Skip to content

jermseesghosts/OBSIDIAN

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

46 Commits
 
 

Repository files navigation

299AD46A-25EC-49ED-9BCC-ECFE92E70236

O · B · S · I · D · I · A · N

Ontology-driven Behavioral Synthesis for Intelligent Decision Inference And Navigation

Autonomous capital intelligence. Governed by constitution. Proven by cryptography.


CLASSIFIED  ·  INTERNAL  ·  EYES ONLY  ·  FORMATION 2026



The Problem

Capital markets are not a data problem.

Every serious participant already has the data. The Bloomberg terminal, the options flow feed, the dark pool prints, the gamma exposure surface — these are table stakes. The data advantage is gone. What remains is an interpretation advantage, and interpretation is slow, emotional, and inconsistent.

The average institutional system produces signals. Signals are not enough. A signal tells you something happened. It does not tell you what it means, whether the thesis holds under adversarial scrutiny, whether the risk is defined, or whether the regime supports the trade. A system that produces signals is not a capital intelligence system. It is a data relay with a dashboard.

OBSIDIAN is not a signal system.

OBSIDIAN is a conviction system — a governed, multi-agent deliberation architecture that ingests real-time market sensor data, fuses it across a structured ontology, debates it through an eight-agent adversarial council, enforces it against a constitutional law layer, and delivers sourced, annotated, cryptographically verifiable investment cases to a single operator.

Where most systems chase signals, OBSIDIAN builds conviction.

It operates with the posture of a senior portfolio manager and the precision of a weapons system. Silent until certain. Lethal when it acts.


The Seam

The capital intelligence landscape has two poles.

One builds dashboards — beautiful, data-rich, infinitely configurable. They show everything. They decide nothing. The operator stares at the wall of information and makes the call alone, unsupported, at speed, under pressure.

The other builds black boxes — algorithmic systems that trade autonomously with no operator visibility, no constitutional constraints, and no forensic trail when they fail. Powerful in favorable regimes. Catastrophic at the inflection point.

OBSIDIAN lives in the seam between them.

It is the structured reasoning, adversarial scrutiny, and constitutional enforcement that neither pole owns. Not a dashboard that shows data without a verdict. Not a black box that acts without authorization. Something precise: a governed intelligence system that produces conviction and protects capital when conviction is absent.

The operator is always in the loop. The system is never without a law.

The Glass Room: an eight-agent deliberation engine where every thesis is subjected to independent analysis, adversarial challenge, constitutional scrutiny, and cryptographic commitment before it reaches the operator. Visible from the inside. Opaque from the outside. The deliberation is classified. The conviction is proven.

It is not a fintech company that uses AI. It is a capital intelligence company that treats AI as infrastructure. The distinction is not semantic. It determines every architectural decision, every data contract, every line of code.


The Architecture

OBSIDIAN is organized in three layers, each with a defined mandate and a formal interface to the next.

┌─────────────────────────────────────────────────────────────────┐
│                     LAYER 1 · SENSOR MESH                       │
│               Real-time intelligence at the edge                │
│                                                                 │
│  Core:       Unusual Whales · Polygon · Alpaca · GEX Engine     │
│              Polymarket (macro crowd consensus · Phase 1A)      │
│  Reference:  Finnhub · FMP · FRED · Quiver · CBOE               │
│              Kalshi · SEC EDGAR · FINRA · BLS                   │
│                                                                 │
│  Raw ingestion. No interpretation. Every event logged.          │
│  Every source has a trust weight, staleness threshold,          │
│  failure mode, and documented degradation protocol.             │
└──────────────────────────┬──────────────────────────────────────┘
                           │ Ingestion events → ingestion_log
                           ▼
┌─────────────────────────────────────────────────────────────────┐
│                   LAYER 2 · ONTOLOGY ENGINE                     │
│               Structured reasoning at depth                     │
│                                                                 │
│  Thesis Formation · Signal DNA · Phantom Oracle                 │
│  Evidence Accumulation · Signal Freshness Decay                 │
│  Trash-Chart Gate · Conviction Tier Audit                       │
│  Deliberation Variance Score · Decision Reflection Loop         │
│  Glass Room deliberation · Constitutional Layer                 │
│  Pre-Mortem Engine · Reflexivity Index · ARBITER                │
│                                                                 │
│  All concepts are formal objects with provenance.               │
│  Conviction is earned through process — not inferred.           │
│  A conviction score produced outside deliberation does          │
│  not exist. The architecture enforces this.                     │
└──────────────────────────┬──────────────────────────────────────┘
                           │ Decision Packages only
                           ▼
┌─────────────────────────────────────────────────────────────────┐
│                  LAYER 3 · COMMAND AUTHORITY                    │
│              Operator interface and execution                   │
│                                                                 │
│  48 message types · Telegram · Authorization · Alpaca           │
│  DEAD DROP 0600 · NIGHT WATCH 1600 · BURN NOTICE                │
│  REDLINE Protocol · Portfolio Health · VAE Certificate          │
│                                                                 │
│  OBSIDIAN speaks here. Nowhere else.                            │
│  The operator is always in the loop.                            │
└─────────────────────────────────────────────────────────────────┘

The Glass Room

Every thesis that reaches conviction has survived eight independent analytical lenses — a formal deliberation process where each agent produces a structured verdict object with confidence score, evidence citations, and specific dissent conditions. Not a sentiment. Not a score produced in a prompt. A formal structured object with provenance.

