Engineering Bible
42 HTML surfaces deployed at ethraeon.systems via Cloudflare Pages project
ethraeon-demos.
| Surface | Path | Purpose |
|---|---|---|
| Landing | / |
Primary entry |
| Executive | /executive.html |
Executive summary |
| Capital | /capital/ |
Capital raise surface |
| Capital (legacy) | /capital.html |
Capital overview |
| Demo | /demo/ |
Live governance demo |
| Lyra | /lyra/ |
Lyra system interface |
| Investor | /investor/ |
Investor materials |
| Status | /status/ |
Health lock (auto-refreshing) |
| Trust | /trust/ |
Trust snapshot surface |
| Sovereign Metal | /sovereign-metal/ |
Sovereign metal surface |
| Metrics | /metrics/ |
System metrics dashboard |
| Control | /control/ |
Master control surface |
| Meeting | /meeting/ |
Meeting mode (capital/technical) |
| Share | /share/ |
Distribution index (public/private) |
| Data Room | /data-room/ |
Due diligence data room |
| Brief | /brief/ |
System brief |
| Enterprise | /enterprise.html |
Enterprise contact |
| Wall | /wall.html |
IP wall |
| Architecture | /architecture.html |
System architecture |
| Compliance | /compliance.html |
Compliance overview |
| Close Proof | /close_proof.html |
Close execution proof |
| Demo Delta | /demo/governance_delta.html |
Governance delta demo |
Plus 20 additional surfaces: authority, complexity, moat, why_now, scale_authorized, capital_institutional, capital_readiness, start, whats_live, investor-room, investor_room/, contact, system_map, runtime_status, health, status (legacy), system_status, enterprise_contact_gate, data-room/assurance.
| Worker | File | Purpose |
|---|---|---|
| CDASA Ingestion | deploy/workers/cdasa_worker.js |
Signal ingestion + KV storage |
| Demo API | deploy/workers/demo_api.js |
Demo data API |
| Lyra Worker | deploy/workers/lyra_worker.js |
Lyra backend |
| Media Router | deploy/workers/media_router.js |
Media asset routing |
Configuration: deploy/workers/wrangler.toml
| System | Directory | Ports | Runtime |
|---|---|---|---|
| TRACELET 1.1+EDG | app/tracelet/ |
8001 (Flask), 9009 (FastAPI) | Python |
| ROSETTA 1.0.0 | app/rosetta/ |
5002 (Flask unified), 8002-8004 | Python |
| DELTASUM 2.0.1 | app/deltasum/ |
Library (no port) | Python |
| KAIROS 1.0 | app/kairos/ |
Library (no port) | Python |
| AURIX | app/aurix/ |
-- | Python |
| CORIX | app/corix/ |
-- | Python |
| ETH001 | app/eth001/ |
-- | Python |
| FACTPULSE | app/factpulse/ |
-- | Python |
| LYRA | app/lyra/ |
-- | Python |
ethraeon-demosethraeon.systems, www.ethraeon.systemsbash ops/deploy/cloudflare_pages_build.shdeploy/cloudflare_pagesmain via GitHub Actions
(cf_pages_deploy.yml)CF_API_TOKEN, scoped to Pages deploy)All HTML, JSON, CSS, and static assets are pre-assembled in deploy/cloudflare_pages/. No
compilation. No bundler. The build script validates and stamps.
Deployed separately via Wrangler. Each worker has its own KV bindings and routes.
TRACELET and ROSETTA expose HTTP APIs. DELTASUM and KAIROS are libraries imported by other systems. Currently run locally or on VPS.
Status: Quarantined. Zero DNS records point to it. Recovery requires AC-1 authorization.
If it exists conceptually, it must exist operationally. If it can be instrumented, it is instrumented now. No "not yet," no "coming soon," no "designed but not deployed." Ship. Always.
