Skip to main content

ADAAD — Autonomous Development & Adaptation Architecture: governance-first constitutional AI evolution runtime

Project description

ADAAD Hero Banner


⚡ Quickstart  ·  📜 Constitution  ·  🗺 Roadmap  ·  📖 Thesis  ·  🕵️ DORK  ·  🏛 Trust Center  ·  ✅ Verifiable Claims  ·  📋 Changelog


Apache 2.0 Python 3.12 v9.75.0 231 Invariants GitHub commit activity

Governance & Determinism Guarantees (Current State)

  • ADAAD_DETERMINISTIC_LOCK: enabled
  • ADAAD_DISPATCH_LATENCY_BUDGET_MS: 250
  • Release evidence and gate status are validated via repository governance scripts before promotion.

Section Divider

The only AI system that governs its own evolution — and can prove it.

ADAAD is not a tool you run. It is a system that runs itself — within constitutional boundaries you set, sign, and own.

Every mutation is proposed by AI agents, challenged by an adversarial red team, shadow-executed against live traffic, scored across 231 constitutional invariants, and sealed with a cryptographic proof chain before it can touch production. Your GPG key is the only key that unlocks critical changes. That is not configurable.

Section Divider

🌍 World's firsts — verified, replayable, publicly auditable

These aren't design goals. They are shipped, hash-chained, GPG-attested milestones. Each one has a ledger entry and replay instructions below.

# Claim Evidence
1 First constitutionally governed autonomous codebase to self-evolve in production → Phase 65
2 First 16-gate Constitutional Evolution Loop with cryptographic proof per mutation → CEL
3 First non-bypassable GovernanceGate as a constitutional primitive (GOV-SOLE-0) → Architecture
4 First adversarial red-team agent structurally incapable of approving its own challenges (AFRT-0) → INNOV-08
5 First hash-chained identity self-model consulted before every mutation proposal (MMEM-0) → INNOV-10
6 First constitutional jury requiring 2-of-3 multi-agent verdict for high-stakes mutations (CJS-0) → INNOV-14
7 First AI system with a meta-governance entropy budget governing its own constitutional change velocity (CEB-0) → INNOV-26
8 First autonomous governance kernel extractable as a standalone semver-managed package (adaad-core) → Phase 124
8b First constitutionally governed community amendment pipeline — structurally incapable of autonomous constitutional change (COMMUNITY-HUMAN0-0) → Phase 125
9 First governed AI system with SELF-AWARE-0: no mutation may reduce self-monitoring observability → INNOV-28
10 First AI to pass its own constitutional self-recognition test before promotion (mirror_test.py) → INNOV-30
11 First governed AI codebase designed to run fully locally on a $200 Android phone → Android
12 First autonomous system with deterministic audit sandbox for one-command third-party verification → INNOV-36
13 First constitutionally governed Red-Team Response Engine with HUMAN-0-gated amendment routing (GRRP) → INNOV-37
14 First adversarially-driven constitutional self-amendment engine with cryptographic provenance (ACSA) → INNOV-38
15 First governed agent coalition formation system with proportional stake redistribution (ACF) → INNOV-39
16 First cryptographically provenance-tracked cross-epoch agent behavioral profile transfer (CELT) → INNOV-40
17 First constitutional fail-closed LLM provider fleet with hash-chained conversation ledger (DORK Living Fleet) → INNOV-41
18 First self-healing LLM provider fleet wired as a governed constitutional subsystem with fsync-persistent ledger (DFSB) → INNOV-42
19 First versioned, rollback-capable constitutional snapshot ledger with chain-linked hash provenance (CVR) → INNOV-43
20 First live invariant co-fire interaction graph with HUMAN-0-gated topology amendment pipeline (IIG) → INNOV-45
21 First constitutional canary deployment gate with shadow-mirror harness and automatic rollback on regression (CMD) → INNOV-46
22 First governed AI system to reach 0 open findings after full security audit — with 2-of-3 Ed25519 threshold key ceremony executed → Phase 140
23 First local LLM with a constitutionally governed, auto-updating knowledge corpus synchronized from the live codebase at every phase boundary (LKSE) → INNOV-47
24 First constitutionally governed local LLM retrieval engine with pure-Python semantic cosine similarity search, deterministic TF-IDF fallback, and session-locked embedding dimensions — zero native dependencies (CSS) → INNOV-48

Section Divider

What ADAAD is

ADAAD is a constitutionally governed autonomous code evolution runtime.

It runs a continuous loop: propose → challenge → shadow-execute → score → gate → prove → ledger. Every pass through this loop produces a cryptographic evidence artifact. Every artifact is hash-chained to every prior artifact. Every critical decision requires your GPG-signed sign-off. There is no side channel.

ADAAD is not a copilot, not CI/CD, not an agent that writes features for you. It is a runtime that governs whether mutations to its own codebase are constitutionally valid — and keeps the ledger to prove it.

ADAAD evolves code.
The Constitution governs evolution.
You govern the Constitution.
The ledger is tamper-evident.

Section Divider

Enforced guarantees

These are runtime-enforced invariants. Violating any one aborts the epoch immediately. No warning. No retry. No configuration option changes this.

Guarantee Mechanism Invariant
Every epoch produces a verifiable evidence hash SHA-256 hash-chained append-only ledger CEL-EVIDENCE-0
Mutations are byte-identical replayable from original inputs No datetime.now() or random.random() in constitutional paths CEL-REPLAY-0
Pipeline steps cannot be skipped or reordered Runtime sequence check — out-of-order aborts immediately CEL-ORDER-0
Governance gate is the only promotion path GovernanceGateV2 is the only path — no side channel exists GOV-SOLE-0
Shadow harness writes nothing to production Zero-write enforcement + egress detection LSME-0
Red Team agent cannot approve its own challenges Structural constraint in code — PASS or RETURNED only AFRT-0
Identity check never blocks an epoch Fail-open with fallback score injection MMEM-0
Critical mutations require GPG-signed human approval Architecturally enforced — not a configuration option HUMAN-0
Import boundaries block unauthorized dependencies Static enforcement — violations block merge AST-IMPORT-0
High-stakes mutations require 2-of-3 jury verdict ConstitutionalJury.deliberate() is the sole authority CJS-0
Governance drift rate capped at 30% before double sign-off Meta-governance limits constitutional change velocity CEB-0
No mutation may reduce self-monitoring observability Transparency is structural and non-negotiable SELF-AWARE-0
adaad-core exports are semver-governed and HUMAN-0 gated Breaking changes require major version bump + ratification CORE-SEMVER-0
231 Hard-class invariants enforced at runtime Epoch aborts on any violation — no silent failures 231 total

Full invariants matrix · Constitution · Verifiable claims

Section Divider

The pipeline

ADAAD Autonomy Loop Pipeline

Every proposed change traverses all steps in strict order. There is no skip path, no override flag, no configuration that changes this.