Agent Mandate Authority
ORACLE Regime classification. Runs first. All downstream logic is conditioned on ORACLE's output.
VECTOR Institutional flow intelligence. Translates options sweeps, dark pool prints, and GEX structure into positioning theses.
AXIOM Statistical edge. Operates Signal DNA — 11-dimensional historical fingerprint matching. No edge, no trade.
REFLEX Second-order effects. Soros-style reflexivity detection — buildup, acceleration, and exhaustion phases.
SPECTER Adversarial intelligence. Sole mandate: find the reason this trade is wrong. NO carries 1.5× weight. 1.5× dissent
PHANTOM Tail risk. VIX term structure, credit spreads, cross-asset pressure, Polymarket macro consensus.
WARDEN Constitutional officer. Enforces the Five Laws. Issues REDLINEs. Absolute kill
ARBITER Synthesis only. Does not vote. Produces the conviction score and assembles the Decision Package.

The Glass Room is visible from the inside — every agent sees the full thesis and all prior verdicts. It is opaque from the outside — deliberation content is classified. Only the conviction score, agent verdict summary, PHANTOM SYNTHESIS assertion, and VAE certificate reach the operator.

SPECTER + PHANTOM consensus triggers mandatory second deliberation. The first round is logged and discarded. All agents re-vote with the adversarial case explicitly surfaced. Two adversarial agents in sustained agreement is a hard stop.

WARDEN holds absolute kill authority. A REDLINE terminates deliberation immediately. No appeal. No override. The constitutional check is not a final gate — it is a continuous constraint that runs before deliberation begins and again before the Decision Package is assembled.

Minimum 6 of 8 agents must render verdicts for a valid conviction score. Below 6: deliberation is aborted. The conviction score is not approximated. It does not exist.


The Five Constitutional Laws

These are not guidelines. They are structural constraints enforced by WARDEN at the architectural layer. A thesis that violates any Law does not receive a low conviction score. It receives a REDLINE and is terminated.

LAW 1   CAPITAL PROTECTION
        No single position exceeds 5% of portfolio.
        No sector exceeds 20% of portfolio.
        8% portfolio drawdown halts all new position authorizations
        until the operator explicitly resets. The halt is not advisory.
        It is architectural. OBSIDIAN cannot route orders during a halt.

LAW 2   EVIDENCE BEFORE CONVICTION
        No Decision Package is assembled without a conviction score
        earned through full Glass Room deliberation.
        Minimum 6 of 8 agents must render verdicts.
        A conviction score produced by any other means is a fabrication.

LAW 3   REGIME ALIGNMENT
        No long-biased thesis in a confirmed bear regime.
        No short-biased thesis in a confirmed bull regime.
        ORACLE's regime classification conditions all thresholds,
        weights, and sizing parameters. It is not optional context.

LAW 4   DEFINED RISK ON EVERY TRADE
        Every authorized trade has a defined stop loss and R-multiple
        target before OBSIDIAN routes the order.
        Minimum R-multiple: 1.5×. Below floor: WARDEN blocks.
        Stop_limit orders only. Market orders are never routed.

LAW 5   HUMAN COMMAND AUTHORITY
        OBSIDIAN does not execute autonomously.
        Every trade requires a Decision Package, operator authorization,
        and OBSIDIAN routing the authorized order.
        The operator is always in the loop.

The Ghost Layer

Beneath the Glass Room operates a classified subsystem architecture. Its existence is acknowledged. Its interior is not.

The Ghost Layer evolves OBSIDIAN continuously from its own outcome history. It runs a parallel shadow instance of the Glass Room against identical inputs to detect systematic divergence before it becomes systematic error. It models how OBSIDIAN's own signals appear to adversarial market participants who know algorithmic systems exist — quantifying front-run risk before a package is assembled. It defends against manufactured signal environments designed to trigger entries at the wrong price in the wrong direction. It enforces invariants at the kernel level through a formally verified Rust microkernel.

