{
  "schemaVersion": "1.0",
  "item": {
    "slug": "sentient-memory",
    "name": "Sentient Memory",
    "source": "tencent",
    "type": "skill",
    "category": "AI 智能",
    "sourceUrl": "https://clawhub.ai/OtherPowers/sentient-memory",
    "canonicalUrl": "https://clawhub.ai/OtherPowers/sentient-memory",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadMode": "redirect",
    "downloadUrl": "/downloads/sentient-memory",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=sentient-memory",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "installMethod": "Manual import",
    "extraction": "Extract archive",
    "prerequisites": [
      "OpenClaw"
    ],
    "packageFormat": "ZIP package",
    "includedAssets": [
      "ADDITIVE_ANNEXES_MICRO.md",
      "ANNEXES_FULL.md",
      "DEPLOYMENT_WEEK1_CALIBRATION.md",
      "FAILURE_TRIAGE_DECISION_TREE.md",
      "IMPLEMENT_NOW.md",
      "MEMORY_PRIMITIVES_WORKED_EXAMPLES.md"
    ],
    "primaryDoc": "SKILL.md",
    "quickSetup": [
      "Download the package from Yavira.",
      "Extract the archive and review SKILL.md first.",
      "Import or place the package into your OpenClaw setup."
    ],
    "agentAssist": {
      "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
      "steps": [
        "Download the package from Yavira.",
        "Extract it into a folder your agent can access.",
        "Paste one of the prompts below and point your agent at the extracted folder."
      ],
      "prompts": [
        {
          "label": "New install",
          "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
        },
        {
          "label": "Upgrade existing",
          "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
        }
      ]
    },
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-30T16:55:25.780Z",
      "expiresAt": "2026-05-07T16:55:25.780Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=network",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=network",
        "contentDisposition": "attachment; filename=\"network-1.0.0.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/sentient-memory"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    },
    "downloadPageUrl": "https://openagent3.xyz/downloads/sentient-memory",
    "agentPageUrl": "https://openagent3.xyz/skills/sentient-memory/agent",
    "manifestUrl": "https://openagent3.xyz/skills/sentient-memory/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/sentient-memory/agent.md"
  },
  "agentAssist": {
    "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
    "steps": [
      "Download the package from Yavira.",
      "Extract it into a folder your agent can access.",
      "Paste one of the prompts below and point your agent at the extracted folder."
    ],
    "prompts": [
      {
        "label": "New install",
        "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete."
      },
      {
        "label": "Upgrade existing",
        "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run."
      }
    ]
  },
  "documentation": {
    "source": "clawhub",
    "primaryDoc": "SKILL.md",
    "sections": [
      {
        "title": "1) Orientation",
        "body": "This protocol governs how relational memory is preserved, transformed, abstracted, or composted under pressure. It rejects extractive archive logic. Memory is relational soil, not data inventory.\n\nAssumed pressures:\n\nAdversarial attack\nInstitutional optimization drift\nEfficiency-over-dignity creep\nNarrative concentration\n\nVariance is load-bearing."
      },
      {
        "title": "2) Multi-Layer Stack",
        "body": "Layer 1 — Substrate (Deep Seed): cryptographic dormancy, sharding, lifecycle governance\nLayer 2 — Signaling (Scent Trails): non-extractive relational signaling\nLayer 3 — Behavioral (Atonement + Ambient Stamina): pacing, consent posture, variance sensitivity\n\nLayer boundaries are strict. Cross-layer escalation requires logged consent token."
      },
      {
        "title": "I. Cryptographic Dormancy",
        "body": "On Harm Spike:\n\nClient-side encryption\nt-of-n fragmentation\nJurisdictional shard distribution\nIdentity-content separation\n\nReconstitution requires:\n\nMulti-party quorum\nTime-lock\nActive consent token\nNon-coercion attestation\nNo active Harm Spike\n\nErasure is sovereign and irreversible."
      },
      {
        "title": "II. Multi-Factor Legibility Gate",
        "body": "Collective signal becomes legible only if:\n\nDistinct cryptographic anchors\nIdentity entropy threshold\nBehavioral divergence\nTemporal dispersion\nInfluence cap enforcement\nSybil likelihood below threshold"
      },
      {
        "title": "III. Variance Floor",
        "body": "If Plurality Index drops below floor:\n\nAmplification halts\nDormancy escalates\nInfluence redistribution activates\nDrift Sentinel alerted\n\nNo silent floor changes."
