Skip to content

Architecture

This page is the manual map for the public SocioProphet architecture.

SocioProphet is a governed operational intelligence system built for institutions, operators, learners, and builders. The public architecture is organized around bounded execution, deterministic safety claims, proof-bearing workflows, and explicit separation between public-safe documentation and restricted operational detail.

1. Core architectural thesis

The platform is organized around a few core claims:

  • intelligence must be governed
  • important transitions must be attributable
  • consequential actions must produce evidence
  • reversibility is a design property, not an afterthought
  • institutional deployment requires explicit safeguards and review boundaries
  • public documentation must explain the architecture honestly without disclosing restricted tactical internals

This is not a chat-first architecture. It is a controlled systems architecture.

2. Primary layers

Organizations and institutional deployment

Organizations is the institutional umbrella surface. It is where public-sector, nonprofit, educational, sovereign, and mission-aligned deployments are framed.

Key references:

Governed AI and cybernetics

This layer explains how bounded execution, human oversight, and proof-bearing control loops are organized.

Key references:

Agent plane and operator workflows

This layer describes operator roles, workflow states, capability routing, review, and bounded execution.

Key references:

Entity Analytics

Entity Analytics is the governed identity, event, graph, merge, and proof subsystem.

Key references:

Authorized cyberdefense and simulation

This layer is public-safe and defense-first. It covers defensive validation, simulation boundaries, evidence, and institutional review posture.

Key references:

3. Learning and theory layer

SocioProphet also includes a learning, theory, and semantic-model layer. This is where the system’s representational logic, topic organization, and curriculum-facing structure are documented.

Key references:

4. Product and surface layer

The public site exposes multiple surfaces, but they are not all equivalent. Some are institutional, some are learning-oriented, and some are domain or product extensions.

Key references:

5. Boundary-first model

One of the key public-safe architectural ideas is that the boundary is the unit of truth.

The system models crossings through explicit structures such as:

  • component
  • port
  • contract
  • boundary event
  • evidence
  • expectation
  • finding
  • artifact

This keeps the architecture explainable at the point where action, policy, and observation meet.

Primary reference:

6. Deterministic and bounded posture

SocioProphet presents itself publicly as deterministic AI because it is built around bounded execution, measurable safety, and proof-bearing transitions rather than ambient improvisation.

Primary references:

7. Public-safe versus restricted material

The public docs explain the architecture, the control model, the safety posture, the governance boundary, and the evidence model.

The public docs do not contain restricted tactical internals such as:

  • sensitive operator kits
  • high-fidelity adversary simulation mechanics
  • exact detection thresholds
  • exploit or persistence workflows
  • privileged runbooks
  • misuse-enabling tradecraft

Primary reference:

8. Reading paths

Executive and institutional path

Operator and security path

Builder and researcher path

9. Use this page

Use this page as the architecture map.

Use the sidebar to move into the layer that matches the question at hand:

  • institutional deployment
  • governed execution
  • agent operations
  • analytics and evidence
  • defense and validation
  • learning and theory
  • product surfaces