ADAAD — Autonomous Development & Adaptation Architecture: governance-first constitutional AI evolution runtime
Project description
What ADAAD is
ADAAD is a constitutionally governed autonomous code evolution runtime.
It proposes mutations to its own source code, red-team tests them, scores them against constitutional rules, runs them in a zero-write shadow harness, checks them against a formally encoded self-model, and requires your cryptographic sign-off before anything critical ships — with every decision sealed in a tamper-evident hash-chained ledger.
The governance stack is not a policy layer. It is the only promotion path. There is no bypass. That is the point.
Who it's for: AI teams, research labs, and enterprises that need to run autonomous AI evolution with auditable, deterministic, human-governed provenance — and need to prove it to auditors, regulators, or acquirers.
Core guarantees
These are not documentation claims. They are runtime-enforced invariants. Violating them aborts the epoch.
| Guarantee | Enforcement | Invariant |
|---|---|---|
| Every epoch produces a verifiable evidence hash | SHA-256 hash-chained append-only ledger | CEL-EVIDENCE-0 |
| Mutations are byte-identical replayable from original inputs | No datetime.now() / random() in constitutional paths |
CEL-REPLAY-0 |
| Step ordering cannot be bypassed or skipped | Runtime sequence check — out-of-order aborts | CEL-ORDER-0 |
| Governance gate is the sole promotion path | GovernanceGateV2 is wired as the only path |
GOV-SOLE-0 |
| Shadow harness writes nothing to production | Zero-write enforcement + egress detection | LSME-0 |
| Red Team cannot approve its own challenges | Structural constraint — PASS or RETURNED only | AFRT-0 |
| Identity check never blocks an epoch | Fail-open with fallback score injection | MMEM-0 |
| Critical mutations require GPG-signed human key | Architecturally enforced — not a config option | HUMAN-0 |
| Import boundaries block unauthorized dependencies | Static enforcement — violations block merge | AST-IMPORT-0 |
| All 125 Hard-class invariants enforced at runtime | Epoch aborts on violation — no silent failures | 125 invariants |
→ Full invariants matrix · Constitution → Active canonical spec
The mutation pipeline
Every proposed change traverses all 9 gates in strict order. CEL-ORDER-0 enforces this at runtime. There is no skip path, no override flag, no configuration that changes this.
Step-by-step breakdown
Phase 0d — Identity Check (INNOV-10)
IdentityContextInjector consults the IdentityLedger — a hash-chained, HUMAN-0-attested self-model containing 8 founding IdentityStatements. Injects identity_consistency_score into CodebaseContext before any proposal is generated. Proposals contradicting the system's self-model are flagged at the root. Never blocks epoch (MMEM-0).
Phase 1 — Proposal
Claude-powered agents (Architect · Dream · Beast) generate MutationCandidates. Identity score is in context. Bandit selector routes to the highest-performing agent based on prior epoch outcomes.
Phase 2–3 — Adversarial Red Team (INNOV-08)
AdversarialRedTeamAgent queries CodeIntelModel for uncovered code paths, generates up to 5 targeted adversarial cases, and runs each in a read-only sandbox. AFRT-0: the agent cannot approve — structural constraint, not policy. Output: PASS or RETURNED.
Phase 4 — Constitutional Scoring
FitnessEngineV2 scores against 7 fitness signals plus identity_consistency (8th). All 27 runtime-enforced constitutional rules checked. Rule violation halts epoch immediately.
Phase 5 — Live Shadow Execution (INNOV-07)
Zero-write shadow harness runs mutation against real traffic patterns. ShadowFitnessReport: divergence rate · error delta · P99 latency. Regression on any signal = hard block. Independent of fitness score.
Phase 6 — Governance Gate
GovernanceGateV2 evaluates the full evidence package — fitness scores, shadow report, red-team verdict, identity score, determinism check, lineage validity. All prior gates must pass. Verdict: APPROVED · RETURNED · BLOCKED.
Phase 7 — Human Sign-off (Tier 0)
For critical mutations, GPG-signed approval from the governor (HUMAN-0: Dustin L. Reid) is required. The system is architecturally incapable of promoting Tier 0 mutations without it. Not a setting.
