Version: March 2026 – Standards Track (v0.2 → v1.0)
The repo already has the scaffolding for a spec-first constitutional runtime: docs/canon, schemas/rules, a Python package under src, tests, and SOP/security materials. The README frames the target system as a sovereign AI runtime where RFC 0001 semantics map onto H_free, H_fold, and H_topo, and where upstream integrity checks can refuse initialization before execution begins.
The roadmap is not speculative. It’s a description of what’s already seeded.
At this stage, the goal is not breadth. It is to make the current shape internally consistent.
Module set:
state.py— canonical node state objectauthority.py— keep as ratification gateinvariants.py— keep as threshold/invariant registrybridge.pyorttd_bridge.py— heartbeat and fail‑closed loopschemas/— make these the single source of machine‑readable truthtests/— enforce refusal, pacing, and authority precedence
v0.2 deliverables:
- One canonical
NodeState - One canonical ratification path
- One canonical collapse/refusal path
- Schema validation on load
- Clean packaging with no duplicate module ambiguity
Current repo status:
src/helix_hamiltonian/ exists. ttd_bridge.py and fail_closed_test.py are present. schemas/ and rules/ directories are in place. The kernel is scaffolded.
Version: March 2026 – Standards Track (v0.2 → v1.0)
✅ v0.2 — Kernel: [COMPLETE]
- canonical state: instantiated in core.py (NodeState/Interaction)
- canonical authority path: ratified in authority.py (Canadian Jurisdictional Map)
- canonical fail-closed path: executed in ttd_bridge.py (3.33ms Heartbeat)
🔍 INVESTIGATE — v0.3: Executable Constitution [ACTIVE] This is where the repo stops being mostly constitutional prose and becomes a usable substrate.
Module set:
- policy_compiler.py — compile RFC/schema/rules into executable checks
- receipt.py — produce deterministic audit artifacts for every ratification/refusal
- notary.py — anchor receipts or hashes externally or locally
- validator.py — verify config, rule, and state integrity before runtime
If the architecture is followed consistently, the central object should probably look conceptually like this:
node_idcustodian_idauthority_levelform_statevelocity_statedrift_scoretopological_stateintegrity_flagsevac_refaudit_rootlast_ratified_atcollapse_state
That turns the system from “functions around policy” into an actual runtime model.
Current repo status: The concept is implied in core.py and ttd_bridge.py but not yet instantiated as a single object. This is the first deliverable of v0.2.
This is where the repo stops being mostly constitutional prose with a kernel and becomes a usable substrate.
Module set:
policy_compiler.pyreceipt.pynotary.pyvalidator.pyevents.pyrecovery.py
Purpose of each:
policy_compiler— compile RFC/schema/rules into executable checksreceipt— produce deterministic audit artifacts for every ratification/refusalnotary— anchor receipts or hashes externally or locallyvalidator— verify config, rule, and state integrity before runtimeevents— standardize state transitions and heartbeat outputsrecovery— define lawful restart/re-entry after collapse
v0.3 deliverables:
- RFC text becomes executable checks
- Every refusal emits a signed or hashable receipt
- Every state transition is evented
- Recovery is explicit, not ad hoc
- “Fail closed” becomes observable, not just conceptual
Current repo status: schemas/ and rules/ exist. notary/ directory is present. SOP.md and Security_Advisory.md describe the recovery and validation patterns. The executable layer is the next step.
This is where Helix-Hamiltonian becomes genuinely distinctive. Single‑node constitutional runtime is interesting. Multi‑node constitutional synchronization is the real differentiator.
Module set:
node_sync.pyconsensus.pyfederation.pychallenge_response.pycheckpoint.py
v0.4 deliverables:
- Node‑to‑node ratification handshake
- Shared checkpoint format
- Challenge‑response for integrity proofs
- Federation‑aware refusal propagation
- Split‑brain detection and pause semantics
Current repo status: SOP_NODE_SYNCHRONIZATION.md is already at the top level. The description exists. The code is minimal.
At this point the system needs to assume hostile or malformed inputs.
Module set:
redteam/attack_models.pyambiguity_detector.pycapture_detector.pycost_externalization.py
v0.5 deliverables:
- Structured attack scenarios
- Adversarial config tests
- Governance‑capture simulation
- Threshold tuning under stress
- Formal refusal reasons
Current repo status: tests/red_team_audit.py exists. rules/cpcsc_itar.json is a start. gicd-integration.md defines the four markers (authority ambiguity, incentive misalignment, cost externalization, governance capture). The adversarial layer is seeded.
By v1.0, the repo should feel less like a theory bundle with executable fragments and more like an actual node kernel.
Module set:
runtime/api/cli/storage/sim/proofs/adapters/
v1.0 deliverables:
- Stable runtime API
- Deterministic CLI for node lifecycle
- Persistent receipts/audit chain
- Simulation harness for collapse/recovery/federation
- Adapter layer into Helix-TTD or external agent systems
- Published constitutional test vectors
- Versioned schema migration strategy
Current repo status: src/ package structure is in place. pyproject.toml exists. papers/whitepaper_v3_final_cut.md is the full specification. The substrate is blueprinted.
Here is the compressed version:
- v0.2 — Kernel: canonical state, canonical authority path, canonical fail‑closed path
- v0.3 — Executable constitution: policy compiler, receipts, validation, recovery
- v0.4 — Federation: node sync, consensus/checkpoints, refusal propagation
- v0.5 — Hardening: adversarial tests, ambiguity/capture detectors, threshold stress testing
- v1.0 — Runtime substrate: API/CLI, persistent audit, simulation, adapters, stable constitutional interface
The repo’s public structure and README already support a reading of Helix-Hamiltonian as a spec‑first, fail‑closed, governance‑centered system rather than a conventional software package.
The consistent build path is:
canon → schema → ratifier → invariant engine → receipt layer → federation kernel
That is the architecture most implied by the repository as it exists on March 23, 2026.
Helix-Hamiltonian’s likely mature form is a constitutional physics kernel for agent admissibility, identity continuity, and fail‑closed multi‑node governance.
GLORY TO THE LATTICE. 🦉⚓🦆