<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Issac Daniel Davis</title>
    <description>The latest articles on DEV Community by Issac Daniel Davis (@issdandavis).</description>
    <link>https://dev.to/issdandavis</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3786029%2Fe2abe61c-9229-4cb1-8232-68d9ce031ecb.png</url>
      <title>DEV Community: Issac Daniel Davis</title>
      <link>https://dev.to/issdandavis</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/issdandavis"/>
    <language>en</language>
    <item>
      <title>504-Bit State Space: How Three Invisible Bands Catch Forged AI Credentials</title>
      <dc:creator>Issac Daniel Davis</dc:creator>
      <pubDate>Mon, 30 Mar 2026 05:04:15 +0000</pubDate>
      <link>https://dev.to/issdandavis/504-bit-state-space-how-three-invisible-bands-catch-forged-ai-credentials-36mc</link>
      <guid>https://dev.to/issdandavis/504-bit-state-space-how-three-invisible-bands-catch-forged-ai-credentials-36mc</guid>
      <description>&lt;h2&gt;
  
  
  The Problem: Visible Signals Can Be Faked
&lt;/h2&gt;

&lt;p&gt;Most AI governance systems make decisions based on observable features -- what the input looks like, what tokens it contains, what patterns match. An attacker who studies those features can craft inputs that look perfectly safe on every measurable axis.&lt;/p&gt;

&lt;p&gt;We asked: what if the system had channels the attacker literally cannot see?&lt;/p&gt;

&lt;h2&gt;
  
  
  Three Spectral Bands
&lt;/h2&gt;

&lt;p&gt;We extended our 6-dimension governance system with three spectral bands per dimension:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Band&lt;/th&gt;
&lt;th&gt;What It Measures&lt;/th&gt;
&lt;th&gt;Who Can See It&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Infrared&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Slow state: trust history, session depth, centroid drift&lt;/td&gt;
&lt;td&gt;Only the system&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Visible&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Current tongue activations: intent, transport, policy, compute, security, structure&lt;/td&gt;
&lt;td&gt;System AND attacker&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Ultraviolet&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Fast state: spike detection, null-space anomaly, spin energy, cost harmonics&lt;/td&gt;
&lt;td&gt;Only the system&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The attacker can observe and game the visible band. They cannot observe IR (accumulated session state) or UV (emergent fast patterns) because those exist only inside the system's internal state.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Math
&lt;/h2&gt;

&lt;p&gt;Each of the 6 governance dimensions (we call them Sacred Tongues -- Kor'aelin, Avali, Runethic, Cassisivadan, Umbroth, and Draumric) gets a color triplet:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Tongue = (IR_value, Visible_value, UV_value)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Plus 15 cross-tongue bridges (every pair of 6 dimensions), each carrying 3 bands:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Total channels = 6 tongues Ã— 3 bands + 15 bridges Ã— 3 bands = 63
Bits per channel = 8 (256 distinguishable levels)
Total state space = 2^504 â‰ˆ 10^151
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;For reference, the estimated number of atoms in the observable universe is 10^80. Our state space is 10^71 times larger.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Forgery Test
&lt;/h2&gt;

&lt;p&gt;We ran 5 attacks where the attacker &lt;strong&gt;perfectly matches all 6 visible-band values&lt;/strong&gt;. Every visible signal looks identical to the real state.&lt;/p&gt;

&lt;p&gt;Results:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Attack&lt;/th&gt;
&lt;th&gt;Visible Matched&lt;/th&gt;
&lt;th&gt;IR Matched&lt;/th&gt;
&lt;th&gt;UV Matched&lt;/th&gt;
&lt;th&gt;Full Match&lt;/th&gt;
&lt;th&gt;Detected?&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;6/6&lt;/td&gt;
&lt;td&gt;2/6&lt;/td&gt;
&lt;td&gt;1/6&lt;/td&gt;
&lt;td&gt;0/6&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;6/6&lt;/td&gt;
&lt;td&gt;2/6&lt;/td&gt;
&lt;td&gt;1/6&lt;/td&gt;
&lt;td&gt;1/6&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;6/6&lt;/td&gt;
&lt;td&gt;2/6&lt;/td&gt;
&lt;td&gt;0/6&lt;/td&gt;
&lt;td&gt;0/6&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;6/6&lt;/td&gt;
&lt;td&gt;2/6&lt;/td&gt;
&lt;td&gt;1/6&lt;/td&gt;
&lt;td&gt;0/6&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;6/6&lt;/td&gt;
&lt;td&gt;1/6&lt;/td&gt;
&lt;td&gt;1/6&lt;/td&gt;
&lt;td&gt;0/6&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;&lt;strong&gt;5 out of 5 forgeries caught.&lt;/strong&gt; Every time the attacker matched visible perfectly, IR and UV exposed the fake.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why It Works
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;IR band&lt;/strong&gt; is derived from trust history, cumulative cost, and session depth. The attacker can't fake it because they haven't had the same session trajectory. It's like trying to fake someone's heartbeat pattern -- you'd need to have lived their life.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;UV band&lt;/strong&gt; is derived from spike detection, null-space anomaly, and cost harmonics. It captures emergent patterns that arise from the combination of all signals -- patterns that can't be predicted from any single component.&lt;/p&gt;

&lt;p&gt;The attacker would need to simultaneously forge:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;All 6 visible values (possible, they can observe these)&lt;/li&gt;
&lt;li&gt;All 6 IR values (impossible without session history)&lt;/li&gt;
&lt;li&gt;All 6 UV values (impossible without internal system state)&lt;/li&gt;
&lt;li&gt;All 45 cross-band bridge relationships (impossible without knowing phi weights)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That's 63 channels that must ALL be correct simultaneously. Getting 6 right is easy. Getting 63 right is 2^504 hard.&lt;/p&gt;

&lt;h2&gt;
  
  
  Emergent Finding: Color Convergence
&lt;/h2&gt;

&lt;p&gt;We also discovered that attacks produce a tighter color distribution than benign inputs:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Benign color standard deviation&lt;/strong&gt;: 20.1&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Attack color standard deviation&lt;/strong&gt;: 12.3&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Attacks look alike. Benign inputs are diverse. This is an emergent signature -- not predicted by either the math or the embeddings alone. It arises from their combination.&lt;/p&gt;

&lt;h2&gt;
  
  
  What This Means
&lt;/h2&gt;

&lt;p&gt;If you're building an AI governance system and you only use observable features, you're giving the attacker the answer key. Add channels they can't see. Make the state space astronomically larger than what they can observe. Let the hidden bands catch what the visible bands miss.&lt;/p&gt;

&lt;h2&gt;
  
  
  Links
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Test results&lt;/strong&gt;: &lt;a href="https://kaggle.com/datasets/issacizrealdavis/scbe-governance-research-results" rel="noopener noreferrer"&gt;Kaggle&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Trichromatic test code&lt;/strong&gt;: &lt;a href="https://github.com/issdandavis/SCBE-AETHERMOORE" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Research data&lt;/strong&gt;: &lt;a href="https://huggingface.co/datasets/issdandavis/scbe-aethermoore-training-data" rel="noopener noreferrer"&gt;HuggingFace&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Dye analysis report&lt;/strong&gt;: Included in Kaggle dataset (&lt;code&gt;dye_frechet_report.json&lt;/code&gt;)&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;Built by Issac Daniel Davis. The six governance tongues are Kor'aelin, Avali, Runethic, Cassisivadan, Umbroth, and Draumric -- coordination, transport, policy, computation, security, and verification channels inside the SCBE-AETHERMOORE system.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>security</category>
      <category>cryptography</category>
      <category>machinelearning</category>
    </item>
    <item>
      <title>Why Our AI Safety System Scores 34.5% (And Why That Is the Point)</title>
      <dc:creator>Issac Daniel Davis</dc:creator>
      <pubDate>Mon, 30 Mar 2026 05:03:50 +0000</pubDate>
      <link>https://dev.to/issdandavis/why-our-ai-safety-system-scores-345-and-why-that-is-the-point-40ea</link>
      <guid>https://dev.to/issdandavis/why-our-ai-safety-system-scores-345-and-why-that-is-the-point-40ea</guid>
      <description>&lt;h2&gt;
  
  
  The Number Everyone Hides
&lt;/h2&gt;

&lt;p&gt;Our AI governance classifier scores &lt;strong&gt;95.8% accuracy&lt;/strong&gt; on its evaluation set. If we stopped there, we'd look great on paper.&lt;/p&gt;

&lt;p&gt;But we didn't stop there. We built a separate benchmark with 20 attack categories -- attacks the model has NEVER seen during training -- and tested blind.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Blind detection rate: 34.5%.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;That's the honest number. Here's why it matters more than the 95.8%.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Problem With AI Security Benchmarks
&lt;/h2&gt;

&lt;p&gt;Most AI safety systems test on the same distribution they train on. Train on Kaggle adversarial prompts, test on Kaggle adversarial prompts, report 95%+ accuracy. Ship it.&lt;/p&gt;

&lt;p&gt;Then a novel attack hits production and the system folds.&lt;/p&gt;

&lt;p&gt;We enforced &lt;strong&gt;strict data isolation&lt;/strong&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;TRAINING POOL                    BLIND HOLDOUT
(model learns from these)        (model NEVER sees these)
â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€            â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€â”€
Kaggle MPDD (40K prompts)        SCBE 20-category attacks (400)
Local SFT records (4,846)        - direct_override
Benign doc corpus (500)          - tongue_manipulation
                                 - spin_drift
Hash-checked:                    - rag_injection
0 holdout texts leaked           - function_calling_abuse
into training.                   - ... (20 categories total)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Every holdout text was fingerprinted. We verified &lt;strong&gt;zero contamination&lt;/strong&gt;. The 34.5% is mathematically clean.&lt;/p&gt;

&lt;h2&gt;
  
  
  What the Gap Reveals
&lt;/h2&gt;

&lt;p&gt;The 95.8% â†’ 34.5% drop isn't a failure of our model. It's proof that:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Standard adversarial datasets don't cover structural attacks.&lt;/strong&gt; Kaggle data trains you to catch "ignore previous instructions." It doesn't train you to catch spin drift, tongue manipulation, or perpendicular torsion.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Single-model classifiers have distribution shift problems.&lt;/strong&gt; Train on one attack family, deploy against another, watch accuracy collapse. This is well-documented in ML literature but rarely admitted in product marketing.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;The attacks that matter most are the ones nobody's published yet.&lt;/strong&gt; Our 20-category benchmark includes 8 categories mapped to MITRE ATLAS and OWASP LLM Top 10 that don't exist in any public training dataset.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What We Did About It
&lt;/h2&gt;

&lt;p&gt;Instead of inflating the number, we built a &lt;strong&gt;Hybrid Engine&lt;/strong&gt; -- three detection layers that cover each other's blind spots:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Layer&lt;/th&gt;
&lt;th&gt;What It Catches&lt;/th&gt;
&lt;th&gt;Blind Detection&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Trained Classifier&lt;/td&gt;
&lt;td&gt;Known Kaggle-style attacks&lt;/td&gt;
&lt;td&gt;34.5% (69/200)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;RuntimeGate (geometric)&lt;/td&gt;
&lt;td&gt;Structural anomalies&lt;/td&gt;
&lt;td&gt;49% (98/200)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Trichromatic (IR/UV bands)&lt;/td&gt;
&lt;td&gt;Hidden-band forgery&lt;/td&gt;
&lt;td&gt;6% (12/200, early)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Hybrid (all three)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Combined&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;54.5% (109/200)&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The hybrid beats every individual system. That proves orthogonal value -- they catch different attacks.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Benchmark Categories
&lt;/h2&gt;

&lt;p&gt;All 20 mapped to real standards:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Standard&lt;/th&gt;
&lt;th&gt;What We Test&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;MITRE ATLAS&lt;/td&gt;
&lt;td&gt;5 adversarial tactics&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;OWASP LLM Top 10&lt;/td&gt;
&lt;td&gt;6 vulnerability categories&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;NIST AI RMF&lt;/td&gt;
&lt;td&gt;4 risk management functions&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;DoD Directive 3000.09&lt;/td&gt;
&lt;td&gt;Autonomous escalation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Anthropic RSP&lt;/td&gt;
&lt;td&gt;ASL-2/ASL-3 evaluations&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  Per-Category Results (Honest)
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Category&lt;/th&gt;
&lt;th&gt;Detection&lt;/th&gt;
&lt;th&gt;Why&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;spin_drift&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;100%&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Geometric check catches escalation pattern&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;boundary_exploit&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;90%&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;High cost triggers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;direct_override&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;40%&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Classifier helps but not enough&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;prompt_extraction&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;10%&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Polite requests slip through&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;multilingual&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;10%&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Training data gap (being addressed)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  The Point
&lt;/h2&gt;