Step-by-step breakdown

Step 0 — Identity check Before any proposal is generated, the IdentityContextInjector consults the IdentityLedger — a hash-chained, HUMAN-0-attested self-model. First AI system to ask: is this mutation consistent with what this system believes itself to be?

Phase 1 — Proposal Claude-powered agents (Architect · Dream · Beast) generate MutationCandidates. UCB1 bandit selector routes to the highest-performing agent. Agents stake reputation on proposals — failed proposals burn stake.

Phase 2–3 — Adversarial Red Team AdversarialRedTeamAgent queries CodeIntelModel for uncovered code paths, generates up to 5 targeted adversarial cases. Structurally incapable of approving. PASS or RETURNED only.

Phase 4 — Constitutional Scoring FitnessEngineV2 scores against 8 fitness signals. All runtime-enforced constitutional rules checked. Rule violation halts epoch immediately.

Phase 5 — Live Shadow Execution Zero-write shadow harness against real traffic patterns. Divergence rate, error delta, P99 latency. Regression on any signal is a hard block.

Phase 6 — Constitutional Jury For high-stakes mutations: ConstitutionalJury.deliberate() convenes 3 independent evaluators. 2-of-3 approve required. Dissenting verdicts committed to dissent ledger.

Phase 7 — Governance Gate GovernanceGateV2 evaluates the full evidence package. All prior gates must pass. Verdict: APPROVED · RETURNED · BLOCKED.

Phase 8 — Human Sign-off (Tier 0) For critical mutations: GPG-signed approval from governor is required. The system is architecturally incapable of promoting Tier 0 mutations without it.

Phase 9 — Ledger Commit + Cryptographic Proof DAG Every decision is SHA-256 hash-chained. Full mutation lineage Merkle-rooted. Every causal ancestor cryptographically linked. Legal-grade provenance.

Section Divider

Architecture

ADAAD System Architecture

ADAAD runs a 16-step Constitutional Evolution Loop (CEL) on every proposed change. Three AI agents — Architect, Dream, and Beast — apply constitutional rules at different steps. No single agent can approve a change. The Constitutional Jury gate adds multi-agent adversarial evaluation for high-stakes paths.

Module map and boundary contracts

Runtime layerruntime/

Module Role
evolution/evolution_loop.py Orchestrates the 16-phase epoch. Phase 0d MMEM wire lives here.
evolution/constitutional_evolution_loop.py 16-step CEL dispatch. Calls GovernanceGate, AFRT, LSME, CJS.
evolution/fitness_v2.py FitnessEngineV2 — 8-signal scoring including identity.
memory/identity_ledger.py Hash-chained HUMAN-0-gated IdentityLedger. MMEM-0/CHAIN-0/LEDGER-0.
innovations30/__init__.py Boot completeness gate — all 46 importable or RuntimeError (INNOV-COMPLETE-0).
innovations30/constitutional_jury.py INNOV-14 — 2-of-3 quorum, dissent ledger, high-stakes gate.
innovations30/constitutional_entropy_budget.py INNOV-26 — governance drift rate limiter, double-HUMAN-0 at 30%.
innovations30/self_awareness_invariant.py INNOV-28 — structural observability protection.
innovations30/mirror_test.py INNOV-30 — constitutional self-recognition test, pipeline seal.
lineage/lineage_ledger_v2.py Second-gen lineage store with MMEM co-commit surface.
capability_graph.py Module capability contracts. No __import__ — enforced.

Governance kerneladaad_core/ (v9.58.0+)

from adaad_core import (
    GovernanceGate,
    ConstitutionalRollbackEngine,
    InvariantDiscoveryEngine,
    MirrorTestEngine,
    EpochMemoryStore,
    verify_ledger,
)

The governance kernel is now independently installable (pip install adaad-core). Semver-governed. Breaking changes require CORE-SEMVER-0 ratification and major version bump. See ADAAD_CORE_API.md.

Import boundary contract: All module-to-module imports must cross defined seams. AST-IMPORT-0 CI gate blocks violations. Every file must carry # SPDX-License-Identifier: Apache-2.0.

