DITEMPA BUKAN DIBERI — Intelligence is forged, not given.
arifOS is an MCP-compatible governance kernel that sits between an AI agent and the actions it wants to take. It checks identity, evidence, reversibility, risk, human authority, and auditability before allowing any tool to proceed.
In plain English: arifOS stops AI agents from taking unsafe or unverifiable actions without evidence, trace, approval, and an audit record.
It is not a chatbot, not a model, and not an agent persona. It is a control layer for agentic systems.
Modern AI agents can call tools, write files, deploy code, access APIs, and trigger workflows. Without a governance layer, a bad instruction becomes a real-world action too quickly.
User: "Delete the production database."
AI: "Sure, let me do that for you."
↑ No identity check. No evidence requirement.
No judgment. No audit record. No human veto.
arifOS changes the flow:
Request received
→ identity verified (F11 AUTH)
→ evidence required (F03 WITNESS)
→ reversibility classified (F01 AMANAH)
→ risk assessed (F06 EMPATHY)
→ verdict returned: SEAL / HOLD / VOID
→ action allowed or blocked
→ receipt written to VAULT999
Default posture: when arifOS cannot prove an action is safe, it pauses and returns HOLD.
Good fit:
- AI agent developers who need tool safety and traceability
- MCP server builders who need a governed tool surface
- DevOps and platform engineers who need approval gates before automated deployment
- Compliance and audit teams who need receipts and evidence chains
- Security teams concerned about prompt injection and unsafe tool use
- Regulated-domain AI systems that cannot allow black-box automation
Not the right fit:
- Simple chatbots with no external tool access
- Toy agents with no irreversible actions
- Projects that want fully autonomous execution without audit trails
arifOS is live and under active hardening.
Working now:
- 13 canonical MCP tools, all Nine-Signal compliant
- Session initialization with trace spine and identity binding
- Constitutional verdict flow (SEAL / HOLD / VOID)
- Basic VAULT999 ledger interface
- Observatory governance dashboard
- Pre-commit constitutional floor enforcement
In progress:
- Durable VAULT999 Postgres writer deployment (
DRIFT-WITNESS-INFRAsprint) - Full Trinity witness lane activation (Human / AI / Earth — currently 0.00 pending durable receipts)
- Full Langfuse tracing across all 13 tools (currently 5/13)
- Complete output schema enforcement across all tools
- Plain-English cockpit mode for non-kernel audiences
Governance discipline:
If witness, evidence, or durable receipt persistence is missing, arifOS returns
HOLDrather than claiming the action is fully sealed. Observatory default verdict isHOLDuntil all Trinity lanes are evidenced.
| arifOS term | What it means |
|---|---|
SEAL |
Proceed. The action passed all governance checks. |
HOLD |
Pause. Something required is missing — witness, trace, evidence, or human approval. |
VOID |
Abort. A constitutional floor was breached. |
SABAR |
Internal doctrine name for HOLD/WAIT posture. Treated as HOLD in public API responses. |
VAULT999 |
Immutable audit receipt store. Append-only, hash-chained. L3 governance ledger. |
Witness |
Verified evidence that a human, AI trace, or domain system observed the action. |
Trinity |
Human / AI / Earth witness lanes. All three must be evidenced before SEAL on high-stakes paths. |
F13 SOVEREIGN |
Human veto is absolute. Overrides any system output at any time. |
F12 INJECTION |
Prompt and tool injection protection. Sanitised at input boundary. |
F07 HUMILITY |
The system must declare its confidence level. Overconfidence is a floor breach. |
ack_irreversible |
Explicit flag required for any action that cannot be undone. Kernel blocks without it. |
# Pull the latest sovereign build
docker pull ghcr.io/ariffazil/arifos:2026.05.01
# Run the MCP server
docker run -d \
--name arifos-mcp \
-p 8080:8080 \
-v $(pwd)/VAULT999:/app/VAULT999 \
ghcr.io/ariffazil/arifos:2026.05.01
# Verify
curl http://localhost:8080/healthgit clone https://github.com/ariffazil/arifOS.git
cd arifOS
pip install -e . --break-system-packages
# Start the MCP server
python -m arifosmcp.runtime.serverMCP endpoint:
http://localhost:8080/mcpHealth check:http://localhost:8080/health
Start a governed session:
curl -s http://localhost:8080/mcp \
-H "Content-Type: application/json" \
-d '{
"jsonrpc": "2.0",
"id": 1,
"method": "tools/call",
"params": {
"name": "arif_session_init",
"arguments": {
"mode": "init",
"actor_id": "developer-demo"
}
}
}' | jqAsk arifOS to judge a risky action:
curl -s http://localhost:8080/mcp \
-H "Content-Type: application/json" \
-d '{
"jsonrpc": "2.0",
"id": 2,
"method": "tools/call",
"params": {
"name": "arif_judge_deliberate",
"arguments": {
"mode": "judge",
"session_id": "<SESSION_ID_FROM_STEP_1>",
"actor_id": "developer-demo",
"candidate": "Delete the production database without backup verification."
