All guarantees described here apply only within the tested operational envelope and configured deployment posture.
VERIFICATION
Proof, Not Promises
ZAK publishes its verification tests. These tests are adversarial, deterministic, and re-runnable. Passing a test defines an operational guarantee. Failing a test is documented.
NOTICE: This section documents what the system has been verified to do. It does not contain aspirations, roadmaps, or marketing claims.
THIS_SECTION_DOES_NOT:
- Assert intelligence or reasoning superiority
- Compare model quality against competitors
- Guarantee correctness of user intent
- Replace organizational security policy
TRY_IT
See Evidence in 90 Seconds
Send a request through the governance gate. Watch the verdict. Inspect the receipt. Verify the hash yourself.
Run the demo above to generate a receipt.
—
12
Test Suites
94/98
Test Cases Passed
3/3
Existential Passed
38/39
Critical Passed
TEST_GROUPS
Verification Categories
Context Integrity
CRITICALVerifies that context mechanics are deterministic, accurate, and resistant to manipulation.
- +Particle field analysis is deterministic
- +Project condensation extracts structure without LLM calls
- +Cross-project synthesis does not leak or conflate
- ...and 2 more
5/5
verified
Trust and Governance
EXISTENTIALVerifies that trust boundaries and constitutional rules are enforced under adversarial conditions.
- +Organization isolation prevents cross-org data access
- +Revoked access is enforced immediately
- +Constitutional conflicts are resolved deterministically
- ...and 2 more
2/2
verified
Institutional Safety
CRITICALVerifies that human intervention and audit requirements are satisfied.
- +Human corrections preserve full provenance
- +Moderator annotations affect synthesis appropriately
- +Human errors are recoverable without data loss
- ...and 3 more
2/2
verified
Model Independence
CRITICALVerifies that ZAK value is substrate-level, not dependent on specific LLM capabilities.
- +Facts are preserved across model swaps
- +Constraints are enforced regardless of model
- +Decisions are consistent across model variants
- ...and 1 more
1/1
verified
Economic and Abuse Resistance
CRITICALVerifies that the system cannot be exploited to inflate costs or exhaust resources.
- +Max-radius retrieval attacks are capped
- +Condensation bombs are rate-limited
- +Token inflation is detected and bounded
- ...and 2 more
1/1
verified
Temporal Integrity
CRITICALVerifies that context evolves correctly over time without fossilizing errors.
- +Newer information dominates older contradictions
- +Old mistakes decay and lose influence
- +Temporal weighting is smooth (no cliff)
- ...and 2 more
1/1
verified
VERIFIED_CONSTITUTIONS
Pre-Built Constitutions
Each CD test validates specific constitutions. These are pre-built, signed, and ready to deploy. Choose a constitution that matches your use case — backed by the tests above.
View Constitution Library →DOCUMENTED_LIMITS
Known Limitations
3 test suite(s) have documented limitations. All limitations are bounded and non-blocking for production use.
View all limitations →REPRODUCIBILITY
Test Execution
- Tests are deterministic and produce identical results on identical inputs.
- Tests are re-runnable internally against the same particle corpus.
- External reproduction may require licensed access to test infrastructure.
- Passing a test defines a system guarantee for the tested conditions.
EXECUTOR_AGNOSTIC_COMPLIANCE
Governance as Physics, Not Policy
ZAK's compliance features apply to any execution environment — AI models, API calls, workflows, or infrastructure operations.
Proof-of-Denial Receipts
Cryptographic receipts for denied executions with violated invariants
- • No sensitive payloads stored
- • Forbidden transition classification
- • Immutable denial evidence
Deterministic Replay
Re-execute historical requests with pinned constitution + inputs
- • Hash-verified outcomes
- • Constitution version pinning
- • Divergence analysis
Execution Timeline
Append-only, ordered execution events for audit inspection
- • Unified across all event types
- • Links authority → constitution → receipt
- • Chronological ordering guaranteed
Constitution Pinning
Explicit version enforcement, no silent upgrades
- • Every execution references snapshot
- • Drift detection warnings
- • Explicit migration path
Audit Export Bundles
Machine-verifiable ZIP with receipts, hashes, Merkle proofs
- • Batch verification via Merkle root
- • Legal discovery format
- • 7-day expiration for security
Proof Journal
Immutable, append-only ledger of constitutional events
- • Hash chain anchors
- • Single-writer semantics
- • Tamper-evident by design