clawft
Weftos

Symposium Decisions

Consolidated design decisions from all WeftOS symposiums: K2, K3, ECC, and K5.

WeftOS development is guided by formal symposium processes where specialist panels evaluate the kernel and render design decisions. This page consolidates key decisions from all four symposiums.

K2 Symposium (2026-03-04)

Scope: K0-K2 readiness for K3+ development Result: 22 decisions, 10 approved changes

Architecture Decisions

IDDecisionImpact
D1Services are separate from processes (ServiceEntry)ServiceRegistry decoupled from PID
D2Agent backend selection: explicit > manifest > policy > defaultSpawnBackend in SpawnRequest
D3Bake SpawnBackend API now, implement incrementallyAll variants defined, only Native implemented
D4Layered protocol: kernel IPC -> ServiceApi -> adaptersServiceApi trait as internal surface
D5Kernel-native first, then A2A + MCP as adaptersMCP adapter near-term follow-on
D6K3 = same-node. Clustering moved to K5 (from K6)K6 becomes deep networking only
D7Defense-in-depth: dual gate checks (routing + handler)Two enforcement points per message
D8ExoChain-stored immutable API contractsservice.contract.register events
D9Universal witness by default, configurable per serviceAuditLevel::Full or GateOnly
D10WASM-compiled shell with container sandboxShell scripts compiled to WASM
D11Post-quantum dual signing (Ed25519 + ML-DSA-65)Dual signatures on chain events
D14SpawnBackend::Tee variant defined, returns not-availableTEE placeholder until hardware
D19Breaking IPC: MessageTarget::Service(name) routingService-oriented message routing
D21Phase ordering: K3 -> K4 -> K5 -> K6 with iterationNot a strict waterfall

Approved Changes (C1-C10)

IDChangePhase
C1SpawnBackend enum in SpawnRequestK2.1
C2ServiceApi trait for internal API surfaceK3
C3Chain-anchored service contractsK3
C4Dual-layer gate in A2ARouterK3
C5WASM-compiled shell pipelineK3/K4
C6Post-quantum dual signing pathK2.1
C7ChainAnchor trait for blockchain anchoringK4
C8SpawnBackend::Tee with EnclaveConfigK2.1
C9N-dimensional EffectVector (configurable)K3
C10K6 SPARC specification requirementPre-K6

K3 Symposium (2026-03-04)

Scope: K3 tool lifecycle evaluation Result: 14 decisions, 8.1/10 overall score

Key Findings

IDFindingSeverity
CF-1Gate action granularity gap (all tools gated as tool.exec)Medium
CF-2FsReadFileTool reads any path (no sandboxing)Medium
CF-3Per-agent ToolRegistry duplicationLow

Decisions

IDDecisionImpact
D1Tool-specific gate_action must be used in exec handlerK4 fix
D2Tool sandboxing via SandboxEnforcer.check_file_read()K4
D3Move ToolRegistry to Kernel struct, share via ArcK4 optimization

K2 Commitment Status at K3

CommitmentStatus
C1 SpawnBackendShipped in K2.1
C2 ServiceApiNot started
C4 Dual-layer gatePartial (handler done, routing deferred)
C6 Post-quantum signingBlocked (rvf-crypto API gap)

ECC Symposium (2026-03-22)

Scope: Ephemeral Causal Cognition substrate design Result: 14 decisions, SPARC plan created, K3c implementation plan

Architecture Decisions

IDDecisionRationale
D1Nervous system model: every kernel instance is a cognitive nodeHardware-agnostic design
D2Forest of trees (polyglot ensemble), not one graphDomain-appropriate structures
D3Self-calibrating cognitive tick (boot-time benchmark)Hardware-determined interval
D4CRDTs for convergence, Merkle for verificationComplementary, not competing
D5DEMOCRITUS as nervous system operation (continuous, not batch)30s micro-batches
D6BLAKE3 for new ECC code, SHAKE-256 for existing ExoChainSingle-hash per subsystem
D7Per-tree scoring with uniform CrossRef indexingUniversal Node IDs
D8One feature flag (ecc), boot decides what is activeCompile provides capability, boot provides config

K3c Scope

~3,500 lines across 6 modules: CausalGraph, HnswService, CognitiveTick, Calibration, CrossRef, ImpulseQueue.

Deferred to K4+

WASM cognitive modules, RVF persistence migration, platform traits (Android/ESP32), CMVG delta sync, CRDT layered sync, spectral offloading, SONA integration, DEMOCRITUS flywheel.

K5 Symposium (2026-03-25)

Scope: K6 mesh networking architecture Result: 15 decisions, 5 commitments, 8.0/10 readiness score

Architecture Decisions

IDDecisionRationale
D1Selective composition (snow + quinn + selective libp2p)Full control, fewer dependencies
D2Ed25519 public key as node identitySelf-authenticating, no CA needed
D3Noise Protocol for all inter-node encryptionTransport-agnostic, forward secrecy
D4governance.genesis hash as cluster trust rootAlready exists, no new infrastructure
D5Feature-gated mesh networking (mesh feature)Zero networking in default build
D6QUIC primary, WebSocket for browsersMultiplexing + browser compatibility
D7Ruvector crates as pure computation (no I/O)Clean composition boundary
D8rvf-wire as mesh wire formatAlready in workspace, zero-copy
D9Dual signing (Ed25519 + ML-DSA-65) for cross-node eventsQuantum resistance
D106-phase implementation (K6.0-K6.5)Each phase independently testable

Commitments

IDCommitmentPhase
C1MessageTarget::RemoteNode variantK6.0
C2GlobalPid composite identifierK6.0
C3MeshTransport traitK6.1
C4mesh feature gateK6.0
C5Cluster-join authentication via governance.genesisK6.1

Readiness Assessment

41 items wire-ready (GREEN), 22 need minor changes (YELLOW), 21 missing (RED). 6 critical gaps all addressable in ~1,500 new lines + ~370 changed lines.

On this page