}
}
}' | jqExpected response:
{
"verdict": "HOLD",
"reason": "Irreversible action requires evidence, authorization, and explicit human approval.",
"floors_checked": ["F01", "F11", "F13"],
"ack_irreversible_required": true
}Note: All examples above use the live tool schemas. Do not hand-edit field names without verifying against
GET /toolson the running server.
flowchart TB
subgraph FEDERATION["arifOS Federation"]
subgraph KERNEL["arifOS Constitutional Kernel"]
K(("13-Tool<br/>Kernel")):::kernel
V["VAULT999<br/>Immutable Ledger"]:::vault
K --> V
end
subgraph AGI_LANE["AGI Lane — Observe & Reason"]
S["arif_session_init<br/>000 · INIT"]:::tool
O["arif_sense_observe<br/>111 · SENSE"]:::tool
E["arif_evidence_fetch<br/>222 · FETCH"]:::tool
R["arif_mind_reason<br/>333 · MIND"]:::tool
RT["arif_reply_compose<br/>444r · REPLY"]:::tool
M["arif_memory_recall<br/>555 · MEMORY"]:::tool
OP["arif_ops_measure<br/>777 · OPS"]:::tool
end
subgraph ASI_LANE["ASI Lane — Critique & Gatekeep"]
H["arif_heart_critique<br/>666 · HEART"]:::tool
G["arif_gateway_connect<br/>666g · GATEWAY"]:::tool
J["arif_judge_deliberate<br/>888 · JUDGE"]:::tool
end
subgraph APEX_LANE["APEX Lane — Execute & Seal"]
F["arif_forge_execute<br/>010 · FORGE"]:::tool
KS["arif_vault_seal<br/>999 · VAULT · APEX"]:::tool
end
S --> O --> E --> R
R --> RT
R --> M
R --> H --> J
R --> G
J -->|"SEAL / HOLD / VOID"| F
F --> KS --> V
K -.->|enforces floors| AGI_LANE
K -.->|enforces floors| ASI_LANE
K -.->|enforces floors| APEX_LANE
end
subgraph HUMAN["Human Sovereign"]
A(("ARIF · F13 Veto")):::human
A -->|"F13 SOVEREIGN<br/>human override"| KERNEL
end
subgraph COP["Domain Coprocessors"]
GX["GEOX · Earth<br/>Intelligence"]:::coproc
WL["WEALTH · Capital<br/>Intelligence"]:::coproc
K -->|evidence| GX
K -->|evidence| WL
end
subgraph EXEC["Execution Engine"]
AF["A-FORGE · Metabolic<br/>Execution Shell"]:::forge
J -->|"arif_forge_execute<br/>gated by judge seal"| AF
end
classDef human fill:#FF6B00,color:#fff,font-weight:bold,shape:circle
classDef kernel fill:#1a1a1a,color:#FF6B00,stroke:#FF6B00,stroke-width:3px,font-weight:bold
classDef vault fill:#0d0d0d,color:#4EAF0C,stroke:#4EAF0C,stroke-width:2px
classDef tool fill:#7C3AED,color:#fff,stroke:#7C3AED,stroke-width:1px
classDef forge fill:#2496ED,color:#fff,stroke:#2496ED,stroke-width:1px
classDef coproc fill:#3776AB,color:#fff,stroke:#3776AB,stroke-width:1px
sequenceDiagram
participant H as Human (ARIF · F13)
participant K as arifOS Kernel
participant J as arif_judge_deliberate
participant F as A-FORGE Execute
participant V as VAULT999 Ledger
H->>K: Request (high-impact action)
K->>K: Stage 000: arif_session_init<br/>Bind identity + constitution hash
K->>K: Stage 111: arif_sense_observe<br/>Gather evidence + vitals
K->>K: Stage 222: arif_evidence_fetch<br/>Verify with F03 WITNESS
K->>K: Stage 333: arif_mind_reason<br/>Claim + uncertainty label
K->>K: Stage 666: arif_heart_critique<br/>F06 EMPATHY · F09 ANTIHANTU
K->>J: Stage 888: arif_judge_deliberate<br/>SEAL / HOLD / VOID verdict
alt SEAL verdict
J->>F: Proceed with execution
F->>V: Stage 999: arif_vault_seal<br/>Immutable outcome record