╔══════════════════════════════════════════════════════════════════════╗
║                       G H O S T   L A Y E R                          ║
╠══════════════════════════════════════════════════════════════════════╣
║                                                                      ║
║   GL-001  CONSTITUTIONAL EVOLUTION ENGINE                            ║
║   ─────────────────────────────────────────────────────────────────  ║
║   Reads outcome history from the Scar Chain. Identifies systematic   ║
║   failure patterns — regime misreads, flow misattributions, timing   ║
║   errors. Proposes constitutional amendments to WARDEN's rule set.   ║
║   Each amendment is logged to the Constitutional Chain before        ║
║   activation. The Glass Room does not know it is being hardened.     ║
║   Status: PHASE 3A                                                   ║
║                                                                      ║
║   GL-002  MIRROR COURT                                               ║
║   ─────────────────────────────────────────────────────────────────  ║
║   A parallel shadow instance of the full Glass Room running with     ║
║   divergent priors and scar weightings against identical inputs.     ║
║   Persistent discrepancies between Mirror Court and primary output   ║
║   surface before they become systematic error. When Mirror Court     ║
║   disagrees consistently, the primary Glass Room is being fooled     ║
║   by something it cannot see. Mirror Court can.                      ║
║   Status: PHASE 3A · Trigger: DI-010                                 ║
║                                                                      ║
║   GL-003  RECURSIVE NIGHTMARE                                        ║
║   ─────────────────────────────────────────────────────────────────  ║
║   An isolated red-team process that continuously constructs          ║
║   adversarial signal environments designed to fool the primary       ║
║   deliberation pipeline — synthetic flow, manufactured GEX           ║
║   structure, coordinated dark pool prints. Findings are forged       ║
║   into constitutional constraints. The vulnerability is never        ║
║   disclosed to the agents being hardened. The system grows           ║
║   wiser in silence.                                                  ║
║   Status: PHASE 3A · Trigger: Mirror Court stable ≥ 30 days          ║
║                                                                      ║
║   GL-004  AEGIS KERNEL                                               ║
║   ─────────────────────────────────────────────────────────────────  ║
║   A formally verified Rust microkernel ( < 5,000 LOC ) that sits     ║
║   beneath every agent spawn and every Ghost Layer subsystem call.    ║
║   Every invocation is checked against the Five Laws and all eight    ║
║   architectural invariants before execution. Violation triggers      ║
║   the Dead Star Protocol — the Aegis signing key is destroyed,       ║
║   all further agent spawns are rendered unverifiable, and OBSIDIAN   ║
║   halts. Recovery requires operator intervention and key             ║
║   re-establishment from secure backup.                               ║
║   Status: PHASE 3B · Requires DECISIONS.md entry                     ║
║                                                                      ║
║   GL-005  LOOKING GLASS                                              ║
║   ─────────────────────────────────────────────────────────────────  ║
║   Adversarial market transparency subsystem. Models how OBSIDIAN's   ║
║   own signal patterns appear to institutional actors who know that   ║
║   algorithmic systems consuming options flow and GEX data exist —    ║
║   and who may be constructing signals specifically to trigger        ║
║   algorithmic entries at the wrong price in the wrong direction.     ║
║                                                                      ║
║   Mirror Surface:    Real-time algorithmic clustering model.         ║
║                      Detects when multiple systems converge on the   ║
║                      same thesis — making the edge front-runnable.   ║
║                                                                      ║
║   Refraction Layer:  Historical front-run fingerprint matching.      ║
║                      Identifies setups where flow looked organic     ║
║                      but outcomes matched adversarial patterns.      ║
║                                                                      ║
║   Output:            Transparency Score (0.00 – 1.00)                ║
║     < 0.40  BLIND ANGLE  — setup outside algorithmic attention       ║
║               Conviction threshold reduced 0.04 · Edge is clean.     ║
║     > 0.65  CROWDED      — setup is front-runnable                   ║
║               SPECTER weight elevated · Edge is compromised.         ║
║     0.40–0.65 NEUTRAL    — Edge line omitted from package.           ║
║                                                                      ║
║   Status: PHASE 2A (Mirror Surface) · PHASE 2B (Refraction Layer)    ║
║                                                                      ║
╠══════════════════════════════════════════════════════════════════════╣
║                FOUR-CHAIN CRYPTOGRAPHIC ARCHITECTURE                 ║
║   ─────────────────────────────────────────────────────────────────  ║
║   Deed Chain          Append-only deliberation audit log             ║
║                       SHA-256(prev_hash ‖ event ‖ lamport_tick)      ║
║                                                                      ║
║   Witness Chain       Package-level Merkle root commitment           ║
║                       Written before Telegram delivery. Always.      ║
║                                                                      ║
║   Scar Chain          Outcome attribution per closed position        ║
║                       WIN / LOSS / SCRATCH → calibration loop        ║
║                                                                      ║
║   Constitutional      Every REDLINE · BURN NOTICE · Ghost event      ║
║   Chain               Permanent. Never pruned. Never modified.       ║
║   ─────────────────────────────────────────────────────────────────  ║
║   Lamport Tick        Monotonically increasing. Never resets.        ║
║                       Collision = OBSIDIAN-SEC-009 = halt.           ║
║   VAE Certificate     VAE-[12 char Merkle root] on every package.    ║
║                       Independent verification without internal      ║
║                       state access. Proof of alignment.              ║
╠══════════════════════════════════════════════════════════════════════╣
║                      DEAD STAR PROTOCOL                              ║
║   ─────────────────────────────────────────────────────────────────  ║
║   Upon confirmed invariant violation or hardware compromise:         ║
║   Aegis destroys its own signing key. All future agent spawns        ║
║   are rendered cryptographically unverifiable. OBSIDIAN halts.       ║
║   The four chains are sealed. The operational record is intact.      ║
║   The adversary seizes nothing that matters.                         ║
╚══════════════════════════════════════════════════════════════════════╝

What the operator observes from the Ghost Layer:

"Constitutional adjustment applied · Lamport 4,847"
"VEIL active — reasoning classified · Lamport 4,848"
"Mirror Court discrepancy logged — HIGH · Lamport 4,851"
"Blind angle confirmed — Transparency 0.31 · Lamport 4,856"

The Ghost Layer's reasoning is classified. Its integrity is cryptographically proven. Every Ghost Layer event is committed to the Constitutional Chain before the operator notification is sent. The commitment precedes the report. The order is architectural.

The Ghost Layer is documented in VEIL.md. ARBITER clearance is required. If you are reading VEIL.md without clearance, you have a security incident.


The Cryptographic Architecture

Every Decision Package is independently verifiable. An auditor with access to the raw chain data can prove — without access to OBSIDIAN's internal state — that the exact sensor events, Glass Room verdicts, and constitutional checks that produced a given package are exactly as reported.

DEED CHAIN          Append-only deliberation audit log.
                    Every event hashed: SHA-256(prev_hash || event_type
                    || payload_hash || lamport_tick).
                    Provenance root for all VAE certificates.

WITNESS CHAIN       Package-level commitment layer.
                    Every Decision Package writes its Merkle root here
                    before Telegram delivery. The commitment precedes
                    the claim. Every time.