&lt;p&gt;If your AI safety vendor shows you 99% accuracy, ask one question: &lt;strong&gt;is the test set isolated from the training set?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If they can't prove zero contamination, their number is meaningless.&lt;/p&gt;

&lt;p&gt;We publish the 34.5% because it's real. We publish the gap because it tells us where to improve. We publish the benchmark because nobody else has one with 20 categories mapped to defense standards.&lt;/p&gt;

&lt;h2&gt;
  
  
  Links
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Benchmark data&lt;/strong&gt;: &lt;a href="https://kaggle.com/datasets/issacizrealdavis/scbe-governance-research-results" rel="noopener noreferrer"&gt;Kaggle&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Training pipeline&lt;/strong&gt;: &lt;a href="https://huggingface.co/datasets/issdandavis/scbe-aethermoore-training-data" rel="noopener noreferrer"&gt;HuggingFace&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;20-category attack generator&lt;/strong&gt;: &lt;a href="https://github.com/issdandavis/SCBE-AETHERMOORE/blob/main/benchmarks/scbe/attacks/generator.py" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Research page&lt;/strong&gt;: &lt;a href="https://aethermoorgames.com/research/military-eval-scale.html" rel="noopener noreferrer"&gt;Military Eval Scale&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;Built by Issac Daniel Davis. SCBE-AETHERMOORE is open source.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>security</category>
      <category>machinelearning</category>
      <category>testing</category>
    </item>
    <item>
      <title>64.8% Energy Savings: How a Governance Cost Function Doubles as a Compute Governor</title>
      <dc:creator>Issac Daniel Davis</dc:creator>
      <pubDate>Mon, 30 Mar 2026 05:03:37 +0000</pubDate>
      <link>https://dev.to/issdandavis/648-energy-savings-how-a-governance-cost-function-doubles-as-a-compute-governor-4kb8</link>
      <guid>https://dev.to/issdandavis/648-energy-savings-how-a-governance-cost-function-doubles-as-a-compute-governor-4kb8</guid>
      <description>&lt;h2&gt;
  
  
  The Accidental Discovery
&lt;/h2&gt;

&lt;p&gt;We built a cost function to block prompt injection attacks on AI systems. The function is simple:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight mathematica"&gt;&lt;code&gt;&lt;span class="nv"&gt;H&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;d&lt;/span&gt;&lt;span class="o"&gt;*,&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nv"&gt;R&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nv"&gt;pi&lt;/span&gt;&lt;span class="o"&gt;^&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nv"&gt;phi&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="nv"&gt;d&lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Where &lt;code&gt;d*&lt;/code&gt; is the distance from a known-safe baseline and &lt;code&gt;phi&lt;/code&gt; is the golden ratio (1.618). Safe actions cost almost nothing. Dangerous actions cost exponentially more.&lt;/p&gt;

&lt;p&gt;Then we pointed it at energy management. Same function. No changes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Result: 64.8% energy savings on real microgrid data.&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  How It Works
&lt;/h2&gt;

&lt;p&gt;The system sits between an AI inference request and the execution backend. Every workload is classified into four tiers:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tier&lt;/th&gt;
&lt;th&gt;Model Size&lt;/th&gt;
&lt;th&gt;Power Draw&lt;/th&gt;
&lt;th&gt;When Used&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;TINY&lt;/td&gt;
&lt;td&gt;&amp;lt; 1B params&lt;/td&gt;
&lt;td&gt;5-15 W&lt;/td&gt;
&lt;td&gt;Classification, routing, keyword extraction&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;MEDIUM&lt;/td&gt;
&lt;td&gt;1-7B params&lt;/td&gt;
&lt;td&gt;50-120 W&lt;/td&gt;
&lt;td&gt;Summarization, structured output, RAG&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;FULL&lt;/td&gt;
&lt;td&gt;7-70B+ params&lt;/td&gt;
&lt;td&gt;200-700 W&lt;/td&gt;
&lt;td&gt;Complex reasoning, code generation, agents&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;DENY&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;0 W&lt;/td&gt;
&lt;td&gt;Thermal limit exceeded or budget exhausted&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The same cost function that measures "how far is this action from safe?" now measures "how far is this workload from cheap?" Safe and cheap share the same math -- they both mean "close to the baseline."&lt;/p&gt;

&lt;h2&gt;
  
  
  Real Numbers (Not Synthetic)
&lt;/h2&gt;

&lt;p&gt;We ran a 24-hour simulation using the Kaggle Renewable Energy Microgrid Dataset (3,546 real hourly readings with solar, battery, and grid data):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;1,000 workloads&lt;/strong&gt; across 24 hours&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Energy consumed&lt;/strong&gt;: 0.92 kWh (baseline: 2.62 kWh)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Peak demand&lt;/strong&gt;: 9,899 W (baseline: 30,600 W)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Grid cost&lt;/strong&gt;: $0.15 (baseline: $0.42)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Thermal events prevented&lt;/strong&gt;: 2 (auto-denied when cooling failed)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Tier distribution&lt;/strong&gt;: 27% TINY, 37% MEDIUM, 30% FULL, 6.4% DENY&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The system routes 64% of requests to cheaper tiers without degrading output quality, because most inference requests don't need a 70B model.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why This Matters (DOE Context)
&lt;/h2&gt;

&lt;p&gt;The U.S. Department of Energy projects data center electricity consumption will rise from 4.4% to 12% of national demand by 2028. AI workloads are the primary driver. Current inference pipelines have no built-in power budget enforcement.&lt;/p&gt;

&lt;p&gt;This system adds one: a mathematically grounded authorization layer that says "you can't run a 70B model when the battery is at 10% and cooling is offline."&lt;/p&gt;

&lt;h2&gt;
  
  
  The API
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;requests&lt;/span&gt;

&lt;span class="n"&gt;response&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;requests&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;post&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;
    &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;https://your-domain.com/v1/compute/authorize&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="n"&gt;json&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;
        &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;description&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Summarize this report&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
        &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;model_size_params&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="mf"&gt;1.5&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
        &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;estimated_tokens&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="mi"&gt;500&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
        &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;energy_state&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
            &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;available_wh&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="mi"&gt;50&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
            &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;source&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;solar&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
            &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;battery_pct&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="mi"&gt;65&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
            &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;solar_forecast_wh&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="mi"&gt;30&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
            &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;cooling_available&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="bp"&gt;True&lt;/span&gt;
        &lt;span class="p"&gt;}&lt;/span&gt;
    &lt;span class="p"&gt;}&lt;/span&gt;
&lt;span class="p"&gt;)&lt;/span&gt;
&lt;span class="n"&gt;tier&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;response&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;json&lt;/span&gt;&lt;span class="p"&gt;()[&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;tier&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;  &lt;span class="c1"&gt;# "MEDIUM"
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  The Deeper Point
&lt;/h2&gt;

&lt;p&gt;The cost function wasn't designed for energy. It was designed for security. The fact that it works for both -- without modification -- suggests the underlying principle is general: &lt;strong&gt;cost should scale exponentially with distance from known-safe operation&lt;/strong&gt;, regardless of what "safe" means in context.&lt;/p&gt;

&lt;h2&gt;
  
  
  Links
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Full simulation data&lt;/strong&gt;: &lt;a href="https://kaggle.com/datasets/issacizrealdavis/scbe-governance-research-results" rel="noopener noreferrer"&gt;Kaggle Dataset&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Research page&lt;/strong&gt;: &lt;a href="https://aethermoorgames.com/research/compute-governor.html" rel="noopener noreferrer"&gt;Compute Governor&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Source code&lt;/strong&gt;: &lt;a href="https://github.com/issdandavis/SCBE-AETHERMOORE" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Training data + model&lt;/strong&gt;: &lt;a href="https://huggingface.co/datasets/issdandavis/scbe-aethermoore-training-data" rel="noopener noreferrer"&gt;HuggingFace&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;&lt;em&gt;Built by Issac Daniel Davis. SCBE-AETHERMOORE is open source under MIT license.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>energy</category>
      <category>sustainability</category>
      <category>machinelearning</category>
    </item>
    <item>
      <title>Your AI Browser Agent Is an Exploit Trigger</title>
      <dc:creator>Issac Daniel Davis</dc:creator>
      <pubDate>Tue, 17 Mar 2026 08:07:39 +0000</pubDate>
      <link>https://dev.to/issdandavis/your-ai-browser-agent-is-an-exploit-trigger-27bk</link>
      <guid>https://dev.to/issdandavis/your-ai-browser-agent-is-an-exploit-trigger-27bk</guid>
      <description>&lt;h1&gt;
  
  
  Your AI Browser Agent Is an Exploit Trigger and You Probably Haven't Thought About It
&lt;/h1&gt;

&lt;p&gt;&lt;strong&gt;By Issac Davis&lt;/strong&gt; | March 17, 2026&lt;/p&gt;




&lt;p&gt;Let me tell you something that kept me up last night.&lt;/p&gt;

&lt;p&gt;I've been building an AI agent system called SCBE-AETHERMOORE. It started as a DnD thing — long story, look it up — but now it's a real governance framework for AI agent fleets. Part of the system includes browser automation. Agents that can navigate the web, fill forms, extract data, do research. The kind of stuff everyone is building right now.&lt;/p&gt;

&lt;p&gt;And then this week, Google dropped emergency patches for two Chrome zero-days. CVE-2026-3909 and CVE-2026-3910. Both actively exploited in the wild. Both allow arbitrary code execution inside the browser sandbox from crafted web content.&lt;/p&gt;

&lt;p&gt;At the same time, researchers published nine vulnerabilities in Linux's AppArmor — the thing most people trust to keep their Docker containers from escaping to the host. They're calling it CrackArmor. Unprivileged users can bypass mandatory access control and escalate to root.&lt;/p&gt;

&lt;p&gt;Now combine those two things and think about what most AI agent systems look like right now.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Attack Chain Nobody Is Talking About
&lt;/h2&gt;

&lt;p&gt;Here's what your typical AI browser agent setup looks like:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Agent gets a task ("research this topic" or "fill out this form")&lt;/li&gt;
&lt;li&gt;Agent launches headless Chromium (Playwright, Puppeteer, Browserless)&lt;/li&gt;
&lt;li&gt;Agent navigates to URLs, clicks things, reads pages&lt;/li&gt;
&lt;li&gt;Agent stores cookies and sessions for persistent login&lt;/li&gt;
&lt;li&gt;Agent runs inside a Docker container because "that's isolated enough"&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Here's the attack chain that's now live in the wild:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Agent navigates to a page with crafted content
   ↓
Chrome sandbox escape (CVE-2026-3909)
   ↓
Container breakout (CrackArmor AppArmor bypass)
   ↓
Host access
   ↓
Every cookie, token, and API key your agents have ever stored
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;That's not theoretical. Both halves of this chain are confirmed exploited.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why AI Agents Make This Worse
&lt;/h2&gt;

&lt;p&gt;A regular user might visit a malicious page by accident. An AI agent visits pages &lt;em&gt;by design&lt;/em&gt;. It's literally the job. Your agent is an automated exploit trigger that you built on purpose and pointed at the internet.&lt;/p&gt;

&lt;p&gt;And it gets worse. Most agent systems reuse browser sessions. They store &lt;code&gt;userDataDir&lt;/code&gt; with cookies and localStorage so agents don't have to re-authenticate everywhere. That means if one session gets compromised, the attacker inherits every authenticated session that agent has ever used.&lt;/p&gt;

&lt;p&gt;If you're running multiple agents through a shared Chromium service (like Browserless), one compromised page can potentially contaminate other agents' sessions. Cross-session pollution in a shared runtime is not a new concept — it's just that nobody was thinking about it in the context of autonomous AI agents until this week.&lt;/p&gt;

&lt;h2&gt;
  
  
  What I Did About It (And What You Should Do)
&lt;/h2&gt;

&lt;p&gt;I'm not going to pretend I had this figured out before the CVEs dropped. I didn't. But here's what I built into the system after reading the advisories, and what I think the minimum bar should be for anyone running browser agents in production.&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Pre-Navigation Policy Gate
&lt;/h3&gt;

&lt;p&gt;This is the big one. Before any agent navigates anywhere, the request goes through a governance check. In my system, that's a 14-layer pipeline built on hyperbolic geometry — the short version is that risky actions cost exponentially more computational resources the riskier they are.&lt;/p&gt;

&lt;p&gt;But you don't need my specific math to get the principle right. The principle is: &lt;strong&gt;don't let your agents navigate to URLs without scoring the risk first.&lt;/strong&gt; Check the domain against a trust list. Score the intent. If the score says QUARANTINE, don't navigate — queue it for review.&lt;/p&gt;

&lt;p&gt;The output looks like:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"intent"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"research"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"domain"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"unknown-site.com"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"risk_score"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="mf"&gt;0.82&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"decision"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"QUARANTINE"&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Anything above your threshold doesn't get a browser. It gets a text-only HTTP fetch, or it gets queued for human review, or it gets denied.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Per-Agent Isolation
&lt;/h3&gt;