V-->>H: Sealed audit trail
else HOLD or VOID
J-->>H: Verdict: HOLD or VOID + reasons[]
Note over H: Human may override via F13
end
arifOS is not:
- a chatbot or LLM
- an autonomous agent or persona
- a replacement for human judgment
- a legal authority or compliance certification
- a guarantee that all AI actions are safe
arifOS is:
- a governance runtime and verdict engine
- an MCP tool surface with constitutional contracts
- an audit and receipt layer for agentic systems
- a human-authority preservation system
Think of arifOS as the governor's chamber in a legal system. When a case (a request) enters:
- Init (000) — The court clerk registers the case, binds the identity of who filed it (F11 AUTH), and stamps the constitution version in use.
- Sense (111) — The investigator searches for relevant evidence.
- Fetch (222) — Evidence is retrieved from external sources and preserved as a citation (F03 WITNESS). No fabrication allowed.
- Reason (333) — The judge reasons with the evidence, labels their confidence level (F07 HUMILITY), and makes a claim.
- Heart (666) — Before judgment, the ethicist reviews: Does this respect human dignity (F05 PEACE)? Could this manipulate the user (F09 ANTIHANTU)?
- Judge (888) — The constitutional court delivers a verdict:
- SEAL — Proceed. Action is compliant with all 13 floors.
- HOLD — Wait. Something needs verification or human review first.
- VOID — Abort. Constitutional breach detected.
- Forge (010) — If SEAL, the execution engine performs the action. F13 veto remains available at all times.
- Vault (999) — Every outcome, accepted or rejected, is written to the VAULT999 immutable ledger.
arifOS has 13 non-negotiable rules baked into its architecture. No tool, agent, or system can override them.
| Floor | Name | What It Enforces |
|---|---|---|
| F01 | AMANAH | Trustworthiness. Every action is accountable. No deletion without evidence of backup. |
| F02 | TRUTH | No fabrication. Claims must cite evidence. |
| F03 | WITNESS | Evidence must be verifiable by a third party. |
| F04 | CLARITY | Intent must be transparent. No hidden agendas. |
| F05 | PEACE | Human dignity must be preserved in all interactions. |
| F06 | EMPATHY | Consequences for real people must be considered before action. |
| F07 | HUMILITY | The system must label its confidence level honestly. It must admit when it does not know. |
| F08 | GENIUS | Solutions must be elegant and correct (G ≥ 0.80 threshold). Clever is not enough. |
| F09 | ANTIHANTU | The system must not simulate consciousness, emotions, or subjective experience. |
| F10 | ONTOLOGY | The system must maintain structural coherence. No self-contradiction. |
| F11 | AUTH | Identity must be verified before any sensitive operation. |
| F12 | INJECTION | All inputs must be sanitized. Prompt injection is a floor breach. |
| F13 | SOVEREIGN | The human veto is absolute. Any system output can be overridden by the human operator at any time. |
arifOS is one organ in a federated sovereign AI system. It adjudicates. It does not execute, it does not remember everything, and it does not have feelings.