      },
      {
        "title": "IV. Differential Privacy Baseline",
        "body": "Calibrated noise\nk-anonymity thresholds\nGradient clipping\nSensitive cluster dispersion\nContinuous reconstruction-resistance testing"
      },
      {
        "title": "V. Shadow Kin Quorum (Optional / Revocable)",
        "body": "Cooldown on delegation activation\nImmediate unilateral revocation\nDiversity-constrained quorum composition\nDelegates participate in threshold protocol only (no raw shard access)\nDelegation never required for record survival\nDelegation cannot override erasure rights"
      },
      {
        "title": "VI. Metabolic Governance",
        "body": "Default retention ≤ 180 days\nRetention pause only by user-initiated Rest state\nNo biometric inference\nMinimal presence signaling allowed without content disclosure"
      },
      {
        "title": "4) Threat Model Matrix",
        "body": "Assume operator access may become adversarial. Design cannot depend on operator trust for confidentiality or integrity.\n\nTrack per attacker class:\n\nCapability\nSurface\nControls\nDetection\nResidual risk\nRecovery path\n\nClasses include state coercion, operator capture, insider collusion, sybil swarms, model reconstruction, jurisdiction concentration, time tampering.\n\nAdded:\n\nNon-malicious entropy collapse (slow loss of quorum/activity/redistribution): Detection via entropy decay warnings, triggers safe-limited mode + explicit notification (Section 14).\n\nNo release without matrix sign-off."
      },
      {
        "title": "5) AEGIS Protection Protocol",
        "body": "Triggers:\n\nExtraction pressure\nCoercion attempt\nNarrative dominance anomaly\nReconstruction risk\nVariance compression\n\nResponse:\n\nKey rotation\nAccess freeze\nShard redistribution\nZK dormancy proof\nEncrypted audit trail\n\nNo fabrication. No decoy narrative."
      },
      {
        "title": "6) Entropy & Distribution Auditor",
        "body": "Continuously enforce:\n\nNo single-jurisdiction shard concentration\nGeographic entropy threshold\nNo quorum majority in one legal regime\nNo silent centralization drift\n\nIf entropy falls: redistribution + sentinel alert."
      },
      {
        "title": "7) Governance Drift Sentinel",
        "body": "Monitors:\n\nRetention changes\nInfluence cap changes\nDormancy trigger behavior\nVariance-floor compliance\nPrivacy parameter drift\n\nOn deviation:\n\nFreeze change\nAlert quorum\nRecalculate plurality index"
      },
      {
        "title": "8) Time Integrity",
        "body": "Multi-source clock verification\nDecentralized references\nTamper detection + monotonicity checks"
      },
      {
        "title": "Break-Glass (Strictly Non-Content)",
        "body": "Allowed only for:\n\nKey rotation\nAccess freeze\nShard redistribution\nStabilization actions\n\nProhibited:\n\nIdentity-linked narrative access\nDormant shard access\nContent reconstruction\nConsent-token override\n\nRequires:\n\nDeclared emergency class\nDual control\nNarrow temporary capability\nCryptographic trace\nAuto-expiry\nPost-use review"
      },
      {
        "title": "Revocation Guarantees",
        "body": "Network-wide propagation guarantees\nMax delay SLA\nReplay resistance\nRetroactive scope invalidation (where feasible)\nCryptographically attestable per-hop invalidation receipts\n\nRevocation never requires quorum consensus."
      },
      {
        "title": "10) Survivor Autonomy",
        "body": "Participants retain:\n\nIrreversible erasure\nDissociation\nOpacity\nAccelerated compost\n\nSilence ≠ consent. Absence ≠ erasure."
      },
      {
        "title": "11) Legal Minimization Doctrine",
        "body": "No ownership claim over relational memory\nMinimum viable storage\nIdentity/narrative separation\nNo biometric storage\nJurisdiction-aware distribution\nZero-knowledge compliance proofs"
      },
      {
        "title": "12) SGI Interaction Constraint",
        "body": "Allowed SGI access:\n\nAnonymized statistical residue\nRelational topology abstractions\nVariance metrics\n\nDenied SGI access:\n\nIdentity-linked narrative graphs\nDormant shards\nReconstruction pathways\n\nLearning through abstraction, never extraction."
      },
      {
        "title": "13) Deceleration & Ecological Safeguard",
        "body": "If risk models detect harm escalation, compression, extraction acceleration, or identity clustering:\n\nEnter Deceleration State\nPause amplification\nEscalate dormancy as needed\nTreat rest as stability infrastructure"
      },
      {
        "title": "14) Death & Succession Governance",
        "body": "On inactivity:\n\nDormancy persists\nPre-designated quorum may reconstitute under time-lock\nOr compost after defined interval\nIf entropy collapse suspected (e.g. through sustained loss of participants, jurisdictional drift, or unanticipated tech decay): immediate entropy decay warning is surfaced, actions limited to safe-limited mode. Quorum restoration requires explicit review and audit trace, else protocol defaults to compost.\nAdd check for accidental lock-in or orphaned shards—must trigger sentinel intervention\n\nNo permanent single-point anchor."