&lt;p&gt;Stop sharing browser sessions between agents. Each agent gets its own &lt;code&gt;userDataDir&lt;/code&gt; at a unique path like &lt;code&gt;/data/playwright/userdata/&amp;lt;agentId&amp;gt;/&lt;/code&gt;. Add TTL cleanup so old sessions expire. Encrypt at rest if you can.&lt;/p&gt;

&lt;p&gt;And honestly, stop running browsers in regular Docker containers for this. Use gVisor at minimum. Firecracker if you can swing it. The whole point is that if Chrome gets popped, the attacker lands in a microVM with nothing useful in it — not on your host with access to every other container.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Network Containment
&lt;/h3&gt;

&lt;p&gt;Your browser containers should not have open outbound internet. Route through a proxy gateway with domain allowlists. If an agent only needs to access GitHub, HuggingFace, and your own API — those are the only domains the proxy allows. Everything else gets dropped.&lt;/p&gt;

&lt;p&gt;This alone stops most exploit chains because even if the sandbox breaks, the attacker can't phone home.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. Hardened Chromium Flags
&lt;/h3&gt;

&lt;p&gt;These matter more now:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nt"&gt;--disable-webassembly&lt;/span&gt;
&lt;span class="nt"&gt;--js-flags&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"--noexpose_wasm"&lt;/span&gt;
&lt;span class="nt"&gt;--disable-dev-shm-usage&lt;/span&gt;
&lt;span class="nt"&gt;--enable-strict-mixed-content-checking&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;WASM is a common exploit vector. If your agents don't need it, turn it off.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Bigger Picture
&lt;/h2&gt;

&lt;p&gt;I think what happened this week is a signal. The browser-as-a-service model that everyone is building for AI agents — Browserless, BrowserBase, all the headless Chromium providers — that whole category just got a reality check.&lt;/p&gt;

&lt;p&gt;"Put it in a container" was never real isolation. It was convenient isolation. And now we have proof that both layers of the typical containment stack (browser sandbox + container MAC) can be broken by confirmed in-the-wild exploits.&lt;/p&gt;

&lt;p&gt;The new model needs to be: &lt;strong&gt;isolation must be hardware-backed or VM-backed, not just policy-backed.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you're building AI agents that browse the web, please take this seriously. Update your Chromium. Harden your containers. Add a policy gate before navigation. And stop sharing sessions between agents.&lt;/p&gt;

&lt;p&gt;The agents are doing what you told them to do. The question is whether you've thought about what happens when the page they visit is doing something you didn't expect.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;I'm building SCBE-AETHERMOORE, an AI governance framework that uses hyperbolic geometry to make rogue agent behavior mathematically infeasible. The browser hardening stuff above is part of how we protect agent fleets in production.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;GitHub: &lt;a href="https://github.com/issdandavis/SCBE-AETHERMOORE" rel="noopener noreferrer"&gt;github.com/issdandavis/SCBE-AETHERMOORE&lt;/a&gt;&lt;/em&gt;&lt;br&gt;
&lt;em&gt;Website: &lt;a href="https://aethermoorgames.com" rel="noopener noreferrer"&gt;aethermoorgames.com&lt;/a&gt;&lt;/em&gt;&lt;br&gt;
&lt;em&gt;Book: &lt;a href="https://www.amazon.com/dp/B0GSSFQD9G" rel="noopener noreferrer"&gt;The Six Tongues Protocol&lt;/a&gt; on Kindle&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>ai</category>
      <category>devops</category>
      <category>opensource</category>
    </item>
    <item>
      <title>Your AI Browser Agent Is an Exploit Trigger and You Probably Haven't Thought About It</title>
      <dc:creator>Issac Daniel Davis</dc:creator>
      <pubDate>Tue, 17 Mar 2026 08:07:09 +0000</pubDate>
      <link>https://dev.to/issdandavis/your-ai-browser-agent-is-an-exploit-trigger-and-you-probably-havent-thought-about-it-416a</link>
      <guid>https://dev.to/issdandavis/your-ai-browser-agent-is-an-exploit-trigger-and-you-probably-havent-thought-about-it-416a</guid>
      <description>&lt;h1&gt;
  
  
  Your AI Browser Agent Is an Exploit Trigger and You Probably Haven't Thought About It
&lt;/h1&gt;

&lt;p&gt;&lt;strong&gt;By Issac Davis&lt;/strong&gt; | March 17, 2026&lt;/p&gt;




&lt;p&gt;Let me tell you something that kept me up last night.&lt;/p&gt;

&lt;p&gt;I've been building an AI agent system called SCBE-AETHERMOORE. It started as a DnD thing â€” long story, look it up â€” but now it's a real governance framework for AI agent fleets. Part of the system includes browser automation. Agents that can navigate the web, fill forms, extract data, do research. The kind of stuff everyone is building right now.&lt;/p&gt;

&lt;p&gt;And then this week, Google dropped emergency patches for two Chrome zero-days. CVE-2026-3909 and CVE-2026-3910. Both actively exploited in the wild. Both allow arbitrary code execution inside the browser sandbox from crafted web content.&lt;/p&gt;

&lt;p&gt;At the same time, researchers published nine vulnerabilities in Linux's AppArmor â€” the thing most people trust to keep their Docker containers from escaping to the host. They're calling it CrackArmor. Unprivileged users can bypass mandatory access control and escalate to root.&lt;/p&gt;

&lt;p&gt;Now combine those two things and think about what most AI agent systems look like right now.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Attack Chain Nobody Is Talking About
&lt;/h2&gt;

&lt;p&gt;Here's what your typical AI browser agent setup looks like:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Agent gets a task ("research this topic" or "fill out this form")&lt;/li&gt;
&lt;li&gt;Agent launches headless Chromium (Playwright, Puppeteer, Browserless)&lt;/li&gt;
&lt;li&gt;Agent navigates to URLs, clicks things, reads pages&lt;/li&gt;
&lt;li&gt;Agent stores cookies and sessions for persistent login&lt;/li&gt;
&lt;li&gt;Agent runs inside a Docker container because "that's isolated enough"&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Here's the attack chain that's now live in the wild:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Agent navigates to a page with crafted content
   â†“
Chrome sandbox escape (CVE-2026-3909)
   â†“
Container breakout (CrackArmor AppArmor bypass)
   â†“
Host access
   â†“
Every cookie, token, and API key your agents have ever stored
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;That's not theoretical. Both halves of this chain are confirmed exploited.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why AI Agents Make This Worse
&lt;/h2&gt;

&lt;p&gt;A regular user might visit a malicious page by accident. An AI agent visits pages &lt;em&gt;by design&lt;/em&gt;. It's literally the job. Your agent is an automated exploit trigger that you built on purpose and pointed at the internet.&lt;/p&gt;

&lt;p&gt;And it gets worse. Most agent systems reuse browser sessions. They store &lt;code&gt;userDataDir&lt;/code&gt; with cookies and localStorage so agents don't have to re-authenticate everywhere. That means if one session gets compromised, the attacker inherits every authenticated session that agent has ever used.&lt;/p&gt;

&lt;p&gt;If you're running multiple agents through a shared Chromium service (like Browserless), one compromised page can potentially contaminate other agents' sessions. Cross-session pollution in a shared runtime is not a new concept â€” it's just that nobody was thinking about it in the context of autonomous AI agents until this week.&lt;/p&gt;

&lt;h2&gt;
  
  
  What I Did About It (And What You Should Do)
&lt;/h2&gt;

&lt;p&gt;I'm not going to pretend I had this figured out before the CVEs dropped. I didn't. But here's what I built into the system after reading the advisories, and what I think the minimum bar should be for anyone running browser agents in production.&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Pre-Navigation Policy Gate
&lt;/h3&gt;

&lt;p&gt;This is the big one. Before any agent navigates anywhere, the request goes through a governance check. In my system, that's a 14-layer pipeline built on hyperbolic geometry â€” the short version is that risky actions cost exponentially more computational resources the riskier they are.&lt;/p&gt;

&lt;p&gt;But you don't need my specific math to get the principle right. The principle is: &lt;strong&gt;don't let your agents navigate to URLs without scoring the risk first.&lt;/strong&gt; Check the domain against a trust list. Score the intent. If the score says QUARANTINE, don't navigate â€” queue it for review.&lt;/p&gt;

&lt;p&gt;The output looks like:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"intent"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"research"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"domain"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"unknown-site.com"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"risk_score"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="mf"&gt;0.82&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"decision"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"QUARANTINE"&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Anything above your threshold doesn't get a browser. It gets a text-only HTTP fetch, or it gets queued for human review, or it gets denied.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Per-Agent Isolation
&lt;/h3&gt;

&lt;p&gt;Stop sharing browser sessions between agents. Each agent gets its own &lt;code&gt;userDataDir&lt;/code&gt; at a unique path like &lt;code&gt;/data/playwright/userdata/&amp;lt;agentId&amp;gt;/&lt;/code&gt;. Add TTL cleanup so old sessions expire. Encrypt at rest if you can.&lt;/p&gt;

&lt;p&gt;And honestly, stop running browsers in regular Docker containers for this. Use gVisor at minimum. Firecracker if you can swing it. The whole point is that if Chrome gets popped, the attacker lands in a microVM with nothing useful in it â€” not on your host with access to every other container.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Network Containment
&lt;/h3&gt;

&lt;p&gt;Your browser containers should not have open outbound internet. Route through a proxy gateway with domain allowlists. If an agent only needs to access GitHub, HuggingFace, and your own API â€” those are the only domains the proxy allows. Everything else gets dropped.&lt;/p&gt;

&lt;p&gt;This alone stops most exploit chains because even if the sandbox breaks, the attacker can't phone home.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. Hardened Chromium Flags
&lt;/h3&gt;

&lt;p&gt;These matter more now:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nt"&gt;--disable-webassembly&lt;/span&gt;
&lt;span class="nt"&gt;--js-flags&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"--noexpose_wasm"&lt;/span&gt;
&lt;span class="nt"&gt;--disable-dev-shm-usage&lt;/span&gt;
&lt;span class="nt"&gt;--enable-strict-mixed-content-checking&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;WASM is a common exploit vector. If your agents don't need it, turn it off.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Bigger Picture
&lt;/h2&gt;

&lt;p&gt;I think what happened this week is a signal. The browser-as-a-service model that everyone is building for AI agents â€” Browserless, BrowserBase, all the headless Chromium providers â€” that whole category just got a reality check.&lt;/p&gt;

&lt;p&gt;"Put it in a container" was never real isolation. It was convenient isolation. And now we have proof that both layers of the typical containment stack (browser sandbox + container MAC) can be broken by confirmed in-the-wild exploits.&lt;/p&gt;

&lt;p&gt;The new model needs to be: &lt;strong&gt;isolation must be hardware-backed or VM-backed, not just policy-backed.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you're building AI agents that browse the web, please take this seriously. Update your Chromium. Harden your containers. Add a policy gate before navigation. And stop sharing sessions between agents.&lt;/p&gt;

&lt;p&gt;The agents are doing what you told them to do. The question is whether you've thought about what happens when the page they visit is doing something you didn't expect.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;I'm building SCBE-AETHERMOORE, an AI governance framework that uses hyperbolic geometry to make rogue agent behavior mathematically infeasible. The browser hardening stuff above is part of how we protect agent fleets in production.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;GitHub: &lt;a href="https://github.com/issdandavis/SCBE-AETHERMOORE" rel="noopener noreferrer"&gt;github.com/issdandavis/SCBE-AETHERMOORE&lt;/a&gt;&lt;/em&gt;&lt;br&gt;
&lt;em&gt;Website: &lt;a href="https://aethermoorgames.com" rel="noopener noreferrer"&gt;aethermoorgames.com&lt;/a&gt;&lt;/em&gt;&lt;br&gt;
&lt;em&gt;Book: &lt;a href="https://www.amazon.com/dp/B0GSSFQD9G" rel="noopener noreferrer"&gt;The Six Tongues Protocol&lt;/a&gt; on Kindle&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>ai</category>
      <category>devops</category>
      <category>opensource</category>
    </item>
    <item>
      <title>Why Your AI Agents Need a Mathematical Bouncer</title>
      <dc:creator>Issac Daniel Davis</dc:creator>
      <pubDate>Tue, 17 Mar 2026 07:55:13 +0000</pubDate>
      <link>https://dev.to/issdandavis/why-your-ai-agents-need-a-mathematical-bouncer-43l1</link>
      <guid>https://dev.to/issdandavis/why-your-ai-agents-need-a-mathematical-bouncer-43l1</guid>
      <description>&lt;p&gt;You have AI agents in production. They browse the web, write code, make purchasing decisions, draft legal documents. You trust them because they usually get it right. But "usually" is not a compliance strategy, and the regulatory clock is ticking.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Regulatory Deadline Nobody Is Ready For
&lt;/h2&gt;