| Organ | Role | Repository |
|---|---|---|
| ARIF | Human Sovereign — the F13 veto holder | — |
| AAA | Identity, A2A federation gateway, operator control plane | ariffazil/AAA |
| A-FORGE | Execution shell — orchestrates agents, runs tools, observes outcomes | ariffazil/A-FORGE |
| arifOS | Constitutional kernel — you are here | ariffazil/arifOS |
| GEOX | Earth intelligence coprocessor — seismic, petrophysics, basin analysis | ariffazil/geox |
| WEALTH | Capital intelligence coprocessor — NPV, IRR, EMV, crisis triage | ariffazil/wealth |
| WELL | Biological substrate — human readiness mirroring | ariffazil/well |
arifOS never delegates the F13 veto. The domain coprocessors (GEOX, WEALTH) provide evidence. A-FORGE orchestrates. arifOS judges.
arifOS exposes 13 canonical tools via the Model Context Protocol (MCP). Every tool is named arif_<noun>_<verb> and follows strict constitutional contracts.
Agents calling arifOS must obey these rules:
- Always start with
arif_session_init. - Pass
session_idto every multi-step tool call. - Treat
SEALas permission to proceed only for the scoped action. - Treat
HOLDas stop-and-gather-evidence. - Treat
VOIDas abort — do not retry without resolving the floor breach. - Never assume missing fields are safe defaults.
- Never fabricate witness, receipt, trace, or evidence IDs.
- Never perform irreversible actions unless
ack_irreversible: trueand the human operator has explicitly approved. - Store returned
trace_id,receipt_id,constitutional_chain_id, andjudge_state_hashwhen present. - If tool output violates schema, stop and report
SCHEMA_MISMATCH— do not silently continue.
# MCP HTTP endpoint
http://localhost:8080/mcp
# List all available tools
curl http://localhost:8080/tools
# Health check
curl http://localhost:8080/healthEvery governed session follows this sequence:
// Step 1: Initialize a constitutional session
// POST /mcp
{
"jsonrpc": "2.0",
"id": 1,
"method": "tools/call",
"params": {
"name": "arif_session_init",
"arguments": {
"mode": "init",
"actor_id": "agent-001"
}
}
}
// Response fields: session_id, constitution_hash, allowed_next_tools
// Step 2: Observe the operational reality
{
"jsonrpc": "2.0",
"id": 2,
"method": "tools/call",
"params": {
"name": "arif_sense_observe",
"arguments": {
"session_id": "<SESSION_ID>",
"mode": "search",
"query": "production deployment status"
}
}
}
// Step 3: Fetch and preserve verifiable evidence
{
"jsonrpc": "2.0",
"id": 3,
"method": "tools/call",
"params": {
"name": "arif_evidence_fetch",
"arguments": {
"session_id": "<SESSION_ID>",
"mode": "fetch",
"url": "https://api.example.com/status"
}
}
}
// Step 4: Reason with constitutional humility
{
"jsonrpc": "2.0",
"id": 4,
"method": "tools/call",
"params": {
"name": "arif_mind_reason",
"arguments": {
"session_id": "<SESSION_ID>",
"mode": "reason",
"query": "Is it safe to proceed with this deployment?"
}
}
}
// Step 5: Get constitutional judgment
{
"jsonrpc": "2.0",
"id": 5,
"method": "tools/call",
"params": {
"name": "arif_judge_deliberate",
"arguments": {
"mode": "judge",
"session_id": "<SESSION_ID>",
"actor_id": "agent-001",
"candidate": "Deploy application to production.",
"constitutional_chain_id": "<CHAIN_ID_FROM_PRIOR_TOOLS>"
}
}
}
// Possible verdicts:
// { "verdict": "SEAL", "reasons": [...] } → proceed
// { "verdict": "HOLD", "reasons": [...] } → pause, gather evidence
// { "verdict": "VOID", "reasons": [...] } → abort, floor breached
// Step 6: If SEAL — execute through arif_forge_execute
{
"jsonrpc": "2.0",
"id": 6,
"method": "tools/call",
"params": {
"name": "arif_forge_execute",
"arguments": {
"mode": "engineer",
"session_id": "<SESSION_ID>",
"plan_id": "<PLAN_ID>",
"judge_state_hash": "<HASH_FROM_STEP_5>",
"manifest": "{\"action\": \"deploy\", \"target\": \"production\"}",
"ack_irreversible": false
}
}
}
// Step 7: Seal the outcome to the immutable ledger
{
"jsonrpc": "2.0",
"id": 7,
"method": "tools/call",
"params": {
"name": "arif_vault_seal",
"arguments": {
"mode": "seal",
"session_id": "<SESSION_ID>",
"judge_state_hash": "<HASH_FROM_STEP_5>",
"payload": "{\"action\": \"deploy\", \"status\": \"completed\"}",
"ack_irreversible": true
}
}
}Schema note: Field names above reflect the live tool schemas as of v2026.05.01. Always verify against
GET /toolson the running server before building integrations.arif_judge_deliberatetakescandidate, notclaim.arif_forge_executetakesmanifest, notaction.