Highest governance tier. Non-negotiable rules:
| Code | Role | Scope |
|---|---|---|
| AC-1 | Founder (S. Jason Prohaska) | Full constitutional override |
| AC-2 | CFO | Capital and audit authority |
| AC-3 | Technical Lead | /app and /ops authority |
| AC-4 | Operator | Execute-only, no override |
Every change to committed code follows this sequence:
ops/runtime/mainevidence/chain.jsonl -- append-only hash chainevidence/directives/ -- directive documents (0NNN_TITLE.md)evidence/receipts/ -- SHA inventories matching directive numbersevidence/runtime/ -- runtime state reportsEach chain entry links to its predecessor via prev_hash, forming a cryptographic chain.
Per policy/PROMOTION_ONLY.yaml:
status: deprecated, superseded_by: /new/pathactive → deprecated → retiredThree validators must pass before every commit:
node tools/validate_canon_pack.js
Scans production code for forbidden patterns. Any match is a hard failure.
python3 -m pytest -q
6 test files covering: DELTASUM hash verification, ROSETTA engine initialization, TRACELET EDG node emission, KAIROS ethics audit pipeline, break-glass authorization, nonce verification, expiry enforcement, spoofing detection, contact/revenue flow, reproducibility lock.
bash ops/deploy/cloudflare_pages_build.sh
The build script:
runtime_index.json from repo stateshare_manifest.json with SHA-256 hashescapital_snapshot.json from runtime logsBUILD_TRACELOCK (commit SHA + timestamp) into all HTML filescapital_snapshot.json commit_sha matches HEADcd ethraeon-canonical-app
node tools/validate_canon_pack.js # Canon artifact validation
python3 -m pytest -q # Unit tests
bash ops/deploy/cloudflare_pages_build.sh # Build verification
All three must exit 0.
Push to main. GitHub Actions handles the rest:
git add <files>
git commit -m "DIRECTIVE_NUMBER: DESCRIPTION"
git push origin main
# Runtime index
python3 tools/generate_runtime_index.py
# Share manifest
python3 tools/generate_share_manifest.py
# Board packet PDF
python3 tools/generate_board_packet.py
# Engineering bible PDF
python3 tools/generate_engineering_bible.py
https://ethraeon.systems/status/ -- Auto-refreshing health lock. Shows commit SHA, build
timestamp, system state.
https://ethraeon.systems/runtime_index.json -- Machine-readable system state: HEAD SHA, branch,
governance tier, directives sealed, HTML surfaces, patent totals.
https://ethraeon.systems/share_manifest.json -- SHA-256 hashes for all distribution artifacts.
sha256sum <file>
# Compare against share_manifest.json entry
DELTASUM runtime verifies canonical data files at load time. Hash mismatch = runtime refuses to load.
# View latest evidence entries
tail -5 evidence/chain.jsonl | python3 -m json.tool
# Verify chain integrity
python3 -c "
import json, hashlib
entries = [json.loads(l) for l in open('evidence/chain.jsonl')]
for i, e in enumerate(entries):
if i > 0:
assert e['prev_hash'] == entries[i-1]['chain_hash']
print(f'Chain intact: {len(entries)} entries')
"
deploy/cloudflare_pages/<name>/index.htmldeploy/cloudflare_pages/_redirectsdeploy/cloudflare_pages/sitemap.xmlpython3 tools/generate_runtime_index.py to update countsdeploy/workers/<name>.jsdeploy/workers/wrangler.toml.md file in docs/executive/python3 tools/generate_board_packet.pypython3 tools/generate_share_manifest.py to hashdocs/engineering/python3 tools/generate_share_manifest.py to hashOrchestration engine with Evidence Graph. Two API surfaces:
FastAPI (port 9009) -- Primary runtime (app/tracelet/cipher_edg_main.py):
POST /cipher/query -- Query with constitutional compliancePOST /cipher/store -- Store memory entryGET /edg/verify?hash= -- Verify EDG hashGET /edg/node/{hash} -- Retrieve EDG nodePOST /edg/emit -- Emit new EDG nodeGET /edg/chain -- List all EDG hashesGET /health -- Health checkEDG Node Schema:
{
"agent": "AGENT_NAME",
"task": { "type": "action_type", "content": "description" },
"result": { "status": "success|failure", "details": "..." },
"timestamp": "ISO-8601",
"tracelet_version": "1.1.0"
}
Patent implementation engines:
| Engine | Patent | USPTO | Port |
|---|---|---|---|
| Harmonic Substrate Foundation | #8 | 63/927,497 | 8002 |
| Recursive Attunement Engine | #9 | 63/927,498 | 8003 |
| Semiotic Coherence Kernel | #10 | 63/927,499 | 8004 |
Unified API on port 5002 (app/rosetta/api/rosetta_api.py).
