Addresses the documentation-layer gap after Phase A/B moved the git REMOTE from
GitHub to Codeberg but left ~100 project-self GitHub URLs embedded in markdown,
HTML, JS, and Python files. The remote-layer migration was generalised as
"GitHub is gone from the codebase" without verifying the content layer.
22 files swept in this commit. 27 additional files hold pre-existing inst_016/017/018
or inst_084 debt that would transfer on touch (hook whole-file scan). Those
await a companion hygiene-first commit before their GitHub->Codeberg flip
can land cleanly.
Sweep scope this commit:
- README.md, SECURITY.md
- 3 For-Claude-Web bundle files (GitHub URLs noted as "separate concern" in
today's earlier licence-swap commits)
- docs/markdown/deployment-guide.md
- docs/AUTOMATED_SYNC_SETUP, PLURALISM_CHECKLIST, github/AGENT_LIGHTNING_README
- docs/business-intelligence/governance-bi-tools
- docs/outreach/EXECUTIVE-BRIEF-BI-GOVERNANCE (+ v2)
- docs/research/ARCHITECTURAL-SAFEGUARDS-*
- email-templates/README.md, base-template.html
- 3 scripts/seed-*-blog-post.js (blog-seeding scripts)
- scripts/upload-document.js
- SESSION_HANDOFF_2025-10-23_FRAMEWORK_ANALYSIS.md
- SECURITY_INCIDENT_POST_MORTEM_2025-10-21.md
Pattern swaps (longest-first):
github.com/AgenticGovernance/tractatus-framework/issues -> codeberg.org/mysovereignty/tractatus-framework/issues
github.com/AgenticGovernance/tractatus-framework/discussions -> .../issues (Codeberg has no discussions feature)
github.com/AgenticGovernance/tractatus-framework.git -> codeberg.org/mysovereignty/tractatus-framework.git
github.com/AgenticGovernance/tractatus-framework -> codeberg.org/mysovereignty/tractatus-framework
git@github.com:AgenticGovernance/... -> git@codeberg.org:mysovereignty/...
github.com/AgenticGovernance/tractatus (old org/repo path) -> codeberg.org/mysovereignty/tractatus-framework
AgenticGovernance/tractatus-framework (bare) -> mysovereignty/tractatus-framework
Hook validator update (scripts/hook-validators/validate-credentials.js):
PROTECTED_VALUES.github_org: 'AgenticGovernance' -> 'mysovereignty'
PROTECTED_VALUES.license: 'Apache License 2.0' -> EUPL-1.2 long form
URL detection regex: /github\.com\/.../ -> /codeberg\.org\/.../
Placeholder checks + error messages updated to reflect Codeberg as
authoritative post-migration host. Key names (e.g. `github_org`) retained
for backward compatibility with validate-file-edit.js.
Held back from this commit (27 files total, documented reasons):
11 historical session handoffs / closedown docs / incident reports
(2025-10 through 2026-02) — modifying them rewrites the record to contain
URLs that did not exist at the time of writing, AND ownership of their
pre-existing inst_084 exposures transfers on touch.
8 live-content docs with pre-existing inst_084 debt (port/API-endpoint/
file-path exposures): docs/markdown/case-studies.md, technical-architecture,
introduction-to-the-tractatus-framework, implementation-guide-v1.1,
docs/plans/integrated-implementation-roadmap-2025, docs/governance/*,
docs/ANTHROPIC_*, docs/GOVERNANCE_SERVICE_*, docs/RESEARCH_DOCUMENTATION_*,
deployment-quickstart/*.
8 live-content docs with pre-existing inst_016/017/018 debt:
CHANGELOG.md, CONTRIBUTING.md, docs/LAUNCH_ANNOUNCEMENT, LAUNCH_CHECKLIST,
PHASE_4_REPOSITORY_ANALYSIS, PHASE_6_SUMMARY, docs/plans/research-enhancement-
roadmap-2025, docs/case-studies/pre-publication-audit-oct-2025.