Phase 8 — Ledger Commit
Every decision — pass, fail, return, block — is SHA-256 hash-chained into the append-only ScoringLedger. One altered entry breaks every subsequent hash. History cannot be rewritten. Any attempt is immediately detectable.
Phase 9 — Cryptographic Proof DAG (INNOV-06) Full mutation lineage Merkle-rooted. Every causal ancestor cryptographically linked. Independently verifiable without system access. Legal-grade provenance for auditors, regulators, patent counsel.
Architecture
ADAAD runs a 16-step Constitutional Evolution Loop (CEL) on every proposed change. Three AI agents — Architect (structural reasoning), Dream (mutation generation), and Beast (performance pressure) — apply constitutional rules at different steps. No single agent can approve a change.
Module map and boundary contracts
Runtime layer — runtime/
| Module | Role |
|---|---|
evolution/evolution_loop.py |
Orchestrates the 16-phase epoch. Phase 0d MMEM wire lives here. |
evolution/constitutional_evolution_loop.py |
16-step CEL dispatch. Calls GovernanceGate, AFRT, LSME. |
evolution/fitness_v2.py |
FitnessEngineV2 — 8-signal scoring including identity. |
memory/identity_ledger.py |
Hash-chained HUMAN-0-gated IdentityLedger. MMEM-0/CHAIN-0/LEDGER-0. |
memory/identity_context_injector.py |
Phase 0d wiring. Never raises. |
lineage/lineage_ledger_v2.py |
Second-gen lineage store with MMEM co-commit surface. |
capability_graph.py |
Tracks module capability contracts. No __import__ — enforced. |
Governance layer — security/
| Module | Role |
|---|---|
security/ledger/governance_events.jsonl |
Hash-chained HUMAN-0 sign-off events. |
security/ledger/scoring.jsonl |
All epoch governance decisions. Append-only. |
config/constitution.yaml |
27 runtime-enforced constitutional rules v0.9.0. |
Import boundary contract
All module-to-module imports must cross defined seams. Violations are caught by scripts/check_spdx_headers.py and AST-IMPORT-0 CI gate. Adding a direct cross-layer import without updating the boundary contract blocks the PR.
Every file must carry # SPDX-License-Identifier: Apache-2.0. Missing headers are a merge blocker.
Agent roles — Architect · Dream · Beast
Architect — Structural reasoning. Long-term maintainability, clean architecture, reducing technical debt. Proposes mutations that improve code organization without sacrificing fitness.
Dream — Creative mutation generation. Experimental approaches, novel capability surfaces, capability gap identification. Higher exploration rate.
Beast — Performance pressure. Throughput, efficiency, bottleneck elimination. Penalizes complexity that doesn't buy fitness.
All three are Claude-powered and selected per epoch by the AgentBanditSelector (INNOV multi-armed bandit) based on prior win/loss ratios. No single agent controls the outcome. The governance gate is the only promotion authority.
Proven milestones — not roadmap promises
These events happened. The evidence is hash-chained in the ledger.
⛓ March 13, 2026 — First autonomous self-evolution (Phase 65)
ADAAD identified its own highest-priority capability gap, generated a mutation, ran a sandboxed fitness tournament, scored it against constitutional rules, applied it, and sealed the proof in the ledger. Zero human intervention in the execution path. Full human control of the constitutional framework.
🌱 March 20, 2026 — First governed seed epoch (Phase 77)
A capability seed flowed through all 7 governed stages — proposal, human review, CEL injection, constitutional loop, ledger-anchored outcome — producing a cryptographic proof linking every step back to its origin. The loop is closed.
◈ March 22, 2026 — CEL live in production (Phase 89)
Real Claude-generated proposals flowing through all 16 constitutional steps in production. Not a test harness.
🧭 March 23, 2026 — Cryptographic Evolution Proof DAG (Phase 90 · INNOV-06)
Every mutation cryptographically bound to all causal ancestors via Merkle root. Independently verifiable without system access. Legal-grade provenance for auditors, regulators, and patent counsel.