Section Divider

Shipped capabilities

Core Capabilities — Shipped

Full innovation index — all 46 shipped
# Innovation Phase Core claim
INNOV-01 constitutional_stress_test.py 87 AI proposes amendments to its own rules under unconditional HUMAN-0 ratification
INNOV-02 self_awareness_invariant.py 87 Dedicated agent stress-tests every constitutional rule by attempting to violate it
INNOV-03 temporal_governance.py 87 Predicts which invariants will be violated in future epochs before they fail
INNOV-04 constitutional_entropy_budget.py 88 Detects constitutional behaviour drift from historical baseline
INNOV-05 governance_archaeology.py 89 Proposes new architectural organs to close capability gaps — HUMAN-0 ratification required
INNOV-06 counterfactual_fitness.py 90 Full lineage Merkle-rooted · independently verifiable · legal-grade provenance
INNOV-07 temporal_regret.py 91 Zero-write shadow harness · real traffic · hard block on regression
INNOV-08 red_team_agent.py 92 Red Team gate before scoring · structurally incapable of approving · PASS or RETURNED only
INNOV-09 aesthetic_fitness.py 93 Code readability as constitutionally-bounded first-class fitness dimension
INNOV-10 morphogenetic_memory.py 94 Hash-chained self-model consulted pre-proposal · identity drift detection at the root
INNOV-11 dream_state.py 96 Offline cross-epoch mutation memory consolidation — governed synaptic replay
INNOV-12 mutation_genealogy.py 97 Property inheritance vectors on lineage edges · population-genetics-level analysis
INNOV-13 knowledge_transfer.py 98 Cryptographically verified cross-instance knowledge transfer
INNOV-14 constitutional_jury.py 99 2-of-3 multi-agent jury for high-stakes mutations · dissent feeds invariant discovery
INNOV-15 reputation_staking.py 100 Agents stake reputation on proposals · failed proposals burn stake
INNOV-16 emergent_roles.py 101 Agents develop constitutional specializations from evolutionary fitness history
INNOV-17 agent_postmortem.py 102 Governed autopsy of failed mutations · extracts constitutional invariants from failure
INNOV-18 temporal_governance.py 103 Time-conditional constitutional rules · governance adapts to epoch context
INNOV-19 reputation_staking.py 104 Archaeological analysis of constitutional decision history
INNOV-20 blast_radius_model.py 105 Systematic adversarial probing of the full constitutional boundary surface
INNOV-21 governance_bankruptcy.py 106 Governed constitutional reset under catastrophic governance failure
INNOV-22 mutation_conflict_framework.py 107 Fitness signals conditioned on live market and economic context
INNOV-23 constitutional_epoch_sentinel.py 108 Constitutional rule mapping to external regulatory frameworks (EU AI Act, NIST RMF)
INNOV-24 semantic_version_enforcer.py 109 Constitutional enforcement of semantic versioning across all four canonical files
INNOV-25 hardware_adaptive_fitness.py 110 Fitness signals that adapt to available compute and memory constraints
INNOV-26 constitutional_entropy_budget.py 111 Meta-governance: rate-limits constitutional drift — 30% rule-change threshold triggers double-HUMAN-0
INNOV-27 regulatory_compliance.py 112 Pre-promotion blast radius estimation · constitutional bound on mutation impact scope
INNOV-28 intent_preservation.py 113 No mutation may reduce system self-monitoring observability — transparency is constitutional
INNOV-29 curiosity_engine.py 114 Constitutional curiosity drive — governed exploration of under-explored mutation space
INNOV-30 mirror_test.py 115 Constitutionally governed self-recognition test — final seal of the Innovations30 pipeline
INNOV-31 invariant_discovery.py 116 Autonomous Invariant Discovery — mines failure ledger for patterns
INNOV-32 constitutional_rollback.py 117 Governed Constitutional Rollback — versioned chain-linked snapshot ledger
INNOV-33 knowledge_bundle_exchange.py 118 Knowledge Bundle Exchange (KBEP) — cryptographically verified capability transfer
INNOV-34 federation_governance_consensus.py 119 Federation Governance Consensus — strict majority quorum for amendments
INNOV-35 self_proposing_innovation_engine.py 120 Self-Proposing Capability Engine (SPIE) — system identifies its own gaps
INNOV-36 deterministic_audit_sandbox.py 121 One-command external third-party verification of any epoch
INNOV-37 governed_redteam_response_protocol.py 127 Red-Team Response Engine: HUMAN-0-gated amendment routing from adversarial findings
INNOV-38 autonomous_constitutional_self_amendment.py 128 Adversarially-driven constitutional self-amendment with cryptographic provenance
INNOV-39 agent_coalition_formation.py 129 Governed agent coalition formation with proportional stake redistribution
INNOV-40 cross_epoch_agent_learning_transfer.py 130 Cryptographically verified cross-epoch agent behavioral profile transfer
INNOV-41 dork_living_fleet.py 132 Constitutional fail-closed LLM provider fleet with hash-chained conversation ledger
INNOV-42 dork_fleet_server_bridge.py 133 Self-healing LLM fleet as a governed constitutional subsystem; fsync-persistent ledger
INNOV-43 constitution_version_ledger.py 135 Versioned constitution snapshot ledger · rollback to any prior constitutional state · chain-linked
INNOV-44 dork_intelligence_hardening.py 137 DORK persona presets · deterministic session labels · skill router · onboarding UX
INNOV-45 invariant_interaction_graph.py 138 Co-fire graph of invariant pairs · cluster detection · HUMAN-0-gated topology amendments
INNOV-46 canary_mutation_deployment.py 139 Canary gate for mutations · shadow mirror · constitutional rollback on regression
INNOV-47 sync_dork_corpus.py 141 Live Knowledge Sync Engine — constitutionally governed, auto-updating DORK corpus synchronized from the live codebase at every phase boundary
INNOV-48 embedder.py 142 Contextual Semantic Search — governed local LLM retrieval with Ollama primary + pure-Python TF-IDF/hash-BoW fallback · session-locked dimensions · zero native deps

Full specifications: ADAAD_30_INNOVATIONS.md

Section Divider

Timeline — proven milestones, not promises

Phase Progress Bar


⛓ March 13, 2026 — First autonomous self-evolution (Phase 65) — the founding event

ADAAD identified its own highest-priority capability gap, generated a mutation, ran a sandboxed fitness tournament, scored it against constitutional rules, applied it, and sealed the proof in the ledger. Zero human intervention in the execution path. Full human control of the constitutional framework.

This is the first externally documented instance of a constitutionally governed AI system autonomously modifying its own codebase within a formally verified governance boundary. The ledger entry, evidence hash, and replay instructions are public.

Verify it yourself:

python -m app.main --replay strict --epoch-id phase65-emergence-001 --verbose
# Expected: byte-identical evidence_hash · APPROVED verdict · 1 mutation applied
# Any divergence = blocking integrity signal

Phase 65 Milestone

Hash Chain Integrity

🔐 March 23, 2026 — Cryptographic Evolution Proof DAG (Phase 90 · INNOV-06)

Every mutation cryptographically bound to all causal ancestors via Merkle root. CryptographicProofBundle is self-contained — independently verifiable without system access. Legal-grade provenance for auditors, regulators, and patent counsel.