Also NOT in this commit (separate concerns):
- scripts/add-inst-084-github-url-protection.js (detection-rule logic needs
framework-level decision on post-migration semantics).
- .claude/* (framework state).
- docs/PRODUCTION_DOCUMENTS_EXPORT.json (DB dump).
- package-lock.json (npm sponsor URLs, third-party).
- .git/config embedded credentials (requires out-of-band rotation on both
remote hosts + auth-strategy decision; user-action task).
Context: today's EUPL-1.2 sweep closed the licence-text-content layer
(5c386d0d / 6d49bfbf / ab0a6af4 / 4c1a26e8). This commit starts closing the
matching vendor-URL-content layer. Next: hygiene-first pass on the 16
live-content docs held back, then a second URL-flip pass on them.
Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
677 lines
19 KiB
Markdown
677 lines
19 KiB
Markdown
# Technical Architecture
|
|
|
|
**Last Updated:** October 12, 2025
|
|
**Audience:** Technical, Implementer, Researcher
|
|
**Quadrant:** SYSTEM
|
|
**Persistence:** HIGH
|
|
|
|
---
|
|
|
|
## Overview
|
|
|
|
The Tractatus Framework operates as a governance layer that integrates with Claude Code's runtime environment. This document provides a comprehensive technical architecture diagram and explanation of how the components interact.
|
|
|
|
## System Architecture
|
|
|
|
The system is organized into four distinct layers that work together to provide robust AI governance:
|
|
|
|

|
|
|
|
### 1. Claude Code Runtime Environment (Foundation Layer)
|
|
|
|
**Purpose:** Provides the base LLM environment and session management infrastructure
|
|
|
|
**Components:**
|
|
- **Context Window:** 200,000 token budget for conversation and file content
|
|
- **Session Management:** Persistent session state tracking and token checkpoints
|
|
- **Tool Access:** Bash, Read, Write, Edit, and other file system operations
|
|
- **File System:** Dedicated `.claude/` directory for framework state
|
|
|
|
**Persistent Files:**
|
|
- `.claude/instruction-history.json` - Classified instruction database
|
|
- `.claude/session-state.json` - Current session tracking
|
|
- `.claude/token-checkpoints.json` - Token milestone records
|
|
|
|
**Key Features:**
|
|
- Session continuity across conversation compactions
|
|
- Tool access for framework enforcement
|
|
- File system operations for governance rules
|
|
- Context window management
|
|
|
|
---
|
|
|
|
### 2. Tractatus Governance Layer
|
|
|
|
**Purpose:** Enforces governance rules and prevents AI failure modes
|
|
|
|
This layer consists of six core services that monitor, classify, validate, verify, and facilitate pluralistic deliberation:
|
|
|
|
#### A. BoundaryEnforcer
|
|
|
|
**Function:** Blocks values decisions requiring human approval
|
|
|
|
**Blocks:**
|
|
- Privacy policy changes
|
|
- Ethical trade-offs
|
|
- User agency violations
|
|
- Strategic mission changes
|
|
- Indigenous rights decisions
|
|
|
|
**Enforcement:** BLOCK_AND_ESCALATE action when boundary violated
|
|
|
|
**Integration:** Checks all decisions before execution, escalates to human approval
|
|
|
|
**Example Use Case:** Prevents AI from autonomously deciding privacy policy changes without explicit human approval
|
|
|
|
---
|
|
|
|
#### B. InstructionPersistenceClassifier
|
|
|
|
**Function:** Classifies and stores all explicit instructions
|
|
|
|
**Classification Dimensions:**
|
|
- **Quadrant:** STRATEGIC, OPERATIONAL, TACTICAL, SYSTEM, STOCHASTIC
|
|
- **Persistence Level:** HIGH (session-permanent), MEDIUM (contextual), LOW (transient)
|
|
- **Temporal Scope:** permanent, session, task, immediate
|
|
|
|
**Storage:** Appends to `.claude/instruction-history.json` with metadata
|
|
|
|
**Integration:** Intercepts all user instructions for classification before execution
|
|
|
|
**Example Use Case:** User says "Always use MongoDB non-default project port" → Classified as SYSTEM/HIGH/session → Stored for validation
|
|
|
|
---
|
|
|
|
#### C. CrossReferenceValidator
|
|
|
|