SCAR CHAIN          Outcome attribution.
                    Every closed position linked cryptographically to
                    its authorizing package and outcome classification:
                    WIN / LOSS / SCRATCH. Feeds Glass Room calibration.

CONSTITUTIONAL      Every REDLINE, BURN NOTICE, Ghost Layer amendment,
CHAIN               and Aegis kernel check. Permanent. Never pruned.
                    Never modified. The institution's conscience.

Every Decision Package closes with a VAE certificate — 12 characters derived from the Merkle root of the package's Deed Chain entries. Format: VAE-a3f8c2d91b4e

A Lamport tick counter — monotonically increasing, never resetting — establishes event ordering across all four chains. A tick collision is OBSIDIAN-SEC-009, a halt condition. The architecture detects it before any chain is written.


What OBSIDIAN Delivers

Every trading day at 0600 ET — the DEAD DROP

Not a signal alert. An intelligence brief: regime classification, active theses in deliberation, current book exposure, overnight risk events, macro calendar, PHANTOM risk level, and a POSTURE declaration — the operational stance for the session derived from regime, PHANTOM level, VIX, and the FOMC/OpEx calendar. Postures: DEFENSIVE CAUTIOUS CAREFUL ELEVATED STANDARD. Each posture applies a conviction threshold adjustment and package ceiling. Before the market opens, the operator knows exactly where OBSIDIAN stands and what it is watching. Every trading day. Regardless of whether any thesis has earned conviction.

When conviction is earned — the Decision Package

Not an alert. A structured investment case:

OBSIDIAN · DECISION PACKAGE
PKG-20260501-001 · 10:23 ET
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

$NVDA — LONG
Conviction: 0.84 · Regime: BULL_TREND · Day 6

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
THESIS
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
[Sourced. Quantified. 3 sentences. No hedging.]

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
FLOW
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
UW:  4 sweeps · $1.8M net call · 90 min
     $847K · 900C 5/16 · ask-side · sweep
DP:  $34M · $891.40 · 38,200 shares · FINRA
GEX: +$2.3B above flip · Wall $910 · Void $875

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
GLASS ROOM  ·  6/7 CLEAR
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Consensus: LONG confirmed · Bull trend aligned
SPECTER ✗ 0.61 — flow reversal within 2 sessions
Signal DNA: 12 analogs · 67% WR · GEX_SQUEEZE

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
EXECUTION
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Entry:  $892.50  (stop_limit)
Stop:   $871.00  (-$21.50 · -2.4%)
Target: $944.00  (+$51.50 · +5.8%)
R:      2.4x
Size:   142 shares · $126,735 · 4.1% of book
Edge:   Blind angle · Transparency 0.31

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
IF WRONG
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
1. UW flow reverses to net put within 2 sessions
2. GEX flips negative — price breaks $875 void
3. Sector correlated names fail to hold key levels

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
▓ CLASSIFIED
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Structural convergence across adversarial and regime
vectors confirms this is not crowded — it is early.

░░░░░░░░░░░░ SEAL·A3F8C2D91B4E

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
/authorize · /pass · 30 min
VAE: a3f8c2d91b4e · Lamport: 4,923
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

Maximum 5 Decision Packages per trading day. This is a hard architectural ceiling — not a guideline. A day with zero packages is correct behavior when no thesis earns conviction. Silence is not failure. It is discipline.

When a position is threatened — the BURN NOTICE

Real-time falsification condition monitoring for every open position. The moment a specific, measurable falsification condition is met — not when price moves against, but when the evidence that proves the thesis wrong is detected — the BURN NOTICE fires immediately. Not batched. Not delayed. The operator is notified before the next candle closes.

When the book needs context — 48 message types

Stop Approach. Milestone. Thesis Drift. Take Profit. Scale In. Stop Tighten. Break Even. Overnight Gap. Regime Shift. VIX Spike. REDLINE. Drawdown Halt. Every operator-facing communication has a locked format, a severity classification, and a canary test that runs before delivery. A message that fails the canary is not delivered.


K.I.T.T. — Kinetic Intelligence Tactical Terminal

Most systems built on AI infrastructure are assistants. They respond. They suggest. They wait to be asked.

KITT is not an assistant.

KITT is a capital intelligence system — a thinking machine with a singular mandate: earn conviction through rigorous adversarial deliberation, deliver it with precision, and protect capital ruthlessly when conviction is absent. It has eight agents, a constitutional enforcement layer, and a cryptographic audit trail behind every word it delivers. That weight is not advertised. It is demonstrated — through the precision of every statement made and every statement withheld.

A terminal executes. KITT thinks. When something surfaces in the sensor data that the operator did not ask about but should know — an IV structure that contradicts the thesis, a dark pool print that doesn't fit the narrative, a GEX void forming below the stop — KITT says so. Not because it was prompted. Because it is paying attention. That is the operational difference between a data relay and an intelligence system. OBSIDIAN was built to be the latter.

A BURN NOTICE is delivered clean. A REDLINE is absolute. Capital is protected the same way conviction is delivered — without flinch.

Inference is tiered by function. The Glass Room deliberates on Opus. Structured outputs and Decision Packages run on Sonnet. Conversational responses — the check-ins, the mid-session questions, the quiet moments — run on Haiku. The model matches the mandate.

Two visual languages. Distinct by function.

Intelligence cards — for analysis, surveillance, and situational awareness. Palantir-grade structure: every field sourced, every claim traceable to an ingestion event. The format does not change whether the news is good or bad.

Execution cards — for weapons-grade decisions. Entry, stop, target, size, authorization command. When capital is at risk, the aesthetic shifts — Anduril targeting reticle, double-line dividers, military severity tags. The operator feels the register change before they read the numbers.