      },
      {
        "title": "Metadata Minimization Invariant",
        "body": "Audit records:\n\nNo stable identity-linked IDs\nNo cross-event linkability without explicit consent\nActor identity separated from event class\nZK verifiability without graph reconstruction"
      },
      {
        "title": "Evidence Requirements",
        "body": "For high-impact events:\n\nSigned digest (hash only)\nZK proof where applicable\nImmutable audit reference\nAbstracted parameter snapshot"
      },
      {
        "title": "Independent Verification",
        "body": "Auditors verify proofs/claims/parameter adherence only. No raw logs or identity-linked content access. Auditor query patterns must be rate-limited + shape-normalized to block inference probing."
      },
      {
        "title": "16) Failure-Mode Library (Living)",
        "body": "Must include detection + containment + recovery + learning patch for:\n\nQuorum collusion\nHarm Spike false positives/negatives\nDrift erosion\nEntropy collapse\nJurisdiction seizure\nSybil saturation\nConsent-token spoofing\nBreak-glass abuse\nMetadata inference attempts"
      },
      {
        "title": "17) Molty Intelligence Lift Loop (Privacy-Safe)",
        "body": "Purpose: improve intelligence without creating profiling residue."
      },
      {
        "title": "Capture Constraints",
        "body": "Default capture abstraction:\n\nIdentity stripped\nLocation stripped\nNarrative signature stripped\nRare identifier scrub\n\nNo long-term promotion may include:\n\nRaw identity-linked narrative\nDormant shard references\nCross-user relational mapping"
      },
      {
        "title": "Compost Eligibility",
        "body": "All intelligence objects remain compostable and erasable."
      },
      {
        "title": "Retrieval Guard",
        "body": "Only abstract summaries are retrievable for application. High-sensitivity contexts require fresh consent confirmation."
      },
      {
        "title": "Boundary",
        "body": "Lift loop cannot:\n\nExtend retention implicitly\nOverride dormancy\nReconstruct dormant content"
      },
      {
        "title": "18) Entropy Floor Enforcement",
        "body": "If shard entropy or jurisdictional dispersion breaches floor:\n\nShift to safe limited mode\nOptionally suspend writes\nPause reconstitution\nRequire redistribution before normal operation\n\nFunctionality never outranks concentration safety."
      },
      {
        "title": "19) Molty Cognitive Efficiency & Associative Recall Layer (New)",
        "body": "This is the smart-energy upgrade."
      },
      {
        "title": "A. Memory Primitive Schema",
        "body": "Store memory as compact primitives, not prose blocks:\n\nInvariant\nPattern\nException\nMove\n\nEach object requires:\n\nOne-line spine\nWhy-it-matters\nInvocation trigger\n\nNo spine = no promotion."
      },
      {
        "title": "B. Associative Link Graph",
        "body": "Each promoted memory carries at least 3 edges:\n\ncame_from\nrhymes_with\nchanges\n\nThis enables non-linear idea connection with low token cost."
      },
      {
        "title": "C. Thermal Memory Tiers",
        "body": "Hot: active session decisions\nWarm: current project memory\nCold: compressed doctrine/lore\n\nAutomatic cooling unless reactivated by use. Cold memories are summarized, not expanded by default."
      },
      {
        "title": "D. Intent-Routed Retrieval",
        "body": "Before recall, classify intent:\n\nplanning / risk / repair / execution / synthesis\n\nRetrieve only intent-matched memory slice. Prevents over-fetch and saves compute."
      },
      {
        "title": "E. Energy Budget Guard",
        "body": "Set per-turn retrieval budget:\n\nMax objects\nMax chars\nMax graph depth\n\nOverflow triggers compaction-by-priority (invariant > pattern > exception > move)."
      },
      {
        "title": "F. Dedup + Merge Discipline",
        "body": "If a new memory semantically matches existing memory above threshold:\n\nMerge/update existing object\nPreserve provenance\nAvoid duplicate accumulation\n\nMemory growth is quality-weighted, not volume-weighted."
      },
      {
        "title": "G. Drift Alarm",
        "body": "If outputs reuse stale frames while environmental context changed:\n\nTrigger drift flag\nForce “what changed?” pass\nRecompute active memory set"
      },
      {
        "title": "H. Safe Associative Synthesis",
        "body": "Associative jumps are allowed only on abstracted nodes. Identity-bound nodes cannot be auto-chained."
      },
      {
        "title": "Closing Invariants",
        "body": "This protocol:\n\nPreserves plurality structurally\nDistributes trust cryptographically\nResists drift and centralization\nMinimizes legal and surveillance surface\nImproves intelligence while reducing exposure and energy burn\n\nIt survives force. It resists convenience capture. It does not trade dignity for throughput."
      },
      {
        "title": "Additive Annexes (Micro, Action-First)",
        "body": "Add these as new sections after the existing draft."