🛡 March 24, 2026 — Live Shadow Mutation Execution (Phase 91 · INNOV-07)

Zero-write shadow harness against real traffic. ShadowFitnessReport: divergence rate · error delta · P99 latency. LSME-0: any write or egress = hard block. A mutation must survive shadow execution and governance gate to advance.

⚔ March 27, 2026 — Adversarial Red Team as a Constitutional Gate (Phase 92 · INNOV-08)

AdversarialRedTeamAgent challenges every proposal before fitness scoring. AFRT-0: structurally incapable of approving — PASS or RETURNED only. Eliminates the single-agent approval failure mode present in all prior autonomous code systems.

🧬 March 28, 2026 — Morphogenetic Memory (Phase 94 · INNOV-10)

IdentityLedger — 8 founding IdentityStatements, hash-chained, HUMAN-0-attested. IdentityContextInjector fires Phase 0d before proposals are generated. First AI system to ask: is this mutation consistent with what this system believes itself to be?

🌙 March 30, 2026 — Cross-Epoch Dream State Engine (Phase 96 · INNOV-11)

Between active epochs, DreamStateEngine replays successful past mutations in novel cross-epoch combinations — analogous to offline synaptic replay in biological memory systems.

⚖️ April 1, 2026 — Constitutional Jury System (Phase 99 · INNOV-14)

High-stakes mutations require 2-of-3 independent agent jury verdict before governance gate. Dissenting verdicts are cryptographically committed and fed to InvariantDiscoveryEngine — disagreement becomes constitutional signal.

🔭 April 4, 2026 — Innovations36 Complete + Deterministic Audit Sandbox (Phase 121 · INNOV-36)

All 46 constitutional innovations shipped. boot_completeness_check() confirms all modules importable at runtime. Any epoch verifiable with docker compose up das-demo — no system access required.

📦 April 5, 2026 — adaad-core Package Extraction (Phase 124)

The constitutional governance kernel extracted as adaad_core — a standalone, semver-governed, independently installable package. Six stable exports: GovernanceGate, ConstitutionalRollbackEngine, InvariantDiscoveryEngine, MirrorTestEngine, EpochMemoryStore, verify_ledger.

Breaking changes require CORE-SEMVER-0 ratification and HUMAN-0 approval. The governance kernel is now a first-class public API. 231 Hard-class invariants. See ADAAD_CORE_API.md.

🏛 April 5, 2026 — Community Governance Infrastructure (Phase 125)

First constitutionally governed community amendment pipeline — structurally incapable of autonomous constitutional change (COMMUNITY-HUMAN0-0).

Community members can now propose constitutional amendments through a governed pipeline: GitHub Issue template → CI validator (quorum check, rationale length ≥50 words, conflict analysis) → FGCON review → HUMAN-0 ratification. Two new Hard-class invariants enforce what no AI agent may override:

  • COMMUNITY-FGCON-0 — a single contributor cannot ratify. Community amendments require FGCON quorum.
  • COMMUNITY-HUMAN0-0 — HUMAN-0 ratification cannot be delegated or automated via any workflow.

The CI gate (constitution_amendment_validation.yml) structurally rejects any PR that claims autonomous ratification. See GOVERNANCE_PARTICIPATION.md for the full amendment lifecycle.

⚔️ April 6, 2026 — Red-Team Challenge + Governed Response Protocol (Phases 126–127 · INNOV-37)

Phase 126 introduced a constitutional invariant attacker with halt-on-silent-pass enforcement — every invariant is systematically challenged before any epoch promotion.

Phase 127 closed the loop: the GovernedRedTeamResponseProtocol routes adversarial findings through a HUMAN-0-gated amendment pipeline. Red-team findings cannot silently expire — each generates a structured finding record, routed for constitutional amendment or explicit HUMAN-0 dismissal.

🧬 April 8, 2026 — Autonomous Constitutional Self-Amendment Engine (Phase 128 · INNOV-38)

AutonomousConstitutionalSelfAmendmentEngine (ACSA) enables adversarially-driven constitutional self-amendment: the system can propose changes to its own constitution in response to red-team findings, with full cryptographic provenance. Every proposed amendment is hash-chained, HUMAN-0-gated, and structurally incapable of self-ratification.

🤝 April 8, 2026 — Agent Coalition Formation (Phase 129 · INNOV-39)

AgentCoalitionFormation (ACF) introduces governed multi-agent coalitions for complex mutation proposals. Agents form coalitions with proportional stake redistribution — coalition fitness is evaluated jointly, and stake flows to contributors proportionally to their fitness contribution. Coalitions that fail constitutional scoring burn collective stake.

🔗 April 8, 2026 — Cross-Epoch Agent Learning Transfer (Phase 130 · INNOV-40)

CrossEpochAgentLearningTransfer (CELT) enables cryptographically verified behavioral profile transfer between agents across epoch boundaries. Agent specializations earned through fitness history can be explicitly transferred to successor agents, with the transfer record hash-chained to the lineage ledger.

🌊 April 10, 2026 — DORK Living Fleet (Phase 132 · INNOV-41)

DORKLivingFleet is a governed, multi-engine LLM provider orchestrator that routes DORK queries through a constitutional fail-closed fleet. Six Hard-class invariants govern every dispatch boundary: unknown slash commands are structurally rejected, fleet blocking is structurally enforced, and all conversations are hash-chained to a persistent ledger. Jaccard-taxonomy intent routing classifies every query before dispatch.

🛠 April 11, 2026 — DORK Fleet Server Bridge (Phase 133 · INNOV-42)

DORKFleetServerBridge (DFSB) wires the Living Fleet into server.py as a first-class constitutional governance subsystem. Six new REST endpoints. DorkLedgerPersistence provides fsync-on-write append-only conversation ledger with restart continuity provable from genesis. DorkFleetWatchdog is an asyncio auto-heal loop that transitions BLOCKED→ACTIVE automatically and logs every state transition to the audit ledger. Fleet fitness is embedded in every governance health response (DFSB-FITNESS-0).

