Path 02 · For Architects & Critics

The shape of the system,
not the schematic.

Enough to evaluate the design. Enough to know what questions to ask. The full schematic lives in the patents and the diligence room.

§ 01

Three design commitments. Visible everywhere.

I · Separation
Planning is a different kind of problem from enforcement. The planning layer can use AI; the enforcement layer must not. WeaveSynth keeps these two concerns in different processes, with a versioned, auditable contract between them.
II · Determinism
Once a blueprint is sealed, enforcement is deterministic. No prompt-time interpretation. No model in the hot path. The same blueprint, replayed, produces the same trace. This is what makes the evidence meaningful.
III · Cryptographic proof
Every observation is sealed and anchored. Evidence integrity does not depend on Logic Axon Shield, your auditor, or any single party remaining honest or available. Replay is end-to-end and offline-verifiable.
§ 02

Three layers, separable, with a single direction of flow.

— Plan

WeaveSynth

The intelligence layer

A multi-stage pipeline that takes regulatory text and produces a deterministic execution blueprint. Authority resolution, dependency modelling, semantic mapping, sequencing, blueprint emission, observational validation. The shape is novel; the details live in the patent.

regulationblueprint
— Enforce

ISATech

The enforcement layer

A control engine, a CI/CD bridge, and adapters into IT, OT, and IoT systems. Executes the blueprint deterministically against your infrastructure. No interpretation. No replanning. Constrains as specified, fails closed.

blueprintaction
— Prove

VerdictVault

The evidence layer

Every step observed. Every observation sealed. Every seal cryptographically anchored. Evidence is replayable, auditor-portable, tamper-evident, and verifiable independently of the issuing system.

actionevidence
§ 03

Direction of flow.

— SOVEREIGN COMPLIANCE INFRASTRUCTURE — REGULATION SYSTEM CONTEXT CONTROL POLICY — PLAN WeaveSynth INGEST · RESOLVE MAP · SEQUENCE EMIT BLUEPRINT + SIMULATION / WHAT-IF + OBSERVATIONAL VALIDATION — ENFORCE ISATech CONTROL ENGINE CI/CD BRIDGE SYSTEM ADAPTERS → IT · OT · IoT FAILS CLOSED — PROVE VerdictVault WITNESS · SEAL ANCHOR · REPLAY ATTEST → AUDITOR · REGULATOR → COURT-GRADE EVIDENCE BLUEPRINT TRACE FIG. 2 — DIRECTION OF FLOW. NO BACKWARD INTERPRETATION. NO SHARED STATE. EACH LAYER VERIFIABLE INDEPENDENTLY. EACH HANDOFF VERSIONED.
§ 04

The questions a critic should ask.

We assume a serious technical reviewer will arrive with sharper questions than these. These are the ones we expect first, with brief answers. The longer answers belong in a conversation.

How is the blueprint not just a prompt?
It is a versioned, structured artifact with explicit dependencies, sequencing, and acceptance criteria. The model produces it; the enforcement layer never re-asks the model. Same blueprint, same trace, every time.
What stops drift between blueprint and reality?
An observational layer runs continuously and non-participatorily. Drift is detected and flagged; remediation goes back to the planning layer, never sideloaded into enforcement.
What are you actually anchoring against?
A configurable set of independent witnesses. Customers can choose their anchoring substrate based on jurisdictional and adversarial assumptions. This is a deployment choice, not a marketing claim.
Where is the AI-shaped risk concentrated?
In the planning layer, by design. The planning layer is where novelty and uncertainty live. The enforcement and evidence layers are deterministic and inspectable. The risk surface is small and where you'd expect it.
How do you avoid lock-in?
Blueprints are portable schemas. Evidence is verifiable independently of the issuing system. If we disappear, your dossiers remain valid and your blueprints remain readable.
§ 05

Intellectual property.

US patents pending
across all three layers.
Filed pro se,
micro entity status,
by the founder.

All three layers — WeaveSynth, ISATech, VerdictVault — are subjects of pending US patent applications, filed by the founder. The architecture commitments described above are the substance of those filings, not marketing language layered over a generic stack.

Specific application numbers, claim coverage, and the relationship between the planning pipeline and the enforcement and evidence layers are discussed in diligence under appropriate confidentiality.

§ 06 · Conversation

Bring your sharpest objection.

Critique calls are scheduled with the founder. Architecture brief available on request to qualified technical reviewers, advisors, and prospective design partners.