DEV Community

Cover image for Executability Is the Real Safety Boundary
Abubakar
Abubakar

Posted on

Executability Is the Real Safety Boundary

Failures in complex systems are often explained as bad deployments, rushed rollbacks, or human error under pressure. That framing operates too close to the surface.

In long lived systems that perform irreversible actions, safety is not determined by intent, correctness, or recovery speed. It is determined by what is allowed to execute, what control signals mean, and where authority is enforced.

From that lens, a small set of invariants emerges.

Invariant 1 Executability defines risk

Any code path that can execute is part of the system’s safety surface, regardless of intent, age, or documentation.

Deprecated, unused, or retired are descriptive labels, not control states.
If a code path must never run, it must be rendered non executable.

Leaving dormant logic callable behind flags, configuration, or assumed reachability creates latent risk. When activation conditions reappear, the system behaves exactly as it was built to behave.

Safety begins where executability ends.

Invariant 2 Control signals require provable semantic alignment

A control signal may only be repurposed if no executable version can interpret it under a previous meaning. Alignment must be enforced, not assumed.

In long aged systems, control signals accumulate history. Their meaning is not defined by current intent, but by the oldest version still capable of execution.

If the same signal can legally trigger different behavior across versions, the system already contains split brain risk. Partial rollout, rollback, or recovery actions will amplify it.

Semantic consistency is an execution time property, not a documentation concern.

Invariant 3 Prevention beats semantic gymnastics

In safety critical systems, introducing new control signals is safer than reinterpreting old ones unless global semantic consistency can be guaranteed.

Reusing signals is often locally rational, especially under time pressure. But in systems with version skew, long tails, and irreversible effects, reuse optimizes convenience over containment.

New signals create isolation.
Isolation reduces cross version ambiguity.
Ambiguity is where control fails.

Invariant 4 Safety cannot depend on deployment correctness

If safety relies on rollout completeness, operator timing, or rollback speed, the system has no safety boundary.

Deployment and rollback are recovery mechanisms. They assume consistency and time. Irreversible systems provide neither.

Once execution crosses the boundary where effects are real, observability becomes historical. Alerts and dashboards describe damage. They do not constrain it.

Control must exist before execution, not after detection.

Authority Boundary

These invariants apply to systems that perform irreversible actions, where authority over execution must be enforced before effects are real.

Reference

Knight Capital Group trading incident, August 2012.

Top comments (0)