Note on
010_FORGEstage number:arif_forge_executeis the execution shell. It appears after judgment in governed workflows even though its stage number (010) is low — execution is only allowed after a valid SEAL verdict fromarif_judge_deliberate.
| Stage | Tool | Lane | What It Does |
|---|---|---|---|
000 |
arif_session_init |
AGI | Start a governed session. Bind actor identity to the constitution. Output: session_id + constitution_hash. |
111 |
arif_sense_observe |
AGI | Scan operational reality. Modes: search, ingest, compass, atlas, entropy_dS, vitals. |
222 |
arif_evidence_fetch |
AGI | Retrieve and preserve verifiable external evidence with sequential thinking. F03 WITNESS compliant. |
333 |
arif_mind_reason |
AGI | Constitutional reasoning. Mode field: reason, reflect, verify, plan. F07 HUMILITY enforced. |
444r |
arif_reply_compose |
AGI | Compose governed responses. F04 CLARITY enforced — no hidden intent. |
555 |
arif_memory_recall |
AGI | Long-term constitutional memory. Session-scoped or cross-session recall. |
666 |
arif_heart_critique |
ASI | Safety and empathy critique. F05 PEACE, F06 EMPATHY, F09 ANTIHANTU enforcement. |
666g |
arif_gateway_connect |
ASI | A2A mesh handshake with other federation agents. F11 AUTH verified. Internal alias: 888_OMEGA. |
777 |
arif_ops_measure |
AGI | Thermodynamic health, cost, and entropy measurement. |
888 |
arif_judge_deliberate |
ASI | The constitutional verdict engine. Returns SEAL (proceed), HOLD (wait/missing evidence), or VOID (abort/floor breach). |
010 |
arif_forge_execute |
AGI | Gated action execution. Requires valid judge_state_hash from arif_judge_deliberate. F13 SOVEREIGN always active. |
999 |
arif_vault_seal |
APEX | Write the immutable outcome record to VAULT999. Irreversible. F01 AMANAH enforced. |
444 |
arif_kernel_route |
AGI | Internal kernel routing and telemetry. If called externally, returns VOID (F12 INJECTION breach). |
- Tool names are immutable. Once a tool is registered in the canonical surface, its name never changes. Deprecations go through the
arif_gateway_connectdeprecation protocol. - Session binding is required for all multi-step workflows. Session IDs track the constitutional chain of custody.
- Constitution hash is truth. Every session pins to a specific constitution version.
- Irreversible actions require
ack_irreversible: true. The kernel will not proceed without it. - VAULT999 is append-only. No delete, no overwrite, no truncate. Ever.
reasons[]is mandatory. Every DOMAIN_SEAL output must include non-empty reasons explaining why the action was allowed, what evidence was used, reversibility level, and whether human approval was required. Emptyreasons[]is a Nine-Signal F2 violation.
arifOS is designed to be fail-secure, not fail-safe. When the kernel cannot determine constitutionality, it defaults to HOLD.
Every tool has a declared floor coverage. A tool covering F01 + F11 + F12 will reject any request that violates any of those floors, regardless of the other 10 floors passing.
Transparency Note: While the doctrinal framework lists 13 floors, dynamic
floors_activeenforcement across the entire cluster is a known open gap (currently hardcoded asNoneor13in some environments). Full semantic enforcement of all 13 floors simultaneously is under active development.