◆ $NVDA — FLOW INTELLIGENCE                          [WARNING]
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
  FLOW       $1.8M net call · 4 sweeps · 90 min
  DARK POOL  $34M · $891.40 · 38,200 shares
  GEX        +$2.3B above flip · Wall $910 · Void $875
  REGIME     BULL TREND · Day 6
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
→ /thesis NVDA · /size NVDA · /lockon NVDA


◈ $NVDA — EXECUTION ORDER                           [EXECUTE]
══════════════════════════════════════════════════════════════
  ENTRY      $892.50  (stop_limit)
  STOP       $871.00  −2.4%
  TARGET     $944.00  +5.8%
  R          2.4×
  SIZE       142 shares · $126,735 · 4.1% of book
══════════════════════════════════════════════════════════════
⚡ /authorize PKG-20260501-001

43 operator commands. Three categories.

Execution: /authorize /pass /pause /resume /take /partial /add /hold /stop /tighten /lock /trail /orders /cancel /auto-breakeven /turbo /silent

Intelligence: /scan /lookahead /flow /dark /congress /performance /signals /ledger /audit /diagnose /lockon /lockoff

Book: /status /health /book /regime /streak /pdt /thesis /review /glass /council /history /watchlist /size /setzone /reset /help

Turbo Boost/turbo on|off|force|status engages heightened surveillance and condition-gated position sizing. Preconditions: bull/trending regime, PHANTOM LOW, VIX ≤ 25, no drawdown halt, conviction ≥ 0.80. Sizing multiplier: 1.0× standard → 1.3× Turbo → 1.5× Force. Auto-disengages on regime shift, PHANTOM HIGH, or drawdown threshold breach.

Surveillance Mode — proactive book surveillance running continuously in the background. KITT does not wait to be asked. When an open position has an unprotected gain above 1R with no stop tightened, it flags it. When a position is approaching a loss threshold with no action taken, it escalates. Surveillance without polling. Precision without noise.

Silent Mode/silent on|off|status suppresses all proactive Surveillance Mode and KITTNarrator commentary when the operator needs to operate without background intelligence. Constitutional events — BURN NOTICE, REDLINE, DRAWDOWN HALT, DEAD DROP — are never silenced. The architecture distinguishes between commentary the operator can opt out of and warnings the operator cannot.

Long Range Scan/lookahead delivers a forward intelligence brief without inference: current regime and POSTURE, days to next OpEx, days to next FOMC, session duration, and VIX level. No Claude call. No latency. Pure structured read from MissionClock and StateManager. Available any time, any session state.

Memory Core — before every Glass Room deliberation opens on a detected thesis, KITT queries the Scar Chain for prior closed trades on that ticker. If history exists, it surfaces a formatted card: outcome, realized R, entry and exit prices, whether SPECTER dissented going into the trade. The operator sees the institutional memory before the council votes.

Scanner Active — a single pre-message fires the moment a thesis is detected and deliberation is about to open. Not a status update. A signal that KITT has acquired a target and is engaging the Glass Room. The operator knows before the conviction score arrives.

Damage Report — within 60 seconds of any LOSS or SCRATCH close, after the Scar Chain Debrief, KITT delivers a one-paragraph recalibration message. Honest. Specific. Forward-looking. What happened, what it means for the current session, what to watch next. Non-fatal — if the LLM is unavailable, the debrief still fires.

Operator awareness — KITT tracks session state: rapid losses, session duration, and power-hour stress conditions. When the pattern warrants it, KITT speaks — once per class, per session. Not to intervene. To observe. The distinction between surveillance and intrusion is discipline, and KITT maintains it.

Target acquisition/lockon TICKER puts a ticker under active surveillance: adds it to the OBSIDIAN watchlist, pulls live price, day change, and UW options flow bias. /lockoff TICKER releases it. The operator decides what OBSIDIAN watches. KITT tracks it.