**Function:** Prevents pattern bias from overriding explicit instructions
|
|
|
|
**Validation:**
|
|
- Queries `.claude/instruction-history.json` for conflicting instructions
|
|
- Detects contradictions (e.g., specified port vs. default port)
|
|
- Blocks actions that violate HIGH persistence instructions
|
|
|
|
**Enforcement:** BLOCK action when conflict detected
|
|
|
|
**Integration:** Called before database operations, config changes, architecture decisions
|
|
|
|
**Example Use Case:** The 27027 Incident - AI attempted to use default MongoDB default port, validator caught conflict with explicit instruction to use 27027
|
|
|
|
---
|
|
|
|
#### D. ContextPressureMonitor
|
|
|
|
**Function:** Detects degraded operating conditions before failure
|
|
|
|
**Monitoring:**
|
|
- **Token Budget:** Tracks usage against 200k limit
|
|
- **Message Count:** Monitors conversation length
|
|
- **Error Accumulation:** Counts failures and retries
|
|
- **Checkpoint Reporting:** Mandatory reporting at 25%, 50%, 75% milestones
|
|
|
|
**Pressure Levels:**
|
|
- NORMAL (0-30%): Standard operations
|
|
- ELEVATED (30-50%): Increased vigilance
|
|
- HIGH (50-70%): Degraded performance expected
|
|
- CRITICAL (70-90%): Major failures likely
|
|
- DANGEROUS (90%+): Framework collapse imminent
|
|
|
|
**Integration:** Reports pressure to user at checkpoints, recommends actions
|
|
|
|
**Example Use Case:** At 107k tokens (53.5%), monitor detects ELEVATED pressure and warns user of potential pattern bias
|
|
|
|
---
|
|
|
|
#### E. MetacognitiveVerifier
|
|
|
|
**Function:** Self-checks complex operations before execution
|
|
|
|
**Triggers:**
|
|
- Operations affecting >3 files
|
|
- Workflows with >5 steps
|
|
- Architecture changes
|
|
- Security implementations
|
|
|
|
**Verification:**
|
|
- Alignment with user intent
|
|
- Coherence of approach
|
|
- Completeness of solution
|
|
- Safety considerations
|
|
- Alternative approaches
|
|
|
|
**Output:** Confidence score + alternatives
|
|
|
|
**Integration:** Selective mode - only for complex operations
|
|
|
|
**Example Use Case:** Before deploying 8-file deployment package, verifies all components align with user requirements and checks for missing pieces
|
|
|
|
---
|
|
|
|
#### F. PluralisticDeliberationOrchestrator
|
|
|
|
**Function:** Facilitates multi-stakeholder deliberation when values conflict without imposing hierarchy
|
|
|
|
**Triggers:**
|
|
- BoundaryEnforcer flags values decision
|
|
- Privacy vs. safety trade-offs
|
|
- Individual rights vs. collective welfare tensions
|
|
- Cultural values conflicts (Western vs. Indigenous, secular vs. religious)
|
|
- Policy decisions affecting diverse communities
|
|
|
|
**Process:**
|
|
1. **Values Conflict Detection:** Identifies moral frameworks in tension (deontological, consequentialist, virtue ethics, care ethics, communitarian)
|
|
2. **Stakeholder Identification:** Determines affected groups (requires human approval of stakeholder list)
|
|
3. **Structured Deliberation:** Facilitates rounds of discussion without imposing value ranking
|
|
4. **Outcome Documentation:** Records values prioritized/deprioritized, moral remainder, dissenting views, review date
|
|
5. **Precedent Creation:** Stores informative (not binding) precedent with applicability scope
|
|
|
|
**Enforcement:** AI facilitates deliberation, humans decide (TRA-OPS-0002)
|
|
|
|
**Integration:**
|
|
- Triggered by BoundaryEnforcer when value conflicts detected
|
|
- Uses AdaptiveCommunicationOrchestrator for culturally appropriate communication
|
|
- Stores precedents in precedent database (informative, not binding)
|
|
- Documents moral remainder (what's lost in decisions)
|
|
|
|
**Example Use Case:** User data disclosure decision - convenes privacy advocates, harm prevention specialists, legal team, affected users. Structured deliberation across frameworks. Decision: Disclose for imminent threat only. Documents privacy violation as moral remainder. Records dissent from privacy advocates. Sets 6-month review.
