -0
  208. package/methodology/question-answer metadata enables inverted search patterns.md +39 -0
  209. package/methodology/random note resurfacing prevents write-only memory.md +33 -0
  210. package/methodology/reconciliation loops that compare desired state to actual state enable drift correction without continuous monitoring.md +59 -0
  211. package/methodology/reflection synthesizes existing notes into new insight.md +100 -0
  212. package/methodology/retrieval utility should drive design over capture completeness.md +69 -0
  213. package/methodology/retrieval verification loop tests description quality at scale.md +81 -0
  214. package/methodology/role field makes graph structure explicit.md +94 -0
  215. package/methodology/scaffolding enables divergence that fine-tuning cannot.md +67 -0
  216. package/methodology/schema enforcement via validation agents enables soft consistency.md +60 -0
  217. package/methodology/schema evolution follows observe-then-formalize not design-then-enforce.md +65 -0
  218. package/methodology/schema field names are the only domain specific element in the universal note pattern.md +46 -0
  219. package/methodology/schema fields should use domain-native vocabulary not abstract terminology.md +47 -0
  220. package/methodology/schema templates reduce cognitive overhead at capture time.md +55 -0
  221. package/methodology/schema validation hooks externalize inhibitory control that degrades under cognitive load.md +48 -0
  222. package/methodology/schema-enforcement.md +27 -0
  223. package/methodology/self-extension requires context files to contain platform operations knowledge not just methodology.md +47 -0
  224. package/methodology/sense-making vs storage does compression lose essential nuance.md +73 -0
  225. package/methodology/session boundary hooks implement cognitive bookends for orientation and reflection.md +60 -0
  226. package/methodology/session handoff creates continuity without persistent memory.md +43 -0
  227. package/methodology/session outputs are packets for future selves.md +43 -0
  228. package/methodology/session transcript mining enables experiential validation that structural tests cannot provide.md +38 -0
  229. package/methodology/skill context budgets constrain knowledge system complexity on agent platforms.md +52 -0
  230. package/methodology/skills encode methodology so manual execution bypasses quality gates.md +50 -0
  231. package/methodology/small-world topology requires hubs and dense local links.md +99 -0
  232. package/methodology/source attribution enables tracing claims to foundations.md +38 -0
  233. package/methodology/spaced repetition scheduling could optimize vault maintenance.md +44 -0
  234. package/methodology/spreading activation models how agents should traverse.md +79 -0
  235. package/methodology/stale navigation actively misleads because agents trust curated maps completely.md +43 -0
  236. package/methodology/stigmergy coordinates agents through environmental traces without direct communication.md +62 -0
  237. package/methodology/storage versus thinking distinction determines which tool patterns apply.md +56 -0
  238. package/methodology/structure enables navigation without reading everything.md +52 -0
  239. package/methodology/structure without processing provides no value.md +56 -0
  240. package/methodology/student learning uses prerequisite graphs with spaced retrieval.md +770 -0
  241. package/methodology/summary coherence tests composability before filing.md +37 -0
  242. package/methodology/tag rot applies to wiki links because titles serve as both identifier and display text.md +50 -0
  243. package/methodology/temporal media must convert to spatial text for agent traversal.md +43 -0
  244. package/methodology/temporal processing priority creates age-based inbox urgency.md +45 -0
  245. package/methodology/temporal separation of capture and processing preserves context freshness.md +39 -0
  246. package/methodology/ten universal primitives form the kernel of every viable agent knowledge system.md +162 -0
  247. package/methodology/testing effect could enable agent knowledge verification.md +38 -0
  248. package/methodology/the AgentSkills standard embodies progressive disclosure at the skill level.md +40 -0
  249. package/methodology/the derivation engine improves recursively as deployed systems generate observations.md +49 -0
  250. package/methodology/the determinism boundary separates hook methodology from skill methodology.md +46 -0
  251. package/methodology/the fix-versus-report decision depends on determinism reversibility and accumulated trust.md +45 -0
  252. package/methodology/the generation effect requires active transformation not just storage.md +57 -0
  253. package/methodology/the no wrong patches guarantee ensures any valid module combination produces a valid system.md +58 -0
  254. package/methodology/the system is the argument.md +46 -0
  255. package/methodology/the vault constitutes identity for agents.md +86 -0
  256. package/methodology/the vault methodology transfers because it encodes cognitive science not domain specifics.md +47 -0
  257. package/methodology/therapy journal uses warm personality with pattern detection for emotional processing.md +584 -0
  258. package/methodology/three capture schools converge through agent-mediated synthesis.md +55 -0
  259. package/methodology/three concurrent maintenance loops operate at different timescales to catch different classes of problems.md +56 -0
  260. package/methodology/throughput matters more than accumulation.md +58 -0
  261. package/methodology/title as claim enables traversal as reasoning.md +50 -0
  262. package/methodology/topological organization beats temporal for knowledge work.md +52 -0
  263. package/methodology/trading uses conviction tracking with thesis-outcome correlation.md +699 -0
  264. package/methodology/trails transform ephemeral navigation into persistent artifacts.md +39 -0
  265. package/methodology/transform universal vocabulary to domain-native language through six levels.md +259 -0
  266. package/methodology/type field enables structured queries without folder hierarchies.md +53 -0
  267. package/methodology/use-case presets dissolve the tension between composability and simplicity.md +44 -0
  268. package/methodology/vault conventions may impose hidden rigidity on thinking.md +44 -0
  269. package/methodology/verbatim risk applies to agents too.md +31 -0
  270. package/methodology/vibe notetaking is the emerging industry consensus for AI-native self-organization.md +56 -0
  271. package/methodology/vivid memories need verification.md +45 -0
  272. package/methodology/vocabulary-transformation.md +27 -0
  273. package/methodology/voice capture is the highest-bandwidth channel for agent-delegated knowledge systems.md +45 -0
  274. package/methodology/wiki links are the digital evolution of analog indexing.md +73 -0
  275. package/methodology/wiki links as social contract transforms agents into stewards of incomplete references.md +52 -0
  276. package/methodology/wiki links create navigation paths that shape retrieval.md +63 -0
  277. package/methodology/wiki links implement GraphRAG without the infrastructure.md +101 -0
  278. package/methodology/writing for audience blocks authentic creation.md +22 -0
  279. package/methodology/you operate a system that takes notes.md +79 -0
  280. package/openclaw/SKILL.md +110 -0
  281. package/package.json +45 -0
  282. package/platforms/README.md +51 -0
  283. package/platforms/claude-code/generator.md +61 -0
  284. package/platforms/claude-code/hooks/README.md +186 -0
  285. package/platforms/claude-code/hooks/auto-commit.sh.template +38 -0
  286. package/platforms/claude-code/hooks/session-capture.sh.template +72 -0
  287. package/platforms/claude-code/hooks/session-orient.sh.template +189 -0
  288. package/platforms/claude-code/hooks/write-validate.sh.template +106 -0
  289. package/platforms/openclaw/generator.md +82 -0
  290. package/platforms/openclaw/hooks/README.md +89 -0
  291. package/platforms/openclaw/hooks/bootstrap.ts.template +224 -0
  292. package/platforms/openclaw/hooks/command-new.ts.template +165 -0
  293. package/platforms/openclaw/hooks/heartbeat.ts.template +214 -0
  294. package/platforms/shared/features/README.md +70 -0
  295. package/platforms/shared/skill-blocks/graph.md +145 -0
  296. package/platforms/shared/skill-blocks/learn.md +119 -0
  297. package/platforms/shared/skill-blocks/next.md +131 -0
  298. package/platforms/shared/skill-blocks/pipeline.md +326 -0
  299. package/platforms/shared/skill-blocks/ralph.md +616 -0
  300. package/platforms/shared/skill-blocks/reduce.md +1142 -0
  301. package/platforms/shared/skill-blocks/refactor.md +129 -0
  302. package/platforms/shared/skill-blocks/reflect.md +780 -0
  303. package/platforms/shared/skill-blocks/remember.md +524 -0
  304. package/platforms/shared/skill-blocks/rethink.md +574 -0
  305. package/platforms/shared/skill-blocks/reweave.md +680 -0
  306. package/platforms/shared/skill-blocks/seed.md +320 -0
  307. package/platforms/shared/skill-blocks/stats.md +145 -0
  308. package/platforms/shared/skill-blocks/tasks.md +171 -0
  309. package/platforms/shared/skill-blocks/validate.md +323 -0
  310. package/platforms/shared/skill-blocks/verify.md +562 -0
  311. package/platforms/shared/templates/README.md +35 -0
  312. package/presets/experimental/categories.yaml +1 -0
  313. package/presets/experimental/preset.yaml +38 -0
  314. package/presets/experimental/starter/README.md +7 -0
  315. package/presets/experimental/vocabulary.yaml +7 -0
  316. package/presets/personal/categories.yaml +7 -0
  317. package/presets/personal/preset.yaml +41 -0
  318. package/presets/personal/starter/goals.md +21 -0
  319. package/presets/personal/starter/index.md +17 -0
  320. package/presets/personal/starter/life-areas.md +21 -0
  321. package/presets/personal/starter/people.md +21 -0
  322. package/presets/personal/vocabulary.yaml +32 -0
  323. package/presets/research/categories.yaml +8 -0
  324. package/presets/research/preset.yaml +41 -0
  325. package/presets/research/starter/index.md +17 -0
  326. package/presets/research/starter/methods.md +21 -0
  327. package/presets/research/starter/open-questions.md +21 -0
  328. package/presets/research/vocabulary.yaml +33 -0
  329. package/reference/AUDIT-REPORT.md +238 -0
  330. package/reference/claim-map.md +172 -0
  331. package/reference/components.md +327 -0
  332. package/reference/conversation-patterns.md +542 -0
  333. package/reference/derivation-validation.md +649 -0
  334. package/reference/dimension-claim-map.md +134 -0
  335. package/reference/evolution-lifecycle.md +297 -0
  336. package/reference/failure-modes.md +235 -0
  337. package/reference/interaction-constraints.md +204 -0
  338. package/reference/kernel.yaml +242 -0
  339. package/reference/methodology.md +283 -0
  340. package/reference/open-questions.md +279 -0
  341. package/reference/personality-layer.md +302 -0
  342. package/reference/self-space.md +299 -0
  343. package/reference/semantic-vs-keyword.md +288 -0
  344. package/reference/session-lifecycle.md +298 -0