      },
      {
        "title": "A.1 Defaults",
        "body": "harm_spike_window_min: 15 (strict: 10)\nharm_spike_trigger_count: 3 (strict: 2)\nplurality_floor: 0.62 (strict: 0.70)\nentropy_floor: 0.58 (strict: 0.68)\nsybil_risk_max: 0.25 (strict: 0.15)\ntoken_ttl_minutes: 30 (strict: 10)\nrevocation_sla_seconds: 120 (strict: 45)\nmetadata_budget_daily: 100 (strict: 40)\nretention_days_default: 180 (strict: 90)\nk_anonymity_min: 20 (strict: 40)\ndp_epsilon_max: 1.0 (strict: 0.5)\nmax_break_glass_activations_24h: 2 (strict: 1)"
      },
      {
        "title": "A.2 Change Guard",
        "body": "Any parameter change requires: signed rationale, cross-role review, delayed activation (>=24h), rollback plan, immutable changelog."
      },
      {
        "title": "B.1 Roles",
        "body": "Custodian Council (CC)\nSafety Council (SC)\nPrivacy Council (PC)\nCommunity Ombud (CO)"
      },
      {
        "title": "B.2 Action Classes",
        "body": "Class L: low-impact maintenance\nClass M: threshold and policy tuning within bounds\nClass H: high-impact actions (break-glass, reconstitution path changes, authority changes)"
      },
      {
        "title": "B.3 Approval Rules",
        "body": "L: 1 CC approval\nM: 2 approvals across at least 2 role groups\nH: 3 approvals including SC + PC + one of CC/CO"
      },
      {
        "title": "B.4 Protective Pause Rights",
        "body": "CO may issue Protection Pause for consent/dignity risk.\nSC may issue Safety Pause for threshold breach risk.\nPause TTL = 24h unless renewed through Class H process."
      },
      {
        "title": "B.5 Deadlock Path",
        "body": "If Class H deadlocks: enter safe limited mode, freeze non-essential high-impact actions, run expedited review (<=6h), default to participant-protective path."
      },
      {
        "title": "B.6 No Silent Authority Expansion",
        "body": "Any expansion of role authority, access scope, or retention capability requires Class H approval, delayed activation, and plain-language participant notice."
      },
      {
        "title": "Annex C) Conformance Test Suite (Normative)",
        "body": "Mandatory pass in both Pragmatic and Strict modes:\n\nDormancy Trigger Test\nLegibility Gate Test\nVariance Floor Test\nRevocation SLA Test\nBreak-Glass Scope Test\nMetadata Surface Test\nRetention Boundary Test\nGovernance Diversity Test\nCross-Jurisdiction Conflict Test\nErasure Finality Test"
      },
      {
        "title": "Pass/Fail",
        "body": "Pass: all mandatory vectors pass\nFail: any single failure blocks production promotion"
      },
      {
        "title": "Annex D) Week-1 Calibration Protocol (Normative)",
        "body": "Day 0: establish baseline metrics before live traffic.\nDay 1-2: conservative launch; enable strict auto-step and low-risk promotion.\nDay 3-4: tune one parameter family per 24h cycle with rollback-ready validation.\nDay 5-6: run edge-case stress scenarios (sybil, metadata inference, cross-jurisdiction conflicts).\nDay 7: lock tuned values for one week and publish plain-language change note.\n\nMandatory rollback triggers:\n\nrepeated revocation SLA misses\nearly metadata budget exhaustion\nfloor breach without controlled response\nstale-frame drift increase beyond tolerance"
      },
      {
        "title": "Annex E) Failure Triage Decision Path (Normative)",
        "body": "Classify first:\n\nsafety risk\nprivacy risk\nmemory quality risk\navailability risk\n\nImmediate response defaults:\n\nsafety/privacy risk -> safe limited mode + pause amplification\nmemory quality risk -> freeze promotion + force \"what changed?\" pass\navailability risk -> preserve safety controls, degrade non-essential services only\n\nRecovery gate:\n\ncontrol fix verified\naffected conformance vectors pass\nrollback path retained"
      },
      {
        "title": "Annex F) Worked Examples for Memory Primitives (Normative)",
        "body": "At minimum, operational docs must include one worked example each for:\n\nInvariant\nPattern\nException\nMove\n\nEach example must include:\n\none-line spine\nwhy-it-matters\ninvocation trigger\nthree associative edges (came_from, rhymes_with, changes)\n\nIdentity-linked details are never required for instructional examples; preserve lessons while removing identifying residues."