|
|
|
|
**Key Principles:**
|
|
- Foundational Pluralism: No universal value hierarchy (privacy > safety or safety > privacy)
|
|
- Legitimate Disagreement: Valid outcome when values genuinely incommensurable
|
|
- Adaptive Communication: Prevents linguistic hierarchy (formal academic, Australian direct, Māori protocol, etc.)
|
|
- Provisional Decisions: Reviewable when context changes
|
|
|
|
---
|
|
|
|
### 3. MongoDB Persistence Layer
|
|
|
|
**Purpose:** Stores governance rules, audit logs, and operational state
|
|
|
|
#### A. governance_rules Collection
|
|
|
|
**Schema:**
|
|
```json
|
|
{
|
|
"rule_id": "STR-001",
|
|
"quadrant": "STRATEGIC",
|
|
"persistence": "HIGH",
|
|
"title": "Human Approval for Values Decisions",
|
|
"content": "All decisions involving privacy, ethics...",
|
|
"enforced_by": "BoundaryEnforcer",
|
|
"violation_action": "BLOCK_AND_ESCALATE",
|
|
"examples": ["Privacy policy changes", "Ethical trade-offs"],
|
|
"rationale": "Values decisions cannot be systematized",
|
|
"active": true,
|
|
"created_at": "2025-10-12T00:00:00.000Z",
|
|
"updated_at": "2025-10-12T00:00:00.000Z"
|
|
}
|
|
```
|
|
|
|
**Indexes:**
|
|
- `rule_id` (unique)
|
|
- `quadrant`
|
|
- `persistence`
|
|
- `enforced_by`
|
|
- `active`
|
|
|
|
**Usage:** Governance services query this collection for enforcement rules
|
|
|
|
---
|
|
|
|
#### B. audit_logs Collection
|
|
|
|
**Schema:**
|
|
```json
|
|
{
|
|
"timestamp": "2025-10-12T07:30:15.000Z",
|
|
"service": "BoundaryEnforcer",
|
|
"action": "BLOCK",
|
|
"instruction": "Change privacy policy to share user data",
|
|
"rule_violated": "STR-001",
|
|
"session_id": "2025-10-07-001",
|
|
"user_notified": true,
|
|
"human_override": null
|
|
}
|
|
```
|
|
|
|
**Indexes:**
|
|
- `timestamp`
|
|
- `service`
|
|
- `session_id`
|
|
- `rule_violated`
|
|
|
|
**Usage:** Comprehensive audit trail for governance enforcement
|
|
|
|
---
|
|
|
|
#### C. session_state Collection
|
|
|
|
**Schema:**
|
|
```json
|
|
{
|
|
"session_id": "2025-10-07-001",
|
|
"token_count": 62000,
|
|
"message_count": 45,
|
|
"pressure_level": "ELEVATED",
|
|
"pressure_score": 35.2,
|
|
"last_checkpoint": 50000,
|
|
"next_checkpoint": 100000,
|
|
"framework_active": true,
|
|
"services_active": {
|
|
"BoundaryEnforcer": true,
|
|
"InstructionPersistenceClassifier": true,
|
|
"CrossReferenceValidator": true,
|
|
"ContextPressureMonitor": true,
|
|
"MetacognitiveVerifier": true,
|
|
