Table of Contents
This architecture is shaped by a small set of hard constraints. They are intentionally more important than short-term convenience.
Hard constraints
-
deterministic planning, hashing, and verification
-
explicit trust propagation across source, notes, agent output, and bundles
-
kernel-owned proof path for ordinary runtime execution
-
expert-only oracle seam for parity and diagnostics
-
governed note quality instead of free-form repository memory
-
bounded scanner selection and explicit scanner activation