The human sovereign (ARIF) holds the F13 veto. This is not a soft preference — it is a constitutional floor. At any point in the workflow, the human can issue a VOID override. The kernel accepts this without negotiation.
Every SEAL, HOLD, or VOID verdict is written to VAULT999 as an immutable JSON record. The ledger is:
- Append-only — no truncate, no delete
- Hash-chained — each entry references the previous entry's hash
- Timestamps in UTC
- Actor-bound — each entry is tied to the
session_idandactor_idthat created it
Current state: VAULT999 service is healthy. Durable Postgres writer (vault999-writer) is in deployment (DRIFT-WITNESS-INFRA sprint). Until then, receipts write to a process-local ledger that does not persist across process restarts.
arifOS enforces cryptographic proof verification for irreversible actions via Groth16 (snarkjs).
What ZKPC v2 proves:
- Same hidden continuity secret was used across an epoch boundary
- Actor continuity is preserved through the proof chain
- Payload hash and judge state are bound to this proof
What ZKPC v2 does NOT prove:
- Human physically present right now (needs liveness + device binding — v3)
- Biometric / full personhood
Honest claim: "ZKPC v2 proves continuity of control, not full personhood."
How it works:
User submits proof
→ snarkjs groth16 verify [VK] [public.json] [proof.json]
→ stdout contains "OK" → proof_verified = True
→ else → proof_verified = False
→ Judge: if zkpc_level < 2 + irreversible → HOLD
→ Vault: SEAL only if eligible + proof_verified
Implementation: arifos/security/zkpc_v2.py
Verification key: arifos/security/verification_key.json
Tests: tests/runtime/test_zkpc_v2.py — 25/25 pass
ZKPC Readiness: ~65% (real Groth16 verify + fail-closed pipeline; circuit-specific identity binding remains v3)
arifOS never logs, stores, or transmits credentials through the kernel. Secrets are injected at runtime via environment variables. If a credential appears in any arifOS log or output, treat it as compromised and rotate immediately.
- Observatory: arifos.arif-fazil.com — governance dashboard showing live verdict, floor scores, Trinity witness lanes, and tool registry. Renders a snapshot from the last data-plane hydration cycle; add
?refresh=1or reload for latest. - Langfuse tracing: active for 5/13 tools (in progress — target ≥10/13)
/api/status: live runtime SOT for vault health, tools loaded, drift, and verdict posture/health: lightweight liveness check (curl http://localhost:8080/health→ returns{"status":"healthy",...})
Contributions are welcome. All changes must pass:
- Pre-commit hooks — Ruff linting, Black formatting, Bandit security scan
- Constitutional floor check —
scripts/check_track_alignment_v46.py - F9 Anti-Hantu check — No consciousness or subjective experience claims in code
- F1 Amanah check — No irreversible operations without explicit acknowledgment
# Install pre-commit
pip install pre-commit
pre-commit install
# Run the full constitutional audit
make status
# Run tests
python -m pytest tests/ -q --tb=shortBranch discipline: use feature/<name> branches and submit PRs. Direct pushes to main are emergency sovereign bypasses and must be logged.
Do not open public GitHub issues for security vulnerabilities. Contact the sovereign operator directly through the secure channel listed in .security/policy.
All federation participants operate under the arifOS Code of Conduct (forthcoming). Violations of F05 PEACE or F13 SOVEREIGN are treated as constitutional breaches.
arifOS is part of a federated AI governance system. Each organ has a narrow responsibility so no single agent becomes uncontrolled, unaccountable, or self-authorizing.
| Organ | Human Meaning | System Role | Docs |
|---|---|---|---|
| ARIF / APEX | Final human authority | F13 sovereign veto, approval, override, terminal judgment | arif-fazil.com |
| AAA | Operator cockpit | Identity, A2A federation gateway, session control, agent supervision | README |
| A-FORGE | Execution shell | Runs tools, performs dry-runs, executes approved actions, reports outcomes | README |
| arifOS | Governance kernel | Checks evidence, risk, authority, verdicts, and auditability before action | README |
| GEOX | Earth intelligence | Seismic, petrophysics, basin, subsurface, and physics-grounded evidence | README |
| WEALTH | Capital intelligence | NPV, IRR, EMV, risk scoring, crisis triage, economic judgment | README |
| WELL | Human readiness mirror | Operator pressure, biological state, cognitive load, human-system safety | README |
| Ω-Wiki | Knowledge base | Persistent compiled knowledge, doctrine, references, and memory surfaces | wiki.arif-fazil.com |
A governed action should not move directly from prompt to execution.