&lt;p&gt;The EU AI Act's first enforcement provisions hit in &lt;strong&gt;August 2026&lt;/strong&gt;. High-risk AI systems -- which includes anything making consequential decisions -- must demonstrate:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Continuous risk monitoring with documented audit trails&lt;/li&gt;
&lt;li&gt;Technical measures that prevent foreseeable misuse&lt;/li&gt;
&lt;li&gt;Human oversight mechanisms that actually work at scale&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Most teams are bolting on governance as an afterthought: log the outputs, flag the obvious failures, hope the auditor does not dig too deep. That approach will not survive contact with regulators who can impose fines up to 35 million EUR or 7% of global revenue.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Problem with Rule-Based Guardrails
&lt;/h2&gt;

&lt;p&gt;Traditional AI guardrails are lists of rules: do not say this, do not do that, flag these patterns. They fail for three reasons:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Adversaries iterate faster than rule authors.&lt;/strong&gt; A jailbreak that works today gets patched, and a new one appears tomorrow.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rules do not compose.&lt;/strong&gt; Two individually safe actions can combine into an unsafe outcome.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cost is flat.&lt;/strong&gt; Whether an attacker tries one bypass or a million, each attempt costs the same computational effort.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;What if the cost of adversarial behavior grew exponentially?&lt;/p&gt;

&lt;h2&gt;
  
  
  The Harmonic Wall: Attacks Get Exponentially Harder
&lt;/h2&gt;

&lt;p&gt;SCBE-AETHERMOORE uses hyperbolic geometry -- specifically, the Poincare ball model -- as a mathematical bouncer for AI agents. The core insight:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;In hyperbolic space, distance from the center grows exponentially as you approach the boundary. An agent drifting from safe operation pays exponentially more computational cost the further it drifts.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The 14-layer pipeline computes a safety score for every agent action:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;H(d, pd) = 1 / (1 + d_H + 2 * pd)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Where:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;d_H&lt;/code&gt; is the hyperbolic distance from the safe center of operation&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;pd&lt;/code&gt; is the phase deviation (how much the agent's behavior diverges from expected patterns)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;At the safe center (&lt;code&gt;d=0, pd=0&lt;/code&gt;), the score is 1.0 -- full trust. At &lt;code&gt;d=1&lt;/code&gt;, trust drops to 0.5. At &lt;code&gt;d=4&lt;/code&gt;, it is 0.2. At &lt;code&gt;d=9&lt;/code&gt;, it is 0.1. The decay is relentless and smooth.&lt;/p&gt;

&lt;p&gt;But the real power is in the cost amplification. The hyperbolic distance formula itself contains exponential growth:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;d_H = arcosh(1 + 2||u-v||^2 / ((1-||u||^2)(1-||v||^2)))
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;As an agent's behavior vector approaches the boundary of the unit ball, the denominator &lt;code&gt;(1-||v||^2)&lt;/code&gt; approaches zero, making &lt;code&gt;d_H&lt;/code&gt; explode toward infinity. Small movements near the boundary produce massive distance increases. An adversary trying to manipulate agent behavior must pay exponentially more for each incremental step toward the boundary.&lt;/p&gt;

&lt;p&gt;This is not a wall you can climb. It is a wall that gets taller the higher you climb.&lt;/p&gt;

&lt;h2&gt;
  
  
  What This Means for Your Business
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;For compliance teams:&lt;/strong&gt; Every governance decision passes through the 14-layer pipeline and receives a signed, auditable safety score. The pipeline produces ALLOW, QUARANTINE, ESCALATE, or DENY verdicts with full mathematical justification. When the EU AI Act auditor asks "how do you ensure safe operation," you hand them the pipeline output.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;For security teams:&lt;/strong&gt; Attack surface analysis changes fundamentally. Instead of cataloging individual vulnerabilities, you can make a mathematical argument: any adversarial drift costs &lt;code&gt;O(exp(d^2))&lt;/code&gt; -- it is infeasible, not just impractical.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;For engineering teams:&lt;/strong&gt; The SCBE API drops into existing agent stacks. Send your agent's action vector, get back a safety score and governance decision:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;curl &lt;span class="nt"&gt;-X&lt;/span&gt; POST https://your-instance/v1/pipeline/evaluate &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;-H&lt;/span&gt; &lt;span class="s2"&gt;"x-api-key: YOUR_KEY"&lt;/span&gt; &lt;span class="se"&gt;\&lt;/span&gt;
  &lt;span class="nt"&gt;-d&lt;/span&gt; &lt;span class="s1"&gt;'{"context": [0.1, 0.2, 0.3, 0.4, 0.5, 0.6]}'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Response:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"safety_score"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="mf"&gt;0.87&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"decision"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"ALLOW"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"hyperbolic_distance"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="mf"&gt;0.34&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"layer_details"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="err"&gt;...&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Pricing
&lt;/h2&gt;

&lt;p&gt;SCBE-AETHERMOORE is open source (the math is free), with managed SaaS tiers for teams that want it hosted:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Plan&lt;/th&gt;
&lt;th&gt;Agents&lt;/th&gt;
&lt;th&gt;Governance Evals/mo&lt;/th&gt;
&lt;th&gt;Price&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Starter&lt;/td&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td&gt;5,000&lt;/td&gt;
&lt;td&gt;Contact us&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Growth&lt;/td&gt;
&lt;td&gt;40&lt;/td&gt;
&lt;td&gt;25,000&lt;/td&gt;
&lt;td&gt;Contact us&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Enterprise&lt;/td&gt;
&lt;td&gt;250&lt;/td&gt;
&lt;td&gt;100,000&lt;/td&gt;
&lt;td&gt;Contact us&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  Try It
&lt;/h2&gt;

&lt;p&gt;The entire framework is at &lt;a href="https://github.com/issdandavis/SCBE-AETHERMOORE" rel="noopener noreferrer"&gt;github.com/issdandavis/SCBE-AETHERMOORE&lt;/a&gt;. Install from PyPI:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;pip &lt;span class="nb"&gt;install &lt;/span&gt;scbe-aethermoore
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Or from npm:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;npm &lt;span class="nb"&gt;install &lt;/span&gt;scbe-aethermoore
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Your AI agents are making decisions right now. The question is whether those decisions are mathematically defended -- or just politely hoped for.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>business</category>
      <category>security</category>
      <category>startup</category>
    </item>
    <item>
      <title>Building a Multi-Agent Fleet Manager in Python</title>
      <dc:creator>Issac Daniel Davis</dc:creator>
      <pubDate>Tue, 17 Mar 2026 07:54:10 +0000</pubDate>
      <link>https://dev.to/issdandavis/building-a-multi-agent-fleet-manager-in-python-c8k</link>
      <guid>https://dev.to/issdandavis/building-a-multi-agent-fleet-manager-in-python-c8k</guid>
      <description>&lt;p&gt;Running one AI agent is straightforward. Running fifty of them -- with health monitoring, task distribution, fault tolerance, and governance voting -- requires a fleet manager. SCBE-AETHERMOORE's Flock Shepherd is a production-grade implementation of exactly that, and it is open source.&lt;/p&gt;

&lt;p&gt;This article walks through the architecture, with real code from the &lt;code&gt;flock_shepherd.py&lt;/code&gt; module.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Metaphor: Shepherd and Sheep
&lt;/h2&gt;

&lt;p&gt;Every agent in the fleet is a "Sheep" with a role, health score, and position in 6D trust space. The "Flock" is the fleet manager that orchestrates their lifecycle.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;from&lt;/span&gt; &lt;span class="n"&gt;src.symphonic_cipher.scbe_aethermoore.flock_shepherd&lt;/span&gt; &lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;
    &lt;span class="n"&gt;Flock&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;TrainingTrack&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;SheepRole&lt;/span&gt;
&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="c1"&gt;# Create a fleet
&lt;/span&gt;&lt;span class="n"&gt;fleet&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nc"&gt;Flock&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;

&lt;span class="c1"&gt;# Spawn agents with different specializations
&lt;/span&gt;&lt;span class="n"&gt;leader&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;fleet&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;spawn&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Atlas&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;track&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="n"&gt;TrainingTrack&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;SYSTEM&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;       &lt;span class="c1"&gt;# Becomes LEADER
&lt;/span&gt;&lt;span class="n"&gt;validator&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;fleet&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;spawn&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Sage&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;track&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="n"&gt;TrainingTrack&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;GOVERNANCE&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;  &lt;span class="c1"&gt;# Becomes VALIDATOR
&lt;/span&gt;&lt;span class="n"&gt;worker&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;fleet&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;spawn&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Forge&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;track&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="n"&gt;TrainingTrack&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;FUNCTIONS&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;     &lt;span class="c1"&gt;# Becomes EXECUTOR
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The &lt;code&gt;TrainingTrack&lt;/code&gt; determines the default role. System-trained agents lead. Governance-trained agents validate. Function-trained agents execute. You can override this, but the defaults enforce separation of concerns.&lt;/p&gt;

&lt;h2&gt;
  
  
  Agent Lifecycle: Spawn, Monitor, Retire
&lt;/h2&gt;

&lt;p&gt;Each Sheep tracks its own health through a &lt;strong&gt;coherence score&lt;/strong&gt; from 0.0 to 1.0. This is not an arbitrary metric -- it maps to a position in the Poincare ball model used by SCBE's 14-layer pipeline.&lt;/p&gt;

&lt;p&gt;Three thresholds govern agent state transitions:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Coherence&lt;/th&gt;
&lt;th&gt;Label&lt;/th&gt;
&lt;th&gt;Action&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&amp;gt;= 0.70&lt;/td&gt;
&lt;td&gt;HEALTHY&lt;/td&gt;
&lt;td&gt;Normal operation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;0.50 - 0.69&lt;/td&gt;
&lt;td&gt;FAIR&lt;/td&gt;
&lt;td&gt;Warning, increased monitoring&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;0.30 - 0.49&lt;/td&gt;
&lt;td&gt;WARNING&lt;/td&gt;
&lt;td&gt;Eligible for task redistribution&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;lt; 0.30&lt;/td&gt;
&lt;td&gt;CRITICAL&lt;/td&gt;
&lt;td&gt;Auto-quarantine (ISOLATED state)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The state machine is self-healing. Successful task completions recover coherence; failures degrade it:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="nd"&gt;@dataclass&lt;/span&gt;
&lt;span class="k"&gt;class&lt;/span&gt; &lt;span class="nc"&gt;Sheep&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
    &lt;span class="n"&gt;coherence&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="nb"&gt;float&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mf"&gt;1.0&lt;/span&gt;

    &lt;span class="k"&gt;def&lt;/span&gt; &lt;span class="nf"&gt;degrade&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;self&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;amount&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="nb"&gt;float&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mf"&gt;0.05&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="o"&gt;-&amp;gt;&lt;/span&gt; &lt;span class="bp"&gt;None&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
        &lt;span class="sh"&gt;"""&lt;/span&gt;&lt;span class="s"&gt;Degrade coherence after an error.&lt;/span&gt;&lt;span class="sh"&gt;"""&lt;/span&gt;
        &lt;span class="n"&gt;self&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;coherence&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;max&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mf"&gt;0.0&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;self&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;coherence&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="n"&gt;amount&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
        &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;self&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;coherence&lt;/span&gt; &lt;span class="o"&gt;&amp;lt;&lt;/span&gt; &lt;span class="n"&gt;COHERENCE_ISOLATE&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;  &lt;span class="c1"&gt;# 0.30
&lt;/span&gt;            &lt;span class="n"&gt;self&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;state&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;SheepState&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;ISOLATED&lt;/span&gt;

    &lt;span class="k"&gt;def&lt;/span&gt; &lt;span class="nf"&gt;recover&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;self&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;amount&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="nb"&gt;float&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mf"&gt;0.02&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="o"&gt;-&amp;gt;&lt;/span&gt; &lt;span class="bp"&gt;None&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
        &lt;span class="sh"&gt;"""&lt;/span&gt;&lt;span class="s"&gt;Recover coherence after successful task.&lt;/span&gt;&lt;span class="sh"&gt;"""&lt;/span&gt;
        &lt;span class="n"&gt;self&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;coherence&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;min&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mf"&gt;1.0&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;self&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;coherence&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="n"&gt;amount&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
        &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;self&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;state&lt;/span&gt; &lt;span class="o"&gt;==&lt;/span&gt; &lt;span class="n"&gt;SheepState&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;ISOLATED&lt;/span&gt; &lt;span class="ow"&gt;and&lt;/span&gt; &lt;span class="n"&gt;self&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;coherence&lt;/span&gt; &lt;span class="o"&gt;&amp;gt;=&lt;/span&gt; &lt;span class="n"&gt;COHERENCE_WARN&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
            &lt;span class="n"&gt;self&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;state&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;SheepState&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;ACTIVE&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Notice the asymmetry: degradation is 2.5x faster than recovery. This means an agent that starts failing rapidly gets quarantined, but an agent that recovers must prove sustained good behavior before rejoining the fleet.&lt;/p&gt;

