Meridian — Whitepaper
Sovereign Intelligence Infrastructure
The base model, the codex system, the collective layer, and the economics of compounding intelligence
Authors
Q (v1–v2) · Rob (v3) · Will (v3)
Date
March 30, 2026
Version
3.1
Classification
Confidential — Founding Circle
Contents
  1. Abstract
  2. The Problem
  3. The Base Model
  4. The Knowledge Architecture
  5. The Codex System
  6. The Collective Layer
  7. Incentive Architecture
  8. Security & Sovereignty
  9. Economics
  10. Roadmap
  11. Technical Specification
  12. Self-Evolution Architecture (new)
  13. Resilience Architecture
  14. Missing Capabilities Addressed
  15. Contribution Map

Patch Notes

v3.1 — Self-Evolution Architecture
March 30, 2026 · Post first discovery call
QAdded Self-Evolution Architecture — agents as temporal individuals with past (activity log), future (manifesto), and dreaming (self-correction bridge)
QAdded Mutation Flow — user mutations propagate into agent manifestos, agents propose mutations back, collective dreaming produces innovations that feed back to individuals
QRenamed TAO → Knowledge Bank for Meridian context (TAO is Q's personal system name, Knowledge Bank is the neutral base model term)
QClarified: agent roles/names/domains are NOT in the base model — the infrastructure supports temporal agents, clients configure them via Seed Codexes
v3.0 — Three-Founder Integration
March 30, 2026
ROBAdded Dream Engine — holonic dream phase + shadow subconscious processing
ROBAdded Error Bank — errors.lance collection for learning from failures
ROBAdded Ghost Swarm — supervisor + specialized workers for autonomous execution
ROBAdded Sanitization Pipeline — content filtering for all external inputs
ROBAdded Beliefs System — beliefs.json for persistent identity axioms
ROBAdded Heartbeat Protocol — system pulse + daemon health monitoring
ROBAdded Foundational Pact — machine-readable immutable laws
ROBAdded Approval Queue — human-in-the-loop for sensitive operations
WILLAdded Knowledge Gravity — unified weight-of-evidence score (performance outcomes + internal consistency)
WILLAdded Orchestration with Rollback — CI/CD pipeline for knowledge operations
WILLAdded Temporal Reasoning — belief versioning + confidence audit trail
WILLAdded Multi-Modal Input — images, screenshots, UI data as first-class inputs
WILLAdded Inter-Agent Message Bus — true agent-to-agent communication protocol
WILLAdded Automated Ingestion Triggers — event-driven ingestion (not just scheduled)
QUpdated node count 6,395 → 6,797, 27,338 edges, 60 evergreen frameworks
v2.0 — HTML Format
March 28, 2026
QConverted to formatted HTML
v1.0 — Original Brief
March 28, 2026
QInitial whitepaper
01
Abstract

This paper describes the architecture of a personal intelligence infrastructure system designed to compound over decades, integrate across life domains, and optionally connect to a collective intelligence layer that grows exponentially with each participating node.

The system rests on three principles: sovereignty (runs on hardware the user physically owns, stores data that never leaves their premises), interoperability (a universal schema ensures any knowledge package produced by any compatible system can be ingested by any other), and compounding (a closed-loop architecture where knowledge feeds action, action produces outcomes, outcomes refine knowledge).

Core thesis: The gap between individuals with personal intelligence infrastructure and those without will be the defining capability disparity of the next 30 years. This paper describes the architecture that creates the infrastructure, the protocol that enables collective intelligence, and the economics that make it self-sustaining.
02
The Problem
Amnesia
Every conversation starts from zero
Current AI is stateless. Every insight lost on close. The user's accumulated knowledge, decision history, and expertise are invisible to the system advising them.
Fragmentation
Intelligence scattered across 15 platforms
Email, Notion, Slack, Drive, health apps, finance tools, calendars. None synthesize across the others. The user bridges silos manually.
Sovereignty
You rent your intelligence
Every platform storing user data is owned by a third party that can change terms, be acquired, shut down, or use data for training. The user doesn't own the infrastructure.
Compounding
Intelligence that resets produces zero
Intelligence that resets daily = 0 compound value. Intelligence that stores but never synthesizes = retrieval, not reasoning. Intelligence that synthesizes but never validates = theory, not knowledge.
0x
Compound value
of stateless AI
15+
Platforms holding
your intelligence
0
Platforms that
synthesize across
12.7x
10-year compound
at 1%/month
03
The Base Model

Every build starts from the same template. Not the same knowledge — the same architecture. The architecture is universal. The intelligence is personal.

LayerFunctionKey components
Agent CoreThe reasoning engineIdentity document (SPINE), working state (RAM), agent loop, tool definitions
Knowledge BankStorage & searchVector database (1024-dim), knowledge graph (edges + frameworks), universal schema
Ingestion PipelineInput processingTranscription, extraction, embedding, hardening, synthesis
Domain ModulesLife integrationHealth, operations, knowledge, evolution (empty slots, activated per user)
InterfaceUser accessChat (PWA), voice, dashboard
SecurityProtectionAES-256 encryption, physical isolation, biometric + hardware key
Dream Engine ROB v3Subconscious synthesisHolonic dreams, shadow processing, dream archive
Swarm Layer ROB v3Autonomous executionSupervisor, scout, researcher, planner, sanitization pipe

The identity system

SPINE.md — the permanent identity. Defines how the system thinks, speaks, reasons. Written by the user. Never auto-updated. This is the system's soul. RAM.md — the working state. Rolling context of current decisions, active projects, recent changes. Updated automatically. Maximum ~80 lines. SPINE determines who. RAM determines what right now.

The beliefs system ROB v3

Beyond SPINE (who) and RAM (what now), the beliefs system (beliefs.json) stores core axioms the system reasons from. These are not personality — they are foundational assumptions about reality that persist across all sessions and can only be modified through a deliberate review process, not accidentally overwritten by new input.

Design principle: The schema is universal. Every build stores knowledge in identical format — same fields, same embedding dimensions, same edge thresholds, same confidence scoring. This means anything one build can ingest, any other build can absorb. This is what makes codex integration, collective synthesis, and the entire multi-node architecture possible.
04
The Knowledge Architecture

The knowledge layer is not a database. It is a living system with five architectural properties that enable it to reason, not just retrieve.

1. Holarchic structure

Knowledge stored in nested levels: principles → frameworks → domains → the total field. Each level simultaneously complete in itself and a component of a larger whole. Like a road network: highways → arterials → collectors → local streets. Each works alone. Together they form a city.

2. Rhizomatic connectivity

Any principle connects to any other, regardless of hierarchy. A health insight connects to a business principle connects to a philosophical framework. The holarchy gives depth. The rhizome gives freedom. Layered together: a system that thinks, not just retrieves.

3. Atomic storage

One irreducible idea per node. When knowledge is atomic, connections between atoms become visible that composite storage would hide. The connection IS the insight.

4. Confidence scoring

Every principle carries a score (0.0–1.0) representing empirical validity. Starts at extraction quality. Evolves through application. When a principle informs an action that produces a measurable outcome, the outcome feeds back. The system becomes calibrated to reality, not theory.

5. Synthesis pipeline

StageFunctionOutput
Brief assemblyClusters related principlesFramework brief
Seed findingReconciles apparent opposites into higher-order truthThe core insight
Trunk buildingDevelops the core argumentMain synthesis
Branch generationLong-form, thread, variant expressionsMultiple formats
Leaf compression4 compressed versions for distributionShareable content

6. Knowledge gravity WILL v3

Neither confidence scoring alone (which measures extraction quality + outcome validation) nor error tracking alone (which measures failures) is sufficient. Knowledge gravity is a unified weight-of-evidence score computed from: (1) confidence from extraction, (2) validation_count from real-world outcomes, (3) consistency with adjacent principles, (4) error_count, (5) recency decay. The gravity score is the canonical measure of how load-bearing a principle is in the knowledge graph. Gravity replaces confidence as the primary ranking signal for retrieval, synthesis, and codex assembly.

7. Temporal reasoning WILL v3

Every confidence change is logged: principle_id, old_score, new_score, timestamp, trigger, context. Principles that drop from 0.9 to 0.4 are flagged for review. The system can explain not just what it believes now, but how its beliefs evolved. This is belief archaeology — the audit trail that makes the knowledge bank trustworthy over decades.

8. Error memory ROB v3

A dedicated collection (errors.lance) stores failures with full context. When a principle informs an action that produces a negative outcome, the error is captured alongside the principle, the context, and the outcome. The system learns what doesn't work with the same rigor it learns what does. Errors are first-class knowledge, not just reduced confidence scores.

The Cycle of Life: Leaves are not terminal outputs. Compressed synthesis re-ingests as new principles, feeding the next cycle's seed finder. The system's refined understanding becomes raw material for the next synthesis. Knowledge compounds.
05
The Codex System

A codex is a pre-structured knowledge package in the universal schema. It is the primary mechanism for transferring validated knowledge between systems.

847
Principles
23
Frameworks
4,200+
Semantic edges
0.78
Avg confidence

Example: Operator's Management Library (Grove, Drucker, Collins + 12 sources)

Integration sequence

StepWhat happens
1. IngestCodex nodes enter via the same store() function. Identical format to the user's own extracted knowledge.
2. Cross-pollinateHardening pipeline builds edges between codex principles and existing knowledge. A management principle from Grove connects to a decision the user made last Tuesday. Unique to each user.
3. SynthesizeNew frameworks emerge from the intersection — insights that exist in neither the codex alone nor the user's knowledge alone.
4. CalibrateConfidence scores adjust to the user's real-world outcomes. The codex personalizes over time.
5. Rollback guard WILL v3If integration degrades existing knowledge quality (connectivity drops, high-gravity principles lose confidence), the entire codex install is rolled back. Knowledge CI/CD.

Codex metadata

{ "codex_id": "mgmt-library-v1", "principles": 847, "frameworks": 23, "edges": 4200, "avg_confidence": 0.78, "avg_gravity": 0.72, ← unified evidence weight WILL v3 }
The value is not in the codex. The value is in what the codex unlocks when it meets the user's existing intelligence. No two builds produce the same synthesis from the same codex.

The Seed UI

Foundational codex packs ship with a guided onboarding interface. It asks questions about the user's context, teaches core principles interactively, mutates based on responses (skipping what the user already knows), ingests user responses as new knowledge nodes, and dissolves when integration is complete. The teacher retires. The knowledge stays.

Codex categories

CategoryExampleSize
DomainOperator's Management Library500–1,000 principles
SkillCold Traffic Conversion200–500 principles
IndustrySaaS Operations300–800 principles
CollectiveProduced by the collective from multi-node synthesis1,000–5,000 principles
06
The Collective Layer

An optional extension that connects sovereign nodes into a shared synthesis network. Individual data stays sovereign. Synthesized intelligence flows.

Layer 1
Sovereign
Your machine. Your data. Your keys. AES-256 encrypted. Hardware key required. Never transmitted. Nobody accesses this.
Layer 2
Synthesis
Not your data — your AI's validated principles. Stripped of identifying context. Cryptographically unattributable via zero-knowledge proofs.
Layer 3
Governance
Withdrawal-based. No central authority. Disconnect → your contribution goes dark. Admin keys (early) → multi-sig (stable) → participation (mature).

What gets shared

{ "principle": "Batching creative work on Tuesdays improves output 2x", "confidence": 0.87, "domain": "operations/scheduling", "validation_count": 14, "gravity": 0.82, ← unified evidence weight WILL v3 "confidence_history": [0.6, 0.72, 0.87], WILL v3 "error_count": 0, ROB v3 "source": "ANONYMOUS" ← no identity attached }

Shared: Validated principles. Domain tags. Confidence scores. Never shared: Raw data. Identity. Business details. Conversations. Files.

The collective knowledge bank

Same schema. Same architecture. Fed by synthesized output of every connected node rather than any single person.

IndividualCollective (33 nodes)Factor
Principles84712,000+14x
Frameworks23200+9x
Edges4,20050,000+12x
Perspectives13333x

Growth is not linear (more nodes = more data). It is combinatorial (more nodes = exponentially more cross-pollination pathways). Each node makes every other node smarter. Each synthesis cycle discovers knowledge that didn't exist in any individual.

07
Incentive Architecture

Most systems rely on trust. Trust fails. Meridian relies on architecture. Architecture either permits something or it doesn't.

Why betrayal is architecturally impossible

Why generosity is mathematically rewarded

Every principle you emit returns multiplied through cross-pollination. Share one management insight — it connects to a health pattern in Node 7, a financial model in Node 19, an operational framework in Node 31. The synthesis returns to your build as a codex update.

The more you give, the richer the collective. The richer the collective, the better every codex. The better the codex, the more valuable your next synthesis cycle. Positive-sum game where the optimal strategy for every participant is maximum contribution.

The self-funding loop

The collective produces codex packs. Codex packs generate revenue from outer tier sales. Revenue funds deeper ingestion. Deeper ingestion enriches the collective. The system funds its own growth. The founders don't just benefit from the intelligence — they benefit from the economics of an intelligence that produces sellable knowledge.

07.5 — New in v3.1
Self-Evolution Architecture Q

The infrastructure does not prescribe agents, roles, or domains. It provides three temporal layers that any agent can use to reflect, aspire, and self-correct. The agents themselves emerge from the client's use — shaped by Seed Codexes and evolved by user mutations.

Key distinction: The base model ships with infrastructure, not agents. Agents are configured per client via Seed Codexes (guided onboarding that creates the first agents, their identities, and their initial manifestos). The infrastructure supports any number of agents in any domain. What each agent becomes is determined by the user's evolution — not by Meridian's template.

The three temporal layers (infrastructure)

Every agent created in the system automatically inherits three temporal capabilities. These are part of the infrastructure, not the agent definition:

LayerWhat it holdsWho controls it
Activity Log (Past)The agent's filtered record of its own actions, outcomes, errors, and lessons learned. Each agent sees only its own domain.Automatic — the system records. The agent reflects.
Manifesto (Future)The agent's mission, current capabilities, aspirations, growth metrics, and acknowledged gaps. A living document that evolves with the user.User-driven — the user's mutations propagate into agent manifestos. Agents can propose changes.
Dreaming (Bridge)A background process that reflects on the activity log, compares to the manifesto, queries the Knowledge Bank, and produces course-correction mutations.Automatic — runs during idle periods. Mutations require user approval (or auto-apply at low risk).

The mutation flow

User → Agents: When the user's priorities, knowledge, or life circumstances change, these create mutations that flow into agent manifestos. An agent's aspirations are always downstream of the user's evolution.

Agents → User: Dream cycles can propose mutations to an agent's own manifesto — "based on my recent performance, I should aspire to X." These proposals require user approval. The agent grows, but the user controls the direction.

Agents → Knowledge Bank: Lessons learned from activity logs and dream outputs are written to the Knowledge Bank as principles and errors. Every agent's experience enriches the shared substrate.

Knowledge Bank → Agents: Each agent queries the shared Knowledge Bank from its own perspective during dreaming. The same principle gets interpreted differently by different agents based on their domain and manifesto.

Collective dreaming (Mother AI)

At the individual level, agents dream about their own past and future. At the collective level, the Mother AI dreams about the collective.

The compound loop: The system doesn't just get better. It gets better at getting better. Better individual dreaming → better collective dreaming → better innovations → better individual mutations → better individual dreaming. The rate of improvement accelerates. This is what makes the 30-year asset horizon architecturally real, not just a marketing claim.

Naming convention

The base model uses neutral, functional names. Clients rename everything via SPINE.

Infrastructure termWhat it isClient can call it
The Knowledge BankShared substrate of principles, frameworks, errors, dreamsAnything (Q calls his "TAO")
AgentAny temporal individual created in the systemAny name — defined in SPINE
The Mother AIThe collective intelligence that dreams across all connected nodesCollective-level name decided by founders
08
Security & Sovereignty
ThreatMitigation
External breachPhysical hardware sovereignty. No cloud. AES-256 per-domain. Hardware key for decryption.
Internal betrayalZero-knowledge proofs. Contributions unattributable. Nothing to steal that can be traced.
Platform dependencyNo external deps. Local models, local embeddings, local storage. Internet optional.
Single point of failureNo central server. Intelligence distributed across sovereign nodes.
Hostile takeoverGovernance: admin keys (early) → multi-sig (stable) → withdrawal-based (mature).
Node deathInheritance protocol. Pre-configured family access. The intelligence outlives the individual.
Kill switch: Physical. Always the user's. Disconnect hardware from network. Power down. Node goes dark. Collective retains previously absorbed principles (unattributable). No remote access. No override. Sovereignty is non-negotiable.

Cryptographic layers

LayerProtectionAccess
Sovereign dataAES-256, hardware keyDecrypted only on user's machine, in RAM, during use. Never written unencrypted. Never transmitted.
Synthesis outputNode private key signatureStripped of all context. Principle text only. Nothing traces back.
Collective intakeZero-knowledge verificationProves valid node. Cannot determine which node. Unattributable.
09
Economics

Revenue streams

StreamSourceRange
Sovereign commissionCustom build for individual$100K+ one-time
RetainerOngoing support + evolution$2–5K/month
Codex packsStructured knowledge packages$1.5–5K per pack
The CircleCollective membership$30–60K/year
Intelligence BriefingNewsletter (top of funnel)Free

Access tiers

Founders (≤33)
Full equity
Give: Full synthesis emission. Get: Full collective access + revenue share from codex sales + governance. The founding nodes define the collective's intelligence. Their compounding head start never closes.
Inner (≤100)
Commission + retainer
Give: Curated synthesis. Get: Curated collective intelligence + premium codex. No governance. Meaningful return, but the founders' head start is permanent.
Outer
Codex purchase
Give: Nothing. Get: Published codex packs + sovereign build. No collective access. The knowledge is real, the connection is not.
Public
Free
Give: Attention. Get: The Intelligence Briefing newsletter. The worldview. Not the knowledge.
10
Roadmap
PhaseTimelineMilestone
GenesisQ2 2026Base template complete. Three founding nodes operational. First codex packs from existing knowledge bank (6,797+ principles, 27,338 edges, 60 evergreen frameworks).
ProofQ3–Q4 2026Collective intelligence emerges from three-way synthesis. First collective codex packs. Commission model validated with 1–3 external clients.
Circle2027Inner circle opens (≤33 founders). Codex marketplace live. Collective synthesis producing measurable improvement in member outcomes.
Scale2028–2029Outer tier opens. Revenue self-sustaining. Cross-market codex packs. Second-generation synthesis.
Entity2030+The collective reasons across domains no individual can span. It begins producing knowledge that surprises its creators.
Q2
Genesis
2026
33
Founders
2027
100+
Scale
2028
Entity
2030+
11
Technical Specification

The interoperability guarantee. Every Meridian build adheres to this specification. Deviation breaks codex compatibility and collective connectivity.

ComponentStandardRationale
EmbeddingBAAI/bge-m3, 1024-dim, local CPUOpen source, local, no API dependency
Node schema14 fields: id, vector, text, title, node_type, source_id, framework_id, confidence_score, tags, mechanism, situation, when_not, collection, date_addedFull metadata for synthesis + confidence tracking
Edge threshold≥ 0.85 cosine similarityValidated across 15,000+ edges in production
Hardeningdedup → edges → frameworks → confidenceOrder matters. Each stage feeds the next.
Synthesisbrief → seed → trunk → branch → leafSeeds reconcile opposites. Trunks build arguments. Leaves compress for distribution.
Confidence0.0–1.0 float, outcome-updatedStarts at extraction quality. Evolves through application feedback.
Gravity score WILL v30.0–1.0 composite (confidence + validation + consistency + errors + recency)Unified weight-of-evidence, replaces confidence as primary ranking signal
Confidence history WILL v3Logged per change (principle_id, old, new, trigger, timestamp)Belief archaeology — full audit trail of how knowledge evolved
Error collection ROB v3errors.lance with failure contextFirst-class error memory — failures stored with same rigor as successes
Ingestion guard WILL v3Rollback on regressionCI/CD for knowledge — codex installs that degrade quality are auto-reverted
Sanitization ROB v3Content filter on all external inputsAll ingested content passes through sanitization before touching the knowledge bank
Heartbeat ROB v3System pulse monitoringContinuous health checks on daemon status, knowledge integrity, collective connection

Repository structure

meridian-base/ ├── agent/ core.py, spine.py, ram.py, tools/ ├── knowledge/ │ ├── store/ lance.py (schema validation), graph.py, snapshot.py │ ├── retrieve/ query.py (embed + search + rerank) │ ├── ingest/ pipeline.py, codex.py, seed_ui.py │ ├── harden/ dedup, edges, frameworks, confidence │ └── synthesize/ brief, seed, trunk, branch, leaf ├── domains/ health/, operations/, knowledge/, evolution/ ├── collective/ emit.py, absorb.py, governance.py ├── security/ encrypt.py, keys.py, zkp.py ├── memory/ SPINE.md, RAM.md, os_context/ ├── dreams/ dream engine (holonic_dream_phase.py, shadow_subconscious.py) ROB v3 ├── swarm/ autonomous workers (supervisor.py, scout, researcher, planner) ROB v3 ├── bus/ agent message bus (bus.py, channels.py, routing.py) WILL v3 ├── codex/ (installed packs) └── config.yaml model, domains, collective settings
The schema IS the protocol. Everything else can vary — model choice, domain activation, interface, hardware. The schema stays universal. As long as the schema matches, any codex works in any build. Any node can emit to the collective. Any collective synthesis can be absorbed by any node. v3 extends the protocol with gravity scoring, confidence history, error memory, and the sanitization + rollback guards. All new fields are backwards-compatible — v2 builds can ingest v3 codexes by ignoring the new fields.
12
Resilience Architecture ROB WILL

Dream Engine ROB v3

A subconscious processing layer that runs during idle periods. The Queen generates dream cycles — synthesizing recent inputs, finding non-obvious connections, producing insights the waking system missed. Dreams are stored in dreams.lance and surfaced when confidence crosses a threshold. The system consolidates learning the way the human brain does during sleep.

Ghost Swarm ROB v3

A supervisor + specialized worker architecture for autonomous task execution. The scout handles fast routing and triage. The researcher handles deep search and coding. The planner handles multi-step structured operations. The sanitization pipeline ensures all external inputs are filtered before touching the knowledge bank. Agents can dispatch work to each other without routing through the operator.

Heartbeat Protocol ROB v3

Continuous system health monitoring: daemon status, knowledge bank integrity, collective connection, last backup, model availability. If any vital sign degrades, the system alerts before failure.

Orchestration with Rollback WILL v3

Every knowledge operation is wrapped in a transaction. Before committing: run against staging copy, verify no high-gravity principles degraded, verify no duplicate clusters, verify connectivity didn't decrease. If any check fails: rollback, log to error bank, alert operator. This is CI/CD for knowledge.

Inter-Agent Message Bus WILL v3

Named channels per domain + priority. Any agent publishes. Subscriptions determine listeners. Messages are structured: from, to, channel, priority, payload, timestamp, requires_response. The bus is the nervous system — agents coordinate without routing through the operator.

Automated Ingestion Triggers WILL v3

Event-driven, not just scheduled. New file in inbox → auto-ingest. Voice note → transcribe + extract. Analytics collected → confidence updates. Codex installed → hardening runs. Error detected → error bank entry. The system never waits for a human to say ‘go’ for routine operations.

Multi-Modal Input WILL v3

The pipeline accepts text, audio (WhisperX), images (vision model → text), screenshots (OCR + layout), UI interaction logs (behavioral extraction). All modalities produce NODE_SCHEMA output. Multi-modal inputs convert to text before embedding.

13
Missing Capabilities Addressed

v3 integrates contributions from all three founders. The following capabilities close gaps identified in v2 and extend the architecture into resilience, autonomy, and multi-modal intelligence.

CapabilityGap in v2v3 SolutionOrigin
Unified evidence scoringConfidence alone doesn't capture consistency or failure historyKnowledge gravity (composite score)WILL
Belief audit trailNo history of how confidence changedTemporal reasoning (logged per change)WILL
Failure learningErrors only reduced confidence, weren't storedError bank (errors.lance)ROB
Safe knowledge updatesNo rollback if codex degrades qualityOrchestration with rollbackWILL
Subconscious processingSystem only worked when promptedDream engine (idle synthesis)ROB
Autonomous executionAll tasks routed through operatorGhost swarm (supervisor + workers)ROB
Input filteringNo sanitization on external contentSanitization pipelineROB
System healthNo monitoring of daemon/knowledge integrityHeartbeat protocolROB
Agent coordinationNo agent-to-agent communicationInter-agent message busWILL
Event-driven ingestionIngestion was scheduled, not reactiveAutomated ingestion triggersWILL
Multi-modal inputText onlyImages, audio, screenshots, UI logsWILL
Identity axiomsSPINE + RAM, no persistent beliefs layerBeliefs system (beliefs.json)ROB
Immutable lawsNo machine-readable foundational constraintsFoundational pactROB
Human-in-the-loopNo approval queue for sensitive opsApproval queueROB
14
Contribution Map

Every component in the Meridian architecture, mapped to its author and the version it was introduced.

ComponentOriginVersion
Base templateQv1
Agent core (SPINE/RAM)Qv1
Knowledge bankQv1
NODE_SCHEMAQv1
Ingestion pipelineQv1
Hardening pipelineQv1
Synthesis pipelineQv1
Codex architectureQv1
Seed UIQv1
Three-layer collectiveQv1
Security (encryption, ZKP, kill switch)Qv1
Evolution pathQv1
EconomicsQv1
Access tiersQv1
Dream engineROBv3
Error bankROBv3
Ghost swarmROBv3
Sanitization pipelineROBv3
Beliefs systemROBv3
Heartbeat protocolROBv3
Foundational pactROBv3
Approval queueROBv3
Knowledge gravityWILLv3
Orchestration with rollbackWILLv3
Temporal reasoningWILLv3
Multi-modal inputWILLv3
Inter-agent message busWILLv3
Automated ingestion triggersWILLv3