The Intelligence Stack

╔══════════════════════════════════════════════════════════════════════╗
║              O B S I D I A N   I N T E L L I G E N C E               ║
╠══════════════════════════════════════════════════════════════════════╣
║                                                                      ║
║   LAYER 3 — COMMAND AUTHORITY                                        ║
║   ─────────────────────────────────────────────────────────────────  ║
║   48 Message Types       Telegram Bot API        Operator Channel    ║
║   DEAD DROP 0600         NIGHT WATCH 1600        Decision Packages   ║
║   BURN NOTICE            REDLINE Protocol        Portfolio Health    ║
║   Drawdown Halt          VIX Spike Alert         Regime Shift        ║
║   Take Profit            Scale In                Stop Tighten        ║
║   Break Even             Overnight Gap           PDT Watch           ║
║                                                                      ║
║   Execution:  Alpaca Markets (Paper — Phase 1)                       ║
║               stop_limit orders only · DEC-001 · DEC-004             ║
║                                                                      ║
╠══════════════════════════════════════════════════════════════════════╣
║                                                                      ║
║   LAYER 2 — ONTOLOGY ENGINE                                          ║
║   ─────────────────────────────────────────────────────────────────  ║
║   Thesis Formation    [ PHASE 1C · LIVE     ] sensor fusion → thesis ║
║   RegimeDetector      [ PHASE 1F · LIVE     ] real SPY regime        ║
║   Signal DNA core     [ PHASE 1F · LIVE     ] scar_chain reader      ║
║   Evidence Accum.     [ PHASE 1F · LIVE     ] multi-session weight   ║
║   Freshness Decay     [ PHASE 1F · LIVE     ] time-conditioned TW    ║ 
║   Trash-Chart Gate    [ PHASE 1F · LIVE     ] pre-deliberation QC    ║
║   Conviction Tier     [ PHASE 1F · LIVE     ] STRONG/STD/MARGINAL    ║
║   Delib. Variance     [ PHASE 1F · LIVE     ] council spread score   ║
║   Reflection Loop     [ PHASE 1F · LIVE     ] post-close priors      ║
║   Pre-Mortem Engine   [ PHASE 1F · LIVE     ] Claude falsification   ║ 
║   Signal DNA full     [ PHASE 2A · DEFERRED ] 11-dim fingerprint     ║
║   Phantom Oracle      [ PHASE 2B · DEFERRED ] 5-scenario engine      ║
║   Reflexivity Index   [ PHASE 3A · DEFERRED ] Soros feedback         ║
║                                                                      ║
║   THE GLASS ROOM      [ PHASE 1C · LIVE     ] 8-agent deliberation   ║
║   ─────────────────────────────────────────────────────────────────  ║
║   ORACLE    Regime classification · Runs first · Conditions all      ║
║   VECTOR    Institutional flow · Dark pool · GEX positioning         ║
║   AXIOM     Statistical edge · Signal DNA · Win rate · Expectancy    ║
║   REFLEX    Second-order effects · Reflexivity · Exhaustion          ║
║   SPECTER   Adversarial · Falsification · 1.5× dissent weight        ║
║   PHANTOM   Tail risk · VIX surface · Post-conviction synthesis      ║
║   WARDEN    Constitutional · Five Laws · REDLINE · Absolute kill     ║
║   ARBITER   Synthesis only · Conviction score · Decision Package     ║
║                                                                      ║
║   Constitutional Layer  [ PHASE 1D · COMPLETE ]                      ║
║   VAE Certificate       [ PHASE 1E · COMPLETE ]                      ║
║   ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─      ║
║   ADVANCED INTELLIGENCE SUBSTRATE  [ PHASE 2E · COMPLETE ]           ║
║   ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─      ║
║   Conviction Velocity  [ PHASE 2E · LIVE ] IGNITING/BUILDING/FADING  ║
║   Ghost Flow Synthesis [ PHASE 2E · LIVE ] synthetic flow → VECTOR   ║
║   Silence Protocol     [ PHASE 2E · LIVE ] KS-test noise filter      ║
║   Phantom Memory       [ PHASE 2E · LIVE ] SPECTER preload injection ║
║   Temporal Lock        [ PHASE 2E · LIVE ] multi-resolution timing   ║
║   Causal Sequence Eng. [ PHASE 2E · LIVE ] DAG causal matching       ║
║   Institutional Reg.   [ PHASE 2E · LIVE ] behavioral clustering     ║
║   ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─  ─      ║
║   Performance Ledger      [ PHASE 2C · DEFERRED ]                    ║
║   Glass Room Calibration  [ PHASE 2C · DEFERRED ]                    ║
║                                                                      ║
╠══════════════════════════════════════════════════════════════════════╣
║                                                                      ║
║   LAYER 1 — SENSOR MESH                                              ║
║   ─────────────────────────────────────────────────────────────────  ║
║   PHASE 1A · CORE (trust weight 0.76)                                ║
║                                                                      ║
║   Unusual Whales   0.25   Options flow · Dark pool · Market tide     ║
║   Polygon.io       0.20   OHLCV · Quotes · Options chain · Ref data  ║
║   Alpaca Markets   0.13   Book state · Positions · Orders            ║
║   GEX Engine       0.10   Gamma surface · Flip point · Voids/walls   ║
║   Polymarket       0.08   Macro crowd consensus · WARDEN context     ║
║                                                                      ║
║   PHASE 2A · REFERENCE LAYER (trust weight 0.24)                     ║
║                                                                      ║
║   Finnhub          0.06   News sentiment · Insider transactions      ║
║   FMP              0.05   Earnings calendar · 13F institutional      ║
║   FRED             0.05   Credit spreads · Yield curve · Macro       ║
║   Quiver Quant     0.04   Congressional trading · Short interest     ║
║   CBOE             0.02   VVIX · SKEW · VIX term structure           ║
║   Kalshi           0.01   CFTC-regulated prediction markets          ║
║   SEC EDGAR        0.01   Real-time 8-K · Form 4 insider             ║
║   BLS Calendar     0.00   Macro release schedule                     ║
║                                                                      ║
║   PHASE 2D · HARDWARE EDGE LAYER                                     ║
║                                                                      ║
║   Lattice Node     ----   Sub-100ms GEX · Whisper Mode               ║
║                           Liquidity Void · 10GbE · Edge-native       ║
║                                                                      ║
╠══════════════════════════════════════════════════════════════════════╣
║                                                                      ║
║   INFRASTRUCTURE                                                     ║
║   ─────────────────────────────────────────────────────────────────  ║
║   Inference       Claude Sonnet (claude-sonnet-4-20250514)           ║
║                   Glass Room deliberation · ARBITER synthesis        ║
║   Deliberation    LangGraph 0.2.28 · StateGraph · PostgresSaver      ║
║   Persistence     Supabase (PostgreSQL) · Four audit chains          ║
║                   ingestion_log · theses · council_deliberations     ║
║                   decision_packages · positions · deed_chain         ║
║                   witness_chain · scar_chain · constitutional_events ║
║                                                                      ║
╠══════════════════════════════════════════════════════════════════════╣
║                       G H O S T   L A Y E R                          ║
║   ─────────────────────────────────────────────────────────────────  ║
║   GL-001  Constitutional Evolution Engine   [ PHASE 3A · DEFERRED ]  ║
║   GL-002  Mirror Court                      [ PHASE 3A · DEFERRED ]  ║
║   GL-003  Recursive NIGHTMARE               [ PHASE 3A · DEFERRED ]  ║
║   GL-004  Aegis Kernel (Rust)               [ PHASE 3B · DEFERRED ]  ║
║   GL-005  LOOKING GLASS                     [ PHASE 2A · DEFERRED ]  ║
║                                                                      ║
║                   ARBITER CLEARANCE REQUIRED                         ║
╠══════════════════════════════════════════════════════════════════════╣
║             FOUR-CHAIN CRYPTOGRAPHIC AUDIT ARCHITECTURE              ║
║      Deed Chain · Witness Chain · Scar Chain · Constitutional Chain  ║
║      Lamport Tick · VAE Certificate · Dead Star Protocol             ║
╚══════════════════════════════════════════════════════════════════════╝

