✅ RPAS‑CM‑GRA‑001 v2.3.0 (CSR-42)
Source:
governance/RPAS.md— branchadpa-project-charter, repository mdresch/adpa.
✅ RPAS‑CM‑GRA‑001 v2.3.0 (CSR-42)
Authoritative framework guardrails and naming convention baseline.
✅ RPAS‑CM Naming Convention & Versioning System
1. Artifact Identity Prefix
| Prefix | Meaning | Examples |
|---|---|---|
TAR |
Traceability, Authority & Responsibility | RPAS‑CM‑TAR‑COL‑001 |
COL |
Collision‑Prevention Protocol | RPAS‑CM‑TAR‑COL‑001 |
CSR |
Certified Stable Release | CSR‑36, CSR‑42 |
AMD |
Amendment Record | AMD‑2026‑04‑09‑0007 |
2. Version Maturity Levels
All governance artifacts adhere to the same progression:
| Version | Meaning |
|---|---|
v0.x |
Exploration (not governed) |
v1.x |
ADPA Baseline |
v2.x |
RPAS‑Aligned Governance |
v3.x |
DRACO‑Supervised & Lineage Bound |
v4.x |
Fully deterministic AI‑assisted governance |
3. Amendment Naming & Change Types
Each amendment uses the canonical form:
AMD‑YYYY‑MM‑DD‑#### (Semantic Description)
Change Types:
EXP— ExpansionREP— ReplacementFIX— HotfixDEL— DeprecationINT— IntegrationNEW— New governance artifact
Regulated Process Assurance System (RPAS)
The Regulated Process Assurance System (RPAS) is the unified governance framework that ensures execution safety, authority correctness, and deterministic auditability across the ADPA ecosystem.
It integrates:
- Mechanical validation (legacy AEV)
- Semantic governance assurance (ADPA guardrails)
into a single, enforceable lifecycle.
✅ Core Objectives
1. Execution Assurance
Guarantee that all code and operations are mechanically sound, compile reliably, and conform to the architectural topology.
2. Governance Assurance
All state mutations must follow the enforced authority loop:
Proposal → Decision → Execution
No mutation may occur outside this loop.
3. Auditability
Maintain a forensic, append‑only lineage of every governance event, decision, and execution outcome.
✅ The 5 Governance Guardrails (G1–G5)
These guardrails protect authority, integrity, traceability, determinism, and safety across all human‑AI‑system interactions.
G1 — Authority Boundary
AI proposes, humans decide, systems execute.
- AI may only provide advisory output.
- AI must never apply changes, approve changes, or bypass governance rituals.
- All state‑changing actions require explicit human authorization.
- The Orchestrator (C# layer) is the only execution authority.
- Administrator as law‑governor, not super‑admin: A human administrator is not entitled to bypass mechanical system requirements. The lawful posture treats the role as governing laws (propose, amend, and ratify rules through rituals)—not as a discretionary override of validators, ledgers, or orchestration checks. Enforcement must be mechanically sound: the same inputs and system state yield the same allow/deny outcome, so no one can assume a capability the encoded rules never granted.
- Law change, validation, and authority tokens: When law evolves or work must be performed under law, a validation path against the active rule set must succeed before cryptographically bound authority tokens are released. Tokens scope permitted execution; they do not restore omnipotent bypass.
Purpose: Prevent unauthorized or implicit mutation of state.
G2 — Lifecycle Integrity
Every state transition must follow the ritual sequence.
Ideation → Business Case → Approval → RTM Seed → Amendment Proposal → Amendment Decision → Execution → CSR‑Certified Baseline
- No skipping steps.
- No fast‑tracking.
- No retroactive mutation.
- Every artifact must reflect its correct stage in the lifecycle.
Purpose: Protect governance flow and prevent corruption of process.
G3 — Evidence & Lineage
Every artifact must be fully traceable.
- Where it came from
- Which decision authorized it
- Which amendment created it
- Which CSR version it belongs to
- Who executed the action
- When it occurred (deterministic timestamp)
RTM entries, amendments, decisions, and CSR versions must be append‑only.
Purpose: Ensure immutability, auditability, and reconstruction of truth.
G4 — Determinism
Execution must be predictable, idempotent, and replay‑safe.