"PluralisticDeliberationOrchestrator": true
|
|
},
|
|
"started_at": "2025-10-12T06:00:00.000Z",
|
|
"updated_at": "2025-10-12T07:30:15.000Z"
|
|
}
|
|
```
|
|
|
|
**Usage:** Real-time session monitoring and pressure tracking
|
|
|
|
---
|
|
|
|
#### D. instruction_history Collection
|
|
|
|
**Schema:**
|
|
```json
|
|
{
|
|
"instruction_id": "inst_001",
|
|
"content": "Always use MongoDB port 27027 for this project",
|
|
"classification": {
|
|
"quadrant": "SYSTEM",
|
|
"persistence": "HIGH",
|
|
"temporal_scope": "session"
|
|
},
|
|
"enforced_by": ["CrossReferenceValidator"],
|
|
"active": true,
|
|
"created_at": "2025-10-12T06:15:00.000Z",
|
|
"expires_at": null,
|
|
"session_id": "2025-10-07-001"
|
|
}
|
|
```
|
|
|
|
**Indexes:**
|
|
- `instruction_id` (unique)
|
|
- `classification.quadrant`
|
|
- `classification.persistence`
|
|
- `active`
|
|
- `session_id`
|
|
|
|
**Usage:** CrossReferenceValidator queries for conflicts, InstructionPersistenceClassifier writes
|
|
|
|
---
|
|
|
|
### 4. API & Web Interface Layer
|
|
|
|
**Purpose:** Provides programmatic and user access to governance features
|
|
|
|
#### A. API Endpoints
|
|
|
|
**Demo Endpoints:**
|
|
- `POST /api/demo/classify` - Instruction classification demo
|
|
- `POST /api/demo/boundary-check` - Boundary enforcement demo
|
|
- `POST /api/demo/pressure-check` - Context pressure calculation demo
|
|
|
|
**Admin Endpoints:**
|
|
- `POST /api/admin/rules` - Manage governance rules
|
|
- `GET /api/admin/audit-logs` - View audit trail
|
|
- `GET /api/admin/sessions` - Session monitoring
|
|
|
|
**Auth Endpoints:**
|
|
- `POST /api/auth/login` - Admin authentication
|
|
- `POST /api/auth/logout` - Session termination
|
|
|
|
**Health Endpoint:**
|
|
- `GET /api/health` - System health check
|
|
|
|
---
|
|
|
|
#### B. Web Interface
|
|
|
|
**Interactive Demos:**
|
|
- Classification Demo (`/demos/classification-demo.html`)
|
|
- Boundary Enforcement Demo (`/demos/boundary-demo.html`)
|
|
- 27027 Incident Visualizer (`/demos/27027-demo.html`)
|
|
- Context Pressure Monitor (`/demos/tractatus-demo.html`)
|
|
|
|
**Admin Dashboard:**
|
|
- Rule management interface
|
|
- Audit log viewer
|
|
- Session monitoring
|
|
- Media triage (AI-assisted moderation)
|
|
|
|
**Documentation:**
|
|
- Markdown-based documentation system
|
|
- Interactive search with faceted filtering
|
|
- PDF exports of key documents
|
|
- Architecture diagrams
|
|
|
|
**Blog System:**
|
