Skip to main content

coreason_veritas is the non-negotiable governance layer of the CoReason platform (Prosperity Public License 3.0.0)

Project description

coreason_veritas

coreason_veritas is the non-negotiable governance layer of the CoReason platform.

CI

The Architecture and Utility of coreason_veritas

1. The Philosophy (The Why)

In the high-stakes world of biopharmaceuticals and GxP regulated environments, the probabilistic nature of standard Large Language Models represents a massive liability. coreason_veritas was architected to solve this specific friction point: it is the non-negotiable governance layer designed to impose "Glass Box" principles onto AI agents.

Our intent is to replace the inherent randomness of generative AI with "Deterministic Equivalence" and "Radical Auditability". This package acts as a middleware "Safety Anchor," enforcing a "Lobotomy Protocol" that restricts an LLM’s creativity in favor of epistemic integrity. By cryptographically verifying the chain of custody for code and forcibly overriding stochastic parameters, we turn AI from a creative writer into a verifiable reasoning engine backed by an Immutable Execution Record (IER).

2. Under the Hood (The Dependencies & Logic)

The stack defined in our pyproject.toml is focused and lightweight, designed for integration rather than heavy computation:

  • opentelemetry-api: We depend on OTel to treat AI reasoning traces as critical infrastructure telemetry, enabling cloud-native, enterprise-grade observability.
  • cryptography: This powers our Gatekeeper function. We use asymmetric cryptographic verification to ensure that "Agent Specs" have not been tampered with since they were signed by a Scientific Review Board.
  • loguru: Used for developer ergonomics and structured logging output.
  • fastapi/uvicorn/httpx: Powers the Gateway Proxy mode, allowing coreason_veritas to act as a standalone governance sidecar.
  • jcs (JSON Canonicalization Scheme): Ensures consistent hashing of JSON payloads across platforms.
  • presidio-analyzer: (Optional) Powered by Microsoft Presidio, this drives the Sanitizer to detect and redaction PII.

The internal logic is structured around four atomic units:

  1. The Gatekeeper: Verifies the cryptographic signature of the input asset before any code runs. If the signature is invalid, execution halts immediately.
  2. The Auditor: Initializes an OpenTelemetry span with mandatory attributes (User ID, Asset ID, Signature) to create the IER.
  3. The Anchor: Uses Python's contextvars to set a thread-safe flag (_ANCHOR_ACTIVE). It creates a scope where any LLM configuration is sanitized—forcing temperature=0.0 and seed=42 (configurable via VERITAS_SEED)—effectively "lobotomizing" the model to ensure it produces the exact same output for the same input every time.
  4. The Sanitizer: An optional utility that scans payloads for Personally Identifiable Information (PII) like phone numbers or email addresses and redacts them before logging or processing.

3. In Practice (The How)

The most powerful way to use coreason_veritas is via our high-level wrapper, which bundles the Gatekeeper, Auditor, and Anchor into a single line of code.

Example 1: The Atomic Wrapper

This example demonstrates the "Happy Path" for protecting an asynchronous agent function. The @governed_execution decorator ensures that the function cannot run unless the inputs are signed, the execution is traced, and the environment is deterministic.

from typing import Any, Dict
from coreason_veritas import governed_execution
from coreason_veritas.anchor import is_anchor_active

# The decorator handles the heavy lifting of verification and tracing
@governed_execution(asset_id_arg="spec", signature_arg="sig", user_id_arg="user")
async def run_clinical_analysis(spec: Dict[str, Any], sig: str, user: str) -> str:
    """
    A critical analysis function that must be auditable.
    """
    # Verify we are in a deterministic scope (The Anchor is holding)
    if is_anchor_active():
        print("System is anchored: Temperature forced to 0.0")

    # ... perform business logic ...
    return "Analysis Complete: Risk Low"

# Execution
# If 'sig' is invalid, this raises AssetTamperedError before the function body ever runs.
await run_clinical_analysis(
    spec={"trial_id": "NCT123456"},
    sig="deadbeef...",
    user="dr_who"
)

Example 2: The "Lobotomy" Protocol

For developers integrating directly with LLM clients (like OpenAI or Anthropic), the DeterminismInterceptor can be used explicitly to sanitize configuration payloads, ensuring no "creative" parameters slip through.

from coreason_veritas.anchor import DeterminismInterceptor

# An unsafe config that might produce hallucinations (high temp, random seed)
risky_config = {
    "model": "gpt-4",
    "temperature": 0.9,
    "top_p": 0.95,
    "seed": 999
}

# The interceptor forcibly overrides stochastic params
safe_config = DeterminismInterceptor.enforce_config(risky_config)

print(safe_config)
# Output:
# {
#   "model": "gpt-4",
#   "temperature": 0.0,  <-- Sanitized
#   "top_p": 1.0,        <-- Sanitized
#   "seed": 42           <-- Injected (Configurable via VERITAS_SEED)
# }

Getting Started

Prerequisites

  • Python 3.12+
  • Poetry

Installation

You can install coreason_veritas directly from PyPI:

pip install coreason-veritas

Or using Poetry:

poetry add coreason-veritas

Alternatively, to install from source:

  1. Clone the repository:
    git clone https://github.com/CoReason-AI/coreason_veritas.git
    cd coreason_veritas
    
  2. Install dependencies:
    poetry install
    

Development

  • Run the linter:
    poetry run pre-commit run --all-files
    
  • Run the tests:
    poetry run pytest
    

License

This project is licensed under the Prosperity Public License 3.0.0. See the LICENSE file for details.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

coreason_veritas-0.11.1.tar.gz (25.7 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

coreason_veritas-0.11.1-py3-none-any.whl (31.8 kB view details)

Uploaded Python 3

File details

Details for the file coreason_veritas-0.11.1.tar.gz.

File metadata

  • Download URL: coreason_veritas-0.11.1.tar.gz
  • Upload date:
  • Size: 25.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for coreason_veritas-0.11.1.tar.gz
Algorithm Hash digest
SHA256 528516af040b4805ff51d2e3b4d9534b2ed838aadf1f502471486d64cb8c1df8
MD5 b115f724bb843f12486813a448935dbf
BLAKE2b-256 98cfaec41d26c34a34f531a4c4e6a6047242be3e37ba692eca3b45b093581cb4

See more details on using hashes here.

Provenance

The following attestation bundles were made for coreason_veritas-0.11.1.tar.gz:

Publisher: publish.yml on CoReason-AI/coreason_veritas

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file coreason_veritas-0.11.1-py3-none-any.whl.

File metadata

File hashes

Hashes for coreason_veritas-0.11.1-py3-none-any.whl
Algorithm Hash digest
SHA256 9d50f671972a9b04d7e830b16eac1cc4feebe02572aa4cdac1b961c43fa2d00f
MD5 d9b72770048a546e4e698ae8f72a30e6
BLAKE2b-256 51d1f88e5e3363711157f221c600c02c907438d51b3b174e00015b1c3d3cc9d7

See more details on using hashes here.

Provenance

The following attestation bundles were made for coreason_veritas-0.11.1-py3-none-any.whl:

Publisher: publish.yml on CoReason-AI/coreason_veritas

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page