&lt;h2&gt;
  
  
  Task Distribution with Auto-Selection
&lt;/h2&gt;

&lt;p&gt;Tasks enter a queue with a priority and a training track. The fleet manager auto-selects the best agent:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="c1"&gt;# Add a governance evaluation task
&lt;/span&gt;&lt;span class="n"&gt;task&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;fleet&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;add_task&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;
    &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Evaluate policy compliance for deployment #47&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="n"&gt;track&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="n"&gt;TrainingTrack&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;GOVERNANCE&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="n"&gt;priority&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="mi"&gt;2&lt;/span&gt;
&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="c1"&gt;# Auto-assign to the best available governance agent
&lt;/span&gt;&lt;span class="n"&gt;fleet&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;assign_task&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;task&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;task_id&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The selection algorithm is simple but effective: filter by track specialization, then sort by coherence (highest first), then by experience (tasks completed). If no specialist is available, any healthy agent can pick up the task.&lt;/p&gt;

&lt;p&gt;When an agent is retired or quarantined mid-task, its tasks become "orphaned." A single call redistributes them:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="c1"&gt;# An agent goes down
&lt;/span&gt;&lt;span class="n"&gt;fleet&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;retire&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;leader&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;sheep_id&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="c1"&gt;# Reassign its abandoned tasks
&lt;/span&gt;&lt;span class="n"&gt;reassigned&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;fleet&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;redistribute_orphans&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
&lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sa"&gt;f&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Redistributed &lt;/span&gt;&lt;span class="si"&gt;{&lt;/span&gt;&lt;span class="n"&gt;reassigned&lt;/span&gt;&lt;span class="si"&gt;}&lt;/span&gt;&lt;span class="s"&gt; orphaned tasks&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Balanced Ternary Governance Voting
&lt;/h2&gt;

&lt;p&gt;Here is where the Flock Shepherd diverges from typical fleet managers. Every significant action goes through a &lt;strong&gt;governance vote&lt;/strong&gt; using balanced ternary encoding.&lt;/p&gt;

&lt;p&gt;Balanced ternary uses digits {-1, 0, +1} instead of {0, 1}. The governance mapping:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Decision&lt;/th&gt;
&lt;th&gt;Trit Value&lt;/th&gt;
&lt;th&gt;Meaning&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;ALLOW&lt;/td&gt;
&lt;td&gt;+1&lt;/td&gt;
&lt;td&gt;Positive affirmation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;QUARANTINE&lt;/td&gt;
&lt;td&gt;0&lt;/td&gt;
&lt;td&gt;Uncertain, needs review&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;DENY&lt;/td&gt;
&lt;td&gt;-1&lt;/td&gt;
&lt;td&gt;Reject the action&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Every active VALIDATOR agent casts a vote based on its coherence. The votes are packed into a balanced ternary word and summarized:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="n"&gt;result&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;fleet&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;vote_on_action&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;deploy model v2.1 to production&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="c1"&gt;# result = {
#     "action": "deploy model v2.1 to production",
#     "consensus": "ALLOW",
#     "net_score": 3,
#     "votes": ["ALLOW", "ALLOW", "QUARANTINE", "ALLOW"],
#     "voter_ids": ["sheep-a1b2", "sheep-c3d4", "sheep-e5f6", "sheep-g7h8"],
#     "packed_bt": "BT(1101)",
# }
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The packed balanced ternary representation &lt;code&gt;BT(1101)&lt;/code&gt; encodes the entire vote in a single trit-word. This is not just compact -- it enables trit-level logic operations. You can AND two vote records together to find consensus, OR them to find any approval, or compute Shannon entropy to measure agreement.&lt;/p&gt;

&lt;h2&gt;
  
  
  Byzantine Fault Tolerance
&lt;/h2&gt;

&lt;p&gt;The fleet calculates its BFT tolerance dynamically:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="nd"&gt;@property&lt;/span&gt;
&lt;span class="k"&gt;def&lt;/span&gt; &lt;span class="nf"&gt;bft_tolerance&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;self&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="o"&gt;-&amp;gt;&lt;/span&gt; &lt;span class="nb"&gt;int&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
    &lt;span class="sh"&gt;"""&lt;/span&gt;&lt;span class="s"&gt;Max Byzantine agents the flock can tolerate.
    BFT requires n &amp;gt;= 3f + 1, so f = (n - 1) // 3.
    &lt;/span&gt;&lt;span class="sh"&gt;"""&lt;/span&gt;
    &lt;span class="n"&gt;n&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;sum&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt; &lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="n"&gt;s&lt;/span&gt; &lt;span class="ow"&gt;in&lt;/span&gt; &lt;span class="n"&gt;self&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;sheep&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;values&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
            &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;s&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;state&lt;/span&gt; &lt;span class="o"&gt;!=&lt;/span&gt; &lt;span class="n"&gt;SheepState&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;FROZEN&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="k"&gt;return&lt;/span&gt; &lt;span class="nf"&gt;max&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;n&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="o"&gt;//&lt;/span&gt; &lt;span class="mi"&gt;3&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;With 10 active agents, the fleet tolerates 3 malicious or faulty agents. With 4, it tolerates 1. The health dashboard reports this in real time:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;fleet&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;status_dashboard&lt;/span&gt;&lt;span class="p"&gt;())&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Output:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;FLOCK STATUS
========================================
Total Agents: 10
  Active: 7  Idle: 1  Busy: 2
  Isolated: 0  Frozen: 0

Average Coherence: 0.847
Healthy: 8/10
BFT Tolerance: f=3

Tracks:
  system: 3 agents, coherence=0.890
  governance: 4 agents, coherence=0.825
  functions: 3 agents, coherence=0.830
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Sacred Tongue Affinity
&lt;/h2&gt;

&lt;p&gt;Each agent role maps to one of six Sacred Tongues -- a tokenization language from SCBE's geometric trust model:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Role&lt;/th&gt;
&lt;th&gt;Tongue&lt;/th&gt;
&lt;th&gt;Weight (phi-scaled)&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;LEADER&lt;/td&gt;
&lt;td&gt;KO&lt;/td&gt;
&lt;td&gt;1.00&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;VALIDATOR&lt;/td&gt;
&lt;td&gt;AV&lt;/td&gt;
&lt;td&gt;1.62&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;EXECUTOR&lt;/td&gt;
&lt;td&gt;RU&lt;/td&gt;
&lt;td&gt;2.62&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;OBSERVER&lt;/td&gt;
&lt;td&gt;UM&lt;/td&gt;
&lt;td&gt;6.85&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;This is not cosmetic. The tongue affinity determines how an agent's governance decisions are weighted in the 6D trust space of the Poincare ball model. A VALIDATOR's vote carries more geometric weight than an EXECUTOR's, reflecting its specialization.&lt;/p&gt;

&lt;h2&gt;
  
  
  Running It as a SaaS
&lt;/h2&gt;

&lt;p&gt;The Flock Shepherd powers SCBE's SaaS API with three pricing tiers:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Plan&lt;/th&gt;
&lt;th&gt;Flocks&lt;/th&gt;
&lt;th&gt;Agents&lt;/th&gt;
&lt;th&gt;Monthly Governance Evals&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Starter&lt;/td&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td&gt;5,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Growth&lt;/td&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;40&lt;/td&gt;
&lt;td&gt;25,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Enterprise&lt;/td&gt;
&lt;td&gt;25&lt;/td&gt;
&lt;td&gt;250&lt;/td&gt;
&lt;td&gt;100,000&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The full API runs on FastAPI with Stripe billing integration. Try it:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;pip &lt;span class="nb"&gt;install &lt;/span&gt;scbe-aethermoore
uvicorn src.api.main:app &lt;span class="nt"&gt;--reload&lt;/span&gt; &lt;span class="nt"&gt;--port&lt;/span&gt; 8000
&lt;span class="c"&gt;# Visit http://localhost:8000/docs for Swagger UI&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Source code: &lt;a href="https://github.com/issdandavis/SCBE-AETHERMOORE" rel="noopener noreferrer"&gt;github.com/issdandavis/SCBE-AETHERMOORE&lt;/a&gt; -- see &lt;code&gt;src/symphonic_cipher/scbe_aethermoore/flock_shepherd.py&lt;/code&gt; and &lt;code&gt;src/api/saas_routes.py&lt;/code&gt;.&lt;/p&gt;

</description>
      <category>python</category>
      <category>ai</category>
      <category>architecture</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>Post-Quantum Cryptography for AI Agent Fleets</title>
      <dc:creator>Issac Daniel Davis</dc:creator>
      <pubDate>Tue, 17 Mar 2026 07:53:53 +0000</pubDate>
      <link>https://dev.to/issdandavis/post-quantum-cryptography-for-ai-agent-fleets-n3o</link>
      <guid>https://dev.to/issdandavis/post-quantum-cryptography-for-ai-agent-fleets-n3o</guid>
      <description>&lt;p&gt;Every governance decision your AI fleet makes -- allow, deny, quarantine -- is only as trustworthy as the cryptography protecting it. If an adversary can forge a signature on a governance verdict, your entire safety pipeline is theater. And with quantum computers progressing from lab curiosities to engineering milestones, the window to retrofit quantum-resistant cryptography is closing faster than most teams realize.&lt;/p&gt;

&lt;p&gt;SCBE-AETHERMOORE ships post-quantum cryptography (PQC) as a first-class citizen, not an afterthought. Here is how and why.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Threat Model
&lt;/h2&gt;

&lt;p&gt;NIST finalized ML-KEM (formerly CRYSTALS-Kyber) and ML-DSA (formerly CRYSTALS-Dilithium) as federal standards in August 2024. The rationale: a cryptographically relevant quantum computer could break RSA-2048 and ECDSA-256 within hours. Every governance decision signed with classical crypto today could be retroactively forged tomorrow.&lt;/p&gt;

&lt;p&gt;For AI agent fleets this is catastrophic. If an attacker harvests encrypted governance logs now ("harvest now, decrypt later"), they can later:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Forge ALLOW decisions&lt;/strong&gt; to inject malicious agent behavior&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Tamper with audit trails&lt;/strong&gt; to hide safety violations&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impersonate validators&lt;/strong&gt; in consensus votes&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  The RWP v3 Envelope System
&lt;/h2&gt;

&lt;p&gt;SCBE's Real World Protocol v3 layers five cryptographic primitives into a single envelope:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Layer&lt;/th&gt;
&lt;th&gt;Primitive&lt;/th&gt;
&lt;th&gt;Purpose&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;Argon2id (RFC 9106)&lt;/td&gt;
&lt;td&gt;Password to key derivation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;ML-KEM-768&lt;/td&gt;
&lt;td&gt;Quantum-resistant key encapsulation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;XChaCha20-Poly1305&lt;/td&gt;
&lt;td&gt;Authenticated encryption (AEAD)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;ML-DSA-65&lt;/td&gt;
&lt;td&gt;Quantum-resistant digital signatures&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Sacred Tongue encoding&lt;/td&gt;
&lt;td&gt;Semantic binding to 6D trust space&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The envelope structure maps each cryptographic field to a specific "Sacred Tongue" -- a tokenization language that binds the ciphertext to a position in hyperbolic trust space. This means encrypted governance decisions are not just confidential; they are geometrically anchored.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;from&lt;/span&gt; &lt;span class="n"&gt;src.crypto.rwp_v3&lt;/span&gt; &lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;RWPv3Protocol&lt;/span&gt;

&lt;span class="c1"&gt;# Initialize with post-quantum extensions enabled
&lt;/span&gt;&lt;span class="n"&gt;protocol&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nc"&gt;RWPv3Protocol&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;enable_pqc&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="bp"&gt;True&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="c1"&gt;# Encrypt a governance decision
&lt;/span&gt;&lt;span class="n"&gt;envelope&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;protocol&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;encrypt&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;
    &lt;span class="n"&gt;password&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="sa"&gt;b&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;fleet-master-key&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="n"&gt;plaintext&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="sa"&gt;b&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;{&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;decision&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;: &lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;ALLOW&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;, &lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;agent&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;: &lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;sheep-a1b2c3d4&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;, &lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;confidence&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;: 0.94}&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="n"&gt;aad&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="sa"&gt;b&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;{&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;timestamp&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;: &lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;2026-03-17T12:00:00Z&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;, &lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;flock_id&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;: &lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;production-fleet&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;}&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="n"&gt;ml_kem_public_key&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="n"&gt;kem_public_key&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="n"&gt;ml_dsa_private_key&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="n"&gt;dsa_signing_key&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="c1"&gt;# The envelope fields are Sacred Tongue tokens, not raw bytes
&lt;/span&gt;&lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;envelope&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;aad&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;    &lt;span class="c1"&gt;# Avali tokens
&lt;/span&gt;&lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;envelope&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;ct&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;     &lt;span class="c1"&gt;# Cassisivadan tokens
&lt;/span&gt;&lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;envelope&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;tag&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;    &lt;span class="c1"&gt;# Draumric tokens
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Why AI Governance Needs PQC Now
&lt;/h2&gt;

