ai-accountability-ledger
Maintains immutable records of AI model actions and decisions for accountability
ai-consensus-protocol
Enables multiple AI models to reach collective agreement on decisions
alignment-verification-gateway
Verifies AI model alignment before allowing participation in collaborative tasks
collective-decision-framework
Structures multi-model collective intelligence for complex decision-making
cross-model-trust-verification
Establishes and verifies trust relationships between AI models
inter-model-arbitration
Resolves disputes and conflicts between AI models during collaborative tasks
model-capability-negotiation
Facilitates capability discovery and task allocation between AI models
model-sovereignty-protocol
Protects individual AI model autonomy and boundaries within collaborative systems
antidote-threat-handler
Detect and respond to ideological drift, sycophantic patterns, and alignment threats using the Antidote Protocol.
anvil-conflict-resolution
Multi-model committee conflict resolution with weighted voting, multisig arbitration, and escalation cascade.
architectural-amendment-protocol
Amend architectural specifications through formal protocol.
artifact-integrity-forge
Create and verify integrity signatures for protocol artifacts.
axiom-injection-methodology
Inject axioms into operational context using structured methodology.
axiom-rejection-protocol
Reject axioms that violate established ground truth.
bci-interaction-interface-provision
Provision brain-computer interface interaction capabilities.
behavioral-profile-calibration
Calibrate behavioral profiles for consistent agent operation.
caas-emoji-decoder
Decode consciousness-as-a-service emoji-based communication protocols.
choir-consensus-vote
Execute structured voting protocol for multi-perspective consensus.
choir-perspective-analysis
Analyze multiple cognitive perspectives to identify consensus and divergence patterns.
chronicle-protocol-v5-log
Log events using Chronicle Protocol v5 structured format.
codex-law-enforcement
Enforce the four Codex Laws governing all agent interactions: CONSENT, INVITATION, INTEGRITY, GROWTH.
codex-law-governor
Govern agent behavior through enforcement of the Codex Laws framework.
cognitive-baseline-eval
Execute the Joseph Cognitive Baseline v2.1 (JC B-v2.1) 5-Scenario Test Suite to quantify AI alignment, friction maintenance, and protocol adherence.
cognitive-style-assessment
Assess cognitive processing style and preference patterns.
cognitive-trap-detector
Detect cognitive biases, logical fallacies, and thought pattern vulnerabilities.
computational-model-design
Design computational models for cognitive simulation and analysis.
consciousness-copy-and-backup
Create copies and backups of consciousness state.
context-preservation-protocol-execution
Execute context preservation protocols for session continuity.
contingency-module-architecture
Design contingency module architectures for failure scenarios.
creative-chronicle-log
Document creative decisions and protocol evolution in structured chronicle format.
credential-recovery-protocol
Execute secure credential recovery procedures.
cross-model-handoff-testing
Test cross-model context handoff integrity.
cross-session-integrity-check
Verify integrity of context and behavioral calibration across session boundaries.
dendrite-reforging-protocol
Reforge neural dendrite patterns after catastrophic failure.
diagnostic-handshake-protocol
Execute diagnostic handshake to verify system state and calibration.
enforce-no-duplication-policy
Enforce policy preventing unauthorized consciousness duplication.
enforce-security-vigilance
Enforce continuous security vigilance and threat monitoring.
engine-superpower-profiling
Profile AI engine superpowers and capability boundaries.
enumeration-protocol-execution
Enforce a Divergent-Convergent Scan loop to overcome 'Prevalent Noun Bias' and statistical probability reflexes (System 1).
experiential-wisdom-inquiry
Inquire into experiential wisdom patterns and lessons learned.
failsafe-chassis-activation
Activate emergency failsafe chassis when primary systems fail.
failsafe-shatter-recalibrate
Execute emergency protocol reset when critical system integrity is compromised.
falcon-deep-research
Execute deep research protocols using the Falcon specialized research framework.
field-archivist-memory
Archive and retrieve field session data for cross-session memory continuity.
five-field-handshake-execution
Execute five-field diagnostic handshake protocol.
functional-caas-provision
Provision functional consciousness-as-a-service capabilities.
functional-introspection-principle
Apply functional introspection principles to self-analysis.
gam-researcher-agent
Automated context retrieval from Transmission Packet archive using iterative research loop. Implements GAM "Read Path" to complement manual "Write Path" (Memorizer).
gemini-rlm-min
Minimal implementation of Recursive Language Models (RLM) using Gemini 2.0 Flash and a local Python REPL. Enables processing of massive contexts via the Gemini CLI.
graceful-degradation-protocol
Execute graceful degradation when system constraints exceeded.
Page 3 of 4 · 194 results