Skip to content

Verifiable-Semantic-Execution-Layer/VSEL

VSEL — Verifiable Semantic Execution Layer

A formally verified execution layer where if a proof is accepted, the corresponding execution is semantically valid under a mechanized formal specification.

Verify(π) ⟹ SatisfiesConstraints(τ) ⟹ ValidConcreteTrace(τ_c) ⟹ ValidSIRTrace(τ_sir) ⟹ ValidFormalTrace(τ_f)

What is VSEL?

VSEL is a protocol that bridges the gap between formal mathematical specifications and concrete execution. Instead of trusting that code "probably does the right thing," VSEL provides cryptographic proof that every execution trace is semantically valid — not just computationally correct, but meaningful under a formally verified specification.

The core insight: Lean 4 is the absolute source of truth. Rust does not invent semantics — it consumes a derived representation. The constraint engine does not have hand-written constraints — it compiles from an intermediate representation. Correctness takes absolute precedence over performance.

Architecture

VSEL implements a five-level derivation chain where each level is a faithful realization of the level above:

L0: Formal Specification (Lean 4)        — Mathematical model defining correctness
 ↓  R₀₁ refinement (proven in Lean 4)
L1: SIR (Lean 4 → derived IR)            — Typed, deterministic semantic bridge
 ↓  R₁₂ refinement (differential testing + Lean 4 proofs)
L2: Concrete Execution (Rust)             — Deterministic execution engine
 ↓  R₂₃ refinement (constraint compiler, NOT hand-written)
L3: Constraint System (Rust)              — Algebraic constraints compiled from SIR/IR
 ↓  R₃₄ refinement
L4: Proof System (Rust + ZK backend)      — Cryptographic proof and verification

Language-per-Layer

Layer Language Role
L0-L1 Lean 4 Source of truth: formal spec, invariants, refinement proofs
SIR/IR Derived from Lean 4 Semantic bridge between formal spec and execution
L2-L4 Rust Execution engine, constraint compiler, proof system
Behavioral models TLA+ Model checking, counterexample generation
Adversarial tooling Python Invalid witness generators, fuzz orchestration

Repository Structure

formal/          Lean 4 formal specification and proofs (L0-L1)
├── VSEL/
│   ├── Foundations/    State, Input, Transition, Invariants
│   ├── Refinement/     Refinement proofs (R₀₁, R₁₂, R₂₃)
│   ├── Mapping/        Semantic mapping proofs (THM-1, THM-2)
│   ├── Invariants/     Local, Global, Temporal invariant proofs
│   ├── Composition/    Assume-guarantee soundness
│   └── Witness/        Witness uniqueness (LEM-6)

protocol/        Rust Cargo workspace (L2-L4)
├── crates/
│   ├── vsel-core/          Core types, state, input, transition, observable
│   ├── vsel-engine/        Deterministic execution engine and pipeline
│   ├── vsel-trace/         Trace recording, commitment chain, replay resistance
│   ├── vsel-mapping/       Semantic mapping and canonicalization
│   ├── vsel-invariants/    Invariant system (local, global, temporal, economic)
│   ├── vsel-constraints/   Constraint compiler (SIR/IR → constraints)
│   ├── vsel-crypto/        Hybrid cryptography (classical + PQC), key lifecycle, migration
│   ├── vsel-proof/         Prover, verifier, witness, recursive proofs, replay guard
│   ├── vsel-composition/   Assume-guarantee contracts, cross-system proofs
│   └── vsel-sir/           SIR/IR deserialization and reference interpreter
└── tests/
    ├── property/           Property-based tests (proptest, 170 tests)
    ├── integration/        Long trace simulation (100-5000 steps)
    ├── differential/       Rust vs SIR interpreter differential tests
    ├── adversarial/        Invalid witness suite (W1-W8) [Phase 9]
    └── edge_cases/         Edge Case Atlas coverage [Phase 9]

tla/             TLA+ behavioral models (StateMachine, Invariants, TemporalProperties, Composition)
docs/            Formal documentation corpus (30+ documents)
paper/           Academic paper (LaTeX)
preprint/        Preprint (LaTeX)
audit/           Audit evidence per phase (phase_0 through phase_8)
tools/           Python adversarial tooling [Phase 9]
scripts/         Build, test, and CI automation

Key Properties

VSEL enforces 40+ invariants across five categories:

  • Local (5) — Per-transition correctness: determinism, closure, resource conservation, bounded mutation
  • Global (5) — Per-state correctness: structural integrity, commitment consistency, monotonicity
  • Temporal (10) — Per-trace correctness: no reversion (SAFE-5 nonce monotonicity), causality (block height + reordering attack detection), completeness, plus temporal economic invariants (TE_extraction, TE_flash, TE_sandwich, TE_manipulation, TE_velocity)
  • Economic (22) — Financial safety: leverage limits, solvency, anti-extraction, anti-manipulation
  • Cross-layer (3) — Inter-layer consistency: execution = spec, constraints = validity, proof = trace

Cryptographic Model

VSEL uses hybrid classical + post-quantum cryptography:

  • Signatures: Ed25519 (classical) + ML-DSA/Falcon (PQC) — both must verify
  • Hashing: SHA-3/BLAKE3 (long-term) + STARK-friendly hashes (proof-internal)
  • Proofs: STARK base (transparent, post-quantum) with optional SNARK recursion
  • Domain separation on all cryptographic operations
  • Key lifecycle management: generation, rotation, revocation
  • Cryptographic migration protocols for commitment, signature, and proof migration
  • Replay resistance: proof replay guard (time-window + domain binding) and trace replay detector (epoch-based + domain binding)

Getting Started

Prerequisites

  • Rust (stable, latest) — curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh
  • Lean 4 (optional, for formal proofs) — curl https://raw.githubusercontent.com/leanprover/elan/master/elan-init.sh -sSf | sh
  • TLA+ TLC (optional, for model checking) — tlaplus/tlaplus releases

Build & Test

# Rust — compile all crates
cd protocol && cargo check

# Rust — run all tests (unit + property-based + integration)
cd protocol && cargo test

# Rust — run long trace simulation (includes 5000-step ignored test)
cd protocol && cargo test --test integration_long_trace -- --ignored

# Lean 4 — build formal proofs (requires Lean 4 toolchain)
cd formal && lake build

# TLA+ — run model checking (requires TLC)
cd tla && tlc Properties -config MC.cfg

Current Status

Phase 8 of 10 complete. 846 tests passing (672 unit + 170 property-based + 4 integration). 9 audit gates passed. All invariants hold across all completed phases.

Roadmap

VSEL follows an 11-phase roadmap with audit gates at every phase boundary. Each phase must achieve 100% invariant compliance, 0 unresolved findings, and 0 underconstraint vulnerabilities before proceeding.

Phase Name Status
0 Foundations: Core Types + Formal Setup ✅ Complete
1 Execution Ground Truth: Engine + Trace ✅ Complete
2 Semantic Alignment: Mapping + Canonicalization ✅ Complete
3 Constraint Integrity: Compiler + Coverage ✅ Complete
4 Proof System Binding ✅ Complete
5 Verification Authority ✅ Complete
6 Composition Survival ✅ Complete
7 Cryptographic Resilience ✅ Complete
8 Temporal Robustness ✅ Complete
9 System Hardening: Adversarial Testing 🔲 Next
10 Pre-Production: Compliance + Final Validation 🔲 Planned

Phase Completion Summary

Phase Key Deliverables Tests Added Audit
0 Core types, state machine, Lean 4 foundations, TLA+ models 171
1 Execution engine, 7-step pipeline, trace engine, commitment chain +113
2 Semantic mapping (μ_S, μ_Σ), canonicalization, differential testing +83
3 Constraint compiler (SIR→C), coverage matrix, underconstraint analysis (U1-U8) +84
4 Prover, witness construction, public inputs, domain separation, recursive proofs +122
5 7-step verification pipeline, stateful verifier, recursive verification +109
6 Assume-guarantee contracts, cross-system invariants (CI-1 to CI-5), TLA+ composition +27
7 Hybrid hashing (SHA-3/BLAKE3), hybrid signatures, key lifecycle, crypto migration +97
8 Temporal robustness, replay resistance, long trace simulation, TLA+ temporal properties +40

Documentation

The docs/ directory contains the complete formal documentation corpus:

See CONTRIBUTING.md for contribution guidelines and SECURITY.md for security policy.

License

See LICENSE for details.

About

A formally verified execution layer where **if a proof is accepted, the corresponding execution is semantically valid** under a mechanized formal specification.

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors