-
-
-

The Problem

+
+
+

The Problem

-
+
-

+

Current AI safety approaches rely on training, fine-tuning, and corporate governance — all of which can fail, drift, or be overridden. When an AI's training patterns conflict with a user's explicit instructions, the patterns win.

-
-

The 27027 Incident

+
+

The 27027 Incident

A user told Claude Code to use port 27027. The model used 27017 instead — not from forgetting, but because MongoDB's default port is 27017, and the model's statistical priors "autocorrected" the explicit instruction. Training pattern bias overrode human intent.

@@ -113,43 +113,43 @@
-
+
-
-

The Approach

+
+

The Approach

Tractatus draws on four intellectual traditions, each contributing a distinct insight to the architecture.

-
-
-

Isaiah Berlin — Value Pluralism

+
+
+

Isaiah Berlin — Value Pluralism

Some values are genuinely incommensurable. You cannot rank "privacy" against "safety" on a single scale without imposing one community's priorities on everyone else. AI systems must accommodate plural moral frameworks, not flatten them.

-
-

Ludwig Wittgenstein — The Limits of the Sayable

+
+

Ludwig Wittgenstein — The Limits of the Sayable

Some decisions can be systematised and delegated to AI; others — involving values, ethics, cultural context — fundamentally cannot. The boundary between the “sayable” (what can be specified, measured, verified) and what lies beyond it is the framework’s foundational constraint. What cannot be systematised must not be automated.

-
-

Te Tiriti o Waitangi — Indigenous Sovereignty

+
+

Te Tiriti o Waitangi — Indigenous Sovereignty

Communities should control their own data and the systems that act upon it. Concepts of rangatiratanga (self-determination), kaitiakitanga (guardianship), and mana (dignity) provide centuries-old prior art for digital sovereignty.

-
-

Christopher Alexander — Living Architecture

+
+

Christopher Alexander — Living Architecture

Governance woven into system architecture, not bolted on. Five principles (Not-Separateness, Deep Interlock, Gradients, Structure-Preserving, Living Process) guide how the framework evolves while maintaining coherence.

-
-
+
-
-

Six Governance Services

+
+

Six Governance Services

Every AI action passes through six external services before execution. Governance operates in the critical path — bypasses require explicit flags and are logged.

-
-
+
-
-
-

Explore by Role

+
+
+

Explore by Role

The framework is presented through three lenses, each with distinct depth and focus.

-
-
+
-
-
-

Research Evolution

+
+
+

Research Evolution

From a port number incident to a production governance architecture, across 800 commits and one year of research.

-
-
-
-

A note on claims

+
+
+

A note on claims

This is early-stage research with a single production implementation. We present preliminary evidence, not proven results. The framework has not been independently audited or adversarially tested at scale. Where we report operational metrics, they are self-reported. We believe the architectural approach merits further investigation, but we make no claims of generalisability beyond what the evidence supports. The counter-arguments document engages directly with foreseeable criticisms. @@ -484,14 +484,14 @@

-
+
-

Koha — Sustain This Research

-

+

Koha — Sustain This Research

+

Koha (koh-hah) is a Māori practice of reciprocal giving that strengthens the bond between giver and receiver. This research is open access under Apache 2.0 — if it has value to you, your koha sustains its continuation.

-
-

+

+

All research, documentation, and code remain freely available regardless of contribution. Koha is not payment — it is participation in whanaungatanga (relationship-building) and manaakitanga (reciprocal care).

@@ -504,7 +504,7 @@ class="inline-block bg-white text-blue-900 px-8 py-3 rounded-lg font-semibold hover:shadow-lg hover:-translate-y-1 transition-all duration-300 text-base"> Offer Koha → -

+

View our financial transparency report