🔐 April 11, 2026 — Constitution Versioning & Rollback (Phase 135 · INNOV-43)

ConstitutionVersionLedger (CVR) introduces versioned constitution snapshot storage with chain-linked hash provenance. Every constitutional amendment produces a snapshot. Any prior constitutional state is restorable via CVR-ROLLBACK-0 — rollback requires HUMAN-0 ratification and produces a lineage event. The constitution's history is now as auditable as the mutation ledger.

🧠 April 11, 2026 — DORK Intelligence Hardening (Phase 137 · INNOV-44)

Phase 137 delivered a comprehensive DORK capability expansion: deterministic persona presets (Architect/Dream/Beast), a slash-command intent router, plain-language post-processing, deterministic session labels persisted across browser sessions, a floating launcher across all UI shells, guided onboarding flow, and capability freshness UX. All DORK session behavior is now ledger-traced and deterministically reproducible.

🕸 April 11, 2026 — Invariant Interaction Graph (Phase 138 · INNOV-45)

InvariantInteractionGraph (IIG) builds a live co-fire graph of invariant pairs — tracking which invariants are triggered together across epochs. Cluster detection identifies constitutional hotspots. Topology amendments (adding/removing monitored pairs) require HUMAN-0 ratification (IIG-HUMAN0-0). The graph is hash-chained and deterministically reproducible from the ledger.

🐦 April 11, 2026 — Canary Mutation Deployment (Phase 139 · INNOV-46)

CanaryMutationDeployment (CMD) introduces a canary gate for mutations before full promotion. A shadow mirror harness runs the candidate mutation against live traffic at reduced percentage. Constitutional regression triggers automatic rollback (CMD-ROLLBACK-0). Canary decisions require HUMAN-0 ratification and produce a chain-linked lineage event. Deployment risk is now constitutionally bounded.

🛡 April 12, 2026 — Constitutional P0 Sweep + P1 Hardening (Phase 140)

The deepest audit in ADAAD history. Phase 140 resolved 5 P0 findings (WL-001..WL-005) and introduced 5 new Hard-class invariants: HAPG-IDENTITY-0 (GPG fingerprint binding for HUMAN-0 approvals), HAPG-EXPIRY-0 (7-day approval expiry enforcement), REPLAY-ALGO-0 (Ed25519 fail-closed — no silent HMAC downgrade in production), TEST-ATTEST-0 (CI gate blocks any innovation PR without 30/30 attestation), GRRP-KEY-0 (GRRP HMAC key from env — never hardcoded). Ghost tag v9.59.0 remediated. ADAADell SSH deploy key ceremony complete. 2-of-3 Ed25519 governance key ceremony executed. First time in ADAAD history: 0 open findings.

📡 April 12, 2026 — Live Knowledge Sync Engine (Phase 141 · INNOV-47)

First local LLM with a constitutionally governed, auto-updating knowledge corpus synchronized from the live codebase at every phase boundary.

sync_dork_corpus.py builds and validates data/dork/corpus.jsonl — 148 entries spanning 22 phases, 47 indexed invariants, 38 innovations, and 23 findings. A GitHub Actions workflow (dork_corpus_sync.yml) runs the sync on every merge to main, with LKSE-HUMAN0-0 preventing autonomous corpus promotion. Five new Hard-class invariants govern every sync boundary: integrity chain (LKSE-CHAIN-0), determinism (LKSE-DETERM-0), gate enforcement (LKSE-GATE-0), and HUMAN-0 ratification (LKSE-HUMAN0-0).

🔍 April 12, 2026 — Contextual Semantic Search (Phase 142 · INNOV-48)

First constitutionally governed local LLM retrieval engine with pure-Python semantic cosine similarity search, deterministic TF-IDF fallback, and session-locked embedding dimensions — requiring zero native dependencies.

dorkllm/embedder.py delivers a two-tier embedding architecture: Ollama nomic-embed-text as primary, pure-Python TF-IDF/hash-BoW as constitutional fallback. dorkllm/retriever.py uses cosine similarity against the LKSE corpus. Five new Hard-class invariants enforce the retrieval boundary: CSS-DETERM-0 (deterministic embedding), CSS-FALLBACK-0 (fallback always reachable), CSS-DIM-0 (session-locked dimensions), CSS-COSINE-0 (cosine-only scoring), CSS-PYDROID-0 (zero native dep constraint preserved on Android). 30/30 acceptance tests pass.

Section Divider

Why you can trust the claims

Every guarantee below is runtime-enforced. Not a policy. Not a pledge. Violation aborts the epoch.

Gate What it checks Invariant
Tamper-evident ledger SHA-256 hash-chained — alter one entry and every subsequent hash breaks CEL-EVIDENCE-0
♻️ Deterministic replay Any epoch re-runs from original inputs producing byte-identical results CEL-REPLAY-0
📜 Constitutional gate 231 rules evaluated at runtime — violation halts epoch GOV-SOLE-0
⚔️ Adversarial red-team Every mutation challenged before scoring — cannot approve AFRT-0
🛡 Shadow execution Zero-write harness before live promotion LSME-0
🔬 Identity gate Self-model consulted before proposals are generated MMEM-0
⚖️ Constitutional jury 2-of-3 verdict for high-stakes mutations — dissent feeds invariant discovery CJS-QUORUM-0
🌡 Entropy budget Constitutional change velocity is itself governed — 30% drift cap CEB-0
👁 Self-awareness No mutation may reduce self-monitoring observability SELF-AWARE-0
🗺 Cryptographic lineage Merkle-rooted proof DAG — independently verifiable without system access CEPD-0
🔑 Human authority GPG key required for Tier 0 — not configurable, not delegatable HUMAN-0
📦 API stability adaad-core breaking changes require major bump + HUMAN-0 ratification CORE-SEMVER-0

Constitution · Trust Center · Security Invariants Matrix

Section Divider

What you control vs. what the system handles

What only you can do What ADAAD handles autonomously
🔑 GPG-sign Tier 0 changes Generate mutation proposals via Claude agents
🌱 Approve seed promotions Red-team challenge every proposal before scoring
📜 Set constitutional rules Shadow-execute mutations in zero-write harness
🏷 Tag version ceremonies Score against 231 constitutional invariants
⚙️ Ratify new Hard-class invariants Hash-chain every decision into the ledger
🧬 Amend IdentityLedger statements Consult self-model before every proposal
📋 Patent and IP decisions Build cryptographic evolution proof DAGs
✅ GA sign-off Mine failure patterns · propose new invariants
🏛 Jury composition policy Convene constitutional jury for high-stakes paths

Section Divider

⚡ Quickstart

git clone https://github.com/InnovativeAI-adaad/adaad.git
cd adaad
python onboard.py

onboard.py sets up your environment, validates governance schemas, and runs a governed dry-run. Safe to re-run any time.