  345. package/reference/templates/base-note.md +16 -0
  346. package/reference/templates/companion-note.md +70 -0
  347. package/reference/templates/creative-note.md +16 -0
  348. package/reference/templates/learning-note.md +16 -0
  349. package/reference/templates/life-note.md +16 -0
  350. package/reference/templates/moc.md +26 -0
  351. package/reference/templates/relationship-note.md +17 -0
  352. package/reference/templates/research-note.md +19 -0
  353. package/reference/templates/session-log.md +24 -0
  354. package/reference/templates/therapy-note.md +16 -0
  355. package/reference/test-fixtures/edge-case-constraints.md +148 -0
  356. package/reference/test-fixtures/multi-domain.md +164 -0
  357. package/reference/test-fixtures/novel-domain-gaming.md +138 -0
  358. package/reference/test-fixtures/research-minimal.md +102 -0
  359. package/reference/test-fixtures/therapy-full.md +155 -0
  360. package/reference/testing-milestones.md +1087 -0
  361. package/reference/three-spaces.md +363 -0
  362. package/reference/tradition-presets.md +203 -0
  363. package/reference/use-case-presets.md +341 -0
  364. package/reference/validate-kernel.sh +432 -0
  365. package/reference/vocabulary-transforms.md +85 -0
  366. package/scripts/sync-thinking.sh +147 -0
  367. package/skill-sources/graph/SKILL.md +567 -0
  368. package/skill-sources/graph/skill.json +17 -0
  369. package/skill-sources/learn/SKILL.md +254 -0
  370. package/skill-sources/learn/skill.json +17 -0
  371. package/skill-sources/next/SKILL.md +407 -0
  372. package/skill-sources/next/skill.json +17 -0
  373. package/skill-sources/pipeline/SKILL.md +314 -0
  374. package/skill-sources/pipeline/skill.json +17 -0
  375. package/skill-sources/ralph/SKILL.md +604 -0
  376. package/skill-sources/ralph/skill.json +17 -0
  377. package/skill-sources/reduce/SKILL.md +1113 -0
  378. package/skill-sources/reduce/skill.json +17 -0
  379. package/skill-sources/refactor/SKILL.md +448 -0
  380. package/skill-sources/refactor/skill.json +17 -0
  381. package/skill-sources/reflect/SKILL.md +747 -0
  382. package/skill-sources/reflect/skill.json +17 -0
  383. package/skill-sources/remember/SKILL.md +534 -0
  384. package/skill-sources/remember/skill.json +17 -0
  385. package/skill-sources/rethink/SKILL.md +658 -0
  386. package/skill-sources/rethink/skill.json +17 -0
  387. package/skill-sources/reweave/SKILL.md +657 -0
  388. package/skill-sources/reweave/skill.json +17 -0
  389. package/skill-sources/seed/SKILL.md +303 -0
  390. package/skill-sources/seed/skill.json +17 -0
  391. package/skill-sources/stats/SKILL.md +371 -0
  392. package/skill-sources/stats/skill.json +17 -0
  393. package/skill-sources/tasks/SKILL.md +402 -0
  394. package/skill-sources/tasks/skill.json +17 -0
  395. package/skill-sources/validate/SKILL.md +310 -0
  396. package/skill-sources/validate/skill.json +17 -0
  397. package/skill-sources/verify/SKILL.md +532 -0
  398. package/skill-sources/verify/skill.json +17 -0
  399. package/skills/add-domain/SKILL.md +441 -0
  400. package/skills/add-domain/skill.json +17 -0
  401. package/skills/architect/SKILL.md +568 -0
  402. package/skills/architect/skill.json +17 -0
  403. package/skills/ask/SKILL.md +388 -0
  404. package/skills/ask/skill.json +17 -0
  405. package/skills/health/SKILL.md +760 -0
  406. package/skills/health/skill.json +17 -0
  407. package/skills/help/SKILL.md +348 -0
  408. package/skills/help/skill.json +17 -0
  409. package/skills/recommend/SKILL.md +553 -0
  410. package/skills/recommend/skill.json +17 -0
  411. package/skills/reseed/SKILL.md +385 -0
  412. package/skills/reseed/skill.json +17 -0
  413. package/skills/setup/SKILL.md +1688 -0
  414. package/skills/setup/skill.json +17 -0
  415. package/skills/tutorial/SKILL.md +496 -0
  416. package/skills/tutorial/skill.json +17 -0
  417. package/skills/upgrade/SKILL.md +395 -0
  418. package/skills/upgrade/skill.json +17 -0
@@ -0,0 +1,892 @@
1
+ ---
2
+ description: Legal case management knowledge system — inspirational composition showing derived architecture for precedent chain tracking, regulatory change propagation, and cross-matter intelligence
3
+ kind: example
4
+ domain: legal
5
+ topics: ["[[domain-compositions]]"]
6
+ ---
7
+
8
+ # legal case management uses precedent chains with regulatory change propagation
9
+
10
+ A derived cognitive architecture for a litigation attorney who needs to stop relying on memory for precedent validity, regulatory changes, and cross-matter patterns. Built kernel-up from the 14 universal primitives, adapted through the natural vocabulary of legal practice, and optimized for the one thing agents do that attorneys cannot: hold every case brief, every regulatory update, every argument ever drafted in working memory simultaneously, ensuring that no relied-upon precedent goes stale and no relevant prior work product goes undiscovered.
11
+
12
+ This is the most schema-heavy domain in the example catalog. Legal practice generates dense, structured metadata — case citations, jurisdictional hierarchies, regulatory frameworks, procedural timelines, evidentiary chains. The YAML frontmatter is not an overhead cost here. It is the mechanism that transforms a filing cabinet of PDFs into a queryable legal knowledge graph.
13
+
14
+ ---
15
+
16
+ ## Persona
17
+
18
+ **Diana**, 38, senior associate at a mid-size litigation firm specializing in technology and data privacy law. She handles 12-15 active matters across multiple jurisdictions (federal, California, New York, EU/GDPR), involving contract disputes, regulatory compliance, IP licensing, and data breach response. She has seven years of briefs, research memos, deposition summaries, and strategy documents spread across a document management system (DMS) that is searchable by keyword but has no conceptual awareness.
19
+
20
+ Diana's pain points are specific:
21
+ 1. She cited a case in a motion last month that opposing counsel showed had been distinguished by a recent appellate decision. She did not know because her DMS does not track precedent chains.
22
+ 2. A GDPR amendment affected three active matters, but she only updated two because she did not realize the third was implicated until the client called.
23
+ 3. She rewrote an argument from scratch for a new matter that she had already developed (better) in a brief two years ago, because search for "trade secret misappropriation damages" returned 200 results and she gave up scrolling.
24
+
25
+ Diana does not need better document management. She needs a knowledge graph where precedents link to their treatment history, regulations link to every matter they affect, and arguments link to the evidence that supports them — and an agent that monitors all of these relationships continuously so that no change goes unnoticed.
26
+
27
+ ---
28
+
29
+ ## Configuration
30
+
31
+ The 8 dimensions derived for litigation case management:
32
+
33
+ | Dimension | Position | Rationale |
34
+ |-----------|----------|-----------|
35
+ | Granularity | Atomic for legal analysis, compound for case files | Each legal principle, case holding, and argument is a distinct, reusable unit. But a case file (matter note) is inherently compound — it tracks parties, deadlines, strategy, and related matters together because they are never accessed independently. |
36
+ | Organization | Flat with wiki links + jurisdictional tagging | Legal knowledge is cross-jurisdictional by nature. A privacy principle applies in California and GDPR. A contract interpretation applies across multiple matters. Folders by jurisdiction would duplicate notes. Flat structure with jurisdictional metadata enables cross-jurisdictional queries. |
37
+ | Linking | Explicit + typed + directional | Legal relationships are inherently typed: precedent → holding (establishes), case → precedent (cites/relies on), case → precedent (distinguishes), regulation → matter (applies to), evidence → argument (supports). Generic "related" links would lose the legal semantics that make the graph useful. |
38
+ | Metadata | Dense — the densest in the example catalog | Every legal artifact carries structured metadata: citations, jurisdictions, courts, dates, parties, procedural postures, standards of review. This metadata is not optional decoration — it is how legal knowledge is queried. "Find all contract disputes in the 9th Circuit where the court applied a heightened pleading standard" is a YAML query, not a keyword search. |
39
+ | Processing | Heavy | Legal research requires the full pipeline: case briefing (extract holdings and reasoning), precedent chain mapping (trace how cases have been treated), argument construction (link evidence to legal elements), and compliance verification (check all regulations against all matters). Each phase produces different analytical artifacts. |
40
+ | Formalization | High from day one | Legal work is inherently formal. Citations have required formats. Courts have hierarchies. Statutes have numbering systems. The schema should mirror the formality of the domain from the start, not evolve toward it. |
41
+ | Review | Weekly for active matters, immediate for regulatory changes, quarterly for precedent chain validation | Active matters require weekly deadline and strategy review. Regulatory changes require immediate impact assessment — a new ruling cannot wait for the weekly review. Precedent chains should be validated quarterly to catch cases that have been overruled or distinguished. |
42
+ | Scope | Individual practitioner with firm-wide potential | Diana's system starts as her personal practice intelligence. But the schema is designed so that multiple attorneys could share the same precedent graph, with matter-specific notes remaining private and legal principle notes being shared. |
43
+
44
+ ---
45
+
46
+ ## Vault Structure
47
+
48
+ ```
49
+ vault/
50
+ ├── 00_inbox/ # raw capture
51
+ │ ├── cases/ # new case law to brief
52
+ │ ├── regulations/ # regulatory updates to process
53
+ │ ├── contracts/ # agreements to review
54
+ │ └── research/ # legal articles, CLE materials
55
+ ├── 01_thinking/ # active legal knowledge (flat)
56
+ │ ├── index.md # hub MOC
57
+ │ ├── precedents.md # domain MOC: case law principles
58
+ │ ├── regulatory.md # domain MOC: regulatory landscape
59
+ │ ├── contracts.md # topic MOC: contract law patterns
60
+ │ ├── privacy-law.md # topic MOC: privacy and data protection
61
+ │ ├── ip-licensing.md # topic MOC: IP and licensing
62
+ │ ├── trade-secrets.md # topic MOC: trade secret law
63
+ │ ├── evidence-standards.md # topic MOC: evidentiary standards
64
+ │ ├── procedural.md # topic MOC: procedural rules
65
+ │ │
66
+ │ ├── transformative-use-test-requires-new-expression-not-new-purpose.md
67
+ │ ├── CCPA-private-right-of-action-limited-to-data-breaches.md
68
+ │ ├── inevitable-disclosure-doctrine-disfavored-in-ninth-circuit.md
69
+ │ ├── heightened-pleading-applies-to-fraud-based-trade-secret-claims.md
70
+ │ ├── GDPR-article-17-right-to-erasure-overridden-by-legal-hold.md
71
+ │ ├── contractual-limitation-of-liability-unenforceable-for-willful-breach.md
72
+ │ └── ...