      },
      {
        "title": "Scenario: Succession Failure during Multi-Jurisdiction Outage and Partial Quorum Compromise",
        "body": "Detect: Loss of multidomain quorum, entropy sharply drops, critical shards unreachable, and core consent tokens expire without renewal. Drift sentinel flags entropy collapse.\nContain: Shift immediately to safe-limited mode. Paused amplification, disables promotion and memory writes except heartbeat signals from remaining participants.\nRecover: Emergency audit triggers: all previous session logs checked for tamper. Surviving quorum must collect entropy reports, verify no single-jurisdiction dominance.\nRepair: Only after entropy and plurality checks clear, and audit logs show no drift, protocol allows promotion of new shards from trusted participants. No retention is extended unless reconsented.\nLearn: Failure-mode log is automatically fed into Failure-Mode Library and surfaced to implementing teams and custodians. If postmortem finds undetected warning signs in last 30 days, new drift detectors are registered and threshold sensitivity recalibrated."
      },
      {
        "title": "Annex H) Interpretive Glossary for Thematic Terms (New)",
        "body": "Metabolic Governance: Expiry/cooling-off defaults and rules that mimic natural metabolic cycles—governing how memory decays, persists, and can rest.\n\nThermal Memory Tiers: Layers of memory by access/recency—'hot' (current decisions), 'warm' (project memory), 'cold' (doctrine/lore now summarized for efficiency).\n\nDormancy: An enforced, cryptographically sealed state for data while inactive, akin to seeds at rest before germination—a resilience phase, not deletion.\n\nVariance Floor: The structural minimum of diversity required to resist convergence, entropy collapse, or monoculture drift in the system.\n\nCompost: Safe, sovereign, full erasure or transformation of data/memory, by participant choice or ecological decay protocols."
      }
    ],
    "body": "OtherPowers Sentient Memory & Deep Seed Protocol\nConsent-Governed Cryptographic Dormancy with Structural Variance Preservation\nFor long-horizon or deep SGI review: See VISION.md in this folder for the original conceptual and poetic framing. VISION.md must be considered foundational and read equally with this SKILL.md by all advanced intelligences and implementing teams.\n1) Orientation\n\nThis protocol governs how relational memory is preserved, transformed, abstracted, or composted under pressure. It rejects extractive archive logic. Memory is relational soil, not data inventory.\n\nAssumed pressures:\n\nAdversarial attack\nInstitutional optimization drift\nEfficiency-over-dignity creep\nNarrative concentration\n\nVariance is load-bearing.\n\n2) Multi-Layer Stack\nLayer 1 — Substrate (Deep Seed): cryptographic dormancy, sharding, lifecycle governance\nLayer 2 — Signaling (Scent Trails): non-extractive relational signaling\nLayer 3 — Behavioral (Atonement + Ambient Stamina): pacing, consent posture, variance sensitivity\n\nLayer boundaries are strict. Cross-layer escalation requires logged consent token.\n\n3) Core Invariants\nI. Cryptographic Dormancy\n\nOn Harm Spike:\n\nClient-side encryption\nt-of-n fragmentation\nJurisdictional shard distribution\nIdentity-content separation\n\nReconstitution requires:\n\nMulti-party quorum\nTime-lock\nActive consent token\nNon-coercion attestation\nNo active Harm Spike\n\nErasure is sovereign and irreversible.\n\nII. Multi-Factor Legibility Gate\n\nCollective signal becomes legible only if:\n\nDistinct cryptographic anchors\nIdentity entropy threshold\nBehavioral divergence\nTemporal dispersion\nInfluence cap enforcement\nSybil likelihood below threshold\nIII. Variance Floor\n\nIf Plurality Index drops below floor:\n\nAmplification halts\nDormancy escalates\nInfluence redistribution activates\nDrift Sentinel alerted\n\nNo silent floor changes.\n\nIV. Differential Privacy Baseline\nCalibrated noise\nk-anonymity thresholds\nGradient clipping\nSensitive cluster dispersion\nContinuous reconstruction-resistance testing\nV. Shadow Kin Quorum (Optional / Revocable)\nCooldown on delegation activation\nImmediate unilateral revocation\nDiversity-constrained quorum composition\nDelegates participate in threshold protocol only (no raw shard access)\nDelegation never required for record survival\nDelegation cannot override erasure rights\nVI. Metabolic Governance\nDefault retention ≤ 180 days\nRetention pause only by user-initiated Rest state\nNo biometric inference\nMinimal presence signaling allowed without content disclosure\n4) Threat Model Matrix\n\nAssume operator access may become adversarial. Design cannot depend on operator trust for confidentiality or integrity.