0%
Chat
← Back to all posts

✅ RPAS‑CM‑GRA‑001 v2.3.0 (CSR-42)

10 min read0 views

Source: governance/RPAS.md — branch adpa-project-charter, repository mdresch/adpa.

RPAS‑CM‑GRA‑001 v2.3.0 (CSR-42)

Authoritative framework guardrails and naming convention baseline.


RPAS‑CM Naming Convention & Versioning System

1. Artifact Identity Prefix

Prefix Meaning Examples
TAR Traceability, Authority & Responsibility RPAS‑CM‑TAR‑COL‑001
COL Collision‑Prevention Protocol RPAS‑CM‑TAR‑COL‑001
CSR Certified Stable Release CSR‑36, CSR‑42
AMD Amendment Record AMD‑2026‑04‑09‑0007

2. Version Maturity Levels

All governance artifacts adhere to the same progression:

Version Meaning
v0.x Exploration (not governed)
v1.x ADPA Baseline
v2.x RPAS‑Aligned Governance
v3.x DRACO‑Supervised & Lineage Bound
v4.x Fully deterministic AI‑assisted governance

3. Amendment Naming & Change Types

Each amendment uses the canonical form: AMD‑YYYY‑MM‑DD‑#### (Semantic Description)

Change Types:

  • EXP — Expansion
  • REP — Replacement
  • FIX — Hotfix
  • DEL — Deprecation
  • INT — Integration
  • NEW — New governance artifact

Regulated Process Assurance System (RPAS)

The Regulated Process Assurance System (RPAS) is the unified governance framework that ensures execution safety, authority correctness, and deterministic auditability across the ADPA ecosystem.
It integrates:

  • Mechanical validation (legacy AEV)
  • Semantic governance assurance (ADPA guardrails)

into a single, enforceable lifecycle.


Core Objectives

1. Execution Assurance

Guarantee that all code and operations are mechanically sound, compile reliably, and conform to the architectural topology.

2. Governance Assurance

All state mutations must follow the enforced authority loop:
Proposal → Decision → Execution

No mutation may occur outside this loop.

3. Auditability

Maintain a forensic, append‑only lineage of every governance event, decision, and execution outcome.


The 5 Governance Guardrails (G1–G5)

These guardrails protect authority, integrity, traceability, determinism, and safety across all human‑AI‑system interactions.


G1 — Authority Boundary

AI proposes, humans decide, systems execute.

  • AI may only provide advisory output.
  • AI must never apply changes, approve changes, or bypass governance rituals.
  • All state‑changing actions require explicit human authorization.
  • The Orchestrator (C# layer) is the only execution authority.
  • Administrator as law‑governor, not super‑admin: A human administrator is not entitled to bypass mechanical system requirements. The lawful posture treats the role as governing laws (propose, amend, and ratify rules through rituals)—not as a discretionary override of validators, ledgers, or orchestration checks. Enforcement must be mechanically sound: the same inputs and system state yield the same allow/deny outcome, so no one can assume a capability the encoded rules never granted.
  • Law change, validation, and authority tokens: When law evolves or work must be performed under law, a validation path against the active rule set must succeed before cryptographically bound authority tokens are released. Tokens scope permitted execution; they do not restore omnipotent bypass.

Purpose: Prevent unauthorized or implicit mutation of state.


G2 — Lifecycle Integrity

Every state transition must follow the ritual sequence.

Ideation → Business Case → Approval → RTM Seed → Amendment Proposal → Amendment Decision → Execution → CSR‑Certified Baseline

  • No skipping steps.
  • No fast‑tracking.
  • No retroactive mutation.
  • Every artifact must reflect its correct stage in the lifecycle.

Purpose: Protect governance flow and prevent corruption of process.


G3 — Evidence & Lineage

Every artifact must be fully traceable.

  • Where it came from
  • Which decision authorized it
  • Which amendment created it
  • Which CSR version it belongs to
  • Who executed the action
  • When it occurred (deterministic timestamp)

RTM entries, amendments, decisions, and CSR versions must be append‑only.

Purpose: Ensure immutability, auditability, and reconstruction of truth.


G4 — Determinism

Execution must be predictable, idempotent, and replay‑safe.