73
+ ├── 02_archive/ # closed matters, retired precedents
74
+ │ ├── matters/ # completed engagements
75
+ │ │ ├── 2025-chen-v-dataflow/
76
+ │ │ └── 2024-acme-license-dispute/
77
+ │ └── precedents/ # overruled or superseded case law
78
+ ├── 03_matters/ # active client matters (the engine)
79
+ │ ├── chen-v-dataflow.md # matter file
80
+ │ ├── techcorp-gdpr-compliance.md
81
+ │ ├── synthex-trade-secret.md
82
+ │ ├── meridian-license-dispute.md
83
+ │ └── ...
84
+ ├── 04_legal/ # legal work product organized by type
85
+ │ ├── briefs/ # argument outlines and filed briefs
86
+ │ │ ├── chen-mtd-opposition.md
87
+ │ │ ├── synthex-pi-motion.md
88
+ │ │ └── ...
89
+ │ ├── research-memos/ # legal research memoranda
90
+ │ │ ├── trade-secret-damages-ninth-circuit.md
91
+ │ │ ├── gdpr-data-breach-notification-timeline.md
92
+ │ │ └── ...
93
+ │ ├── depositions/ # deposition summaries
94
+ │ │ ├── chen-depo-wong-2026-01-28.md
95
+ │ │ └── ...
96
+ │ └── evidence-maps/ # evidence-to-argument linking
97
+ │ ├── synthex-evidence-map.md
98
+ │ └── ...
99
+ ├── 05_meta/ # infrastructure
100
+ │ ├── templates/
101
+ │ │ ├── case-brief.md
102
+ │ │ ├── matter.md
103
+ │ │ ├── research-memo.md
104
+ │ │ ├── regulatory-update.md
105
+ │ │ ├── precedent-principle.md
106
+ │ │ ├── argument-outline.md
107
+ │ │ ├── deposition-summary.md
108
+ │ │ ├── evidence-map.md
109
+ │ │ ├── contract-review.md
110
+ │ │ └── compliance-checklist.md
111
+ │ ├── logs/
112
+ │ │ ├── observations.md
113
+ │ │ ├── observations/
114
+ │ │ ├── tensions.md
115
+ │ │ └── tensions/
116
+ │ ├── scripts/
117
+ │ │ ├── precedent-check.sh # validate cited cases still good law
118
+ │ │ ├── regulatory-impact.sh # trace regulation to affected matters
119
+ │ │ ├── deadline-audit.sh # check all deadlines across matters
120
+ │ │ ├── brief-search.sh # find prior arguments by legal element
121
+ │ │ └── cross-matter.sh # find patterns across matters
122
+ │ └── tasks/
123
+ │ └── queue.json
124
+ ├── self/
125
+ │ ├── identity.md
126
+ │ ├── methodology.md
127
+ │ ├── goals.md
128
+ │ └── diana-profile.md # practice areas, jurisdictions, preferences
129
+ └── ops/
130
+ └── methodology/
131
+ ├── how-precedent-tracking-works.md
132
+ ├── how-regulatory-propagation-works.md
133
+ └── how-brief-bank-works.md
134
+ ```
135
+
136
+ ---
137
+
138
+ ## Note Schemas
139
+
140
+ ### Case Brief
141
+
142
+ ```yaml
143
+ ---
144
+ description: [one sentence — the holding and its significance]
145
+ case_name: "Oracle v. DataShield Technologies"
146
+ citation: "2025 WL 4523891 (9th Cir. 2025)"
147
+ court: 9th-circuit
148
+ court_level: appellate
149
+ jurisdiction: federal
150
+ date_decided: 2025-11-14
151
+ procedural_posture: "appeal from summary judgment"
152
+ issue: "Whether trade secret misappropriation claims based on inevitable disclosure require evidence of actual or threatened misappropriation beyond mere employment by a competitor"
153
+ holding: "Inevitable disclosure alone, without evidence of actual or threatened misappropriation, is insufficient to sustain a trade secret claim under the DTSA"
154
+ reasoning: "The court reasoned that inevitable disclosure doctrine creates an inherent tension with employee mobility rights and cannot substitute for the statute's requirement of actual or threatened misappropriation"
155
+ significance: "Strengthens the 9th Circuit's skepticism toward inevitable disclosure and raises the evidentiary bar for trade secret plaintiffs who cannot prove actual misappropriation"
156
+ dicta: "Court noted in dicta that 'contractual non-compete agreements remain the appropriate vehicle for protecting against competitive employment, not judicial injunctions based on speculative disclosure'"
157
+ treatment:
158
+ followed_by: []
159
+ distinguished_by: []
160
+ overruled_by: null
161
+ cited_by: ["[[synthex-pi-motion]]"]
162
+ related_cases: ["[[Waymo v. Uber (N.D. Cal. 2018)]]"]
163
+ topics: ["[[trade-secrets]]", "[[precedents]]"]
164
+ relevant_notes: ["[[inevitable-disclosure-doctrine-disfavored-in-ninth-circuit]] — this case strengthens the principle", "[[synthex-trade-secret]] — directly affects our motion strategy"]
165
+ ---
166
+ ```
167
+
168
+ ### Matter Note
169
+
170
+ ```yaml
171
+ ---
172
+ description: [one sentence — matter summary and current posture]
173
+ client: "Synthex Corp"
174
+ matter_name: "Synthex Corp v. NovaTech LLC"
175
+ matter_number: "2026-LIT-0042"
176
+ matter_type: trade-secret-litigation
177
+ status: active
178
+ court: "N.D. Cal."
179
+ jurisdiction: federal
180
+ judge: "Hon. Maria Gonzalez"
181
+ opposing_counsel: "Richards & Morrison LLP (Sarah Park)"
182
+ cause_of_action: ["trade secret misappropriation (DTSA)", "trade secret misappropriation (CUTSA)", "breach of employment agreement"]
183
+ key_facts: "Former Synthex engineer joined NovaTech and allegedly used proprietary ML training pipeline architecture. No non-compete but had confidentiality agreement."