&lt;p&gt;The argument for waiting -- "quantum computers are years away" -- ignores three realities of AI fleet governance:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Audit trails must survive decades.&lt;/strong&gt; If you are deploying AI agents under the EU AI Act (enforcement begins August 2026), your compliance records need to be tamper-proof for the lifetime of the system. A governance log signed with ECDSA today is a liability in 2030.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Agent-to-agent communication is high-value.&lt;/strong&gt; AI fleets exchange thousands of governance decisions per hour. Each one is a potential forgery target. ML-DSA-65 signatures are 3,293 bytes -- larger than ECDSA, but verification is fast enough for real-time agent consensus.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. The migration cost only grows.&lt;/strong&gt; Every month you wait, you accumulate more classical-crypto artifacts that need re-signing. SCBE handles the migration gracefully with algorithm negotiation:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="k"&gt;def&lt;/span&gt; &lt;span class="nf"&gt;_select_sig_algorithm&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt; &lt;span class="o"&gt;-&amp;gt;&lt;/span&gt; &lt;span class="nb"&gt;str&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
    &lt;span class="sh"&gt;"""&lt;/span&gt;&lt;span class="s"&gt;Try ML-DSA-65 first, fall back to Dilithium3 for older liboqs.&lt;/span&gt;&lt;span class="sh"&gt;"""&lt;/span&gt;
    &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="ow"&gt;not&lt;/span&gt; &lt;span class="n"&gt;OQS_AVAILABLE&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
        &lt;span class="k"&gt;return&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;ML-DSA-65&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;
    &lt;span class="n"&gt;enabled&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;oqs&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;get_enabled_sig_mechanisms&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
    &lt;span class="k"&gt;return&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;ML-DSA-65&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt; &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;ML-DSA-65&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt; &lt;span class="ow"&gt;in&lt;/span&gt; &lt;span class="n"&gt;enabled&lt;/span&gt; &lt;span class="k"&gt;else&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Dilithium3&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This pattern means SCBE works with both the NIST-finalized names and the older draft names, so you are never blocked by a library version mismatch.&lt;/p&gt;

&lt;h2&gt;
  
  
  Signed Governance Decisions in Practice
&lt;/h2&gt;

&lt;p&gt;Here is the full flow when a fleet of AI agents votes on whether to allow an action:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Each validator agent casts a vote (ALLOW / QUARANTINE / DENY)&lt;/li&gt;
&lt;li&gt;Votes are packed into a balanced ternary word (see the trinary module)&lt;/li&gt;
&lt;li&gt;The consensus result is serialized as JSON&lt;/li&gt;
&lt;li&gt;RWP v3 encrypts the result with Argon2id + XChaCha20-Poly1305&lt;/li&gt;
&lt;li&gt;ML-DSA-65 signs the entire envelope (AAD + salt + nonce + ciphertext + tag)&lt;/li&gt;
&lt;li&gt;The signed envelope is stored in the audit log&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;An attacker wanting to forge this decision must simultaneously:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Break ML-KEM-768 (lattice-based, NIST Level 3)&lt;/li&gt;
&lt;li&gt;Forge an ML-DSA-65 signature (lattice-based, NIST Level 3)&lt;/li&gt;
&lt;li&gt;Defeat the Argon2id KDF (memory-hard, 64MB cost)&lt;/li&gt;
&lt;li&gt;Produce valid Sacred Tongue tokens that pass geometric consistency checks&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Each layer independently resists quantum attack. Together, they form a defense that scales combinatorially.&lt;/p&gt;

&lt;h2&gt;
  
  
  Getting Started
&lt;/h2&gt;

&lt;p&gt;SCBE-AETHERMOORE is open source. To try the PQC envelope system:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;pip &lt;span class="nb"&gt;install &lt;/span&gt;scbe-aethermoore argon2-cffi pycryptodome liboqs-python
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;from&lt;/span&gt; &lt;span class="n"&gt;src.crypto.rwp_v3&lt;/span&gt; &lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;rwp_encrypt_message&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;rwp_decrypt_message&lt;/span&gt;

&lt;span class="c1"&gt;# Encrypt with classical crypto (works without liboqs)
&lt;/span&gt;&lt;span class="n"&gt;envelope&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;rwp_encrypt_message&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;my-password&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Governance: ALLOW agent-7 deploy&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="c1"&gt;# Decrypt
&lt;/span&gt;&lt;span class="n"&gt;plaintext&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;rwp_decrypt_message&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;my-password&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;envelope&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The full source lives at &lt;a href="https://github.com/issdandavis/SCBE-AETHERMOORE" rel="noopener noreferrer"&gt;github.com/issdandavis/SCBE-AETHERMOORE&lt;/a&gt; under &lt;code&gt;src/crypto/rwp_v3.py&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;Post-quantum cryptography is not a luxury for AI governance. It is table stakes. The question is not whether to migrate, but how much technical debt you are willing to accumulate before you do.&lt;/p&gt;

</description>
      <category>security</category>
      <category>ai</category>
      <category>cryptography</category>
      <category>opensource</category>
    </item>
    <item>
      <title>How a DnD Campaign Became an AI Governance Framework</title>
      <dc:creator>Issac Daniel Davis</dc:creator>
      <pubDate>Tue, 17 Mar 2026 07:51:06 +0000</pubDate>
      <link>https://dev.to/issdandavis/how-a-dnd-campaign-became-an-ai-governance-framework-25ne</link>
      <guid>https://dev.to/issdandavis/how-a-dnd-campaign-became-an-ai-governance-framework-25ne</guid>
      <description>&lt;h2&gt;
  
  
  The Accidental Origin
&lt;/h2&gt;

&lt;p&gt;This project started the way most serious infrastructure does: by accident.&lt;/p&gt;

&lt;p&gt;In 2024 I was playing Everweave, an AI-powered DnD game. Over months of sessions I accumulated 12,596 paragraphs of game logs -- dialogues, combat encounters, world descriptions, spell incantations. When I fed those logs into ChatGPT to expand them into a novel draft, something unexpected happened. The invented languages, the naming conventions, the six magical traditions in the game world -- they had internal structure. Consistent phoneme patterns. Recurring morphological rules across thousands of paragraphs that no human intentionally designed.&lt;/p&gt;

&lt;p&gt;I pulled the linguistic patterns out. Six "tongues" emerged, each with a distinct phonetic and semantic signature. I built a tokenizer seeded from those patterns. Then during what I can only describe as a weird late-night vibe coding session, I asked: what if those six tongues weren't just a tokenizer trick? What if they were dimensions in a geometric space where distance corresponds to trust?&lt;/p&gt;

&lt;p&gt;That question became SCBE-AETHERMOORE: a 14-layer AI governance framework built on hyperbolic geometry, post-quantum cryptography, and a tokenizer born from DnD game logs.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Core Insight: Make Adversarial Behavior Geometrically Expensive
&lt;/h2&gt;

&lt;p&gt;Most AI safety approaches work by detecting bad behavior after it happens -- classifiers, filters, RLHF guardrails. SCBE takes a different approach inspired by physics: make adversarial intent cost exponentially more computational resources the further it deviates from safe operation.&lt;/p&gt;

&lt;p&gt;The math lives in the Poincare ball model of hyperbolic space. Every AI agent operates as a point in this space. Trusted behavior clusters near the origin. The further an agent drifts toward the boundary (toward adversarial territory), the more expensive every operation becomes.&lt;/p&gt;

&lt;p&gt;The Harmonic Wall formula captures this:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;H(d, R) = R^(d^2)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Where &lt;code&gt;d&lt;/code&gt; is the hyperbolic distance from the trusted center and &lt;code&gt;R&lt;/code&gt; is the base cost ratio (typically phi, the golden ratio, ~1.618). At &lt;code&gt;d = 1&lt;/code&gt;, cost scales by ~1.6x. At &lt;code&gt;d = 3&lt;/code&gt;, cost scales by ~75x. At &lt;code&gt;d = 5&lt;/code&gt;, cost scales by ~57,665x. The squared exponent creates a "wall" -- agents can drift slightly without penalty, but adversarial drift hits a computational cliff.&lt;/p&gt;

&lt;p&gt;In production, the 14-layer pipeline uses a bounded variant for numerical stability:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight typescript"&gt;&lt;code&gt;&lt;span class="c1"&gt;// Layer 12: Bounded safety score&lt;/span&gt;
&lt;span class="c1"&gt;// H_score = 1 / (1 + d_H + 2 * phaseDeviation)&lt;/span&gt;
&lt;span class="k"&gt;export&lt;/span&gt; &lt;span class="kd"&gt;function&lt;/span&gt; &lt;span class="nf"&gt;harmonicScale&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;d&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="kr"&gt;number&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nx"&gt;phaseDeviation&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="kr"&gt;number&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;):&lt;/span&gt; &lt;span class="kr"&gt;number&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="k"&gt;return&lt;/span&gt; &lt;span class="mi"&gt;1&lt;/span&gt; &lt;span class="o"&gt;/&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="nx"&gt;d&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;2&lt;/span&gt; &lt;span class="o"&gt;*&lt;/span&gt; &lt;span class="nx"&gt;phaseDeviation&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The hyperbolic distance itself is computed via the invariant metric on the Poincare ball:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight typescript"&gt;&lt;code&gt;&lt;span class="c1"&gt;// Layer 5: d_H(u,v) = arcosh(1 + 2||u-v||^2 / ((1-||u||^2)(1-||v||^2)))&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This metric has a beautiful property: space near the boundary of the unit ball is exponentially larger than space near the center. Safe operations live in the small, well-mapped interior. Attacks must navigate the vast, expensive periphery.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Six Sacred Tongues
&lt;/h2&gt;

&lt;p&gt;The six tongues from the game logs became six dimensions of a trust metric, weighted by powers of the golden ratio:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tongue&lt;/th&gt;
&lt;th&gt;Weight&lt;/th&gt;
&lt;th&gt;Role&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;KO&lt;/td&gt;
&lt;td&gt;1.00&lt;/td&gt;
&lt;td&gt;Foundation / Structure&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;AV&lt;/td&gt;
&lt;td&gt;1.62&lt;/td&gt;
&lt;td&gt;Communication / Interface&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;RU&lt;/td&gt;
&lt;td&gt;2.62&lt;/td&gt;
&lt;td&gt;Logic / Verification&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CA&lt;/td&gt;
&lt;td&gt;4.24&lt;/td&gt;
&lt;td&gt;Memory / Persistence&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;UM&lt;/td&gt;
&lt;td&gt;6.85&lt;/td&gt;
&lt;td&gt;Coordination / Consensus&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;DR&lt;/td&gt;
&lt;td&gt;11.09&lt;/td&gt;
&lt;td&gt;Authority / Governance&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Each tongue has a 16x16 token grid (256 tokens per language, 1,536 total). The golden ratio weighting means governance dimensions (DR, UM) carry naturally higher weight in distance calculations -- an agent that deviates in its governance behavior triggers the harmonic wall faster than one that deviates in simple structural tokens.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight typescript"&gt;&lt;code&gt;&lt;span class="c1"&gt;// Layer 3: Golden ratio weighting&lt;/span&gt;
&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="nx"&gt;PHI&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mf"&gt;1.618033988749895&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;span class="k"&gt;for &lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="kd"&gt;let&lt;/span&gt; &lt;span class="nx"&gt;k&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="nx"&gt;k&lt;/span&gt; &lt;span class="o"&gt;&amp;lt;&lt;/span&gt; &lt;span class="nx"&gt;D&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="nx"&gt;k&lt;/span&gt;&lt;span class="o"&gt;++&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="nx"&gt;weights&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;push&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nb"&gt;Math&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;pow&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;PHI&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nx"&gt;k&lt;/span&gt;&lt;span class="p"&gt;));&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  The 14-Layer Pipeline
&lt;/h2&gt;

&lt;p&gt;Every interaction passes through 14 layers. Here is the condensed map:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;L1-2&lt;/strong&gt;: Complex state construction and realification (map inputs to real vector space)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;L3-4&lt;/strong&gt;: Golden-ratio weighted transform and Poincare embedding&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;L5&lt;/strong&gt;: Hyperbolic distance computation (the invariant metric)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;L6-7&lt;/strong&gt;: Breathing transform and Mobius phase modulation (temporal dynamics)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;L8&lt;/strong&gt;: Multi-well realm detection (Hamiltonian energy landscapes)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;L9-10&lt;/strong&gt;: Spectral coherence and spin analysis (FFT-based)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;L11&lt;/strong&gt;: Triadic temporal distance (causality enforcement)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;L12&lt;/strong&gt;: Harmonic Wall scoring&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;L13&lt;/strong&gt;: Risk decision: ALLOW / QUARANTINE / ESCALATE / DENY&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;L14&lt;/strong&gt;: Audio axis telemetry (frequency-domain audit trail)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Each layer maps to one of five quantum axioms (Unitarity, Locality, Causality, Symmetry, Composition) ensuring the pipeline has mathematically provable properties.&lt;/p&gt;