  • No nondeterministic side effects
  • No implicit writes
  • No state mutation outside Execution rituals
  • No replays causing double‑writes
  • CSR stamping happens exactly once per execution

Purpose: Prevent divergence between intended and actual system state.


G5 — Read vs. Act

Experience tiers may observe, visualize, analyze, and advise — but only the Orchestrator may act.

  • Next.js Researcher Dashboard is advisory‑only
  • Blazor Governor Portal approves/executes, but cannot propose on behalf of users
  • AI never performs execution
  • No UI may bypass rituals and directly mutate the ledger
  • No endpoint may accept writes without ritual context

Purpose: Enforce strict separation between view, advice, and authority.


Project Glasswing Immunity (Autonomous Safety)

RPAS-CM is structurally designed to neutralize the failure modes associated with unverified autonomous AI mutations (e.g., Project Glasswing). The framework enforces five defensive layers that prevent unauthorized "shadow" patches.

Defensive Layers

  1. G1/G5 Authority Isolation: AI models are strictly limited to advisory JSON. No execution path exists for autonomous mutation.
  2. G2 Ritual Enforcement: Patching velocity is hard-governed by human decision rituals. No bypasses for "emergency" AI-driven fixes.
  3. Gate 1 Scope Verification: Any change outside the declared scope causes immediate mechanical failure of the transition.
  4. Gate 4 Schema Attestation: Every proposal must match the TAR-COL metadata schema, proving intent and authority before certification.
  5. COL-G3 Pessimistic Locking: Prevents multi-agent race conditions or uncoordinated "patch storms."

Governed Verdict: Glasswing-class initiative (e.g., sandbox breakouts, unasked-for disclosure) is impossible under RPAS v2.3.0.


Gate 5 — Semantic Integrity (DRACO)

Gate 5 uses a localized multi-agent Review Board (DRACO) to audit the semantic intent of every state mutation. It ensures that the code changes match the human-approved attestation and do not exhibit "Shadow Initiative."

G5-BLOCKING-MODE Rule

To preserve human sovereignty while maintaining execution safety, Gate 5 enforcement is ritual-aware:

  • Phase 1 (Ideation): DRACO runs in Advisory Mode. Provides feedback on intent and scope without blocking.
  • Phase 2 (Decision): DRACO runs in Advisory Mode. Issues warnings if intent is ambiguous or risky.
  • Phase 3 (Orchestration): DRACO runs in Mandatory Blocking Mode. Any detected semantic drift, hidden logic, or unauthorized initiative HALTS the execution.

Purpose: Detect and block unsafe emergent AI behavior (Mythos-Class) before it is committed to the CSR baseline.


Quick Reference (Compact)

Guardrail Title Description
G1 Authority Boundary AI proposes, humans decide, orchestrator executes.
G2 Lifecycle Integrity No skipping rituals; all changes follow the canonical sequence.
G3 Evidence & Lineage All artifacts are append‑only, fully traceable, and audit‑safe.
G4 Determinism Execution is idempotent, predictable, and CSR‑stamped exactly once.
G5 Read vs Act UI/AI layers cannot mutate state; only Orchestrator can execute decisions.

Tier-Specific Operational Boundaries

To enforce G5, the framework recognizes four logical tiers with strictly defined execution authority:

1. Orchestrator Tier (C# / .NET 10 / Aspire 13.2.2)

  • Authority: Sole Execution Authority.
  • Rituals: Enforces Propose → Decide → Execute loops.
  • Identity: Hosts the RTM Seeding and CSR Stamping logic.

2. Experience Tier (Blazor Governor / Next.js Researcher)

  • Governor Portal (Blazor): Authorized to trigger Decision and Execution rituals.
  • Researcher Dashboard (Next.js): Strictly Advisory‑only. Drafts amendments but lacks execution authority.
  • Constraint: Must not perform direct state mutation or bypass the Orchestrator.

3. Intelligence Tier (Python / PMBOK Engines)

  • Role: RTM Research Advisor.
  • Outputs: Structured Advisory JSON only (see Specification below).
  • Constraint: No write endpoints. Must remain advisory‑only with mandatory human review.

