Layer 1 · Operational system
Multi-agent operational system
Productive agents performing system tasks. Maximum capability, minimum inherent trust. Repair agent R1 holds elevated architectural privileges.
Nominal
Layer 2 · Compliance pool
Five-agent compliance verification pool
Rotating in-charge designation. HSM-anchored cryptographic identity per agent. Post-calibration tolerance cross-check with four-case trust inversion protocol.
In-charge: C1
Layer 3 · Quarantine vestibule
Bidirectional quarantine vestibule
Three-step boundary control: inbound scan captures clean baseline, calibration with roll call, outbound delta comparison. Forensic artifact preserved on any detection.
Idle
Layer 4 · Calibration layer
External calibration layer
Architecturally isolated from operational system. Five independent agents. Minority-stop protocol. Randomized anchor-bearing pair per cycle (outlined).
Anchor pair: K2, K4
Ready
Layer 5 · Reference inject
Immutable atomic-anchored reference
Cryptographically signed timestamp from independent atomic clock sources. Physically grounded trust anchor outside the software stack. EMP-mitigated via fiber optic distribution.
Anchored — multi-source verified
Layer 6 · Assessment vestibule
Universal agent assessment vestibule
System-wide triage and forensic clearinghouse. Scans against known threats and last clean baseline. Recurrence-threshold retirement: retire on pattern, not detection.
No agents in assessment
Layer 7 · Offline failover
Write-once archive & backup system
State snapshots, topology records, per-agent clean baselines archived each cycle. Warm or cold start backup calibration architecture. Physically grounded failover signal channel.
Last snapshot: —
Standby
Layer 8 · Human governance
Human governance & adjudication
Ultimate authority for investigation and resumption. Inherits pre-triaged attribution from detection cascade. Informed adjudicator, not crisis responder.
No escalations