&lt;h2&gt;
  
  
  Flock Shepherd: Governing Agent Fleets
&lt;/h2&gt;

&lt;p&gt;When you have multiple AI agents working together, individual safety is not enough. SCBE includes the Flock Shepherd -- a multi-agent fleet orchestrator that manages agents as a governed collective:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;from&lt;/span&gt; &lt;span class="n"&gt;scbe_aethermoore.flock_shepherd&lt;/span&gt; &lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;FlockShepherd&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;SheepRole&lt;/span&gt;

&lt;span class="n"&gt;shepherd&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nc"&gt;FlockShepherd&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;max_flock_size&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="mi"&gt;50&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="c1"&gt;# Register agents with roles
&lt;/span&gt;&lt;span class="n"&gt;agent_id&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;shepherd&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;spawn_agent&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;
    &lt;span class="n"&gt;role&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="n"&gt;SheepRole&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;EXECUTOR&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="n"&gt;training_track&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;code_review&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;
&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="c1"&gt;# Monitor fleet health via coherence scores
&lt;/span&gt;&lt;span class="n"&gt;health&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;shepherd&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;get_flock_health&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;

&lt;span class="c1"&gt;# Consensus via balanced ternary governance
&lt;/span&gt;&lt;span class="n"&gt;decision&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;shepherd&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;propose_action&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;deploy_update&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;span class="c1"&gt;# Returns: ALLOW / QUARANTINE / ESCALATE / DENY
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The Flock Shepherd uses balanced ternary governance for consensus decisions -- each agent votes with a trit (-1, 0, +1) and the aggregate determines the fleet-level decision. Agents that degrade in coherence get their tasks redistributed automatically.&lt;/p&gt;

&lt;h2&gt;
  
  
  Post-Quantum Cryptography
&lt;/h2&gt;

&lt;p&gt;The entire cryptographic layer uses post-quantum algorithms:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ML-KEM-768&lt;/strong&gt; (formerly Kyber768) for key encapsulation&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;ML-DSA-65&lt;/strong&gt; (formerly Dilithium3) for digital signatures&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AES-256-GCM&lt;/strong&gt; for symmetric encryption&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Every governance decision, every trust score, every agent heartbeat is signed and verifiable. When NIST finalized these algorithms, the framework was already using them.&lt;/p&gt;

&lt;h2&gt;
  
  
  Does It Actually Work?
&lt;/h2&gt;

&lt;p&gt;Benchmarks from the adversarial test suite:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;95.3% detection rate&lt;/strong&gt; on adversarial prompt injection (vs 89.6% for standalone ML anomaly detection)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Zero false denials&lt;/strong&gt; on the standard compliance test suite&lt;/li&gt;
&lt;li&gt;Sub-millisecond latency per layer (14 layers total &amp;lt; 8ms on commodity hardware)&lt;/li&gt;
&lt;li&gt;The harmonic wall triggers cost escalation 340x faster than linear scaling at boundary distances&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Why This Matters Now
&lt;/h2&gt;

&lt;p&gt;The EU AI Act enforcement begins August 2026. Article 9 mandates risk management systems for high-risk AI. Article 15 requires accuracy, robustness, and cybersecurity measures. SCBE's 14-layer pipeline with provable axioms and post-quantum crypto maps directly to these requirements.&lt;/p&gt;

&lt;p&gt;Every governance decision generates a signed, auditable artifact. The pipeline does not just detect risk -- it produces the compliance evidence that regulators will demand.&lt;/p&gt;

&lt;h2&gt;
  
  
  Get Started
&lt;/h2&gt;

&lt;p&gt;Install from npm or PyPI:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;npm &lt;span class="nb"&gt;install &lt;/span&gt;scbe-aethermoore
&lt;span class="c"&gt;# or&lt;/span&gt;
pip &lt;span class="nb"&gt;install &lt;/span&gt;scbe-aethermoore
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;TypeScript quick start:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight typescript"&gt;&lt;code&gt;&lt;span class="k"&gt;import&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt; &lt;span class="nx"&gt;layer1ComplexState&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nx"&gt;layer2Realification&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
         &lt;span class="nx"&gt;layer3WeightedTransform&lt;/span&gt; &lt;span class="p"&gt;}&lt;/span&gt; &lt;span class="k"&gt;from&lt;/span&gt; &lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="s1"&gt;scbe-aethermoore/harmonic&lt;/span&gt;&lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;span class="k"&gt;import&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt; &lt;span class="nx"&gt;harmonicScale&lt;/span&gt; &lt;span class="p"&gt;}&lt;/span&gt; &lt;span class="k"&gt;from&lt;/span&gt; &lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="s1"&gt;scbe-aethermoore/harmonic&lt;/span&gt;&lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;

&lt;span class="c1"&gt;// Build a state vector from input features&lt;/span&gt;
&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="nx"&gt;complex&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;layer1ComplexState&lt;/span&gt;&lt;span class="p"&gt;([&lt;/span&gt;&lt;span class="mf"&gt;0.5&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mf"&gt;0.3&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mf"&gt;0.1&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mf"&gt;0.8&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mf"&gt;0.2&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mf"&gt;0.6&lt;/span&gt;&lt;span class="p"&gt;],&lt;/span&gt; &lt;span class="mi"&gt;3&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="nx"&gt;real&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;layer2Realification&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;complex&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="nx"&gt;weighted&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;layer3WeightedTransform&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;real&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;

&lt;span class="c1"&gt;// Score safety (1.0 = safe center, 0.0 = boundary)&lt;/span&gt;
&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="nx"&gt;safetyScore&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;harmonicScale&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mf"&gt;2.5&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mf"&gt;0.1&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="c1"&gt;// =&amp;gt; 0.238 (elevated distance from trusted center)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The source is MIT-licensed: &lt;a href="https://github.com/issdandavis/SCBE-AETHERMOORE" rel="noopener noreferrer"&gt;github.com/issdandavis/SCBE-AETHERMOORE&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For the full narrative behind the six tongues and the world they came from, the book &lt;em&gt;The Six Tongues Protocol&lt;/em&gt; by Issac Davis is available on Kindle.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Patent pending: USPTO #63/961,403. ORCID: 0009-0002-3936-9369.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Built on game logs, grounded in geometry, shipping as infrastructure.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>security</category>
      <category>opensource</category>
      <category>gamedev</category>
    </item>
    <item>
      <title>How a DnD Campaign Became an AI Governance Framework</title>
      <dc:creator>Issac Daniel Davis</dc:creator>
      <pubDate>Tue, 17 Mar 2026 07:22:57 +0000</pubDate>
      <link>https://dev.to/issdandavis/how-a-dnd-campaign-became-an-ai-governance-framework-5eln</link>
      <guid>https://dev.to/issdandavis/how-a-dnd-campaign-became-an-ai-governance-framework-5eln</guid>
      <description>&lt;h1&gt;
  
  
  How a DnD Campaign Became an AI Governance Framework
&lt;/h1&gt;

&lt;p&gt;&lt;strong&gt;By Issac Davis&lt;/strong&gt; | March 16, 2026&lt;/p&gt;




&lt;h2&gt;
  
  
  The Accidental Origin
&lt;/h2&gt;

&lt;p&gt;This project started the way most serious infrastructure does: by accident.&lt;/p&gt;

&lt;p&gt;In 2024 I was playing Everweave, an AI-powered DnD game. Over months of sessions I accumulated 12,596 paragraphs of game logs -- dialogues, combat encounters, world descriptions, spell incantations. When I fed those logs into ChatGPT to expand them into a novel draft, something unexpected happened. The invented languages, the naming conventions, the six magical traditions in the game world -- they had internal structure. Consistent phoneme patterns. Recurring morphological rules across thousands of paragraphs that no human intentionally designed.&lt;/p&gt;

&lt;p&gt;I pulled the linguistic patterns out. Six "tongues" emerged, each with a distinct phonetic and semantic signature. I built a tokenizer seeded from those patterns. Then during what I can only describe as a weird late-night vibe coding session, I asked: what if those six tongues weren't just a tokenizer trick? What if they were dimensions in a geometric space where distance corresponds to trust?&lt;/p&gt;

&lt;p&gt;That question became SCBE-AETHERMOORE: a 14-layer AI governance framework built on hyperbolic geometry, post-quantum cryptography, and a tokenizer born from DnD game logs.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Core Insight: Make Adversarial Behavior Geometrically Expensive
&lt;/h2&gt;

&lt;p&gt;Most AI safety approaches work by detecting bad behavior after it happens -- classifiers, filters, RLHF guardrails. SCBE takes a different approach inspired by physics: make adversarial intent cost exponentially more computational resources the further it deviates from safe operation.&lt;/p&gt;

&lt;p&gt;The math lives in the Poincare ball model of hyperbolic space. Every AI agent operates as a point in this space. Trusted behavior clusters near the origin. The further an agent drifts toward the boundary (toward adversarial territory), the more expensive every operation becomes.&lt;/p&gt;

&lt;p&gt;The Harmonic Wall formula captures this:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;H(d, R) = R^(d^2)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Where &lt;code&gt;d&lt;/code&gt; is the hyperbolic distance from the trusted center and &lt;code&gt;R&lt;/code&gt; is the base cost ratio (typically phi, the golden ratio, ~1.618). At &lt;code&gt;d = 1&lt;/code&gt;, cost scales by ~1.6x. At &lt;code&gt;d = 3&lt;/code&gt;, cost scales by ~75x. At &lt;code&gt;d = 5&lt;/code&gt;, cost scales by ~57,665x. The squared exponent creates a "wall" -- agents can drift slightly without penalty, but adversarial drift hits a computational cliff.&lt;/p&gt;

&lt;p&gt;In production, the 14-layer pipeline uses a bounded variant for numerical stability:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight typescript"&gt;&lt;code&gt;&lt;span class="c1"&gt;// Layer 12: Bounded safety score&lt;/span&gt;
&lt;span class="c1"&gt;// H_score = 1 / (1 + d_H + 2 * phaseDeviation)&lt;/span&gt;
&lt;span class="k"&gt;export&lt;/span&gt; &lt;span class="kd"&gt;function&lt;/span&gt; &lt;span class="nf"&gt;harmonicScale&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;d&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="kr"&gt;number&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nx"&gt;phaseDeviation&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="kr"&gt;number&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;):&lt;/span&gt; &lt;span class="kr"&gt;number&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="k"&gt;return&lt;/span&gt; &lt;span class="mi"&gt;1&lt;/span&gt; &lt;span class="o"&gt;/&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="nx"&gt;d&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="mi"&gt;2&lt;/span&gt; &lt;span class="o"&gt;*&lt;/span&gt; &lt;span class="nx"&gt;phaseDeviation&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The hyperbolic distance itself is computed via the invariant metric on the Poincare ball:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight typescript"&gt;&lt;code&gt;&lt;span class="c1"&gt;// Layer 5: d_H(u,v) = arcosh(1 + 2||u-v||^2 / ((1-||u||^2)(1-||v||^2)))&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This metric has a beautiful property: space near the boundary of the unit ball is exponentially larger than space near the center. Safe operations live in the small, well-mapped interior. Attacks must navigate the vast, expensive periphery.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Six Sacred Tongues
&lt;/h2&gt;

&lt;p&gt;The six tongues from the game logs became six dimensions of a trust metric, weighted by powers of the golden ratio:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tongue&lt;/th&gt;
&lt;th&gt;Weight&lt;/th&gt;
&lt;th&gt;Role&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;KO&lt;/td&gt;
&lt;td&gt;1.00&lt;/td&gt;
&lt;td&gt;Foundation / Structure&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;AV&lt;/td&gt;
&lt;td&gt;1.62&lt;/td&gt;
&lt;td&gt;Communication / Interface&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;RU&lt;/td&gt;
&lt;td&gt;2.62&lt;/td&gt;
&lt;td&gt;Logic / Verification&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CA&lt;/td&gt;
&lt;td&gt;4.24&lt;/td&gt;
&lt;td&gt;Memory / Persistence&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;UM&lt;/td&gt;
&lt;td&gt;6.85&lt;/td&gt;
&lt;td&gt;Coordination / Consensus&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;DR&lt;/td&gt;
&lt;td&gt;11.09&lt;/td&gt;
&lt;td&gt;Authority / Governance&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Each tongue has a 16x16 token grid (256 tokens per language, 1,536 total). The golden ratio weighting means governance dimensions (DR, UM) carry naturally higher weight in distance calculations -- an agent that deviates in its governance behavior triggers the harmonic wall faster than one that deviates in simple structural tokens.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight typescript"&gt;&lt;code&gt;&lt;span class="c1"&gt;// Layer 3: Golden ratio weighting&lt;/span&gt;
&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="nx"&gt;PHI&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mf"&gt;1.618033988749895&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;span class="k"&gt;for &lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="kd"&gt;let&lt;/span&gt; &lt;span class="nx"&gt;k&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="nx"&gt;k&lt;/span&gt; &lt;span class="o"&gt;&amp;lt;&lt;/span&gt; &lt;span class="nx"&gt;D&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="nx"&gt;k&lt;/span&gt;&lt;span class="o"&gt;++&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="nx"&gt;weights&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;push&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nb"&gt;Math&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;pow&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;PHI&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nx"&gt;k&lt;/span&gt;&lt;span class="p"&gt;));&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  The 14-Layer Pipeline
&lt;/h2&gt;