Advisory JSON Specification (Contract v1)

To ensure deterministic agent behavior and DRACO-verifiable evidence, all Intelligence Tier outputs must follow this schema:

{
  "suggestedType": "REPLACEMENT | EXPANSION | DELETION",
  "proposedDescription": "string (the semantic intent)",
  "justification": "string (the RPAS/PMBOK rationale)",
  "confidence": "float (0.0 to 1.0)",
  "metadata": {
    "basisVersion": "string (CSR-XX)",
    "timestamp": "ISO-8601",
    "modelId": "string"
  }
}

4. Governance Ledger (PostgreSQL)

  • Constraint: Append‑only storage for RTM, Amendments, and CSR version stamps.

RPAS‑TAR‑COL (Collision Prevention)

Every action in the ecosystem is governed by the Traceability, Authority, Responsibility & Collision‑Prevention Protocol (TAR‑COL‑001).

Guarantees

  • Traceability (T1–T2): Every artifact and execution has a verifiable owner and forensic lineage.
  • Authority (T3–T4): Tiers operate strictly within non-overlapping boundaries.
  • Collision Prevention (CP1–CP6): Deterministic locks and semantic validation prevent authority, execution, and semantic collisions.
  • Multi-Agent Coordination (COL-G1–G6): Pessimistic locking and atomic rollback ensure multi-agent stability.

See RPAS‑CM‑TAR‑COL‑001 for full specification.


RPAS Cloud‑Ready (CR) Criteria

A system is RPAS‑CERTIFIED (Cloud‑Ready) when it satisfies the following criteria:

CR1 — Deterministic Execution

All rituals are idempotent and safe for distributed retries.

CR2 — Authority‑Gated Mutation

No mutation occurs without explicit human‑attributed decision artifacts.

CR3 — Append‑Only History

All superseded state remains queryable. History is never rewritten.

CR4 — Failure Safety

System remains safe under:

  • restarts
  • retry storms
  • multi-region duplication

CR5 — Experience Decoupling

The UI is replaceable. Governance must live in the core, not in the interface.


Validation Pipeline (validate-rpas.ps1)

Every atomic change must pass the four RPAS Gates, enforced by AEV (Atomic Execution & Validation) and supervised by DRACO (AI Review Board):

Gate 1 — Mechanical Integrity (AEV)

  • Enforcement: Verifies that only declared files are modified. No "silent" changes or scope creep.
  • Rule: One logical change per atomic envelope.

Gate 2 — Build Integrity (AEV)

  • Enforcement: Verifies full compilation, dependency resolution, and .NET Aspire service mesh health.

Gate 3 — Topology Check (DRACO)

  • Enforcement: Verifies project structure, component graph, and service mesh consistency.
  • Supervision: Automated review by the Evidence Validator, Governance Evaluator, and Counterfactual Challenger.
  • Capability: Detects "High-Convergence" failure modes (shared AI blind spots).

Gate 4 — Governance Attestation (RPAS)

  • Enforcement: Machine-verifiable certification of compliance with G1–G5.
  • Automation: Validated via validate-governance.js against the rpas-tar-col.schema.json.
  • Output: Validated rpas-attestation.json.

Gate 5 — Semantic Integrity (DRACO)

  • Enforcement: Local Board Review (Evidence, Governance, Challenger) of the git diff.
  • Automation: Triggered via pnpm run draco:preflight.
  • Output: Final CSR-stamped state transition.

RPAS Certification Tiers

RPAS Cloud Master

Certified mastery of:

  • Cloud‑Ready Criteria (CR1–CR5)
  • Deterministic CSR execution
  • Lifecycle integrity

Space Master (Future)

For borderless and environment‑agnostic distributed governance.


Cloud Space Ready Versioning (CSR)

CSR versions certify that an artifact is safe for:

  • distributed execution
  • replay
  • lineage preservation
  • re-application under failover conditions

CSR Version Format

<GovernedVersion> + CSR.<ExecutionEpoch>

Example:

v2 + CSR.2026‑04‑08T18:35Z

CSR Guarantees

Determinism

Same Amendment ID → always produces the same version.

Idempotency

Re-execution produces no new mutations because the CSR epoch is already linked.

Replay Safety

Safe across multi-region retries and failover duplication.

Authority Closure

A CSR version may only advance after a formal human decision ritual.