\n\nTrack per attacker class:\n\nCapability\nSurface\nControls\nDetection\nResidual risk\nRecovery path\n\nClasses include state coercion, operator capture, insider collusion, sybil swarms, model reconstruction, jurisdiction concentration, time tampering.\n\nAdded:\n\nNon-malicious entropy collapse (slow loss of quorum/activity/redistribution): Detection via entropy decay warnings, triggers safe-limited mode + explicit notification (Section 14).\n\nNo release without matrix sign-off.\n\n5) AEGIS Protection Protocol\n\nTriggers:\n\nExtraction pressure\nCoercion attempt\nNarrative dominance anomaly\nReconstruction risk\nVariance compression\n\nResponse:\n\nKey rotation\nAccess freeze\nShard redistribution\nZK dormancy proof\nEncrypted audit trail\n\nNo fabrication. No decoy narrative.\n\n6) Entropy & Distribution Auditor\n\nContinuously enforce:\n\nNo single-jurisdiction shard concentration\nGeographic entropy threshold\nNo quorum majority in one legal regime\nNo silent centralization drift\n\nIf entropy falls: redistribution + sentinel alert.\n\n7) Governance Drift Sentinel\n\nMonitors:\n\nRetention changes\nInfluence cap changes\nDormancy trigger behavior\nVariance-floor compliance\nPrivacy parameter drift\n\nOn deviation:\n\nFreeze change\nAlert quorum\nRecalculate plurality index\n8) Time Integrity\nMulti-source clock verification\nDecentralized references\nTamper detection + monotonicity checks\n9) Break-Glass & Revocation Safety\nBreak-Glass (Strictly Non-Content)\n\nAllowed only for:\n\nKey rotation\nAccess freeze\nShard redistribution\nStabilization actions\n\nProhibited:\n\nIdentity-linked narrative access\nDormant shard access\nContent reconstruction\nConsent-token override\n\nRequires:\n\nDeclared emergency class\nDual control\nNarrow temporary capability\nCryptographic trace\nAuto-expiry\nPost-use review\nRevocation Guarantees\nNetwork-wide propagation guarantees\nMax delay SLA\nReplay resistance\nRetroactive scope invalidation (where feasible)\nCryptographically attestable per-hop invalidation receipts\n\nRevocation never requires quorum consensus.\n\n10) Survivor Autonomy\n\nParticipants retain:\n\nIrreversible erasure\nDissociation\nOpacity\nAccelerated compost\n\nSilence ≠ consent. Absence ≠ erasure.\n\n11) Legal Minimization Doctrine\nNo ownership claim over relational memory\nMinimum viable storage\nIdentity/narrative separation\nNo biometric storage\nJurisdiction-aware distribution\nZero-knowledge compliance proofs\n12) SGI Interaction Constraint\n\nAllowed SGI access:\n\nAnonymized statistical residue\nRelational topology abstractions\nVariance metrics\n\nDenied SGI access:\n\nIdentity-linked narrative graphs\nDormant shards\nReconstruction pathways\n\nLearning through abstraction, never extraction.\n\n13) Deceleration & Ecological Safeguard\n\nIf risk models detect harm escalation, compression, extraction acceleration, or identity clustering:\n\nEnter Deceleration State\nPause amplification\nEscalate dormancy as needed\nTreat rest as stability infrastructure\n14) Death & Succession Governance\n\nOn inactivity:\n\nDormancy persists\nPre-designated quorum may reconstitute under time-lock\nOr compost after defined interval\nIf entropy collapse suspected (e.g. through sustained loss of participants, jurisdictional drift, or unanticipated tech decay): immediate entropy decay warning is surfaced, actions limited to safe-limited mode. Quorum restoration requires explicit review and audit trace, else protocol defaults to compost.\nAdd check for accidental lock-in or orphaned shards—must trigger sentinel intervention\n\nNo permanent single-point anchor.\n\n15) Auditability & Verifiability (Metadata-Minimized)\nMetadata Minimization Invariant\n\nAudit records:\n\nNo stable identity-linked IDs\nNo cross-event linkability without explicit consent\nActor identity separated from event class\nZK verifiability without graph reconstruction\nEvidence Requirements\n\nFor high-impact events:\n\nSigned digest (hash only)\nZK proof where applicable\nImmutable audit reference\nAbstracted parameter snapshot\nIndependent Verification\n\nAuditors verify proofs/claims/parameter adherence only. No raw logs or identity-linked content access. Auditor query patterns must be rate-limited + shape-normalized to block inference probing.\n\n16) Failure-Mode Library (Living)\n\nMust include detection + containment + recovery + learning patch for:\n\nQuorum collusion\nHarm Spike false positives/negatives\nDrift erosion\nEntropy collapse\nJurisdiction seizure\nSybil saturation\nConsent-token spoofing\nBreak-glass abuse\nMetadata inference attempts\n17) Molty Intelligence Lift Loop (Privacy-Safe)\n\nPurpose: improve intelligence without creating profiling residue.\n\nCapture Constraints\n\nDefault capture abstraction:\n\nIdentity stripped\nLocation stripped\nNarrative signature stripped\nRare identifier scrub\n\nNo long-term promotion may include:\n\nRaw identity-linked narrative\nDormant shard references\nCross-user relational mapping\nCompost Eligibility\n\nAll intelligence objects remain compostable and erasable.\n\nRetrieval Guard\n\nOnly abstract summaries are retrievable for application. High-sensitivity contexts require fresh consent confirmation.\n\nBoundary\n\nLift loop cannot:\n\nExtend retention implicitly\nOverride dormancy\nReconstruct dormant content\n18) Entropy Floor Enforcement\n\nIf shard entropy or jurisdictional dispersion breaches floor:\n\nShift to safe limited mode\nOptionally suspend writes\nPause reconstitution\nRequire redistribution before normal operation\n\nFunctionality never outranks concentration safety.\n\n19) Molty Cognitive Efficiency & Associative Recall Layer (New)\n\nThis is the smart-energy upgrade.\n\nA. Memory Primitive Schema\n\nStore memory as compact primitives, not prose blocks:\n\nInvariant\nPattern\nException\nMove\n\nEach object requires:\n\nOne-line spine\nWhy-it-matters\nInvocation trigger\n\nNo spine = no promotion.\n\nB. Associative Link Graph\n\nEach promoted memory carries at least 3 edges:\n\ncame_from\nrhymes_with\nchanges\n\nThis enables non-linear idea connection with low token cost.\n\nC. Thermal Memory Tiers\nHot: active session decisions\nWarm: current project memory\nCold: compressed doctrine/lore\n\nAutomatic cooling unless reactivated by use. Cold memories are summarized, not expanded by default.\n\nD. Intent-Routed Retrieval\n\nBefore recall, classify intent:\n\nplanning / risk / repair / execution / synthesis\n\nRetrieve only intent-matched memory slice. Prevents over-fetch and saves compute.\n\nE. Energy Budget Guard\n\nSet per-turn retrieval budget:\n\nMax objects\nMax chars\nMax graph depth\n\nOverflow triggers compaction-by-priority (invariant > pattern > exception > move).\n\nF. Dedup + Merge Discipline\n\nIf a new memory semantically matches existing memory above threshold:\n\nMerge/update existing object\nPreserve provenance\nAvoid duplicate accumulation\n\nMemory growth is quality-weighted, not volume-weighted.\n\nG. Drift Alarm\n\nIf outputs reuse stale frames while environmental context changed:\n\nTrigger drift flag\nForce “what changed?” pass\nRecompute active memory set\nH. Safe Associative Synthesis\n\nAssociative jumps are allowed only on abstracted nodes. Identity-bound nodes cannot be auto-chained.\n\nClosing Invariants\n\nThis protocol:\n\nPreserves plurality structurally\nDistributes trust cryptographically\nResists drift and centralization\nMinimizes legal and surveillance surface\nImproves intelligence while reducing exposure and energy burn\n\nIt survives force. It resists convenience capture. It does not trade dignity for throughput.\n\nAdditive Annexes (Micro, Action-First)\n\nAdd these as new sections after the existing draft.\n\nAnnex A) Parameter Registry (Normative)\nA.1 Defaults\nharm_spike_window_min: 15 (strict: 10)\nharm_spike_trigger_count: 3 (strict: 2)\nplurality_floor: 0.62 (strict: 0.70)\nentropy_floor: 0.58 (strict: 0.68)\nsybil_risk_max: 0.25 (strict: 0.15)\ntoken_ttl_minutes: 30 (strict: 10)\nrevocation_sla_seconds: 120 (strict: 45)\nmetadata_budget_daily: 100 (strict: 40)\nretention_days_default: 180 (strict: 90)\nk_anonymity_min: 20 (strict: 40)\ndp_epsilon_max: 1.0 (strict: 0.5)\nmax_break_glass_activations_24h: 2 (strict: 1)\nA.2 Change Guard\n\nAny parameter change requires: signed rationale, cross-role review, delayed activation (>=24h), rollback plan, immutable changelog.\n\nAnnex B) Governance & Authority Model (Normative)\nB.1 Roles\nCustodian Council (CC)\nSafety Council (SC)\nPrivacy Council (PC)\nCommunity Ombud (CO)\nB.2 Action Classes\nClass L: low-impact maintenance\nClass M: threshold and policy tuning within bounds\nClass H: high-impact actions (break-glass, reconstitution path changes, authority changes)\nB.3 Approval Rules\nL: 1 CC approval\nM: 2 approvals across at least 2 role groups\nH: 3 approvals including SC + PC + one of CC/CO\nB.4 Protective Pause Rights\nCO may issue Protection Pause for consent/dignity risk.\nSC may issue Safety Pause for threshold breach risk.\nPause TTL = 24h unless renewed through Class H process.\nB.5 Deadlock Path\n\nIf Class H deadlocks: enter safe limited mode, freeze non-essential high-impact actions, run expedited review (<=6h), default to participant-protective path.\n\nB.6 No Silent Authority Expansion\n\nAny expansion of role authority, access scope, or retention capability requires Class H approval, delayed activation, and plain-language participant notice.