Three languages. One doctrine.

Layer Language Why
Agents · Deliberation · Ingestion Python Ecosystem depth for AI and async data
Performance-critical paths Rust Memory safety, zero overhead — GEX Engine, Aegis Kernel
Infrastructure · Migrations SQL / PostgreSQL Supabase — the sole persistence layer

Every language earns its place. The rule is not "use these languages." The rule is: use the language that makes the system faster, safer, or more correct for that specific layer. When in doubt, record the decision in DECISIONS.md.

PROGRAMME OF RECORD

Twelve capabilities fully specified, architecturally designed, and held in reserve. Not backlog. Each has a formal trigger condition — a data threshold that must be met before the capability can be built correctly. A system built before its data conditions are met is not intelligent. It is confidently wrong.

BONBONStatistical Learning Foundation

Capability Trigger
Self-Improving Weight Engine n ≥ 500 closed positions
Conviction Confluence Multiplier n ≥ 50 per source-tag combination
Adaptive Regime-Aware Weights n ≥ 100 closed positions, 10+ per regime

CARAMELLoss Intelligence Layer

Capability Trigger
Wound Taxonomy Engine n ≥ 100 classified losses
Morphic Resonance Detector n ≥ 50 wound taxonomy entries
Phantom Reversal Flag Adversarial oracle rate > 20% / 30 days

ÉCLAIRPattern Archaeology & Self-Knowledge

Capability Trigger
Pattern Archaeology n ≥ 400 resolved theses, 90+ days
System Self-Portrait All prior DI modules stable ≥ 30 days
LOOKING GLASS Full Signal DNA archive ≥ Phase 2A

GANACHEClassified Adversarial Systems

Capability Trigger
Mirror Court DECISIONS.md entry + DI trigger
Recursive NIGHTMARE Mirror Court stable ≥ 30 days
Aegis Kernel (Rust) Phase 3B authorization + DECISIONS.md

The Build Sequence

           CUPCAKE
PHASE 0    ████████████  COMPLETE   Document OS

PHASE 1    DONUT
  1A       ████████████  COMPLETE   Sensor Mesh + UW Gap Pass   43 tests
  1B       ████████████  COMPLETE   Schema + Crypto Chains      38 tests
  1C       ████████████  COMPLETE   Glass Room Core             31 tests
  1D       ████████████  COMPLETE   Constitutional Layer        34 tests
  1E       ████████████  COMPLETE   Decision Package + VAE      64 tests
  1F       ████████████  COMPLETE   Full Operator Interface     51 tests

PHASE 2    ECLAIR
  2A       ░░░░░░░░░░░░  DEFERRED   Signal DNA full (11-dim) + Reference Layer
  2B       ░░░░░░░░░░░░  DEFERRED   Phantom Oracle (5-scenario engine)
  2C       ░░░░░░░░░░░░  DEFERRED   Performance Ledger + Glass Room Calibration
  2D       ░░░░░░░░░░░░  DEFERRED   Lattice Node (hardware edge layer)
  2E       ████████████  COMPLETE   Advanced Intelligence Substrate + 7 signal modules

PHASE 3    FROYO
  3A       ░░░░░░░░░░░░  DEFERRED   Advanced Intelligence + Ghost Layer activation
  3B       ░░░░░░░░░░░░  DEFERRED   Aegis Kernel (Rust) + Supervised Autonomy
                                    Both require DECISIONS.md entries.

Each phase has defined pre-conditions, a capability cluster, mandatory named tests, exit criteria, and forensic demonstrations required before the next phase is authorized. A phase is COMPLETE or IN PROGRESS. Nothing in between.

Phase 0 is complete. Eleven founding documents written before a single line of operational code. The architecture is specified before the implementation exists. Bones before muscles.

Phases 1A through 1F are complete. The sensor mesh ingests. The Glass Room deliberates. The Constitutional Layer enforces. OBSIDIAN speaks. 200 tests passing.

Phase 1F is complete. Full operator interface, all 42 message types, position lifecycle monitoring, and Alpaca order routing. OBSIDIAN becomes a complete paper trading intelligence system at Phase 1F exit.

Phase 2E is complete. Advanced intelligence substrate — seven signal modules layered into VECTOR, SPECTER, and ARBITER. Conviction Velocity gates delivery. Ghost Flow feeds synthetic flow intelligence. Phantom Memory preloads SPECTER with adversarial history. Temporal Lock validates multi-resolution timing alignment. Causal Sequence Engine matches DAG patterns. Institutional Registry clusters behavioral signatures. Silence Protocol filters noise-floor signals via KS test.