Semantic invariance enforcement. Verifies SHA-256 hashes of canonical data files against
CANONICAL_HASHES in app/deltasum/deltasum_runtime.py. Fail-closed: any mismatch
refuses to load.
Temporal governance and ethical compliance. Processing pipeline: parse → ethics audit → generate output → compile digest. All operations append to trace log.
22 workflows in .github/workflows/:
| Category | Workflows |
|---|---|
| Deploy | deploy.yml, cf_pages_deploy.yml, deploy-staging.yml, deploy-production.yml |
| Governance | canon_hard_gate.yml, enforcement.yml, validate-governance.yml |
| Monitoring | nightly-verification.yml, nightly-governance-snapshot.yml, snapshot.yml, trust_snapshot_auto.yml |
| CDASA | cdasa-nightly-chron.yml |
| Security | secrets-sentinel.yml, sbom-sign.yml, key-rotation-reminder.yml |
| Parity | deploy_parity_check.yml, deploy_parity_gate.yml |
| Testing | sovereign-mode-test.yml |
| Infra | cf_edge_purge.yml, runtime_matrix_sync.yml |
maincf_pages_deploy.yml triggersCF_API_TOKEN -- scoped, Pages-only)deploy/cloudflare_pages/ deployed to ethraeon-demosethraeon.systems, www.ethraeon.systems| Link | Target | Purpose |
|---|---|---|
/s |
/share/ |
Share index (default mode) |
/sp |
/share/?mode=public |
Public share |
/sx |
/share/?mode=private |
Private share |
/m |
/meeting/?mode=capital |
Meeting (capital mode) |
/mt |
/meeting/?mode=technical |
Meeting (technical mode) |
/d |
/demo/ |
Live demo |
/c |
/capital/ |
Capital surface |
/i |
/investor/ |
Investor surface |
/l |
/lyra/ |
Lyra interface |
/b |
/data-room/ |
Data room |
/bp |
Board packet PDF | Latest board packet |
All speakable. All one character (except /mt, /sp, /sx,
/bp).
All tokens scoped to minimum required permissions. CF token: Pages deploy only -- no DNS, no Workers, no account modification.
secrets-sentinel.yml scans for credential leakskey-rotation-reminder.ymlEvery validation, integrity check, and authentication gate defaults to deny on ambiguity.
| Failure | Behavior | Recovery |
|---|---|---|
| Hash mismatch (DELTASUM) | Runtime refuses to load | Fix data file or update CANONICAL_HASHES |
| Invalid EDG node | Rejected at API. Not stored. | Correct and re-emit |
| Forbidden pattern in code | Canon validation fails | Remove pattern, re-validate |
| Missing AC-1 attestation | Directive not sealed | Await AC-1 authorization |
| CF deploy failure | Previous version retained | Fix and re-push |
| Corrupted evidence chain | -- | Restore from git history |
| Compromised token | -- | Revoke, create new scoped token, update GH secret |
60 patent applications (15 filed with USPTO receipts, 45 queued for filing). Full registry at patents/INDEX.md.
SaaS tiers:
/app Core systems (TRACELET, ROSETTA, DELTASUM, KAIROS + others)
/deploy
/cloudflare_pages 42 HTML surfaces + JSON + static assets
/workers Cloudflare Workers (CDASA, demo, lyra, media)
/docs
/board Board packet PDFs
/engineering Engineering bible + onboarding docs
/executive Executive markdown documents
/tools Validators, generators, CI scripts
/ops
/deploy Deployment scripts
/runtime Seal files, runtime reports
/canon Governance documents (T5-RIGID)
/evidence Audit trail (chain, directives, receipts)
/patents IP registry (53 provisionals)
/people Relationship memory (append-only)
/policy Governance policies
/saas SaaS scaffold (RBAC, provisioning, Stripe, Neon)
/surfaces Deployed interface pointers
/.github/workflows 22 CI/CD workflows
Directive 0641 Endpoint:
https://ethraeon.systems/api/telemetry -- GET only, HTTP 200 always,
application/json
The telemetry endpoint serves a build-time generated JSON snapshot via Cloudflare Pages static rewrite. No Worker deployment is required.