🛡 March 24, 2026 — Live Shadow Mutation Execution (Phase 91 · INNOV-07)
Zero-write shadow harness against real traffic. ShadowFitnessReport: divergence rate · error delta · P99 latency. Must survive shadow execution and governance gate to advance.
⚔ March 27, 2026 — Adversarial Red Team as a Constitutional Gate (Phase 92 · INNOV-08)
Every proposal challenged by AdversarialRedTeamAgent before governance scoring. Finds uncovered code paths, fires targeted adversarial cases. AFRT-0: cannot approve — PASS or RETURNED only. Structurally enforced.
🎨 March 27, 2026 — Aesthetic Fitness Signal (Phase 93 · INNOV-09)
Code readability scored across 5 AST axes (function length · name entropy · nesting depth · comment density · cyclomatic complexity) as a constitutionally-bounded, weighted fitness signal. AFIT-WEIGHT-0: weight bounded [0.05, 0.30]. Technical debt is now measurable and governed.
🧬 March 28, 2026 — Morphogenetic Memory (Phase 94 · INNOV-10)
IdentityLedger — 8 founding IdentityStatements (IS-001..IS-008), hash-chained, HUMAN-0-attested. IdentityContextInjector fires Phase 0d before proposals are generated. Injects identity_consistency_score. Proposals contradicting the system's self-model flagged before they're written. First system to ask: is this mutation consistent with what this system believes itself to be?
Why you can trust the claims
Every property below is mechanically enforced at runtime.
⛓ Tamper-evident ledger — Every event is SHA-256 hash-chained. Alter one entry and every subsequent hash breaks. History cannot be rewritten.
♻️ Deterministic replay — Any prior epoch can be re-run from its original inputs and produce byte-identical results. No datetime.now(), no random.random() in constitutional paths. CEL-REPLAY-0.
📜 Constitutional gate — 27 runtime-enforced rules. Rule violation halts epoch. No config option changes this.
⚔️ Adversarial red-team gate — Every mutation challenged before scoring. Cannot approve. AFRT-0.
🛡 Shadow execution gate — Zero-write harness before live promotion. LSME-0.
🔬 Identity gate — Self-model consulted before proposals are generated. MMEM-0.
🗺 Cryptographic lineage — Merkle-rooted proof DAG. Independently verifiable. CEPD-0.
🔑 Human authority is structural — GPG key required for Tier 0. Not configurable. HUMAN-0.
🚧 125 Hard-class invariants — Cannot be disabled, configured around, or violated without epoch abort.
→ Read the Constitution · Trust Center · Security Invariants Matrix
30 shipped world-first innovations — pipeline complete
Full innovation index
| # | Innovation | Phase | Core claim |
|---|---|---|---|
| INNOV-01 | Constitutional Self-Amendment (CSAP) | 87 | ADAAD proposes amendments to its own rules — unconditional human ratification required |
| INNOV-02 | Adversarial Constitutional Stress (ACSE) | 87 | Dedicated agent attempts to violate every constitutional rule to stress-test governance |
| INNOV-03 | Temporal Invariant Forecasting (TIFE) | 87 | Predicts which invariants will likely be violated in future epochs before they fail |
| INNOV-04 | Semantic Drift Detection (SCDD) | 88 | Detects when constitutional behaviour drifts from its historical baseline |
| INNOV-05 | Autonomous Organ Emergence (AOEP) | 89 | Proposes entirely new architectural organs to close capability gaps — human ratification required |
| INNOV-06 | Cryptographic Evolution Proof DAG (CEPD) | 90 | Full lineage Merkle-rooted · independently verifiable · legal-grade provenance |
| INNOV-07 | Live Shadow Mutation Execution (LSME) | 91 | Zero-write shadow harness · real traffic · hard block on regression |
| INNOV-08 | Adversarial Fitness Red Team (AFRT) | 92 | Red Team gate before scoring · cannot approve · PASS or RETURNED only |
| INNOV-09 | Aesthetic Fitness Signal (AFIT) | 93 | Code readability as a constitutionally-bounded, weighted fitness dimension |
| INNOV-10 | Morphogenetic Memory (MMEM) | 94 | Hash-chained self-model consulted pre-proposal · detects identity drift at root |
| INNOV-11 | Cross-Epoch Dream State Engine (DSTE) | 96 | Speculative mutation rehearsal across epoch boundaries — never touches production |
| INNOV-12 | Mutation Genealogy Visualization (MGV) | 97 | Full lineage graph for every mutation from proposal to terminal outcome |
| INNOV-13 | Inter-Model Knowledge Transfer (IMT) | 98 | Signed capability transfer protocol — cryptographically verified cross-agent learning |
| INNOV-14 | Constitutional Jury System (CJS) | 99 | Multi-agent constitutional jury decides contested mutations — no single-agent approval |
| INNOV-15 | Agent Reputation Staking (ARS) | 100 | Agents stake reputation on proposals · slashed on failure · chain-verified ledger |
| INNOV-16 | Emergent Role Specialization (ERS) | 101 | Agents self-specialize into constitutional roles based on performance history |
| INNOV-17 | Agent Post-Mortem Interviews (APM) | 102 | Every terminated agent answers structured constitutional debrief before teardown |
| INNOV-18 | Temporal Governance Windows (TGOV) | 103 | Health-adaptive rule severity — non-critical rules soften during high-health epochs |
| INNOV-19 | Governance Archaeology Mode (GAM) | 104 | Cryptographically verified decision timeline reconstruction for any mutation_id |
| INNOV-20 | Constitutional Stress Testing (CST) | 105 | Adversarial scenario catalogue — append-only gap ledger feeds invariant discovery |
| INNOV-21 | Governance Bankruptcy Protocol (GBP) | 106 | Bounded bankruptcy state machine — discharge progression monotonic, re-entry blocked |
| INNOV-22 | Mutation Conflict Framework (MCF) | 107 | Constitutional conflict detection · severity stratification · HUMAN-0 escalation advisory |
| INNOV-23 | Constitutional Epoch Sentinel (CES) | 108 | Anticipatory warning emission before Hard-class invariant breach — world-first |
| INNOV-24 | Sovereign Validation Plane (SVP) | 109 | Independent constitutional validation layer operating outside the core mutation pipeline |
| INNOV-25 | Hardware-Adaptive Fitness (HAF) | 110 | Fitness scoring dynamically calibrated to available hardware resource envelope |
| INNOV-26 | Constitutional Entropy Budget (CEB) | 111 | Rate-limits constitutional drift — 30% rule-change threshold triggers double-HUMAN-0 |
| INNOV-27 | Mutation Blast Radius Modeling (BLAST) | 112 | Formal reversal cost estimation before acceptance — safety bounded by constitution |
| INNOV-28 | Self-Awareness Invariant (SELF-AWARE) | 113 | No mutation may reduce system self-monitoring observability — transparency is constitutional |
| INNOV-29 | Curiosity-Driven Exploration (CURIOSITY) | 114 | Inverted-fitness exploration every 25 epochs · hard constitutional stops prevent catastrophe |
| INNOV-30 | The Mirror Test (MIRROR) | 115 | Historical proposal prediction audit every 50 epochs · low accuracy triggers calibration epoch |
All 30 innovations shipped. Pipeline complete as of April 4, 2026. Full specifications: ADAAD_30_INNOVATIONS.md
What you control vs. what the system handles
| What only you can do | What ADAAD handles autonomously |
|---|---|
| 🔑 GPG-sign Tier 0 changes | Generate mutation proposals via Claude |
| 🌱 Approve seed promotions | Red-team challenge every proposal before scoring |
| 📜 Set constitutional rules | Shadow-execute mutations in zero-write harness |
| 🏷 Tag version ceremonies | Score against 27 constitutional rules |
| ⚙️ Ratify new Hard-class invariants | Hash-chain every decision into the ledger |
🧬 Amend IdentityLedger statements |
Consult self-model before every proposal (MMEM) |
| 📋 Patent and IP decisions | Build cryptographic evolution proof DAGs |
| ✅ GA sign-off | Mine failure patterns and propose new invariants |
Quickstart
One command
git clone https://github.com/InnovativeAI-adaad/adaad.git
cd adaad
python onboard.py
onboard.py sets up your environment, validates governance schemas, and runs a governed dry-run. Safe to re-run any time.
What success looks like:
✔ Python 3.12.x
✔ Virtual environment created (.venv)
✔ Dependencies installed
✔ Governance schemas valid
✔ Dry-run complete (fail-closed behaviour confirmed)
Run the dashboard python server.py
Run an epoch python -m app.main --verbose
Strict replay python -m app.main --replay strict --verbose
Deterministic environment (reproducible evidence hashes)
# Create venv with pinned Python
python3.12 -m venv .venv && source .venv/bin/activate
# Install editable + dev extras
pip install -e .[dev]
# Set deterministic env — required for byte-identical replay
export ADAAD_SEED=42
export PYTHONHASHSEED=0
# Validate workspace and run epoch
python nexus_setup.py --validate-only
python -m app.main --replay audit --verbose
If your evidence hash differs from expected:
- Confirm
python --versionmatches — minor version matters - Confirm
PYTHONHASHSEED=0is set in your shell - Confirm deps were installed with
--no-deps(no transitive upgrades) - Run
scripts/check_replay_keyring_secrets.pyfor environment diff - Run
git status— any local changes will diverge the hash
Platform-specific setup
| Platform | Method |
|---|---|
| Linux / macOS | pip install adaad or clone above |
| Windows | pip install adaad (WSL2 for sandbox) |
| Android (Termux) | TERMUX_SETUP.md |
| Android (Pydroid 3) | INSTALL_ANDROID.md |
| Docker | docker pull ghcr.io/innovativeai-adaad/adaad |
Constitutional governance should not depend on cloud infrastructure. ADAAD's safety properties come from SHA-256 hash chains and the Python runtime — not from cloud KMS, Kubernetes, or any third-party service.
Replay and audit
Every governance decision ADAAD makes is replayable and verifiable from first principles.
Verify an epoch
# Run an epoch with audit output
python -m app.main --replay audit --verbose
# Output includes:
# epoch_id : unique identifier
# evidence_hash : sha256 of the full epoch evidence package
# mutations_applied
# governance_decisions: [APPROVED|RETURNED|BLOCKED] per candidate
Replay a specific epoch
# Strict replay — must produce byte-identical evidence hash
python -m app.main --replay strict --epoch-id <epoch_id> --verbose
# If replay diverges, it is a blocking integrity signal.
# Check: same Python version, same PYTHONHASHSEED, same deps.
Inspect mutation lineage
# Verify the hash chain of the scoring ledger
python -c "
from runtime.lineage.lineage_ledger_v2 import LineageLedgerV2
ledger = LineageLedgerV2()
print('Chain valid:', ledger.verify_chain())
print('Events:', len(ledger.events()))
"
Verify the IdentityLedger chain
python -c "
from runtime.memory.identity_ledger import IdentityLedger
ledger = IdentityLedger.load_genesis()
print('Chain valid:', ledger.verify_chain())
print('Statements:', len(ledger))
for s in ledger.statements():
print(f' {s.statement_id}: {s.statement[:60]}...')
"
Confirm no unauthorized imports
python scripts/check_spdx_headers.py
# All files must carry: # SPDX-License-Identifier: Apache-2.0
# Violations are printed and cause CI failure.
Governance in 60 seconds
ADAAD evolves through numbered phases. Each phase ships a specific capability, registers findings, resolves them with evidence, and chains a governance ledger entry before merge.
Recent phases
| Phase | Innovation | Invariants added | Status |
|---|---|---|---|
| 107 | Mutation Conflict Framework (MCF) · INNOV-22 | MCF-0..7 | ✅ Shipped |
| 108 | Constitutional Epoch Sentinel (CES) · INNOV-23 | CES-0..7 | ✅ Shipped |
| 109 | Sovereign Validation Plane (SVP) · INNOV-24 | SVP-0..7 | ✅ Shipped |
| 110 | Hardware-Adaptive Fitness (HAF) · INNOV-25 | HAF-0..7 | ✅ Shipped |
| 111 | Constitutional Entropy Budget (CEB) · INNOV-26 | CEB-0..7 | ✅ Shipped |
| 112 | Mutation Blast Radius Modeling (BLAST) · INNOV-27 | BLAST-0..7 | ✅ Shipped |
| 113 | Self-Awareness Invariant (SELF-AWARE) · INNOV-28 | SELF-AWARE-0..7 | ✅ Shipped |
| 114 | Curiosity-Driven Exploration (CURIOSITY) · INNOV-29 | CURIOSITY-0..7 | ✅ Shipped |
| 115 | The Mirror Test (MIRROR) · INNOV-30 | MIRROR-0..7 | ✅ Shipped 🏁 |
Governance event chain
Every HUMAN-0 sign-off is recorded in security/ledger/governance_events.jsonl as a hash-chained event. Chain verification:
python -c "
import json, hashlib
events = [json.loads(l) for l in open('security/ledger/governance_events.jsonl')]
print(f'Governance events: {len(events)}')
print(f'Latest: {events[-1][\"event_id\"]}')
print(f'Latest hash: {events[-1][\"event_hash\"][:32]}...')
"
How a phase ships (contributor reference)
- ArchitectAgent produces a specification for the phase
- MutationAgent implements on a
feature/phase<N>-*branch - TIER 0 invariant checks pass +
pytestgreen + no regressions - HUMAN-0 signs off verbally (
Approved. All signed: Dustin L. Reid) --no-ffmerge to main (lineage preserved — mandatory)- CHANGELOG entry + VERSION bump + semantic GPG-signed tag
- Agent state updated + governance ledger event chained
- Push
For contributors
Required reading before opening any PR
- CONTRIBUTING.md — development setup, PR flow, required checks
- docs/CONSTITUTION.md — 27 constitutional rules, governance philosophy
- docs/governance/V8_CONSTITUTIONAL_INVARIANTS_MATRIX.md — all Hard-class invariants
Local checks before every PR
# 1. Tests — all must pass
pytest --tb=short -q
# 2. SPDX headers — all source files
python scripts/check_spdx_headers.py
# 3. Import boundaries
python scripts/check_dependency_baseline.py
# 4. License check
python scripts/check_licenses.py
# 5. Replay integrity
python -m app.main --replay audit --verbose
# 6. Workspace validation
python nexus_setup.py --validate-only
PR evidence requirements
Every governance-impacting PR must include in its description:
- Branch name:
feature/phase<N>-<descriptor>orfix/phase<N>-<descriptor> - Test count: number of new tests added
- Invariants: any new Hard-class invariants introduced
- Evidence hash: from a local epoch run
- HUMAN-0 sign-off: governor approval before merge
PRs without evidence artifacts are returned, not merged.
How to propose a new innovation
- Open a discussion with the
[INNOV-PROPOSAL]label - Include: problem statement, proposed mechanism, invariants required, test coverage plan
- ArchitectAgent reviews and produces a formal specification
- HUMAN-0 ratifies the specification
- Phase number is assigned and added to the procession
- Implementation proceeds on a feature branch per the governance flow above
Security and trust center
SPDX enforcement — Every source file must carry # SPDX-License-Identifier: Apache-2.0. Missing headers block merge via CI.
Import boundary enforcement — Module seams are defined and enforced. Cross-layer imports without boundary contract updates block merge via AST-IMPORT-0.
Replay divergence — Any divergence from expected evidence hash is treated as a blocking integrity signal. Not a warning. A block.
Key management — HUMAN-0 GPG key (4C95E2F99A775335B1CF3DAF247B015A1CCD95F6) signs all release tags and Tier 0 governance events. Key is not stored in this repository.
IdentityLedger attestation — ILA-94-2026-03-28-001 attests the genesis seed terminal hash 3f5706.... External auditors can verify independently.
