Skip to main content

Human-in-the-Loop as a discipline. UPIP (Universal Process Integrity Protocol), airlock sandbox, dependency triage, cross-machine replay, Zenodo reproducibility bundles with TIBET provenance.

Project description

tibet-triage

Human-in-the-Loop as a discipline. Not a rubber stamp.

Airlock sandbox execution, isomorphic mirror, risk-gated triage levels with full TIBET provenance. Every action is pre-computed, every change is diffed, every decision is signed.

The Problem

Compliance frameworks (SOC 2, ISO 27001, NIS2, DORA, PCI DSS, HIPAA) require human oversight. But nobody defines when, how, or with what evidence. The result: operators rubber-stamp everything because stopping the pipeline is worse than the risk.

Triage is not approval. Triage is assessment by someone who sees the difference.

How It Works

Process Request → AIRLOCK (sandbox) → RISK GATE → TRIAGE LEVEL → APPLY
  1. Airlock: Run any process in an isolated sandbox. Capture all file changes, side effects, and TIBET tokens.
  2. Risk Gate: Evaluate trigger rules against the airlock result. Automatically determine what level of oversight is needed.
  3. Triage: Present evidence to the right level of human reviewer.
  4. Apply: On approval, apply the pre-computed diff. Deterministic. No drift.

Triage Levels

Level Who When
L0 AUTO No human Trust score high, no triggers fired
L1 OPERATOR One operator, async Moderate risk, standard review
L2 SENIOR Senior + co-signer System-critical, intent mismatch
L3 CEREMONY Physical presence Catastrophic risk, out-of-band

Quick Start

pip install tibet-triage

# Run a command in the airlock
tibet-triage run python deploy.py --source ./app --intent "Deploy API v2.3"

# If triage is needed, review the evidence
tibet-triage pending
tibet-triage review triage-abc123

# Approve or reject
tibet-triage approve triage-abc123 --operator jasper@humotica.com
tibet-triage reject triage-abc123 --reason "Diff too large"

Not Just for AI

tibet-triage is a universal process integrity engine. The same airlock + mirror + risk gate pattern works for:

  • CI/CD pipelines — pre-compute deployments, review before apply
  • Scientific computing — reproducible experiments with evidence chains
  • Supply chain — package build verification before publish
  • Financial transactions — pre-compute + compliance check + execute
  • Infrastructure — terraform plan is a primitive airlock; this is the full version
  • Medical data — HIPAA minimum necessary, proven by diff

Part of the TIBET Ecosystem

License

MIT — Humotica AI Lab

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

tibet_triage-0.3.2.tar.gz (38.7 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

tibet_triage-0.3.2-py3-none-any.whl (45.3 kB view details)

Uploaded Python 3

File details

Details for the file tibet_triage-0.3.2.tar.gz.

File metadata

  • Download URL: tibet_triage-0.3.2.tar.gz
  • Upload date:
  • Size: 38.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for tibet_triage-0.3.2.tar.gz
Algorithm Hash digest
SHA256 82338b092064ba045d4356925298795baf425302be16827c5503b2255570f52b
MD5 933ed1b3711c5b422a733651f645f565
BLAKE2b-256 c2f9f8f64a2aaf571f80ab2e6099475f79513206f35d764c6fe616319a547be2

See more details on using hashes here.

File details

Details for the file tibet_triage-0.3.2-py3-none-any.whl.

File metadata

  • Download URL: tibet_triage-0.3.2-py3-none-any.whl
  • Upload date:
  • Size: 45.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for tibet_triage-0.3.2-py3-none-any.whl
Algorithm Hash digest
SHA256 b1e122be6ed89ecdde5dbefb29d2912f5d9e25b36c3ca8a448efd4d70c520654
MD5 e1f40aeff5dc6747efea6d0f6c1c78ef
BLAKE2b-256 d85a4128642e91a8b6d7c080a491b8111eccf2147cf693a785b4505b368d50b8

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page