&lt;p&gt;Every interaction passes through 14 layers. Here is the condensed map:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;L1-2&lt;/strong&gt;: Complex state construction and realification (map inputs to real vector space)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;L3-4&lt;/strong&gt;: Golden-ratio weighted transform and Poincare embedding&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;L5&lt;/strong&gt;: Hyperbolic distance computation (the invariant metric)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;L6-7&lt;/strong&gt;: Breathing transform and Mobius phase modulation (temporal dynamics)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;L8&lt;/strong&gt;: Multi-well realm detection (Hamiltonian energy landscapes)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;L9-10&lt;/strong&gt;: Spectral coherence and spin analysis (FFT-based)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;L11&lt;/strong&gt;: Triadic temporal distance (causality enforcement)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;L12&lt;/strong&gt;: Harmonic Wall scoring&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;L13&lt;/strong&gt;: Risk decision: ALLOW / QUARANTINE / ESCALATE / DENY&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;L14&lt;/strong&gt;: Audio axis telemetry (frequency-domain audit trail)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Each layer maps to one of five quantum axioms (Unitarity, Locality, Causality, Symmetry, Composition) ensuring the pipeline has mathematically provable properties.&lt;/p&gt;

&lt;h2&gt;
  
  
  Flock Shepherd: Governing Agent Fleets
&lt;/h2&gt;

&lt;p&gt;When you have multiple AI agents working together, individual safety is not enough. SCBE includes the Flock Shepherd -- a multi-agent fleet orchestrator that manages agents as a governed collective:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;from&lt;/span&gt; &lt;span class="n"&gt;scbe_aethermoore.flock_shepherd&lt;/span&gt; &lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;FlockShepherd&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;SheepRole&lt;/span&gt;

&lt;span class="n"&gt;shepherd&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nc"&gt;FlockShepherd&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;max_flock_size&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="mi"&gt;50&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="c1"&gt;# Register agents with roles
&lt;/span&gt;&lt;span class="n"&gt;agent_id&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;shepherd&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;spawn_agent&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;
    &lt;span class="n"&gt;role&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="n"&gt;SheepRole&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;EXECUTOR&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="n"&gt;training_track&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;code_review&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;
&lt;span class="p"&gt;)&lt;/span&gt;

&lt;span class="c1"&gt;# Monitor fleet health via coherence scores
&lt;/span&gt;&lt;span class="n"&gt;health&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;shepherd&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;get_flock_health&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;

&lt;span class="c1"&gt;# Consensus via balanced ternary governance
&lt;/span&gt;&lt;span class="n"&gt;decision&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;shepherd&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;propose_action&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="s"&gt;deploy_update&lt;/span&gt;&lt;span class="sh"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
&lt;span class="c1"&gt;# Returns: ALLOW / QUARANTINE / ESCALATE / DENY
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The Flock Shepherd uses balanced ternary governance for consensus decisions -- each agent votes with a trit (-1, 0, +1) and the aggregate determines the fleet-level decision. Agents that degrade in coherence get their tasks redistributed automatically.&lt;/p&gt;

&lt;h2&gt;
  
  
  Post-Quantum Cryptography
&lt;/h2&gt;

&lt;p&gt;The entire cryptographic layer uses post-quantum algorithms:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;ML-KEM-768&lt;/strong&gt; (formerly Kyber768) for key encapsulation&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;ML-DSA-65&lt;/strong&gt; (formerly Dilithium3) for digital signatures&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AES-256-GCM&lt;/strong&gt; for symmetric encryption&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Every governance decision, every trust score, every agent heartbeat is signed and verifiable. When NIST finalized these algorithms, the framework was already using them.&lt;/p&gt;

&lt;h2&gt;
  
  
  Does It Actually Work?
&lt;/h2&gt;

&lt;p&gt;Benchmarks from the adversarial test suite:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;95.3% detection rate&lt;/strong&gt; on adversarial prompt injection (vs 89.6% for standalone ML anomaly detection)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Zero false denials&lt;/strong&gt; on the standard compliance test suite&lt;/li&gt;
&lt;li&gt;Sub-millisecond latency per layer (14 layers total &amp;lt; 8ms on commodity hardware)&lt;/li&gt;
&lt;li&gt;The harmonic wall triggers cost escalation 340x faster than linear scaling at boundary distances&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Why This Matters Now
&lt;/h2&gt;

&lt;p&gt;The EU AI Act enforcement begins August 2026. Article 9 mandates risk management systems for high-risk AI. Article 15 requires accuracy, robustness, and cybersecurity measures. SCBE's 14-layer pipeline with provable axioms and post-quantum crypto maps directly to these requirements.&lt;/p&gt;

&lt;p&gt;Every governance decision generates a signed, auditable artifact. The pipeline does not just detect risk -- it produces the compliance evidence that regulators will demand.&lt;/p&gt;

&lt;h2&gt;
  
  
  Get Started
&lt;/h2&gt;

&lt;p&gt;Install from npm or PyPI:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;npm &lt;span class="nb"&gt;install &lt;/span&gt;scbe-aethermoore
&lt;span class="c"&gt;# or&lt;/span&gt;
pip &lt;span class="nb"&gt;install &lt;/span&gt;scbe-aethermoore
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;TypeScript quick start:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight typescript"&gt;&lt;code&gt;&lt;span class="k"&gt;import&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt; &lt;span class="nx"&gt;layer1ComplexState&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nx"&gt;layer2Realification&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
         &lt;span class="nx"&gt;layer3WeightedTransform&lt;/span&gt; &lt;span class="p"&gt;}&lt;/span&gt; &lt;span class="k"&gt;from&lt;/span&gt; &lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="s1"&gt;scbe-aethermoore/harmonic&lt;/span&gt;&lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;span class="k"&gt;import&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt; &lt;span class="nx"&gt;harmonicScale&lt;/span&gt; &lt;span class="p"&gt;}&lt;/span&gt; &lt;span class="k"&gt;from&lt;/span&gt; &lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="s1"&gt;scbe-aethermoore/harmonic&lt;/span&gt;&lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;

&lt;span class="c1"&gt;// Build a state vector from input features&lt;/span&gt;
&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="nx"&gt;complex&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;layer1ComplexState&lt;/span&gt;&lt;span class="p"&gt;([&lt;/span&gt;&lt;span class="mf"&gt;0.5&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mf"&gt;0.3&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mf"&gt;0.1&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mf"&gt;0.8&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mf"&gt;0.2&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mf"&gt;0.6&lt;/span&gt;&lt;span class="p"&gt;],&lt;/span&gt; &lt;span class="mi"&gt;3&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="nx"&gt;real&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;layer2Realification&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;complex&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="nx"&gt;weighted&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;layer3WeightedTransform&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;real&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;

&lt;span class="c1"&gt;// Score safety (1.0 = safe center, 0.0 = boundary)&lt;/span&gt;
&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="nx"&gt;safetyScore&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;harmonicScale&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mf"&gt;2.5&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mf"&gt;0.1&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="c1"&gt;// =&amp;gt; 0.238 (elevated distance from trusted center)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The source is MIT-licensed: &lt;a href="https://github.com/issdandavis/SCBE-AETHERMOORE" rel="noopener noreferrer"&gt;github.com/issdandavis/SCBE-AETHERMOORE&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For the full narrative behind the six tongues and the world they came from, the book &lt;em&gt;The Six Tongues Protocol&lt;/em&gt; by Issac Davis is available on Kindle.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Patent pending: USPTO #63/961,403. ORCID: 0009-0002-3936-9369.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Built on game logs, grounded in geometry, shipping as infrastructure.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>security</category>
      <category>gamedev</category>
      <category>opensource</category>
    </item>
    <item>
      <title>Building a Governed Browser-as-a-Service: How We Route AI Agents Through Hyperbolic Space</title>
      <dc:creator>Issac Daniel Davis</dc:creator>
      <pubDate>Mon, 02 Mar 2026 14:25:08 +0000</pubDate>
      <link>https://dev.to/issdandavis/building-a-governed-browser-as-a-service-how-we-route-ai-agents-through-hyperbolic-space-45md</link>
      <guid>https://dev.to/issdandavis/building-a-governed-browser-as-a-service-how-we-route-ai-agents-through-hyperbolic-space-45md</guid>
      <description>&lt;p&gt;Most AI browser automation is a liability. You point an agent at a website, hope it does the right thing, and pray it doesn't click "Confirm Purchase" on something you didn't authorize.&lt;/p&gt;

&lt;p&gt;We built something different: a &lt;strong&gt;governed browser swarm&lt;/strong&gt; where every agent action passes through a 14-layer security pipeline, and different agents literally see different shortest paths through the web because their mathematical personalities warp the geometry.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Architecture
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;User Request &amp;gt; FastAPI Gateway (port 8000) &amp;gt; Governance Membrane (14 layers) &amp;gt; TongueRouter (Dijkstra on Poincare Ball) &amp;gt; Agent Pool &amp;gt; Playwright Wrapper &amp;gt; Training Tap
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  The Tongue Router
&lt;/h3&gt;

&lt;p&gt;Every URL gets expanded into a 6D vector using Sacred Tongue space - six dimensions weighted by the golden ratio:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="k"&gt;class&lt;/span&gt; &lt;span class="nc"&gt;TongueObserver&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
    &lt;span class="n"&gt;TONGUE_WEIGHTS&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
        &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;KO&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="mf"&gt;1.000&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;   &lt;span class="c1"&gt;# Intent
&lt;/span&gt;        &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;AV&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="mf"&gt;1.618&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;   &lt;span class="c1"&gt;# Context
&lt;/span&gt;        &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;RU&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="mf"&gt;2.618&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;   &lt;span class="c1"&gt;# Policy
&lt;/span&gt;        &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;CA&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="mf"&gt;4.236&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;   &lt;span class="c1"&gt;# Execution
&lt;/span&gt;        &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;UM&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="mf"&gt;6.854&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;   &lt;span class="c1"&gt;# Security
&lt;/span&gt;        &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;DR&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="mf"&gt;11.090&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;  &lt;span class="c1"&gt;# Attestation
&lt;/span&gt;    &lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Agent Personalities
&lt;/h3&gt;

&lt;p&gt;Different agents have different tongue weightings - they see different edge costs in the navigation graph. A scout finds the fastest route. An auditor finds the safest route. Same web, different geometry.&lt;/p&gt;

&lt;p&gt;The math: &lt;code&gt;g_ij(x, agent) = (4/(1-|x|^2)^2) * T_ij(agent)&lt;/code&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Governance at Every Step
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Semantic antivirus&lt;/strong&gt; - checks intent against known malicious patterns&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Action validation&lt;/strong&gt; - confirms the action matches the approved task&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Governance scan&lt;/strong&gt; - 14-layer pipeline produces ALLOW/DENY/QUARANTINE&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Training tap&lt;/strong&gt; - every interaction becomes an SFT training pair&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;14,654 training pairs and counting, all pushed to HuggingFace.&lt;/p&gt;

&lt;h2&gt;
  
  
  Running It Yourself
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;git clone https://github.com/issdandavis/SCBE-AETHERMOORE.git
&lt;span class="nb"&gt;cd &lt;/span&gt;SCBE-AETHERMOORE
pip &lt;span class="nb"&gt;install&lt;/span&gt; &lt;span class="nt"&gt;-r&lt;/span&gt; requirements.txt
python &lt;span class="nt"&gt;-m&lt;/span&gt; uvicorn src.api.browser_saas:app &lt;span class="nt"&gt;--port&lt;/span&gt; 8000
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Why Open Source?
&lt;/h2&gt;

&lt;p&gt;AI governance is too important to be proprietary. The full codebase: &lt;a href="https://github.com/issdandavis/SCBE-AETHERMOORE" rel="noopener noreferrer"&gt;github.com/issdandavis/SCBE-AETHERMOORE&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Patent pending (USPTO #63/961,403) - the math is protected, the code is free.&lt;/p&gt;

</description>
      <category>agents</category>
      <category>ai</category>
      <category>architecture</category>
      <category>security</category>
    </item>
  </channel>
</rss>
