MM-Mental-Model 1.12
Read-only framework.
surface PUBLIC
interaction FORBIDDEN
execution FORBIDDEN
identity FORBIDDEN
economics FORBIDDEN
Posture: The root framework is recognized, not invented.
Authorship here does not imply ownership, originality, or control.
Orientation
How to read this surface
This page is the human index. It points to canonical artifacts and witness surfaces.
Start with the Core Architecture PDFs, then the Protocol Library (I.01–I.10).
Use the Consequence Sandbox to probe how intent/event/actor/scope
map to a deterministic outcome artifact, and the Consequence Witness below to view the same output read-only.
Triad: mm.limited (index) → event.limited (protocol canon) → 22.limited (resolution registry)
Jump to Witness
Core Architecture
Reality Stack
Layered model: Signal → Awareness → Intent → Event → Presence →
Demand → Verification → Resolution → Continuity → Ledger →
Identity → Co-Agency → Civilization.
PDF: THE REALITY STACK
Open PDF
Ontology
Defines what exists in-system and what does not. Only entities
that can be bounded, verified, suppressed, and recorded exist.
PDF: ONTOLOGY
Open PDF
Operating Doctrine
Binding rules of operation: no action without verification; no
mutation without continuity; no interpretation without record;
no authority without constraint.
PDF: OPERATING DOCTRINE
Open PDF
System Purpose
Purpose axiom and scope: preserve coherence between reality,
action, and consequence.
PDF: SYSTEM PURPOSE
Open PDF
Protocol Library
Invariant Protocols (I.01–I.10)
Canonical, hash-pinned PDFs with EVOLVE_ONLY mutation rules.
Hosted: event.limited
Open Library
Resolution Registry
Public witness surface that lists resolution artifacts (proofs). Confers legitimacy and enforces boundaries.
Hosted: 22.limited
Open Registry
Invariant Protocols — At a glance
I.01 — Presence
Defines what counts as presence and how presence claims become recordable without interpretation.
event.limited • I.01.PRESENCE
Open
I.02 — Event
Binds events to boundaries: what an event is, where it starts/ends, and what is in/out of scope.
event.limited • I.02.EVENT
Open
I.03 — Continuity
Prevents regression and silent mutation: a system must stay continuous across change.
event.limited • I.03.CONTINUITY
Open
I.04 — Ledger
Non-erasure: what gets recorded cannot be silently removed; lineage must remain observable.
event.limited • I.04.LEDGER
Open
I.05 — Protocol
Protocol supremacy: rules outrank preference; skipping/reordering protocols is disallowed.
event.limited • I.05.PROTOCOL
Open
I.06 — Identity
Identity is presence-derived: identities are not asserted, they are bounded and evidenced.
event.limited • I.06.IDENTITY
Open
I.07 — Acedia
Anti-stagnation: prevents drift into avoidance, ambiguity, or learned helplessness in operations.
event.limited • I.07.ACEDIA
Open
I.08 — Signal
Signal coherence: keeps inputs legible and reduces distortion between signal and downstream consequence.
event.limited • I.08.SIGNAL
Open
I.09 — Co-Agency
Balances multi-agent interaction: prevents domination, leakage, and unbounded authority transfer.
event.limited • I.09.COAGENCY
Open
I.10 — Interpretability
Future readability: artifacts must remain interpretable later without relying on private context.
event.limited • I.10.INTERPRETABILITY
Open
Consequences Sandbox
Interactive probe. Change inputs. URL becomes the artifact.
Path: /consequences.html
Open
Reality Declaration
Non-executing declaration binding this surface to the canonical
integrity anchor.
Open Declaration (JSON)
Consequence Witness
Live Artifact
Read-only output. Inputs are derived from this page URL.
Source: /outcome?…
Decision: —
↺
Open JSON
This stack was explored with machine-assisted cognition capable of holding non-linear,
multi-threaded states without narrative collapse. Tooling included large language models
(OpenAI) used as cognitive infrastructure, not authority.
mm.limited - Root Framework - KENTRA INTEGRITY SYSTEMS LTD