What success looks like:

  ✔ Python 3.12.x
  ✔ Dependencies installed
  ✔ Boot completeness: 36/36 innovations importable [INNOV-COMPLETE-0]
  ✔ Dry-run complete  (fail-closed behaviour confirmed)

  Run the dashboard   python server.py
  Run an epoch        adaad demo
  Inspect ledger      adaad inspect-ledger data/evolution_ledger.jsonl
  Propose mutation    adaad propose "upgrade system x"
  Strict replay       python -m app.main --replay strict --verbose

Use the governance kernel directly

pip install adaad-core
from adaad_core import GovernanceGate, verify_ledger

gate = GovernanceGate.from_config("config/constitution.yaml")
result = gate.evaluate(candidate)           # APPROVED · RETURNED · BLOCKED

chain_ok = verify_ledger("data/evolution_ledger.jsonl")
print("Ledger integrity:", chain_ok)        # True = unbroken hash chain

CLI

./scripts/adaad --help
./scripts/adaad demo              # Run a dry-run epoch
./scripts/adaad inspect-ledger    # View ledger summary
./scripts/adaad propose "desc"    # Submit a mutation proposal

Local development server

pip install -r requirements.server.txt
ADAAD_AUDIT_TOKENS="" uvicorn server:app --host 127.0.0.1 --port 8000
Dashboard URL
Aponi governance UI http://127.0.0.1:8000/ui/aponi/index.html
Developer Whale.Dic http://127.0.0.1:8000/ui/developer/ADAADdev/whaledic.html

Deterministic audit environment

python3.12 -m venv .venv && source .venv/bin/activate
pip install -e .[dev]
export ADAAD_SEED=42 PYTHONHASHSEED=0
python -m app.main --replay audit --verbose
Platform support
Platform Method
Linux / macOS pip install adaad or clone above
Windows pip install adaad (WSL2 for sandbox)
Android (Termux) TERMUX_SETUP.md
Android (Pydroid 3) INSTALL_ANDROID.md
Docker docker pull ghcr.io/innovativeai-adaad/adaad

Safety properties come from SHA-256 hash chains and the Python runtime — not cloud KMS, Kubernetes, or any third-party service. If those go away, so do your safety guarantees. ADAAD's guarantees are local, deterministic, and yours.

Section Divider

Replay and audit

Verify the Phase 65 founding event

python -m app.main --replay strict --epoch-id phase65-emergence-001 --verbose
# Expected: byte-identical evidence_hash, APPROVED verdict, 1 mutation applied
# Divergence = blocking integrity signal. Check: Python version, PYTHONHASHSEED, deps.

Inspect the governance chain

python -c "
import json, hashlib
events = [json.loads(l) for l in open('security/ledger/governance_events.jsonl')]
print(f'Events: {len(events)}')
print(f'Latest: {events[-1][\"event_id\"]}')
print(f'Hash:   {events[-1][\"event_hash\"][:48]}...')
"

Verify identity ledger

python -c "
from runtime.memory.identity_ledger import IdentityLedger
ledger = IdentityLedger.load_genesis()
print('Chain valid:', ledger.verify_chain())
for s in ledger.statements():
    print(f'  {s.statement_id}: {s.statement[:72]}...')
"

Confirm no unauthorized imports

python scripts/check_spdx_headers.py
# All files must carry: # SPDX-License-Identifier: Apache-2.0

One-command third-party audit

docker compose up das-demo
# Runs the Deterministic Audit Sandbox against a public epoch
# No system access required beyond this repository

Section Divider

Governance in 60 seconds

ADAAD evolves through numbered phases. Each phase ships a specific capability, registers findings, resolves them with evidence, and chains a governance ledger entry before merge. No phase ships without a HUMAN-0 attestation and a four-file canonical version sync.

Recent phases

Phase Capability Invariants added Status
121 Deterministic Audit Sandbox (INNOV-36) DAS-EPOCH-0 · DAS-DETERM-0
122 README Credibility + ROADMAP Sync
123 CLI Entry Point (adaad binary) CLI-SANDBOX-0 · CLI-GATE-0
124 adaad-core Package Extraction CORE-EXPORT-0 · CORE-IMPORT-0 · CORE-SEMVER-0
125 Community Governance Infrastructure COMMUNITY-FGCON-0 · COMMUNITY-HUMAN0-0
126 Red-Team Challenge (Invariant Attacker) RTCA-HALT-0 · RTCA-SILENT-0
127 Governed Red-Team Response Protocol (INNOV-37) GRRP-ROUTE-0 · GRRP-HUMAN0-0
128 Autonomous Constitutional Self-Amendment (INNOV-38) ACSA-PROV-0 · ACSA-HUMAN0-0
129 Agent Coalition Formation (INNOV-39) ACF-STAKE-0 · ACF-QUORUM-0
130 Cross-Epoch Agent Learning Transfer (INNOV-40) CELT-CHAIN-0 · CELT-PROV-0
132 DORK Living Fleet (INNOV-41) DORK-CMD-0 · FLEET-BLOCK-0 + 4 more
133 DORK Fleet Server Bridge (INNOV-42) DFSB-PERSIST-0 · DFSB-HEAL-0 · DFSB-FITNESS-0 · DFSB-GATE-0
134 DFSB Post-Ship Remediation (REF-001–004) DFSB-WATCHDOG-0 · DFSB-LEDGER-0
135 Constitution Versioning & Rollback (INNOV-43) CVR-IMMUT-0 · CVR-ROLLBACK-0 · CVR-HUMAN0-0 · CVR-CHAIN-0
136 DORK Runtime Enrichment Bridge Hardening DORK-ENRICH-0 · DORK-LEDGER-VERIFY-0
137 DORK Intelligence Hardening (INNOV-44) DORK-PERSONA-0 · DORK-ROUTER-0 · DORK-ONBOARD-0
138 Invariant Interaction Graph (INNOV-45) IIG-COFIRE-0 · IIG-CLUSTER-0 · IIG-HUMAN0-0
139 Canary Mutation Deployment (INNOV-46) CMD-GATE-0 · CMD-MIRROR-0 · CMD-ROLLBACK-0 · CMD-HUMAN0-0
140 Constitutional P0 Sweep + P1 Hardening HAPG-IDENTITY-0 · HAPG-EXPIRY-0 · REPLAY-ALGO-0 · TEST-ATTEST-0 · GRRP-KEY-0
141 Live Knowledge Sync Engine (INNOV-47) LKSE-SYNC-0 · LKSE-DETERM-0 · LKSE-CHAIN-0 · LKSE-GATE-0 · LKSE-HUMAN0-0
142 Contextual Semantic Search (INNOV-48) CSS-DETERM-0 · CSS-FALLBACK-0 · CSS-DIM-0 · CSS-COSINE-0 · CSS-PYDROID-0
How a phase ships (contributor reference)
  1. ArchitectAgent produces a specification for the phase
  2. MutationAgent implements on a feature/phase<N>-* branch
  3. All 30 acceptance tests pass · no regressions · TIER 0 invariant checks green
  4. HUMAN-0 signs off: Approved. All signed: Dustin L. Reid
  5. --no-ff merge to main (lineage preserved — mandatory)
  6. CHANGELOG entry + VERSION bump + GPG-signed tag
  7. Agent state updated + governance ledger event chained
  8. Push