Report security issues via the issue template SECURITY.md. Do not open public issues for vulnerability reports.
→ Full Trust Center · Compliance Pack
Live system stats
Mythic identity
The ADAAD system uses named operational roles. These are runtime roles, not marketing.
| Name | Role |
|---|---|
| Architect | Structural mutation agent. Prioritizes maintainability and constitutional alignment. |
| Dream | Exploratory mutation agent. Novel approaches, capability gap identification. |
| Beast | Performance mutation agent. Throughput, efficiency, bottleneck pressure. |
| Cryovant | Identity and device-anchoring layer. Session tokens, audit signatures, trust anchoring. |
| Aponi | Governance dashboard. Audit UI, mutation lineage viewer, live epoch status. |
| HUMAN-0 | The governor role. Dustin L. Reid. Holds GPG key. Ratifies constitutional changes. |
ADAAD names clarify runtime roles and UX flows. They are not APIs and not marketing personas.
Enterprise and commercial use
Commercial documentation suite
| Resource | What it is |
|---|---|
| Pricing Model | Seat-based, usage-based, and hybrid SKUs |
| Procurement Fast-Lane | Day-0 checklist, DPA/MSA fallback clauses, security Q&A — designed for 5-day close |
| SLO / SLA Sheet | Reliability targets and support tier commitments |
| Compliance Pack | Data handling, access control matrix, incident response |
| Trust Center | Security posture and governance assurance artifacts |
| Certification Program | Operator · Governance Engineer · Enterprise Administrator |
| Partner Program | Integrator and consultancy onboarding |
| Data Room Index | Due-diligence artifact map |
| ROI Model | Value quantification framework for governance automation |
What ADAAD is not
- ❌ Not a code assistant — it doesn't autocomplete your code or answer questions
- ❌ Not CI/CD — it governs the mutation process, not the build pipeline
- ❌ Not fully autonomous — your sign-off is constitutionally required for critical changes
- ❌ Not a security scanner — it enforces mutation governance, not vulnerability detection
- ❌ Not magic — every decision is logged, hash-chained, replayable, and explainable
FAQ
Is this actually running autonomously?
Yes. Phase 65 (March 13, 2026) was the first epoch where ADAAD identified a capability gap, generated a mutation, ran it through all fitness and governance layers, and applied it with zero human intervention in the execution path. Phase 89 activated live LLM proposals in production.
Human oversight is structural, not optional. Dustin L. Reid holds the governor role. Any Tier 0 mutation requires his GPG-signed approval. That is not configurable.
What makes this different from just running tests in CI?
CI tests whether known code passes known assertions. ADAAD governs whether changes to the codebase itself are constitutionally valid, adversarially stress-tested, fitness-improving, and deterministically replayable.
You can delete your CI history. You cannot alter ADAAD's ledger.
ADAAD actively challenges its own proposals via adversarial red-team agents, checks them against its encoded self-model, and runs them through zero-write shadow execution before they reach production. No CI system does this. No CI system has constitutional rules it's bound by. No CI system produces a cryptographic proof of its evolutionary lineage.
How does the adversarial Red Team work?
Every mutation proposal is handed to AdversarialRedTeamAgent before fitness scoring. It queries CodeIntelModel for code paths the proposing agent didn't cover, then generates up to five targeted adversarial cases. Each runs in a read-only sandbox.
If any case falsifies the proposal, it's returned with a RedTeamFindingsReport. AFRT-0: the agent cannot approve — structurally enforced in code, not policy. Its only outputs are PASS or RETURNED.
What is Morphogenetic Memory?
MMEM (INNOV-10, Phase 94) is a formally encoded architectural self-model: a hash-chained, HUMAN-0-gated, append-only IdentityLedger containing founding IdentityStatements that define what ADAAD believes itself to be.
Before every epoch's proposals are generated (Phase 0d), the IdentityContextInjector consults the ledger and injects identity_consistency_score into CodebaseContext. This score is available to all downstream stages.
It answers the question no prior gate could ask: is this mutation consistent with what this system believes itself to be?