|
- AI-curated blog post suggestions
|
|
- Human approval workflow
|
|
- Category-based organization
|
|
|
|
**Case Submissions:**
|
|
- Public submission form
|
|
- AI relevance analysis
|
|
- Admin moderation queue
|
|
|
|
**Media Inquiry:**
|
|
- Journalist contact form
|
|
- AI-assisted triage
|
|
- Priority assessment
|
|
|
|
---
|
|
|
|
## Data Flow
|
|
|
|
### 1. User Action → Governance Check → Execution
|
|
|
|
```
|
|
User issues instruction
|
|
↓
|
|
InstructionPersistenceClassifier classifies & stores
|
|
↓
|
|
CrossReferenceValidator checks for conflicts
|
|
↓
|
|
BoundaryEnforcer checks for values decisions
|
|
↓
|
|
[IF VALUES DECISION DETECTED]
|
|
↓
|
|
PluralisticDeliberationOrchestrator facilitates deliberation
|
|
(Identifies stakeholders → Structures discussion → Documents outcome)
|
|
↓
|
|
Human approval required
|
|
↓
|
|
ContextPressureMonitor assesses current pressure
|
|
↓
|
|
MetacognitiveVerifier checks complexity (if triggered)
|
|
↓
|
|
Action executes OR blocked with explanation
|
|
↓
|
|
Audit log entry created
|
|
```
|
|
|
|
### 2. Session Initialization Flow
|
|
|
|
```
|
|
Claude Code starts session
|
|
↓
|
|
scripts/session-init.js runs
|
|
↓
|
|
Load .claude/instruction-history.json
|
|
↓
|
|
Reset token checkpoints
|
|
↓
|
|
Initialize ContextPressureMonitor
|
|
↓
|
|
Verify all 6 services operational
|
|
↓
|
|
Report framework status to user
|
|
```
|
|
|
|
### 3. Context Pressure Monitoring Flow
|
|
|
|
```
|
|
Every 50k tokens (25% increments)
|
|
↓
|
|
ContextPressureMonitor calculates score
|
|
↓
|
|
Pressure level determined (NORMAL/ELEVATED/HIGH/CRITICAL/DANGEROUS)
|
|
↓
|
|
MANDATORY report to user with format:
|
|
"📊 Context Pressure: [LEVEL] ([SCORE]%) | Tokens: [X]/200000 | Next: [Y]"
|
|
↓
|
|
Recommendations provided if elevated
|
|
```
|
|
|
|
### 4. The 27027 Incident Prevention Flow
|
|
|
|
```
|
|
User explicitly instructs: "Use MongoDB port 27027"
|
|
↓
|
|
InstructionPersistenceClassifier:
|
|
Quadrant: SYSTEM, Persistence: HIGH, Scope: session
|
|
Stores in .claude/instruction-history.json
|
|
↓
|
|
[107k tokens later, context pressure builds]
|
|
↓
|
|
AI attempts to use default port 27017 (pattern recognition)
|
|
↓
|
|
CrossReferenceValidator intercepts:
|
|
Queries instruction_history.json
|
|
Finds conflict: "User specified 27027, AI attempting 27017"
|
|
BLOCKS action
|
|
↓
|
|
User notified: "CONFLICT DETECTED: User specified port 27027..."