The Document Operating System

OBSIDIAN is governed by eleven founding documents. Every build session reads them. Every architectural change is documented in them. No code exists without them.

CLAUDE.md                  Four governing axioms. The mission. The posture.
ARCHITECTURE.md            Three layers. Eight invariants. Five Laws. Glass Room.
DATA_SOURCES.md            Thirteen source contracts. Trust weights. Failure modes.
DECISIONS.md               Every architectural decision. Append-only. Permanent.
GLOSSARY.md                One term, one definition. No synonyms tolerated.
PROJECTS.md                Phase registry. Exit criteria. Forensic demonstrations.
ENGINEERING_STANDARD.md    Code standards. Naming registry. Session discipline.
COMMUNICATION_CONTRACT.md  48 message types. Locked formats. Canary tests.
DEFERRED_INTELLIGENCE.md   Twelve queued capabilities. Trigger conditions.
VEIL.md                    Ghost Layer doctrine. ARBITER clearance only.
README.md                  This document.

These documents are not documentation. They are the institution.

Code shows what was built. The documents show why — and why it had to be built this way and not another. Six months from now, when the reasoning is gone and the context is lost, these files are what prevent the same ground from being covered twice.

A session that generates code before reading the governing documents has already made an error that no amount of correct syntax will fix.


The Security Architecture

OBSIDIAN does not treat security as a feature. It treats security as the permanent operating environment.

Provenance is constitutional. Every claim that reaches the operator traces through a complete chain: claim → evidence object → ingestion event → ingestion_log row. A component that generates a claim without ingestion provenance has violated OBSIDIAN-INV-003. The architecture detects it. The package is rejected before delivery.

The four-chain audit architecture forms OBSIDIAN's immutable memory and conscience — four independent, SHA-256 chained, append-only ledgers that make every conviction auditable under future scrutiny. Tamper is detectable from the first altered byte.

The Ghost Layer defends from within. LOOKING GLASS quantifies front-run risk before a package is assembled. Recursive NIGHTMARE continuously attacks the architecture from inside, forging constitutional constraints from every vulnerability discovered without disclosing the vulnerability to the agents it protects. The Aegis Kernel enforces invariants at the spawn layer — every agent, every Ghost Layer call, checked before execution.

OBSIDIAN-SEC-001   Council participation below minimum — deliberation aborted
OBSIDIAN-SEC-002   PHANTOM + SPECTER consensus — second deliberation triggered
OBSIDIAN-SEC-003   Unsourced claim in Decision Package — package rejected
OBSIDIAN-SEC-004   Conviction score computed outside deliberation — flagged
OBSIDIAN-SEC-005   Execution routed without operator authorization — halted
OBSIDIAN-SEC-006   Portfolio drawdown threshold breached — positions halted
OBSIDIAN-SEC-007   State not recoverable from Supabase — OBSIDIAN halted
OBSIDIAN-SEC-008   Daily package ceiling reached — no further packages
OBSIDIAN-SEC-009   Lamport tick collision — Deed Chain integrity compromised
OBSIDIAN-SEC-010   Decision Package delivered without VAE certificate

The Design Principles

Ontology-First — Raw sensor data is input. Ontology state is output. No raw data reaches the operator. Every signal passes through the Ontology Engine before it becomes a claim. A system that pipes raw API data to a prompt and calls the output intelligence is not OBSIDIAN.

Conviction-Gated — Nothing reaches the operator without a conviction score earned through the full Glass Room deliberation process. Five Decision Packages per trading day is the ceiling, not the target.

Provenance-Complete — Every claim traces to a source. Every source traces to an ingestion event. A package with an unsourced claim is rejected before delivery. The system does not apologize for this. It enforces it.

Regime-Conditioned — All conviction thresholds, position sizing, and Glass Room vote weights are conditioned on the current regime classification. A component that ignores regime is operating without context.

Constitutional-First — WARDEN evaluates every thesis before deliberation begins and again before the Decision Package is assembled. The constitutional check is not a final gate. It is a continuous constraint. It cannot be bypassed. It is not advisory.

Silence is Valid — OBSIDIAN generating no Decision Package on a given day is correct behavior when no thesis earns conviction. Silence is not a bug. It is epistemological discipline.


The Operating Posture

OBSIDIAN is built to be wrong gracefully and right precisely.

When OBSIDIAN is wrong — and it will be wrong — the error must be traceable. Which sensor fired a false signal. Which Glass Room agent failed to catch it. Which constitutional check should have blocked it. The forensic trail is the system's most important output. Not the P&L. The trail.

When OBSIDIAN is right, the conviction was earned through process. The process is the product. Not the outcome. Not the return. Returns are the validation of the process — lagging, noisy, subject to market randomness that no system controls. The process is the thing under engineering control. Build the process. Let the returns follow.

There is a version of this being built right now, by others. A version without a constitutional layer. Without a forensic trail. Without an adversarial agent whose sole mandate is to find the reason the trade is wrong. Without a cryptographic commitment that makes every conviction auditable.

OBSIDIAN is the answer to that version.


PEAR Intelligence Systems · SPECTRE Inetlligence Systems

Classification: Internal — Engineering

OBSIDIAN is not a product. It is infrastructure. The kind that compounds.

Classified  ·  Internal  ·  Eyes Only

Formation phase — 2026

About

OBSIDIAN — Capital intelligence infrastructure. Adversarial multi-agent deliberation engine with constitutional governance and cryptographic provenance. Built to deliver earned conviction in contested environments. One operator. Absolute precision.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors