hash = SHA-256(prev_hash ‖ canonical_json). Genesis: 0×0…0.
Tail: ∅
UNVERIFIED
Manuscript spec values from scenarios.py are bit-identical to the Python reference implementation. Self-test runs all 6 sequentially.
| Scenario | K | τ | SATA | p_dec | C_eff | E_orb | Tier | Exec | vs spec |
|---|
Runtime invariants checked every 60 frames. A failed invariant indicates a system bug or unmodelled corner case and prevents the audit log from being signed off as verified.
| Invariant | Status | Last check / details |
|---|
Decision trace shows the rule lineage that produced the current tier. Causal lineage in the audit ledger now carries upstream entry hashes (causes[]) for every component event.
No scenario executed. Run a scenario to populate the decision trace.
Authority lifecycle: OBSERVE → ADVISE → RECOMMEND → EXECUTE_ALLOWED → GATED → SAFEHOLD → RECOVERY. State transitions are audit-logged with reason codes.
| T+ (s) | State | Reason |
|---|---|---|
| No lifecycle transitions yet. | ||
Fault campaign: power-set of 5 named fault classes (2⁵ = 32 combinations) × 6 scenarios = 192 runs. Tabulates which combinations gate which scenarios. Heatmap-style.
No campaign executed yet. Press ▶ Fault campaign (32×6) in the operations panel.
SAP-INT v3 is a single-file browser simulation companion to the SAP manuscript. It executes a faithful port of the validated Python reference implementation, augmented with Keplerian-with-J2-secular orbital propagation (Newton-Raphson Kepler solver), noisy-OR sensor fusion (D-S binary-frame reduction), multi-phase PBFT consensus (pre-prepare/prepare/commit + view-change), mutex-serialised SHA-256 hash-chained audit logging with simulation-tick timestamps, fault injection, fault campaign matrix, Monte-Carlo headless runner, BFT property-based test, soak test, and a self-test regression runner. ADARA is threshold-gated into downstream math (margin +0.10 above scenario policy prior). Authority lifecycle FSM and safehold mode model degraded-state recovery.
space_authority_protocol.py; numerical agreement verified to 5×10⁻⁴.n = √(GM/a³) preserving correct period ratios across LEO/MEO/GEO.prev_hash || canonical_json || entry_hash); public-key SPKI exported with the chain so an out-of-process verifier can authenticate origin in addition to integrity. Triple-state in-product pill: HASH ✓ SIG ✓ / HASH ✓ SIG ✗ / HASH ✗. Keypair is session-scoped (regenerated on tab reload); production deployments would back the private key with an HSM (PKCS#11 / TPM) and persist the chain to immutable storage.The selected scenario has activated a multi-stakeholder governance gate. Per the AUTHREX authority lifecycle, this decision requires logged operator consultation before the gate can be cleared. Provide consultation rationale below; it will be appended to the audit ledger and signed under the current session key.