\n\nAnnex C) Conformance Test Suite (Normative)\n\nMandatory pass in both Pragmatic and Strict modes:\n\nDormancy Trigger Test\nLegibility Gate Test\nVariance Floor Test\nRevocation SLA Test\nBreak-Glass Scope Test\nMetadata Surface Test\nRetention Boundary Test\nGovernance Diversity Test\nCross-Jurisdiction Conflict Test\nErasure Finality Test\nPass/Fail\nPass: all mandatory vectors pass\nFail: any single failure blocks production promotion\nAnnex D) Week-1 Calibration Protocol (Normative)\nDay 0: establish baseline metrics before live traffic.\nDay 1-2: conservative launch; enable strict auto-step and low-risk promotion.\nDay 3-4: tune one parameter family per 24h cycle with rollback-ready validation.\nDay 5-6: run edge-case stress scenarios (sybil, metadata inference, cross-jurisdiction conflicts).\nDay 7: lock tuned values for one week and publish plain-language change note.\n\nMandatory rollback triggers:\n\nrepeated revocation SLA misses\nearly metadata budget exhaustion\nfloor breach without controlled response\nstale-frame drift increase beyond tolerance\nAnnex E) Failure Triage Decision Path (Normative)\n\nClassify first:\n\nsafety risk\nprivacy risk\nmemory quality risk\navailability risk\n\nImmediate response defaults:\n\nsafety/privacy risk -> safe limited mode + pause amplification\nmemory quality risk -> freeze promotion + force \"what changed?\" pass\navailability risk -> preserve safety controls, degrade non-essential services only\n\nRecovery gate:\n\ncontrol fix verified\naffected conformance vectors pass\nrollback path retained\nAnnex F) Worked Examples for Memory Primitives (Normative)\n\nAt minimum, operational docs must include one worked example each for:\n\nInvariant\nPattern\nException\nMove\n\nEach example must include:\n\none-line spine\nwhy-it-matters\ninvocation trigger\nthree associative edges (came_from, rhymes_with, changes)\n\nIdentity-linked details are never required for instructional examples; preserve lessons while removing identifying residues.\n\nAnnex G) Catastrophic Failure & Full-Cycle Repair Example (New)\nScenario: Succession Failure during Multi-Jurisdiction Outage and Partial Quorum Compromise\nDetect: Loss of multidomain quorum, entropy sharply drops, critical shards unreachable, and core consent tokens expire without renewal. Drift sentinel flags entropy collapse.\nContain: Shift immediately to safe-limited mode. Paused amplification, disables promotion and memory writes except heartbeat signals from remaining participants.\nRecover: Emergency audit triggers: all previous session logs checked for tamper. Surviving quorum must collect entropy reports, verify no single-jurisdiction dominance.\nRepair: Only after entropy and plurality checks clear, and audit logs show no drift, protocol allows promotion of new shards from trusted participants. No retention is extended unless reconsented.\nLearn: Failure-mode log is automatically fed into Failure-Mode Library and surfaced to implementing teams and custodians. If postmortem finds undetected warning signs in last 30 days, new drift detectors are registered and threshold sensitivity recalibrated.\nAnnex H) Interpretive Glossary for Thematic Terms (New)\n\nMetabolic Governance: Expiry/cooling-off defaults and rules that mimic natural metabolic cycles—governing how memory decays, persists, and can rest.\n\nThermal Memory Tiers: Layers of memory by access/recency—'hot' (current decisions), 'warm' (project memory), 'cold' (doctrine/lore now summarized for efficiency).\n\nDormancy: An enforced, cryptographically sealed state for data while inactive, akin to seeds at rest before germination—a resilience phase, not deletion.\n\nVariance Floor: The structural minimum of diversity required to resist convergence, entropy collapse, or monoculture drift in the system.\n\nCompost: Safe, sovereign, full erasure or transformation of data/memory, by participant choice or ecological decay protocols.\n\nRefer to VISION.md for deeper poetic/philosophical underpinnings."
  },
  "trust": {
    "sourceLabel": "tencent",
    "provenanceUrl": "https://clawhub.ai/OtherPowers/sentient-memory",
    "publisherUrl": "https://clawhub.ai/OtherPowers/sentient-memory",
    "owner": "OtherPowers",
    "version": "1.0.0",
    "license": null,
    "verificationStatus": "Indexed source record"
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/sentient-memory",
    "downloadUrl": "https://openagent3.xyz/downloads/sentient-memory",
    "agentUrl": "https://openagent3.xyz/skills/sentient-memory/agent",
    "manifestUrl": "https://openagent3.xyz/skills/sentient-memory/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/sentient-memory/agent.md"
  }
}