184
+ strategy: "Establish actual misappropriation through document comparison and testimony, avoid reliance on inevitable disclosure given 9th Circuit skepticism"
185
+ key_dates:
186
+ filed: 2026-01-15
187
+ answer_due: 2026-02-28
188
+ initial_case_management: 2026-03-15
189
+ discovery_cutoff: 2026-09-30
190
+ dispositive_motions: 2026-11-15
191
+ trial: 2027-02-01
192
+ deadlines:
193
+ - date: 2026-02-28
194
+ description: "Answer and counterclaim deadline"
195
+ status: pending
196
+ - date: 2026-03-01
197
+ description: "PI motion filing deadline"
198
+ status: drafting
199
+ - date: 2026-03-15
200
+ description: "Initial case management conference"
201
+ status: pending
202
+ related_matters: ["[[techcorp-gdpr-compliance]]"]
203
+ regulations_applicable: ["DTSA (18 U.S.C. 1836)", "CUTSA (Cal. Civ. Code 3426)"]
204
+ work_product: ["[[synthex-pi-motion]]", "[[trade-secret-damages-ninth-circuit]]", "[[synthex-evidence-map]]"]
205
+ topics: ["[[trade-secrets]]", "[[precedents]]"]
206
+ relevant_notes: ["[[inevitable-disclosure-doctrine-disfavored-in-ninth-circuit]] — shapes our strategy: we must prove actual misappropriation", "[[Oracle v. DataShield Technologies]] — key precedent supporting our need for direct evidence"]
207
+ ---
208
+ ```
209
+
210
+ ### Precedent Principle Note
211
+
212
+ ```yaml
213
+ ---
214
+ description: [one sentence — the legal principle and its current status across jurisdictions]
215
+ principle: "inevitable disclosure doctrine"
216
+ jurisdictions:
217
+ - jurisdiction: 9th-circuit
218
+ status: disfavored
219
+ key_case: "[[Oracle v. DataShield Technologies]]"
220
+ standard: "requires evidence of actual or threatened misappropriation beyond mere competitive employment"
221
+ - jurisdiction: 7th-circuit
222
+ status: accepted
223
+ key_case: "[[PepsiCo v. Redmond (7th Cir. 1995)]]"
224
+ standard: "inevitable disclosure may support injunctive relief where trade secrets are highly technical and competition is direct"
225
+ - jurisdiction: california-state
226
+ status: rejected
227
+ key_case: "[[Whyte v. Schlage Lock (Cal. Ct. App. 2002)]]"
228
+ standard: "California strongly disfavors inevitable disclosure as inconsistent with Business and Professions Code 16600"
229
+ last_validated: 2026-02-10
230
+ matters_affected: ["[[synthex-trade-secret]]"]
231
+ topics: ["[[trade-secrets]]", "[[precedents]]"]
232
+ relevant_notes: ["[[Oracle v. DataShield Technologies]] — most recent 9th Circuit treatment", "[[heightened-pleading-applies-to-fraud-based-trade-secret-claims]] — related evidentiary standard in trade secret litigation"]
233
+ ---
234
+ ```
235
+
236
+ ### Regulatory Update Note
237
+
238
+ ```yaml
239
+ ---
240
+ description: [one sentence — what changed and which matters are affected]
241
+ regulation: "GDPR"
242
+ article: "Article 17 — Right to Erasure"
243
+ change_type: amendment | interpretation | enforcement-action | guidance
244
+ effective_date: 2026-02-01
245
+ change_summary: "European Data Protection Board issued new guidance clarifying that legal hold obligations under US litigation do not automatically satisfy the 'legitimate interests' exception to erasure requests"
246
+ source: "EDPB Guidelines 01/2026"
247
+ affected_areas: ["data-retention", "litigation-hold", "cross-border-data"]
248
+ affected_matters: ["[[techcorp-gdpr-compliance]]", "[[meridian-license-dispute]]"]
249
+ required_actions:
250
+ - matter: "[[techcorp-gdpr-compliance]]"
251
+ action: "Review litigation hold notice against new EDPB guidance; may need supplemental data protection impact assessment"
252
+ deadline: 2026-03-01
253
+ status: pending
254
+ - matter: "[[meridian-license-dispute]]"
255
+ action: "Verify data retention clause in license agreement complies with updated guidance"
256
+ deadline: 2026-03-15
257
+ status: pending
258
+ propagation_complete: false
259
+ topics: ["[[regulatory]]", "[[privacy-law]]"]
260
+ relevant_notes: ["[[GDPR-article-17-right-to-erasure-overridden-by-legal-hold]] — this principle note needs updating in light of new guidance"]
261
+ ---
262
+ ```
263
+
264
+ ### Research Memo
265
+
266
+ ```yaml
267
+ ---
268
+ description: [one sentence — the legal question addressed and conclusion]
269
+ question_presented: "What is the measure of damages for trade secret misappropriation under DTSA in the Ninth Circuit where the plaintiff seeks lost profits but the trade secret has not been commercialized?"
270
+ short_answer: "The Ninth Circuit permits reasonable royalty as an alternative measure where actual damages cannot be proven, but requires the plaintiff to establish a hypothetical willing-buyer/willing-seller framework grounded in the trade secret's demonstrated or projected market value"
271
+ jurisdictions: ["9th-circuit", "federal"]
272
+ matter: "[[synthex-trade-secret]]"
273
+ authorities_cited:
274
+ - "[[Oracle v. DataShield Technologies]]"
275
+ - "[[Waymo v. Uber (N.D. Cal. 2018)]]"
276
+ - "18 U.S.C. 1836(b)(3)(B)"
277
+ status: final
278
+ drafted: 2026-02-08
279
+ topics: ["[[trade-secrets]]", "[[precedents]]"]
280
+ relevant_notes: ["[[synthex-trade-secret]] — commissioned for this matter", "[[inevitable-disclosure-doctrine-disfavored-in-ninth-circuit]] — shapes the damages theory because we cannot rely on threatened disclosure"]
281
+ ---
282
+ ```
283
+
284
+ ### Argument Outline
285
+
286
+ ```yaml
287
+ ---
288
+ description: [one sentence — the argument and its evidentiary support status]
289
+ matter: "[[synthex-trade-secret]]"
290
+ motion: "preliminary injunction"
291
+ argument: "Defendant's use of identical ML pipeline architecture demonstrates actual misappropriation, not inevitable disclosure"
292
+ legal_standard: "likelihood of success on the merits (Winter v. NRDC)"
293
+ supporting_authorities:
294
+ - "[[Oracle v. DataShield Technologies]] — establishes need for actual misappropriation evidence"
295
+ - "18 U.S.C. 1836(b)(3)(A) — injunctive relief provision"
296
+ supporting_evidence:
297
+ - evidence: "side-by-side code comparison"
298
+ source: "expert report (Dr. Martinez)"
299
+ status: obtained
300
+ strength: strong
301
+ - evidence: "defendant's access logs during employment"
302
+ source: "discovery production"
303
+ status: pending
304
+ strength: moderate
305
+ - evidence: "deposition testimony re: architecture knowledge"
306
+ source: "[[chen-depo-wong-2026-01-28]]"
307
+ status: obtained
308
+ strength: strong
309
+ counter_arguments:
310
+ - argument: "Independent development defense"
311
+ rebuttal: "Timeline analysis shows NovaTech's pipeline appeared 3 weeks after defendant's start date — insufficient time for independent development of comparable architecture"
312
+ strength_of_rebuttal: strong
313
+ - argument: "General industry knowledge defense"
314
+ rebuttal: "Expert testimony will establish that the specific architecture choices (not the general approach) constitute protectable trade secrets"
315
+ strength_of_rebuttal: moderate
316
+ gaps: ["need defendant's git commit history to establish timeline"]
317
+ topics: ["[[trade-secrets]]", "[[evidence-standards]]"]
318
+ relevant_notes: ["[[synthex-evidence-map]] — full evidence-to-argument mapping", "[[heightened-pleading-applies-to-fraud-based-trade-secret-claims]] — ensures our pleading standard is met"]
319
+ ---
320
+ ```
321
+
322
+ ### Deposition Summary
323
+
324
+ ```yaml
325
+ ---
326
+ description: [one sentence — the deponent, key testimony, and significance]
327
+ matter: "[[synthex-trade-secret]]"
328
+ deponent: "Dr. James Wong"
329
+ deponent_role: "Former Synthex senior ML engineer, now at NovaTech"
330
+ date: 2026-01-28
331
+ duration_hours: 6.5
332
+ examining_attorney: "Diana Chen"
333
+ key_testimony:
334
+ - topic: "knowledge of ML pipeline architecture"
335
+ testimony: "Admitted familiarity with Synthex's proprietary data preprocessing pipeline, including the custom feature engineering module"
336
+ significance: strong
337
+ page_line: "pp. 84:12 - 87:3"
338
+ - topic: "access to source code"
339
+ testimony: "Confirmed regular access to the full pipeline codebase during employment, including architecture documentation"
340
+ significance: strong
341
+ page_line: "pp. 102:15 - 105:8"
342
+ - topic: "NovaTech development timeline"
343
+ testimony: "Stated NovaTech's pipeline was 'in development' when he joined, but could not specify what existed before his arrival"
344
+ significance: moderate
345
+ page_line: "pp. 145:22 - 148:11"
346
+ admissions: ["knew pipeline architecture was confidential", "did not delete Synthex materials from personal devices until 'sometime after' starting at NovaTech"]
347
+ contradictions: ["claimed no non-compete but employment agreement contains confidentiality clause with non-use provision"]
348
+ impeachment_opportunities: ["testimony about NovaTech timeline contradicts NovaTech's git commit history showing first pipeline commit 18 days after defendant's start date"]
349
+ follow_up_needed: ["obtain defendant's personal device forensics", "subpoena NovaTech git logs for pipeline repository"]
350
+ topics: ["[[trade-secrets]]", "[[evidence-standards]]"]
351
+ relevant_notes: ["[[synthex-evidence-map]] — testimony mapped to legal elements", "[[synthex-pi-motion]] — testimony supports actual misappropriation argument"]
352
+ ---
353
+ ```
354
+
355
+ ### Compliance Checklist
356
+
357
+ ```yaml
358
+ ---
359
+ description: [one sentence — regulation being tracked and current compliance status]
360
+ matter: "[[techcorp-gdpr-compliance]]"
361
+ regulation: "GDPR"
362
+ jurisdiction: EU
363
+ requirements:
364
+ - requirement: "Data processing inventory (Art. 30)"
365
+ status: compliant
366
+ evidence: "Processing register updated 2026-01-15"
367
+ responsible: "TechCorp DPO"
368
+ next_review: 2026-04-15
369
+ - requirement: "Lawful basis documented for each processing activity (Art. 6)"
370
+ status: compliant
371
+ evidence: "Lawful basis assessment completed 2025-11-01"
372
+ responsible: "Diana Chen"
373
+ next_review: 2026-05-01
374
+ - requirement: "Data breach notification procedure (Art. 33-34)"
375
+ status: needs-update
376
+ evidence: "Procedure drafted but not tested against new EDPB guidance"
377
+ responsible: "Diana Chen"
378
+ next_review: 2026-03-01
379
+ - requirement: "Right to erasure procedure (Art. 17)"
380
+ status: needs-update
381
+ evidence: "Current procedure assumes US litigation hold automatically satisfies legitimate interests exception — EDPB 01/2026 guidance changes this"
382
+ responsible: "Diana Chen"
383
+ next_review: 2026-03-01
384
+ topics: ["[[regulatory]]", "[[privacy-law]]"]
385
+ relevant_notes: ["[[GDPR-article-17-right-to-erasure-overridden-by-legal-hold]] — principle note being updated", "[[2026-02-01-EDPB-erasure-guidance]] — the regulatory change triggering this update"]
386
+ ---
387
+ ```
388
+
389
+ ---
390
+
391
+ ## Example Notes
392
+
393
+ ### Case Brief: Oracle v. DataShield Technologies
394
+
395
+ ```markdown
396
+ ---
397
+ description: 9th Circuit holds inevitable disclosure alone insufficient for trade secret claim — requires evidence of actual or threatened misappropriation, strengthening employee mobility protections
398
+ case_name: "Oracle v. DataShield Technologies"
399
+ citation: "2025 WL 4523891 (9th Cir. 2025)"
400
+ court: 9th-circuit
401
+ court_level: appellate
402
+ jurisdiction: federal
403
+ date_decided: 2025-11-14
404
+ procedural_posture: "appeal from summary judgment"
405
+ issue: "Whether trade secret misappropriation claims based on inevitable disclosure require evidence of actual or threatened misappropriation beyond mere employment by a competitor"
406
+ holding: "Inevitable disclosure alone, without evidence of actual or threatened misappropriation, is insufficient to sustain a trade secret claim under the DTSA"
407
+ reasoning: "The court reasoned that inevitable disclosure doctrine creates an inherent tension with employee mobility rights and cannot substitute for the statute's requirement of actual or threatened misappropriation"
408
+ significance: "Strengthens the 9th Circuit's skepticism toward inevitable disclosure and raises the evidentiary bar for trade secret plaintiffs who cannot prove actual misappropriation"
409
+ dicta: "Court noted in dicta that contractual non-compete agreements remain the appropriate vehicle for protecting against competitive employment, not judicial injunctions based on speculative disclosure"
410
+ treatment:
411
+ followed_by: []
412
+ distinguished_by: []
413
+ overruled_by: null
414
+ cited_by: ["[[synthex-pi-motion]]"]
415
+ related_cases: ["[[Waymo v. Uber (N.D. Cal. 2018)]]", "[[PepsiCo v. Redmond (7th Cir. 1995)]]"]
416
+ topics: ["[[trade-secrets]]", "[[precedents]]"]
417
+ relevant_notes: ["[[inevitable-disclosure-doctrine-disfavored-in-ninth-circuit]] — this case provides the strongest 9th Circuit statement against inevitable disclosure", "[[synthex-trade-secret]] — directly shapes our motion strategy: we must establish actual misappropriation through document comparison, not speculative disclosure"]
418
+ ---
419
+
420
+ # Oracle v. DataShield Technologies
421
+
422
+ ## Facts
423
+
424
+ Oracle employed a senior database engineer for eight years. The engineer left to join DataShield Technologies, a direct competitor developing a competing database optimization product. Oracle sought a preliminary injunction under the DTSA, arguing that the engineer's knowledge of Oracle's proprietary optimization algorithms made disclosure inevitable in her new role. Oracle did not allege that the engineer had taken any documents, code, or proprietary materials.