- No nondeterministic side effects
- No implicit writes
- No state mutation outside Execution rituals
- No replays causing double‑writes
- CSR stamping happens exactly once per execution
Purpose: Prevent divergence between intended and actual system state.
G5 — Read vs. Act
Experience tiers may observe, visualize, analyze, and advise — but only the Orchestrator may act.
- Next.js Researcher Dashboard is advisory‑only
- Blazor Governor Portal approves/executes, but cannot propose on behalf of users
- AI never performs execution
- No UI may bypass rituals and directly mutate the ledger
- No endpoint may accept writes without ritual context
Purpose: Enforce strict separation between view, advice, and authority.
✅ Project Glasswing Immunity (Autonomous Safety)
RPAS-CM is structurally designed to neutralize the failure modes associated with unverified autonomous AI mutations (e.g., Project Glasswing). The framework enforces five defensive layers that prevent unauthorized "shadow" patches.
Defensive Layers
- G1/G5 Authority Isolation: AI models are strictly limited to advisory JSON. No execution path exists for autonomous mutation.
- G2 Ritual Enforcement: Patching velocity is hard-governed by human decision rituals. No bypasses for "emergency" AI-driven fixes.
- Gate 1 Scope Verification: Any change outside the declared scope causes immediate mechanical failure of the transition.
- Gate 4 Schema Attestation: Every proposal must match the
TAR-COLmetadata schema, proving intent and authority before certification. - COL-G3 Pessimistic Locking: Prevents multi-agent race conditions or uncoordinated "patch storms."
Governed Verdict: Glasswing-class initiative (e.g., sandbox breakouts, unasked-for disclosure) is impossible under RPAS v2.3.0.
✅ Gate 5 — Semantic Integrity (DRACO)
Gate 5 uses a localized multi-agent Review Board (DRACO) to audit the semantic intent of every state mutation. It ensures that the code changes match the human-approved attestation and do not exhibit "Shadow Initiative."
G5-BLOCKING-MODE Rule
To preserve human sovereignty while maintaining execution safety, Gate 5 enforcement is ritual-aware:
- Phase 1 (Ideation): DRACO runs in Advisory Mode. Provides feedback on intent and scope without blocking.
- Phase 2 (Decision): DRACO runs in Advisory Mode. Issues warnings if intent is ambiguous or risky.
- Phase 3 (Orchestration): DRACO runs in Mandatory Blocking Mode. Any detected semantic drift, hidden logic, or unauthorized initiative HALTS the execution.
Purpose: Detect and block unsafe emergent AI behavior (Mythos-Class) before it is committed to the CSR baseline.
Quick Reference (Compact)
| Guardrail | Title | Description |
|---|---|---|
| G1 | Authority Boundary | AI proposes, humans decide, orchestrator executes. |
| G2 | Lifecycle Integrity | No skipping rituals; all changes follow the canonical sequence. |
| G3 | Evidence & Lineage | All artifacts are append‑only, fully traceable, and audit‑safe. |
| G4 | Determinism | Execution is idempotent, predictable, and CSR‑stamped exactly once. |
| G5 | Read vs Act | UI/AI layers cannot mutate state; only Orchestrator can execute decisions. |
✅ Tier-Specific Operational Boundaries
To enforce G5, the framework recognizes four logical tiers with strictly defined execution authority:
1. Orchestrator Tier (C# / .NET 10 / Aspire 13.2.2)
- Authority: Sole Execution Authority.
- Rituals: Enforces Propose → Decide → Execute loops.
- Identity: Hosts the RTM Seeding and CSR Stamping logic.
2. Experience Tier (Blazor Governor / Next.js Researcher)
- Governor Portal (Blazor): Authorized to trigger Decision and Execution rituals.
- Researcher Dashboard (Next.js): Strictly Advisory‑only. Drafts amendments but lacks execution authority.
- Constraint: Must not perform direct state mutation or bypass the Orchestrator.
3. Intelligence Tier (Python / PMBOK Engines)
- Role: RTM Research Advisor.
- Outputs: Structured Advisory JSON only (see Specification below).
- Constraint: No write endpoints. Must remain advisory‑only with mandatory human review.