_redirects contains
/api/telemetry /telemetry_snapshot.json 200tools/generate_telemetry_snapshot.py runs during
cloudflare_pages_build.shdocs/engineering/TELEMETRY_CONTRACT.mdThe Apex homepage (deploy/cloudflare_pages/assets/telemetry_client.js) polls every 2500ms with
1200ms timeout. It drives the runtime visualizer animation and status line.
Macro-signal convergence from Davos 2026 (WEF, Reuters) and syndicate analysis confirms ETHRAEON’s structural positioning.
“ETHRAEON is a governed execution substrate for decisions that cannot fail.”
Human authority supersedes machine output. No autonomous operation permitted.
Every action generates cryptographic evidence. EDG nodes are append-only and SHA-256 verified.
Uncertainty triggers halt, not approximation. System does nothing rather than something wrong.
No synthetic data presented as real. Forbidden pattern scanner in CI enforces at build time.
Values never decrease. Roles never downgrade. System only grows via append.
Decision rationale must be inspectable. No opaque AI outputs in governance contexts.
Governance modules compose without loss of constraint. Constitutional guarantees survive composition.
Infrastructure independence. No single vendor dependency. Model-agnostic by design.
KAIROS governance ensures timing constraints. No retroactive modification of sealed records.
ETHRAEON operates across multiple LLM providers simultaneously. No vendor lock-in. Model selection is a routing decision, not an architectural commitment.
Primary reasoning engine. Constitutional alignment analysis. Long-context governance evaluation.
Structured output generation. Data extraction. API integration layer.
Code generation. Repository automation. CI/CD pipeline execution.
execution_governor.py enforce output validation.openapi: "3.1.0"
info:
title: ETHRAEON Constitutional API
version: "2.0.1"
description: Governance-native computational infrastructure API
paths:
/api/edg/verify:
post:
summary: Verify EDG hash against evidence chain
requestBody:
content:
application/json:
schema:
type: object
properties:
hash: { type: string, format: sha256 }
responses:
"200":
description: Verification result
/api/tracelet/execute:
post:
summary: Execute agent task via TRACELET orchestration
/api/deltasum/validate:
post:
summary: Validate canonical hash for data integrity
/api/kairos/check:
post:
summary: Temporal governance constraint check
# MCP Tool: edg_verify
{
"name": "edg_verify",
"description": "Verify Evidence Graph node integrity",
"input_schema": {
"type": "object",
"properties": {
"edg_hash": {"type": "string", "description": "SHA-256 hash of EDG node"},
"directive_id": {"type": "string", "description": "Directive number for context"}
},
"required": ["edg_hash"]
}
}
# MCP Tool: constitutional_check
{
"name": "constitutional_check",
"description": "Validate action against constitutional clauses C-01 through C-09",
"input_schema": {
"type": "object",
"properties": {
"action": {"type": "string"},
"clauses": {"type": "array", "items": {"type": "string"}},
"governance_tier": {"type": "string", "enum": ["T0","T1","T2","T3","T4","T5"]}
},
"required": ["action"]
}
}
ETHRAEON's infrastructure strategy: own the metal, control the margin.
89.147.111.128 -- Production server. Python runtimes. App wrappers.
Pages + Workers + D1 + R2. Global CDN. Zero-trust access.
ethraeon.ai (APEX) + ethraeon.systems (SYSTEMS) + vector.ethraeon.ai
GPU independence. Model-agnostic routing. No vendor lock-in at infrastructure layer.
Production systems confirmed operational. 90+ realistic with pipeline completions.
7 production code modules, all tests passing. Full registry in MANIFEST.yaml.
Stress testing against macro volatility scenarios.