425
+
426
+ ## Analysis
427
+
428
+ The court's reasoning turns on the statutory text of the DTSA, which requires "actual or threatened misappropriation" as a predicate for relief. The court found that inevitable disclosure theory stretches "threatened misappropriation" beyond its statutory meaning by converting specialized knowledge — which employees legitimately develop through their work — into a basis for restricting future employment. The court distinguished [[PepsiCo v. Redmond (7th Cir. 1995)]], noting that the 7th Circuit's adoption of inevitable disclosure predated the DTSA and relied on state trade secret law with different statutory language.
429
+
430
+ The practical consequence is significant for trade secret plaintiffs in the 9th Circuit: without evidence of actual misappropriation (document theft, code copying, data exfiltration) or specific, articulable threats of disclosure (not mere competitive employment), injunctive relief under the DTSA is unavailable. This raises the evidentiary burden and pushes plaintiffs toward contractual remedies (non-compete agreements, which are themselves disfavored in California under Bus. & Prof. Code 16600).
431
+
432
+ ## Impact on Active Matters
433
+
434
+ This case directly affects [[synthex-trade-secret]]. Our motion strategy must establish actual misappropriation through the code comparison evidence and deposition testimony in [[chen-depo-wong-2026-01-28]], not through an inevitable disclosure theory. The fact that we have document comparison evidence (identical ML pipeline architecture) and timeline evidence (pipeline appeared 18 days after defendant's start) puts us in a stronger position than Oracle was — but we must present this as actual misappropriation, not inevitable disclosure.
435
+
436
+ Since [[heightened-pleading-applies-to-fraud-based-trade-secret-claims]], our pleading must satisfy the higher specificity standard. The code comparison evidence should be described with architectural detail, not conclusory allegations.
437
+
438
+ ---
439
+ ```
440
+
441
+ ### Precedent Principle: Inevitable Disclosure in the 9th Circuit
442
+
443
+ ```markdown
444
+ ---
445
+ description: The 9th Circuit disfavors inevitable disclosure as a standalone basis for trade secret claims — three key cases establish the requirement for evidence of actual or threatened misappropriation
446
+ principle: "inevitable disclosure doctrine"
447
+ jurisdictions:
448
+ - jurisdiction: 9th-circuit
449
+ status: disfavored
450
+ key_case: "[[Oracle v. DataShield Technologies]]"
451
+ standard: "requires evidence of actual or threatened misappropriation beyond mere competitive employment"
452
+ - jurisdiction: 7th-circuit
453
+ status: accepted
454
+ key_case: "[[PepsiCo v. Redmond (7th Cir. 1995)]]"
455
+ standard: "inevitable disclosure may support injunctive relief where trade secrets are highly technical and competition is direct"
456
+ - jurisdiction: california-state
457
+ status: rejected
458
+ key_case: "[[Whyte v. Schlage Lock (Cal. Ct. App. 2002)]]"
459
+ standard: "California strongly disfavors inevitable disclosure as inconsistent with Business and Professions Code 16600"
460
+ last_validated: 2026-02-10
461
+ matters_affected: ["[[synthex-trade-secret]]"]
462
+ topics: ["[[trade-secrets]]", "[[precedents]]"]
463
+ relevant_notes: ["[[Oracle v. DataShield Technologies]] — the strongest 9th Circuit statement against inevitable disclosure", "[[heightened-pleading-applies-to-fraud-based-trade-secret-claims]] — related evidentiary standard that compounds the burden on trade secret plaintiffs", "[[contractual-limitation-of-liability-unenforceable-for-willful-breach]] — the contractual alternative when injunctive relief is unavailable"]
464
+ ---
465
+
466
+ # inevitable-disclosure-doctrine-disfavored-in-ninth-circuit
467
+
468
+ ## The Principle
469
+
470
+ The inevitable disclosure doctrine posits that a court may enjoin a former employee from working for a competitor when the employee's knowledge of trade secrets makes disclosure inevitable in the new role, even absent evidence that the employee has actually taken or used proprietary information. The doctrine exists in tension with employee mobility rights and varies dramatically across jurisdictions.
471
+
472
+ ## Jurisdictional Treatment
473
+
474
+ In the 9th Circuit, since [[Oracle v. DataShield Technologies]], inevitable disclosure standing alone is insufficient to sustain a trade secret misappropriation claim under the DTSA. The court requires evidence of actual or threatened misappropriation — defined as specific, articulable conduct beyond mere competitive employment. This aligns with California's strong public policy favoring employee mobility and its statutory prohibition against non-compete agreements (Bus. & Prof. Code 16600).
475
+
476
+ The 7th Circuit takes the opposite approach. Since [[PepsiCo v. Redmond (7th Cir. 1995)]], inevitable disclosure can support injunctive relief where the trade secrets are highly technical, the competition is direct, and the former employer can show that the employee would be unable to perform the new job without drawing on protected knowledge. Several district courts in the 7th Circuit have applied this standard, though the doctrine has been narrowed in subsequent decisions.
477
+
478
+ California state courts reject inevitable disclosure entirely. Since [[Whyte v. Schlage Lock (Cal. Ct. App. 2002)]], the doctrine is viewed as an end-run around California's prohibition on non-compete agreements. A trade secret plaintiff in California state court must prove actual misappropriation or a concrete, imminent threat of disclosure — hypothetical or speculative disclosure based on job similarity is not enough.
479
+
480
+ ## Practical Implications
481
+
482
+ For matters in the 9th Circuit or California state courts, the strategy must be built on actual misappropriation evidence: documents taken, code copied, data exfiltrated, or testimony admitting use. The [[synthex-trade-secret]] matter has strong actual misappropriation evidence (code comparison showing identical architecture, timeline showing impossibility of independent development), which is exactly the type of case that survives the 9th Circuit's skepticism.
483
+
484
+ For matters in the 7th Circuit or jurisdictions that accept inevitable disclosure, the doctrine remains a viable supplemental theory, but should not be the primary basis for relief. Even in accepting jurisdictions, courts have narrowed the doctrine and imposed additional requirements.
485
+
486
+ ## Monitoring
487
+
488
+ The agent validates this principle quarterly by checking Westlaw/Lexis for new 9th Circuit decisions citing [[Oracle v. DataShield Technologies]] or applying inevitable disclosure analysis. Any case that follows, distinguishes, or overrules Oracle gets briefed and linked here. As of the last validation (Feb 10, 2026), Oracle has been cited favorably in two district court decisions and has not been distinguished or overruled.