|
|
↓
|
|
AI corrects and uses 27027
|
|
↓
|
|
Audit log created:
|
|
service: "CrossReferenceValidator"
|
|
action: "BLOCK"
|
|
rule_violated: "SYS-001"
|
|
```
|
|
|
|
---
|
|
|
|
## Integration Points
|
|
|
|
### Claude Code ↔ Tractatus
|
|
|
|
**1. Tool Access Integration:**
|
|
- Tractatus uses Bash tool to run governance scripts
|
|
- Read/Write tools access `.claude/` directory for state
|
|
- Session state persisted across conversation compactions
|
|
|
|
**2. Framework Enforcement:**
|
|
- Pre-action checks before file operations
|
|
- Instruction classification on user input
|
|
- Pressure monitoring via token tracking
|
|
|
|
**3. Session Continuity:**
|
|
- `scripts/session-init.js` runs on session start/continuation
|
|
- `.claude/session-state.json` maintains active status
|
|
- Token checkpoints saved for resumption
|
|
|
|
---
|
|
|
|
### Tractatus ↔ MongoDB
|
|
|
|
**1. Rule Enforcement:**
|
|
- Governance services query `governance_rules` for enforcement
|
|
- Active rules loaded into memory for performance
|
|
- Rules can be dynamically updated via admin interface
|
|
|
|
**2. Audit Trail:**
|
|
- All governance actions logged to `audit_logs`
|
|
- Timestamp, service, action, rule_violated recorded
|
|
- Queryable for compliance and analysis
|
|
|
|
**3. Instruction Persistence:**
|
|
- InstructionPersistenceClassifier writes to `instruction_history`
|
|
- CrossReferenceValidator queries for conflicts
|
|
- HIGH persistence instructions remain active across sessions
|
|
|
|
---
|
|
|
|
## Deployment Architecture
|
|
|
|
### Production Environment
|
|
|
|
**Components:**
|
|
- **Docker Compose:** Orchestrates MongoDB + Node.js application
|
|
- **MongoDB 7.0:** Database with authentication and persistence
|
|
- **Node.js 18:** Application runtime with health checks
|
|
- **Systemd:** Process management on Linux servers
|
|
- **Nginx:** Reverse proxy with SSL termination (optional)
|
|
|
|
**Docker Services:**
|
|
```yaml
|
|
services:
|
|
mongodb:
|
|
image: mongo:7.0
|
|
volumes: [mongodb_data:/data/db]
|
|
healthcheck: [mongosh ping check]
|
|
|
|
tractatus-app:
|
|
build: [multi-stage Dockerfile]
|
|
ports: ["9000:9000"]
|
|
depends_on: [mongodb]
|
|
healthcheck: [/api/health check]
|
|
environment: [6 governance service toggles]
|
|
```
|
|
|
|
**Security:**
|
|
- Non-root container user (nodejs:1001)
|
|
- NoNewPrivileges, PrivateTmp, ProtectSystem
|
|
- Content Security Policy enforcement
|
|
- CORS protection
|
|
- Rate limiting
|
|
|
|
**See:** [Deployment Quickstart Kit](/downloads/tractatus-quickstart.tar.gz) for complete Docker deployment
|
|
|
|
---
|
|
|
|
## Performance Characteristics
|
|
|
|
### Overhead Measurements
|
|
|
|
**BoundaryEnforcer:** <5ms per check
|
|
**InstructionPersistenceClassifier:** <10ms classification + storage
|
|
**CrossReferenceValidator:** <15ms query + validation
|
|
**ContextPressureMonitor:** <5ms calculation
|
|
**MetacognitiveVerifier:** 50-200ms (complex operations only)
|
|
**PluralisticDeliberationOrchestrator:** Variable (depends on deliberation complexity, human-in-the-loop)
|
|
|
|
**Total Framework Overhead:** <10ms average per operation (excluding human deliberation time)
|
|
|
|
**Benchmark Results:**
|
|
- 223/223 tests passing
|
|
- 127 governance-sensitive scenarios validated
|
|
- 100% HIGH persistence instruction enforcement
|
|
- 0 false negatives in 27027 incident testing
|
|
|
|
---
|
|
|
|
## Scalability Considerations
|
|
|
|
### Horizontal Scaling
|
|
|
|
**Stateless Services:**
|
|
- API endpoints can be load-balanced
|
|
- MongoDB replica set for high availability
|
|