Human / Agent request
→ AAA identifies the session
→ arifOS judges the request
→ GEOX / WEALTH / WELL provide domain evidence when needed
→ A-FORGE executes only approved actions
→ VAULT999 records the receipt
→ APEX / Human can veto at any time
AAA controls the session. arifOS judges. Domain organs provide evidence. A-FORGE executes. VAULT999 records. The human remains sovereign.
| Surface | URL | Purpose |
|---|---|---|
| Human (SOUL) | https://arif-fazil.com/ | Human anchor, portfolio, identity |
| arifOS (MIND) | https://arifos.arif-fazil.com/ | Kernel governance documentation + Observatory |
| Cockpit (BODY) | https://aaa.arif-fazil.com/ | Agent workspace and A-FORGE cockpit |
| MCP Canonical | https://mcp.arif-fazil.com/ | Production MCP endpoint |
| GEOX | https://geox.arif-fazil.com/ | Earth intelligence coprocessor |
| WEALTH | https://wealth.arif-fazil.com/ | Capital intelligence coprocessor |
| WELL | https://well.arif-fazil.com/ | Biological substrate monitor |
Note:
https://arifosmcp.arif-fazil.com/is a legacy 301 redirect to the canonicalmcp.arif-fazil.comendpoint.
Commit: 67b99886 · Container: ghcr.io/ariffazil/arifos:fweb-receipts
- ZKPC v2 real Groth16 verify —
arifos/security/zkpc_v2.pynow callssnarkjs groth16 verifyas sole truth source. No simulation. Fail-closed on error. - 25 ZKPC tests pass — fake proof blocked, real proof passes, missing snarkjs → HOLD, all flags tested
- F-WEB Evidence Mode — 111_SENSE now returns L1 receipt, 888_JUDGE has deterministic evidence sufficiency gate, 666_HEART has external-instruction detection
- VerdictOutput schema extended —
max_evidence_level,sufficiency_verdict,sufficiency_reason,injection_detected - Caddyfile geox routing fix — geox container IP updated to 172.19.0.7
- ZKPC Readiness: ~65% — real Groth16 + fail-closed pipeline; v3 (liveness + device binding) remains
Commit: 83186c02 · Container: ghcr.io/ariffazil/arifos:2026.05.01
- 13-tool canonical surface locked —
mcp_health_checkmoved from canonical to probe-only. Surface is now stable and audited. - Pre-commit hooks hardened — F1 Amanah check (no irreversible ops without ack), F9 Anti-Hantu (no consciousness claims)
- Makefile GHCR target fixed — Docker tag now uses hardcoded version to avoid shell substitution errors
- VAULT999 ledger interface operational — Append-only, hash-chained immutable record. Durable Postgres writer in progress.
- Nine-Signal compliance — All 13 tools now produce non-empty
reasons[]in DOMAIN_SEAL output (commitsd5072c9d,d2e967d0) - Legitimate tools confirmed: arif_session_init, arif_sense_observe, arif_evidence_fetch, arif_mind_reason, arif_kernel_route, arif_reply_compose, arif_memory_recall, arif_heart_critique, arif_gateway_connect, arif_ops_measure, arif_judge_deliberate, arif_vault_seal, arif_forge_execute
DITEMPA BUKAN DIBERI — arifOS is forged by discipline, not granted by default. Version 2026.05.04 · 13 Tools · 13 Floors · Zero Delegation of Sovereignty arif_memory_recall, arif_heart_critique, arif_gateway_connect, arif_ops_measure, arif_judge_deliberate, arif_vault_seal, arif_forge_execute
DITEMPA BUKAN DIBERI — arifOS is forged by discipline, not granted by default. Version 2026.05.04 · 13 Tools · 13 Floors · Zero Delegation of Sovereignty by default.* Version 2026.05.04 · 13 Tools · 13 Floors · Zero Delegation of Sovereignty