489
+
490
+ ---
491
+ ```
492
+
493
+ ### Regulatory Update: EDPB Erasure Guidance
494
+
495
+ ```markdown
496
+ ---
497
+ description: New EDPB guidance narrows the legal hold exception to GDPR right-to-erasure requests — affects two active matters requiring immediate compliance review
498
+ regulation: "GDPR"
499
+ article: "Article 17 — Right to Erasure"
500
+ change_type: guidance
501
+ effective_date: 2026-02-01
502
+ change_summary: "European Data Protection Board issued new guidance clarifying that legal hold obligations under US litigation do not automatically satisfy the legitimate interests exception to erasure requests — requires case-by-case balancing test with documented justification"
503
+ source: "EDPB Guidelines 01/2026"
504
+ affected_areas: ["data-retention", "litigation-hold", "cross-border-data"]
505
+ affected_matters: ["[[techcorp-gdpr-compliance]]", "[[meridian-license-dispute]]"]
506
+ required_actions:
507
+ - matter: "[[techcorp-gdpr-compliance]]"
508
+ action: "Review litigation hold notice against new EDPB guidance; conduct supplemental data protection impact assessment for US-held data subject to both litigation hold and GDPR erasure requests"
509
+ deadline: 2026-03-01
510
+ status: pending
511
+ - matter: "[[meridian-license-dispute]]"
512
+ action: "Verify that data retention clause in license agreement does not conflict with updated erasure guidance; review DPA addendum"
513
+ deadline: 2026-03-15
514
+ status: pending
515
+ propagation_complete: false
516
+ topics: ["[[regulatory]]", "[[privacy-law]]"]
517
+ relevant_notes: ["[[GDPR-article-17-right-to-erasure-overridden-by-legal-hold]] — this principle note must be updated to reflect the new guidance", "[[techcorp-gdpr-compliance]] — most urgent affected matter: client has active litigation hold AND GDPR exposure"]
518
+ ---
519
+
520
+ # 2026-02-01 EDPB Erasure Guidance Update
521
+
522
+ ## What Changed
523
+
524
+ The EDPB issued Guidelines 01/2026 on February 1, clarifying the interaction between the GDPR right to erasure (Article 17) and litigation hold obligations under non-EU law. The key change: US litigation holds do not automatically satisfy the "legitimate interests" exception to erasure requests under Article 6(1)(f). Instead, controllers must conduct a case-by-case balancing test weighing:
525
+
526
+ 1. The necessity of data retention for litigation purposes
527
+ 2. The data subject's reasonable expectations regarding erasure
528
+ 3. The specificity of the litigation hold (broad holds covering entire databases receive less deference than targeted holds on identified documents)
529
+ 4. Whether the data can be pseudonymized during the hold period
530
+
531
+ ## Why This Matters
532
+
533
+ Previously, our standard advice to clients was that a valid US litigation hold provided sufficient legal basis to deny GDPR erasure requests for held data. Since [[GDPR-article-17-right-to-erasure-overridden-by-legal-hold]], this was the established principle. The new guidance does not eliminate this position but requires additional documentation: a written balancing test for each category of held data, regular reassessment of hold scope, and pseudonymization where feasible.
534
+
535
+ ## Impact on Active Matters
536
+
537
+ **[[techcorp-gdpr-compliance]] — HIGH PRIORITY:** TechCorp is currently under US litigation hold (Chen v. DataFlow matter) while also processing EU data subjects' personal data. The existing litigation hold notice does not include the EDPB-required balancing test. Diana needs to:
538
+ 1. Review the hold scope for necessity and specificity
539
+ 2. Draft a supplemental DPIA for data subject to both obligations
540
+ 3. Implement pseudonymization where hold does not require identifying data
541
+ 4. Document the balancing test and make it available for supervisory authority review
542
+
543
+ **[[meridian-license-dispute]] — MODERATE PRIORITY:** The Meridian license agreement contains a data retention clause that may conflict with updated erasure guidance. The DPA addendum references "legitimate interests" as the lawful basis for post-termination data retention. Under the new guidance, this reference alone is insufficient — the DPA addendum needs a documented balancing test.
544
+
545
+ ## Principle Note Update Required
546
+
547
+ The note [[GDPR-article-17-right-to-erasure-overridden-by-legal-hold]] must be updated to reflect the narrowing of this principle. The title may need revision: "overridden by" is no longer accurate — "qualified by" or "subject to balancing test alongside" better captures the current state.
548
+
549
+ ---
550
+ ```
551
+
552
+ ### Matter Note: Synthex Trade Secret
553
+
554
+ ```markdown
555
+ ---
556
+ description: Active trade secret litigation in N.D. Cal — PI motion deadline March 1, strategy centers on actual misappropriation evidence to avoid inevitable disclosure reliance
557
+ client: "Synthex Corp"
558
+ matter_name: "Synthex Corp v. NovaTech LLC"
559
+ matter_number: "2026-LIT-0042"
560
+ matter_type: trade-secret-litigation
561
+ status: active
562
+ court: "N.D. Cal."
563
+ jurisdiction: federal
564
+ judge: "Hon. Maria Gonzalez"
565
+ opposing_counsel: "Richards & Morrison LLP (Sarah Park)"
566
+ cause_of_action: ["trade secret misappropriation (DTSA)", "trade secret misappropriation (CUTSA)", "breach of employment agreement"]
567
+ key_facts: "Former Synthex engineer (Dr. James Wong) joined NovaTech and allegedly used proprietary ML training pipeline architecture. No non-compete but had confidentiality agreement with non-use provision."
568
+ strategy: "Establish actual misappropriation through side-by-side code comparison (expert report) and timeline evidence (pipeline appeared 18 days after defendant's start date). Avoid reliance on inevitable disclosure given 9th Circuit skepticism per Oracle v. DataShield."
569
+ key_dates:
570
+ filed: 2026-01-15
571
+ answer_due: 2026-02-28
572
+ pi_motion_deadline: 2026-03-01
573
+ initial_case_management: 2026-03-15
574
+ discovery_cutoff: 2026-09-30
575
+ dispositive_motions: 2026-11-15
576
+ trial: 2027-02-01
577
+ deadlines:
578
+ - date: 2026-02-28
579
+ description: "Answer and counterclaim deadline"
580
+ status: pending
581
+ - date: 2026-03-01
582
+ description: "PI motion filing deadline"
583
+ status: drafting
584
+ - date: 2026-03-15
585
+ description: "Initial case management conference"
586
+ status: pending
587
+ related_matters: []
588
+ regulations_applicable: ["DTSA (18 U.S.C. 1836)", "CUTSA (Cal. Civ. Code 3426)"]
589
+ work_product: ["[[synthex-pi-motion]]", "[[trade-secret-damages-ninth-circuit]]", "[[synthex-evidence-map]]", "[[chen-depo-wong-2026-01-28]]"]
590
+ topics: ["[[trade-secrets]]", "[[precedents]]"]
591
+ relevant_notes: ["[[inevitable-disclosure-doctrine-disfavored-in-ninth-circuit]] — why our strategy avoids this theory", "[[Oracle v. DataShield Technologies]] — controlling precedent on the evidentiary standard", "[[heightened-pleading-applies-to-fraud-based-trade-secret-claims]] — affects our pleading specificity requirements"]
592
+ ---
593
+
594
+ # Synthex Corp v. NovaTech LLC
595
+
596
+ ## Matter Summary
597
+
598
+ Synthex alleges that Dr. James Wong, a former senior ML engineer, misappropriated Synthex's proprietary machine learning training pipeline architecture after leaving to join competitor NovaTech. The evidence suggests actual misappropriation rather than theoretical inevitable disclosure: NovaTech's pipeline appeared in their codebase 18 days after Wong's start date, the architecture is structurally identical to Synthex's proprietary system, and Wong admitted in deposition (see [[chen-depo-wong-2026-01-28]]) to having had access to the full pipeline codebase and architecture documentation during his employment.
599
+
600
+ ## Strategy
601
+
602
+ Since [[inevitable-disclosure-doctrine-disfavored-in-ninth-circuit]], our strategy must rely on actual misappropriation evidence, not speculative disclosure. This works in our favor because we have strong actual misappropriation evidence:
603
+
604
+ 1. **Code comparison:** Expert report (Dr. Martinez) shows architecturally identical pipeline with specific implementation choices that are not standard in the industry
605
+ 2. **Timeline:** NovaTech's first git commit for the pipeline is 18 days after Wong's start date — insufficient time for independent development of comparable architecture
606
+ 3. **Deposition testimony:** Wong admitted familiarity with and access to the proprietary pipeline, did not delete Synthex materials from personal devices until "sometime after" starting at NovaTech (see [[chen-depo-wong-2026-01-28]])
607
+ 4. **Confidentiality agreement:** Wong signed an agreement with a non-use provision — breach of this agreement is an independent cause of action
608
+
609
+ Since [[Oracle v. DataShield Technologies]], the 9th Circuit requires specific, articulable evidence of actual or threatened misappropriation. Our evidence meets this standard. The PI motion ([[synthex-pi-motion]]) is being drafted with this framework.
610
+
611
+ ## Evidence Gaps
612
+
613
+ - Need defendant's personal device forensics (motion to compel may be required)
614
+ - NovaTech git commit logs for pipeline repository (subpoena pending)
615
+ - Expert testimony on the non-standard nature of the specific architecture choices (Dr. Martinez report in progress)
616
+
617
+ ## Key Risk
618
+
619
+ NovaTech's strongest defense is independent development. If they can show that any portion of the pipeline existed before Wong's arrival, our timeline argument weakens. The git commit history is critical — if the first commit predates Wong's start date, we lose the timeline argument entirely.