What are the 30 shipped innovations?
INNOV-01 through INNOV-30 shipped across v9.18.0–v9.48.0 (Phases 87–115): Constitutional Self-Amendment (CSAP), Adversarial Constitutional Stress (ACSE), Temporal Invariant Forecasting (TIFE), Semantic Drift Detection (SCDD), Autonomous Organ Emergence (AOEP), Cryptographic Evolution Proof DAG (CEPD), Live Shadow Mutation Execution (LSME), Adversarial Fitness Red Team (AFRT), Aesthetic Fitness Signal (AFIT), Morphogenetic Memory (MMEM), Cross-Epoch Dream State Engine (DSTE), Mutation Genealogy Visualization (MGV), Inter-Model Knowledge Transfer (IMT), Constitutional Jury System (CJS), Agent Reputation Staking (ARS), Emergent Role Specialization (ERS), Agent Post-Mortem Interviews (APM), Temporal Governance Windows (TGOV), Governance Archaeology Mode (GAM), Constitutional Stress Testing (CST), Governance Bankruptcy Protocol (GBP), Mutation Conflict Framework (MCF), Constitutional Epoch Sentinel (CES), Sovereign Validation Plane (SVP), Hardware-Adaptive Fitness (HAF), Constitutional Entropy Budget (CEB), Mutation Blast Radius Modeling (BLAST), Self-Awareness Invariant (SELF-AWARE), Curiosity-Driven Exploration (CURIOSITY), and The Mirror Test (MIRROR).
Pipeline complete as of April 4, 2026. Full specifications: ADAAD_30_INNOVATIONS.md
Why does it run on a $200 Android phone?
Constitutional governance should not require enterprise infrastructure. ADAAD's safety properties come from SHA-256 hash chains and the Python runtime — not cloud KMS, Kubernetes, or any third-party service. If those go away, so do your safety guarantees. ADAAD's guarantees are local, deterministic, and yours.
How do I evaluate ADAAD for enterprise procurement?
Start with the Trust Center. The Procurement Fast-Lane package is designed to complete security and legal review within 5 business days. A Certification Program is available for operators, governance engineers, and enterprise administrators.
Roadmap
🏁 Pipeline complete — All 30 innovations shipped (Phases 87–115 · v9.18.0–v9.48.0 · April 4, 2026).
Next gate — v1.1-GA release candidate. Active GA blocker: FINDING-66-004 — 2-of-3 Ed25519 key ceremony (HUMAN-0 action required).
Long term — Cross-device federation with deterministic consensus, device-anchored mobile runtime, enterprise GA v1.1 certification.
→ Full roadmap · 30 Innovations specification
Built by Innovative AI LLC · Governor: Dustin L. Reid · Blackwell, Oklahoma
The next wave of AI isn't AI that writes your code. It's AI that governs itself while writing your code — and can prove it.
⚡ Get Started · 📜 Constitution · 📖 Thesis · 🗺 Roadmap · 🏛 Trust Center
Build without limits. Govern without compromise.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file adaad-9.50.0.tar.gz.
File metadata
- Download URL: adaad-9.50.0.tar.gz
- Upload date:
- Size: 1.5 MB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.10.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
07cd95718b25c56ca139357ce5228efe22485b001726016fbea25af98932ce9e
|
|
| MD5 |
4a614f13216415f804e762708cc614bf
|
|
| BLAKE2b-256 |
63a8f18094a4b5a8dd93257d94aea2a5813fc9547b52dc3eeacda15168a8eda6
|
File details
Details for the file adaad-9.50.0-py3-none-any.whl.
File metadata
- Download URL: adaad-9.50.0-py3-none-any.whl
- Upload date:
- Size: 1.3 MB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.10.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
aae6637c205c64e57b1245dde883264e107b1de0bde0130a15a12bca7a9663ef
|
|
| MD5 |
660dffc36ae0e2c64e770104565b6209
|
|
| BLAKE2b-256 |
768fc038ba8d0f25a6ff0257f40efd68a2c8b0761a393c56a80208e6018c045f
|