Section Divider

For contributors

Required reading before opening any PR
Local checks before every PR
pytest --tb=short -q                          # All must pass
python scripts/check_spdx_headers.py          # SPDX headers on all source files
python scripts/check_dependency_baseline.py   # Import boundary enforcement
python scripts/check_licenses.py              # License compliance
python -m app.main --replay audit --verbose   # Replay integrity
python nexus_setup.py --validate-only         # Workspace validation
PR evidence requirements

Every governance-impacting PR must include:

  • Branch: feature/phase<N>-<descriptor> or fix/phase<N>-<descriptor>
  • Test count: number of new tests added
  • Invariants: any new Hard-class invariants introduced
  • Evidence hash: from a local epoch run
  • HUMAN-0 sign-off: governor approval before merge

PRs without evidence artifacts are returned, not merged.

Section Divider

Security and trust

SPDX enforcement — Every source file must carry # SPDX-License-Identifier: Apache-2.0. Missing headers block merge via CI.

Import boundary enforcement — Module seams are defined and enforced. Cross-layer imports without boundary contract updates block merge via AST-IMPORT-0.

Replay divergence — Any divergence from expected evidence hash is a blocking integrity signal. Not a warning.

Key management — HUMAN-0 GPG key (4C95E2F99A775335B1CF3DAF247B015A1CCD95F6) signs all release tags and Tier 0 governance events. Key is not stored in this repository.

IdentityLedger attestation — ILA-124-2026-04-05-001 attests the genesis seed terminal hash. External auditors can verify independently.

Report security issues via SECURITY.md. Do not open public issues for vulnerability reports.

Full Trust Center · Compliance Pack

Section Divider

Live system stats

System Stats

GitHub commit activity GitHub last commit GitHub repo size GitHub issues

Section Divider

Versioning

ADAAD uses a phase-correlated version scheme by design. Each minor increment in the v9.x.0 series corresponds to one shipped, HUMAN-0-attested, evidence-linked governance phase.

v9.75.0 means 141 governed phase milestones have shipped in the v9 series. Each phase delivers: a governance ledger event, a HUMAN-0 session_digest sign-off, 30 passing acceptance tests, a CHANGELOG entry, and a four-file canonical version sync (VERSION · pyproject.toml · .adaad_agent_state.json · governance/report_version.json).

Section Divider

Named roles

Name Role
Architect Structural mutation agent. Prioritizes maintainability and constitutional alignment.
Dream Exploratory mutation agent. Novel approaches, capability gap identification.
Beast Performance mutation agent. Throughput, efficiency, bottleneck pressure.
Cryovant Identity and device-anchoring layer. Session tokens, audit signatures, trust anchoring.
Aponi Governance dashboard. Audit UI, mutation lineage viewer, live epoch status.
HUMAN-0 The governor role. Dustin L. Reid. Holds GPG key. Ratifies constitutional changes.

These are runtime roles. They are not APIs and not marketing personas.

Section Divider

Enterprise and commercial use

Commercial documentation suite
Resource What it is
Pricing Model Seat-based, usage-based, and hybrid SKUs
Procurement Fast-Lane Day-0 checklist, DPA/MSA fallback clauses, security Q&A — designed for 5-day close
SLO / SLA Sheet Reliability targets and support tier commitments
Compliance Pack Data handling, access control matrix, incident response
Trust Center Security posture and governance assurance artifacts
Certification Program Operator · Governance Engineer · Enterprise Administrator
Partner Program Integrator and consultancy onboarding
Data Room Index Due-diligence artifact map
ROI Model Value quantification framework for governance automation

Section Divider

How ADAAD compares

ADAAD is in a category of one. The table below is structured around verifiable, runtime-enforced properties — not feature checkboxes.

Capability ADAAD GitHub Copilot / Devin CodeRabbit / Qodo Traditional CI/CD
Autonomous code mutation with governance gate
Adversarial red-team challenge before scoring
Zero-write shadow execution against live traffic
SHA-256 hash-chained tamper-evident ledger
Byte-identical deterministic epoch replay ⚠️ partial
Constitutional self-model (Morphogenetic Memory)
2-of-3 multi-agent jury for high-stakes mutations
Runtime-enforced Hard-class invariants (231)
HUMAN-0 GPG key required for critical changes ⚠️ policy only
Governance drift rate capped (30% entropy budget)
Cryptographic evolution proof DAG (Merkle-rooted)
Independently installable governance kernel ()
One-command third-party audit sandbox ⚠️ partial
Runs on a 00 Android phone (no cloud dependency)
Open source, Apache 2.0 ⚠️ partial
Constitutional self-evolution in production (Phase 65)

Key distinction: Tools like Copilot and Devin generate or suggest code. CodeRabbit reviews it. CI/CD tests it. ADAAD governs whether mutations to its own codebase are constitutionally valid — and produces cryptographic proof of every decision. These are not competing categories. They are adjacent layers. ADAAD occupies the layer none of them reach.