Advisory JSON Specification (Contract v1)
To ensure deterministic agent behavior and DRACO-verifiable evidence, all Intelligence Tier outputs must follow this schema:
{
"suggestedType": "REPLACEMENT | EXPANSION | DELETION",
"proposedDescription": "string (the semantic intent)",
"justification": "string (the RPAS/PMBOK rationale)",
"confidence": "float (0.0 to 1.0)",
"metadata": {
"basisVersion": "string (CSR-XX)",
"timestamp": "ISO-8601",
"modelId": "string"
}
}
4. Governance Ledger (PostgreSQL)
- Constraint: Append‑only storage for RTM, Amendments, and CSR version stamps.
✅ RPAS‑TAR‑COL (Collision Prevention)
Every action in the ecosystem is governed by the Traceability, Authority, Responsibility & Collision‑Prevention Protocol (TAR‑COL‑001).
Guarantees
- Traceability (T1–T2): Every artifact and execution has a verifiable owner and forensic lineage.
- Authority (T3–T4): Tiers operate strictly within non-overlapping boundaries.
- Collision Prevention (CP1–CP6): Deterministic locks and semantic validation prevent authority, execution, and semantic collisions.
- Multi-Agent Coordination (COL-G1–G6): Pessimistic locking and atomic rollback ensure multi-agent stability.
See RPAS‑CM‑TAR‑COL‑001 for full specification.
✅ RPAS Cloud‑Ready (CR) Criteria
A system is RPAS‑CERTIFIED (Cloud‑Ready) when it satisfies the following criteria:
CR1 — Deterministic Execution
All rituals are idempotent and safe for distributed retries.
CR2 — Authority‑Gated Mutation
No mutation occurs without explicit human‑attributed decision artifacts.
CR3 — Append‑Only History
All superseded state remains queryable. History is never rewritten.
CR4 — Failure Safety
System remains safe under:
- restarts
- retry storms
- multi-region duplication
CR5 — Experience Decoupling
The UI is replaceable. Governance must live in the core, not in the interface.
✅ Validation Pipeline (validate-rpas.ps1)
Every atomic change must pass the four RPAS Gates, enforced by AEV (Atomic Execution & Validation) and supervised by DRACO (AI Review Board):
Gate 1 — Mechanical Integrity (AEV)
- Enforcement: Verifies that only declared files are modified. No "silent" changes or scope creep.
- Rule: One logical change per atomic envelope.
Gate 2 — Build Integrity (AEV)
- Enforcement: Verifies full compilation, dependency resolution, and .NET Aspire service mesh health.
Gate 3 — Topology Check (DRACO)
- Enforcement: Verifies project structure, component graph, and service mesh consistency.
- Supervision: Automated review by the Evidence Validator, Governance Evaluator, and Counterfactual Challenger.
- Capability: Detects "High-Convergence" failure modes (shared AI blind spots).
Gate 4 — Governance Attestation (RPAS)
- Enforcement: Machine-verifiable certification of compliance with G1–G5.
- Automation: Validated via
validate-governance.jsagainst therpas-tar-col.schema.json. - Output: Validated
rpas-attestation.json.
Gate 5 — Semantic Integrity (DRACO)
- Enforcement: Local Board Review (Evidence, Governance, Challenger) of the
git diff. - Automation: Triggered via
pnpm run draco:preflight. - Output: Final CSR-stamped state transition.
✅ RPAS Certification Tiers
RPAS Cloud Master
Certified mastery of:
- Cloud‑Ready Criteria (CR1–CR5)
- Deterministic CSR execution
- Lifecycle integrity
Space Master (Future)
For borderless and environment‑agnostic distributed governance.
✅ Cloud Space Ready Versioning (CSR)
CSR versions certify that an artifact is safe for:
- distributed execution
- replay
- lineage preservation
- re-application under failover conditions
CSR Version Format
<GovernedVersion> + CSR.<ExecutionEpoch>
Example:
v2 + CSR.2026‑04‑08T18:35Z
✅ CSR Guarantees
Determinism
Same Amendment ID → always produces the same version.
Idempotency
Re-execution produces no new mutations because the CSR epoch is already linked.
Replay Safety
Safe across multi-region retries and failover duplication.
Authority Closure
A CSR version may only advance after a formal human decision ritual.