620
+
621
+ ---
622
+ ```
623
+
624
+ ### Evidence Map: Synthex
625
+
626
+ ```markdown
627
+ ---
628
+ description: Maps every piece of evidence in Synthex v. NovaTech to the legal elements it supports — identifies evidentiary gaps and strength of proof per element
629
+ matter: "[[synthex-trade-secret]]"
630
+ claim: "trade secret misappropriation (DTSA)"
631
+ last_updated: 2026-02-14
632
+ overall_strength: strong
633
+ topics: ["[[trade-secrets]]", "[[evidence-standards]]"]
634
+ relevant_notes: ["[[synthex-pi-motion]] — this map informs the argument structure", "[[chen-depo-wong-2026-01-28]] — primary testimonial evidence"]
635
+ ---
636
+
637
+ # Synthex Evidence Map
638
+
639
+ ## Element 1: Existence of a Trade Secret
640
+
641
+ | Evidence | Source | Status | Strength |
642
+ |----------|--------|--------|----------|
643
+ | ML pipeline architecture documentation | Synthex production | obtained | strong |
644
+ | Expert report: architecture is not standard practice | Dr. Martinez | in progress | strong (expected) |
645
+ | Confidentiality agreement designating pipeline as trade secret | Synthex HR records | obtained | strong |
646
+ | Wong testimony: knew pipeline was confidential | [[chen-depo-wong-2026-01-28]] p.84 | obtained | strong |
647
+
648
+ **Assessment:** Strong on this element. Multiple independent sources confirm the pipeline architecture was treated as confidential and has independent economic value from not being generally known.
649
+
650
+ ## Element 2: Misappropriation (Acquisition or Use)
651
+
652
+ | Evidence | Source | Status | Strength |
653
+ |----------|--------|--------|----------|
654
+ | Side-by-side code comparison showing identical architecture | Expert report (Martinez) | in progress | strong (expected) |
655
+ | NovaTech pipeline first commit 18 days after Wong's start | NovaTech git logs | subpoena pending | strong (if obtained) |
656
+ | Wong admitted access to full pipeline codebase | [[chen-depo-wong-2026-01-28]] p.102 | obtained | strong |
657
+ | Wong did not delete Synthex materials until "sometime after" start | [[chen-depo-wong-2026-01-28]] p.156 | obtained | moderate |
658
+ | Personal device forensics showing Synthex files | Motion to compel | not yet filed | strong (if obtained) |
659
+
660
+ **Assessment:** Currently moderate-to-strong. The code comparison expert report (expected late February) will be the linchpin. Git commit timeline is critical for the independent development rebuttal. Without either, this element weakens to the testimony alone, which is circumstantial.
661
+
662
+ **Gap:** Need the git commit history. If NovaTech destroys or claims privilege over repository logs, we need a backup approach — potentially through Wong's personal commit history or NovaTech's CI/CD deployment records.
663
+
664
+ ## Element 3: Damages or Threat of Irreparable Harm (for PI)
665
+
666
+ | Evidence | Source | Status | Strength |
667
+ |----------|--------|--------|----------|
668
+ | NovaTech marketing materials advertising pipeline capabilities | Public filings | obtained | moderate |
669
+ | Customer declarations re: competitive impact | Synthex clients | 2 obtained, 1 pending | moderate |
670
+ | Expert report on reasonable royalty valuation | Economic expert | not yet retained | pending |
671
+
672
+ **Assessment:** Weakest element. For the PI motion, irreparable harm is the standard — but since [[Oracle v. DataShield Technologies]], mere competitive harm without specific evidence of ongoing misappropriation may be insufficient. We need to show that NovaTech is actively using the misappropriated architecture in its current product, not just that they acquired it.
673
+
674
+ ---
675
+ ```
676
+
677
+ ---
678
+
679
+ ## Processing Workflow
680
+
681
+ ### Capture
682
+
683
+ Legal knowledge enters the system through multiple channels:
684
+
685
+ 1. **New case law:** Cases identified through legal research alerts, opposing counsel citations, or CLE materials land in `00_inbox/cases/` for briefing.
686
+ 2. **Regulatory changes:** Regulatory updates, agency guidance, and enforcement actions land in `00_inbox/regulations/` for impact assessment.
687
+ 3. **Matter events:** Deposition transcripts, filed motions, discovery productions, court orders — each generates a note linked to the matter file.
688
+ 4. **Research:** Legal articles, treatises, and CLE materials land in `00_inbox/research/` for claim extraction.
689
+ 5. **Contracts:** Agreements for review land in `00_inbox/contracts/`.
690
+
691
+ ### Process (the domain-specific step)
692
+
693
+ Four processing workflows, each with distinct legal requirements:
694
+
695
+ **Case briefing pipeline:**
696
+ 1. Case arrives in inbox → agent creates case brief note from template
697
+ 2. Agent extracts: issue, holding, reasoning, dicta, significance
698
+ 3. Agent checks if case affects existing precedent principles → updates treatment chains (followed_by, distinguished_by, overruled_by)
699
+ 4. Agent checks if case affects active matters → links and alerts
700
+ 5. Agent creates or updates precedent principle notes
701
+
702
+ **Regulatory impact pipeline:**
703
+ 1. Regulatory change identified → agent creates regulatory update note
704
+ 2. Agent traces affected areas through YAML metadata across all matter notes and compliance checklists
705
+ 3. Agent generates required_actions for each affected matter with deadlines
706
+ 4. Agent flags affected precedent principle notes for review
707
+ 5. Agent sets propagation_complete to false until all affected matters have been updated
708
+
709
+ **Argument construction pipeline:**
710
+ 1. Legal question identified → agent searches brief bank for prior work product addressing similar issues
711
+ 2. Agent searches precedent graph for supporting authorities
712
+ 3. Agent creates argument outline with evidence mapping
713
+ 4. Agent identifies evidentiary gaps — what evidence is needed but not yet obtained
714
+ 5. Agent cross-references counter-arguments from opposing counsel's prior briefs (if in the system)
715
+
716
+ **Matter review pipeline (weekly):**
717
+ 1. Agent reviews all active matter deadlines → flags approaching deadlines
718
+ 2. Agent checks all cited precedents against treatment chains → alerts if any relied-upon case has been subsequently distinguished or overruled
719
+ 3. Agent checks all applicable regulations for recent changes → cross-references against regulatory update notes
720
+ 4. Agent reviews evidence maps for gaps → prioritizes discovery and investigation tasks
721
+ 5. Agent generates weekly matter status summary
722
+
723
+ ### Connect
724
+
725
+ Every case brief links to the principles it establishes or modifies. Every principle links to every matter it affects. Every regulatory update links to every matter and principle it impacts. Every argument links to the evidence that supports it. The agent maintains these connections bidirectionally and continuously — when a new case is briefed, it propagates through the precedent chain, through affected matters, and through any arguments that relied on the modified principle. This is the graph advantage: a change anywhere ripples everywhere it matters.
726
+
727
+ ### Verify
728
+
729
+ Weekly: precedent chain validation (are cited cases still good law?), deadline audit (are any deadlines approaching without assigned tasks?), evidence map gap check.
730
+ Monthly: compliance checklist review, regulatory landscape scan, cross-matter pattern analysis.
731
+ Quarterly: full precedent graph validation, brief bank indexing, matter archival for closed matters.
732
+
733
+ ---
734
+
735
+ ## MOC Structure
736
+
737
+ ### Hub MOC: index.md
738
+
739
+ ```markdown
740
+ ---
741
+ description: Entry point for Diana's legal knowledge system — navigate to precedent law, regulatory landscape, active matters, or legal work product
742
+ type: moc
743
+ ---
744
+
745
+ # Legal Practice
746
+
747
+ ## Active Navigation
748
+ - [[precedents]] — case law principles, treatment chains, jurisdictional variations
749
+ - [[regulatory]] — regulatory landscape, compliance tracking, change propagation
750
+ - [[trade-secrets]] — trade secret law, inevitable disclosure, misappropriation standards
751
+ - [[privacy-law]] — privacy and data protection, GDPR, CCPA, cross-border data
752
+
753
+ ## Practice Areas
754
+ - [[contracts]] — contract law patterns, interpretation, limitation of liability
755
+ - [[ip-licensing]] — IP licensing, fair use, transformative use
756
+ - [[evidence-standards]] — evidentiary standards, pleading requirements, burden of proof
757
+ - [[procedural]] — procedural rules, deadlines, jurisdictional requirements
758
+
759
+ ---
760
+
761
+ Agent Notes:
762
+ When a new case is briefed, always check [[precedents]] for affected principle notes before filing. When a regulatory change arrives, always run the impact trace through all active matters before marking it processed. The precedent chain and regulatory propagation are the two highest-value automated workflows in this system.
763
+ ```
764
+
765
+ ### Domain MOC: precedents.md
766
+
767
+ ```markdown
768
+ ---
769
+ description: Case law principles with treatment tracking — where every relied-upon holding is validated against its citation chain and jurisdictional variations are mapped
770
+ type: moc
771
+ topics: ["[[index]]"]
772
+ ---
773
+
774
+ # precedents
775
+
776
+ This MOC tracks legal principles established by case law, organized by practice area and jurisdiction. The critical function is treatment tracking: when a case is overruled, distinguished, or limited, every downstream note that relies on that case gets flagged.
777
+
778
+ ## Trade Secret Principles
779
+ - [[inevitable-disclosure-doctrine-disfavored-in-ninth-circuit]] — the doctrine is disfavored in the 9th Circuit and rejected in California; 7th Circuit accepts with limitations
780
+ - [[heightened-pleading-applies-to-fraud-based-trade-secret-claims]] — fraud-based trade secret claims must satisfy Rule 9(b) specificity requirements
781
+
782
+ ## Privacy Principles
783
+ - [[CCPA-private-right-of-action-limited-to-data-breaches]] — CCPA private right only covers data breach claims, not all privacy violations
784
+ - [[GDPR-article-17-right-to-erasure-overridden-by-legal-hold]] — NEEDS UPDATE: EDPB 01/2026 guidance narrows this principle
785
+
786
+ ## Contract Principles
787
+ - [[contractual-limitation-of-liability-unenforceable-for-willful-breach]] — limitation of liability clauses generally unenforceable where breach is willful or grossly negligent
788
+ - [[transformative-use-test-requires-new-expression-not-new-purpose]] — transformative use in copyright fair use analysis
789
+
790
+ ## Treatment Alerts
791
+ - **ACTIVE:** [[GDPR-article-17-right-to-erasure-overridden-by-legal-hold]] — principle narrowed by EDPB 01/2026 guidance. Affects [[techcorp-gdpr-compliance]] and [[meridian-license-dispute]]. Update pending.