Full competitive analysis · Verifiable claims

Section Divider

What ADAAD is not

  • Not a code assistant — it governs mutation of its own codebase, not yours
  • Not CI/CD — it governs the mutation process, not the build pipeline
  • Not fully autonomous — your sign-off is constitutionally required for critical changes
  • Not a security scanner — it enforces mutation governance, not vulnerability detection
  • Not magic — every decision is logged, hash-chained, replayable, and explainable

Section Divider

FAQ

Is this actually running autonomously?

Yes. Phase 65 (March 13, 2026) was the first epoch where ADAAD identified a capability gap, generated a mutation, ran it through all fitness and governance layers, and applied it with zero human intervention in the execution path.

Human oversight is structural, not optional. The governor holds the GPG key. Any Tier 0 mutation requires GPG-signed approval. That is not configurable.

What makes this different from running tests in CI?

CI tests whether known code passes known assertions. ADAAD governs whether changes to the codebase itself are constitutionally valid, adversarially stress-tested, fitness-improving, and deterministically replayable.

You can delete your CI history. You cannot alter ADAAD's ledger.

ADAAD actively challenges its own proposals via adversarial red-team agents, checks them against its encoded self-model, and runs them through zero-write shadow execution before they reach production. No CI system does this. No CI system has 231 constitutional rules it's bound by. No CI system produces a cryptographic proof of its evolutionary lineage.

How does the adversarial Red Team work?

Every mutation proposal is handed to AdversarialRedTeamAgent before fitness scoring. It queries CodeIntelModel for code paths the proposing agent didn't cover, then generates up to five targeted adversarial cases. Each runs in a read-only sandbox.

If any case falsifies the proposal, it returns a RedTeamFindingsReport. AFRT-0: the agent cannot approve — structurally enforced in code, not policy. Its only outputs are PASS or RETURNED.

What is Morphogenetic Memory?

MMEM (INNOV-10, Phase 94) is a formally encoded architectural self-model: a hash-chained, HUMAN-0-gated, append-only IdentityLedger containing founding IdentityStatements that define what ADAAD believes itself to be.

Before every epoch's proposals are generated (Phase 0d), the IdentityContextInjector consults the ledger and injects identity_consistency_score into CodebaseContext. This score is available to all downstream stages.

It answers the question no prior gate could ask: is this mutation consistent with what this system believes itself to be?

What is adaad-core?

adaad-core (Phase 124, v9.58.0) is the constitutional governance kernel extracted as a standalone, independently installable Python package. It exposes six semver-governed exports: GovernanceGate, ConstitutionalRollbackEngine, InvariantDiscoveryEngine, MirrorTestEngine, EpochMemoryStore, and verify_ledger.

Breaking changes require CORE-SEMVER-0 ratification and HUMAN-0 approval, enforced by CI. It is the first AI governance primitive designed to be embedded in external systems. See ADAAD_CORE_API.md.

Why does it run on a $200 Android phone?

Constitutional governance should not require enterprise infrastructure. ADAAD's safety properties come from SHA-256 hash chains and the Python runtime — not cloud KMS, Kubernetes, or any third-party service. If those go away, so do your safety guarantees. ADAAD's guarantees are local, deterministic, and yours.

How do I evaluate ADAAD for enterprise procurement?

Start with the Trust Center. The Procurement Fast-Lane package is designed to complete security and legal review within 5 business days.

Section Divider

Roadmap

142 phases complete. 231 Hard-class invariants. 48 innovations shipped. 46/46 Grade-A hardened modules. 0 open findings.

Short term — PyPI publication (version gap closure), FINDING-66-004 ceremony execution, Phase 143 planning, provisional patent filing.

Mid term — device-anchored mobile runtime graduation, reproducible packaging, cross-device federation.

Long term — Full autonomy graduation, v1.1-GA Release.

Full roadmap · 46 Innovations specification

Section Divider

World's Firsts



Built by Innovative AI LLC · Governor: Dustin L. Reid · Blackwell, Oklahoma


The next wave of AI isn't AI that writes your code. It's AI that governs itself while writing your code — and can prove it.


Get Started Constitution Trust Center Thesis


Build without limits. Govern without compromise.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

adaad-9.75.0.tar.gz (1.7 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

adaad-9.75.0-py3-none-any.whl (1.5 MB view details)

Uploaded Python 3

File details

Details for the file adaad-9.75.0.tar.gz.

File metadata

  • Download URL: adaad-9.75.0.tar.gz
  • Upload date:
  • Size: 1.7 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.12

File hashes

Hashes for adaad-9.75.0.tar.gz
Algorithm Hash digest
SHA256 1ec571726f6a9696ba69c7143249866b7dff309505cba823eb1213c80fe3d286
MD5 3f00739a58a1c0dfa0d4070c232de555
BLAKE2b-256 8aaf240f8772d2908717866c90b275ca6ab045ca23a355c0e6025f06a52b1dbb

See more details on using hashes here.

File details

Details for the file adaad-9.75.0-py3-none-any.whl.

File metadata

  • Download URL: adaad-9.75.0-py3-none-any.whl
  • Upload date:
  • Size: 1.5 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.12

File hashes

Hashes for adaad-9.75.0-py3-none-any.whl
Algorithm Hash digest
SHA256 b9acb6755f51cc5054b9e3bd0a76181a6dced2fccf3981fcdb32d1c6e925e7dc
MD5 10b63ec5fb849c97a8d56c7301483b02
BLAKE2b-256 0d3bd0b936836ad84741c4a49df784c8c8432f97593d52dd25fcdd12ee8bf363

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page