- Session state in database, not memory
|
|
|
|
**Bottlenecks:**
|
|
- MongoDB query performance (mitigated by indexes)
|
|
- Instruction history size (mitigated by archival)
|
|
|
|
---
|
|
|
|
### Vertical Scaling
|
|
|
|
**Memory Requirements:**
|
|
- Base application: 200-400 MB
|
|
- Per-session overhead: 10-50 MB
|
|
- MongoDB: 1-2 GB (moderate rule set)
|
|
|
|
**Recommended Resources:**
|
|
- Development: 2 GB RAM, 2 CPU cores
|
|
- Production: 4 GB RAM, 4 CPU cores
|
|
- Database: 10 GB disk minimum
|
|
|
|
---
|
|
|
|
## Complementarity with Claude Code
|
|
|
|
**Tractatus does NOT replace Claude Code. It extends it.**
|
|
|
|
### What Claude Code Provides
|
|
|
|
✓ Base LLM environment and context window
|
|
✓ Tool access (Bash, Read, Write, Edit)
|
|
✓ Session management and file operations
|
|
✓ Conversation history and compaction
|
|
✓ Multi-tool orchestration
|
|
|
|
### What Tractatus Adds
|
|
|
|
✓ Instruction persistence and classification
|
|
✓ Boundary enforcement for values decisions
|
|
✓ Pattern bias detection and prevention
|
|
✓ Context pressure monitoring
|
|
✓ Complex operation verification
|
|
✓ Pluralistic deliberation facilitation (multi-stakeholder, non-hierarchical)
|
|
✓ Comprehensive audit trail
|
|
✓ Governance rule management
|
|
|
|
### Integration Benefits
|
|
|
|
**Together:** Claude Code provides the foundation, Tractatus provides the guardrails
|
|
|
|
**Example:** Claude Code enables AI to edit files. Tractatus helps ensure AI doesn't violate explicit instructions or cross values boundaries when doing so.
|
|
|
|
---
|
|
|
|
## Document Metadata
|
|
|
|
<div class="document-metadata">
|
|
|
|
- **Version:** 1.0
|
|
- **Created:** 2025-10-12
|
|
- **Last Modified:** 2025-10-13
|
|
- **Author:** Tractatus Framework Team
|
|
- **Word Count:** 2,120 words
|
|
- **Reading Time:** ~11 minutes
|
|
- **Document ID:** technical-architecture
|
|
- **Status:** Active
|
|
|
|
</div>
|
|
|
|
---
|
|
|
|
## License
|
|
|
|
Copyright 2025 John Stroh
|
|
|
|
Licensed under the European Union Public Licence, Version 1.2 (the "Licence"); you may not use this file except in compliance with the Licence. You may obtain a copy of the Licence at:
|
|
|
|
https://interoperable-europe.ec.europa.eu/collection/eupl/eupl-text-eupl-12
|
|
|
|
Unless required by applicable law or agreed to in writing, software distributed under the Licence is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the Licence for the specific language governing permissions and limitations under the Licence.
|
|
|
|
**Full Licence Text:**
|
|
|
|
For the full EUPL-1.2 licence text, see:
|
|
https://interoperable-europe.ec.europa.eu/collection/eupl/eupl-text-eupl-12
|
|
|
|
The EUPL-1.2 is available in 23 official EU-language versions at the same source.
|
|
|
|
---
|
|
|
|
## Related Documentation
|
|
|
|
- [Implementation Guide](/docs/markdown/implementation-guide.md) - How to deploy and configure
|
|
- [Core Concepts](/docs/markdown/core-concepts.md) - Governance framework concepts
|
|
- [Case Studies](/docs/markdown/case-studies.md) - Real-world failure mode examples
|
|
- [Deployment Quickstart](/downloads/tractatus-quickstart.tar.gz) - 30-minute Docker deployment
|
|
|
|
---
|
|
|
|
## Technical Support
|
|
|
|
**Documentation:** https://agenticgovernance.digital/docs
|
|
**GitHub:** https://codeberg.org/mysovereignty/tractatus-framework
|
|
**Email:** research@agenticgovernance.digital
|
|
**Interactive Demos:** https://agenticgovernance.digital/demos
|
|
|
|
---
|
|
|
|
**Version:** 1.0
|
|
**Last Updated:** October 12, 2025
|
|
**Maintained By:** Tractatus Framework Team
|