792
+
793
+ ## Validation Schedule
794
+ Last full validation: 2026-02-10. Next scheduled: 2026-05-10. The agent checks all cited cases quarterly against Westlaw/Lexis alerts for subsequent treatment.
795
+
796
+ ---
797
+
798
+ Agent Notes:
799
+ Treatment alerts are the highest-priority items in this MOC. Any principle in the Treatment Alerts section requires immediate attention — it means a relied-upon case has been affected by subsequent authority. Check affected matters immediately and assess whether pending or filed briefs need supplemental authority notices.
800
+ ```
801
+
802
+ ---
803
+
804
+ ## Graph Query Examples
805
+
806
+ ```bash
807
+ # Find all matters affected by a specific regulation
808
+ rg '^regulations_applicable:.*GDPR' vault/03_matters/
809
+
810
+ # Find all case briefs from a specific court
811
+ rg '^court: 9th-circuit' vault/01_thinking/ vault/04_legal/
812
+
813
+ # Find all arguments with evidentiary gaps
814
+ rg '^gaps:' vault/04_legal/briefs/ | grep -v '\[\]'
815
+
816
+ # Find all matters with approaching deadlines
817
+ rg '^\s*- date: 2026-02' vault/03_matters/ -A 2
818
+
819
+ # Find all precedent principles that need updating
820
+ rg '^last_validated:' vault/01_thinking/ | \
821
+ while read line; do
822
+ date=$(echo "$line" | grep -o '20[0-9][0-9]-[0-9][0-9]-[0-9][0-9]')
823
+ if [[ "$date" < "2025-11-15" ]]; then echo "STALE: $line"; fi
824
+ done
825
+
826
+ # Cross-matter pattern: find all matters using the same cause of action
827
+ rg '^cause_of_action:.*trade.secret' vault/03_matters/
828
+
829
+ # Find all deposition contradictions (impeachment opportunities)
830
+ rg '^impeachment_opportunities:' vault/04_legal/depositions/
831
+
832
+ # Track treatment of a specific case
833
+ rg 'Oracle v. DataShield' vault/ --glob '*.md'
834
+
835
+ # Find all regulatory changes with incomplete propagation
836
+ rg '^propagation_complete: false' vault/01_thinking/ vault/04_legal/
837
+
838
+ # Brief bank search: find prior work on a legal issue
839
+ rg '^question_presented:.*trade.secret.*damages' vault/04_legal/research-memos/
840
+ ```
841
+
842
+ ---
843
+
844
+ ## What Makes This Domain Unique
845
+
846
+ ### Precedent chain tracking is a graph integrity problem
847
+
848
+ Legal reasoning depends on the continued validity of prior authority. A case cited in a brief is only as good as its current treatment: if it has been overruled, distinguished, or limited by a subsequent decision, the argument built on it is weakened or destroyed. This is not a "nice to have" — citing overruled authority is a sanctionable offense in federal courts.
849
+
850
+ The knowledge graph turns this from a manual research task into a structural property. Every case brief has a `treatment` field tracking how it has been followed, distinguished, or overruled. Every argument outline lists its supporting authorities. When a new case is briefed and the agent detects that it distinguishes or overrules an existing case in the graph, it traces forward through every argument and matter that relied on the affected case and generates alerts. No attorney can maintain this level of citation hygiene manually across 15 active matters spanning multiple practice areas. The graph makes it structural.
851
+
852
+ ### Regulatory change propagation across matters is the cross-cutting killer feature
853
+
854
+ When the EDPB issues new guidance on data erasure, Diana needs to know which of her 15 matters are affected. She might remember the obvious one (the GDPR compliance matter) but miss the less obvious one (the license dispute where the DPA addendum references "legitimate interests"). The agent traces regulatory changes through every matter's `regulations_applicable` field and every compliance checklist's requirements, generating action items for each affected engagement. This propagation is instantaneous and exhaustive — it catches the connections that human memory misses.
855
+
856
+ ### Dense schema enables graph database queries over documents
857
+
858
+ Legal work product is inherently structured: citations have formats, courts have hierarchies, jurisdictions have boundaries, causes of action have elements, evidence has admissibility standards. The dense YAML schema captures this structure so that the vault is queryable like a database. "Find all 9th Circuit decisions on trade secret misappropriation where the court applied a heightened pleading standard" is a ripgrep query, not a research project. This transforms the brief bank from a keyword-searchable file dump into a structured legal knowledge base where every dimension of every artifact is queryable independently.
859
+
860
+ ---
861
+
862
+ ## Agent-Native Advantages
863
+
864
+ ### Exhaustive precedent chain validation across all active matters
865
+
866
+ The agent validates every cited case in every active matter against its current treatment status on a quarterly cycle. For each case in the precedent graph, it checks whether subsequent decisions have followed, distinguished, limited, or overruled the holding. If a relied-upon case has been affected, the agent traces forward through every argument outline, research memo, and matter note that cites it, generating specific alerts: "Case X, relied upon in your PI motion for matter Y, was distinguished by case Z last month on the scope-of-disclosure issue. Review whether the distinguishing factors apply to your facts."
867
+
868
+ **What this looks like in practice:** Diana's precedent graph contains 85 case briefs across four practice areas. A quarterly validation run checks each case's treatment status. The agent detects that a case she relied upon in the Synthex PI motion was cited (but not distinguished) in a new district court decision. It reads the new decision, determines that the citation is favorable (following, not distinguishing), and adds the citation to the case brief's `treatment.cited_by` field. But it also detects that a case cited in the Meridian contract dispute was limited by a new 2nd Circuit decision. It alerts Diana: "The 2nd Circuit limited the holding in [case] to cases involving software licensing specifically. Your Meridian matter involves hardware licensing. Review whether this limitation affects your argument at paragraph 23 of the draft motion." Diana's DMS could never do this because it treats documents as text blobs, not as nodes in a precedent chain graph.
869
+
870
+ ### Cross-matter pattern detection and work product reuse
871
+
872
+ The agent maintains awareness of all arguments, research memos, and legal strategies across all matters — active and archived. When Diana begins research for a new matter, the agent searches the brief bank not by keyword but by legal element: "Has Diana previously argued trade secret misappropriation damages in the 9th Circuit? What authorities did she cite? What counter-arguments did she face?" The search is semantic and structural, leveraging the YAML metadata to find relevant work product that keyword search would miss.
873
+
874
+ **What this looks like in practice:** Diana opens a new matter involving breach of a software licensing agreement. The agent searches the brief bank and finds: "You drafted a research memo on contractual limitation of liability in the Meridian matter (2025) that analyzed 9th Circuit standards. The Meridian memo cited 4 cases that directly apply to the new matter's liability cap issue. You also drafted an argument outline for a similar clause in the ACME matter (2024) that addressed the willful breach exception. Both are relevant to the new matter. Shall I create an argument outline for the new matter pre-populated with these authorities and adapted for the current facts?" Diana would have spent 3 hours re-researching what she already knew. The agent found it in seconds because the YAML structure (jurisdiction, legal issue, authorities cited) made the connection visible.
875
+
876
+ ### Regulatory change impact assessment with matter-level granularity
877
+
878
+ When a regulatory change occurs, the agent performs instant impact assessment across all matters, compliance checklists, and contractual obligations. The propagation is not a keyword search for the regulation's name — it traces through the regulation's `affected_areas` to every matter whose `regulations_applicable` includes the changed regulation, every compliance checklist whose requirements reference the changed provision, and every contract review note whose terms interact with the changed rule. The agent generates specific, actionable items for each affected engagement with proposed deadlines.
879
+
880
+ **What this looks like in practice:** The EDPB issues new erasure guidance on February 1. Within minutes of the regulatory update note being created, the agent has identified every affected matter: TechCorp (active litigation hold + GDPR exposure), Meridian (DPA addendum with "legitimate interests" reference), and a third matter Diana did not immediately consider (a data processing agreement review in the inbox that references the same Article 17 exception). The agent generates three action items with tiered deadlines based on urgency, flags the relevant precedent principle note for update, and marks propagation as incomplete until Diana confirms each matter has been addressed. Diana's previous system — a regulatory alert email that she flagged and meant to trace through her matters this weekend — would have caught TechCorp because it was obvious, probably caught Meridian because she remembered, and missed the inbox item entirely. The agent catches all three because exhaustive propagation is what agents do.
881
+
882
+ ### Deadline monitoring with jurisdictional calculation
883
+
884
+ Legal deadlines are not simple calendar entries. They interact with procedural rules, court schedules, holiday calendars, and jurisdictional variations. Filing deadlines in federal court are calculated differently than state court. Service rules vary by jurisdiction. Tolling provisions affect statutes of limitations. The agent calculates and monitors all deadlines across all matters simultaneously, accounting for these jurisdictional variations.
885
+
886
+ **What this looks like in practice:** The agent maintains a rolling deadline report across all 15 active matters. It flags: "Three deadlines within the next 14 days. (1) Synthex PI motion filing — March 1, 14 days remaining, status: drafting, evidence gap: expert report pending. (2) TechCorp GDPR compliance review — March 1, 14 days remaining, triggered by EDPB guidance. (3) Meridian answer — March 5, 18 days remaining, status: not started." Each deadline includes its calculation basis (procedural rule + filing), dependent tasks (what must be completed before the deadline can be met), and risk assessment (which deadlines are at risk based on the status of dependent tasks). No calendar application can provide this level of procedural awareness because calendars track dates, not the legal rules and dependent tasks that determine whether those dates can be met.
887
+
888
+ ---
889
+ ---
890
+
891
+ Topics:
892
+ - [[domain-compositions]]