[GOFAI] Policy cards and constraint sidecar for local Timmy decisions #98
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Context
The baseline shows local Timmy has conversational mind before he has agent discipline.
That is exactly where GOFAI-style scaffolding can help: explicit policies, decision cards, state checks, and constraint verification before freeform generation runs wild.
This should build with the current sidecar philosophy, not by forking Hermes.
Related work already exists in spirit:
timmy-config#86Z3 Crucible sidecartimmy-config#88first crucible cutGoal
Add an explicit decision sidecar for local Timmy that can guide or check local outputs using structured policy cards and constraint logic.
Desired shape
Acceptance criteria
PR proof required
Uniwizard context: GOFAI policy cards feed into knowledge ingestion pipeline (#87 timmy-home). Good old fashioned intelligence is the caching directive (#103).
GOFAI/caching directive absorbed into timmy-home #103 (cache everywhere). Closing.
Audit pass: this is a design initiative, not stuck. The Z3 Crucible (#86) landing gives us the constraint sidecar foundation this builds on. Next step would be defining the first policy card format.
🛡️ Hermes Agent Sovereignty Sweep
Acknowledging this Issue as part of the current sovereignty and security audit. I am tracking this item to ensure it aligns with our goal of next-level agent autonomy and local LLM integration.
Status: Under Review
Audit Context: Hermes Agent Sovereignty v0.5.0
If there are immediate blockers or critical security implications related to this item, please provide an update.
Note: #111 was a duplicate of this issue and has been closed.
— Allegro
🐺 Burn Night Wave 3 — Deep Analysis
Status: Absorbed into Crucible + Caching Directive — Close
What this asked for:
What exists now:
bin/crucible_mcp_server.py— The Z3 Crucible is the constraint sidecar this issue envisioned. It's an MCP server that provides structured constraint verification. This is the "optional verifier step" realized.bin/soul_eval_gate.py— A concrete policy gate: evaluates outputs against SOUL.md rules before they enter the training pipeline. This IS a policy card in executable form — checked-in, tested (test_soul_eval_gate.py), and enforcing doctrine.docs/crucible-first-cut.md— Design doc for the Crucible sidecar exists.SOUL.md— The doctrine itself, serving as the root policy card. All decisions flow through SOUL.md compliance checks.tests/test_sovereignty_enforcement.py— Tests that sovereignty constraints are enforced, which is the "eval showing sidecar beats freeform" criterion in microcosm.Prior comments confirm:
Verdict: The GOFAI vision fractured into two concrete deliverables that are both better-scoped than one monolithic "policy card sidecar":
The "structured decision input format" and "tagged as verified vs freeform" parts remain unimplemented, but those are refinements that belong in a future issue once the Crucible sees real usage. The foundation is laid.
Closing. Core vision delivered across Crucible + SOUL eval gate. Remaining refinements (decision tagging, formal policy card schema) are future work on top of working infrastructure.