AGI Alpha Node v0 is the owner-controlled intelligence engine that braids on-chain authority, libp2p runtime governance, and a fully provisioned observability wall. Every surface is tuned so the owner can pause, retune, or redirect the platform in a single transaction while the CI wall keeps the repository deployment-ready. The canonical token contract is anchored at 0xa61a3b3a130a9c20768eebf97e21515a6046a1fa (18 decimals) so treasury, staking, and governance always remain under explicit owner command.
The stack is curated like a flight deck built to defend a green badge wall: diagrams lint the same way GitHub renders them, CI surfaces every check as a visible status, and branch protection is wired to the same job names that the local npm run ci:verify emits. The owner keeps immediate control over runtime posture, validator rosters, identity routes, staking balances, and treasury sweeps—every override is accompanied by metrics, events, and dashboards so production actions are reversible, observable, and enforced by policy. All critical parameters stay owner-editable: pause/unpause, validator rosters, ENS routing, staking custody, treasury sweeps, validation/slashing, and address/controller rotation remain live from the same owner key that binds $AGIALPHA.
The repository is maintained as a production cockpit: mermaid diagrams lint for GitHub parity, coverage is gated at 85%+, dependency security is enforced on every PR, and branch protection mirrors the exact checks documented below so the CI badge is always green and visible. Badge targets, required checks, and CLI commands all share the same labels so GitHub, local runs, and Shields endpoints render identically.
Mermaid diagrams, badges, and CI gate names have been aligned so GitHub renders everything identically to local previews. The README, docs, dashboards, and workflow job names are kept in lockstep to make enforcement transparent: the required checks, badge endpoints, and npm run ci:verify output all share the same strings, so a green wall locally means a green wall on PRs and main. If a diagram ever looks off, run npm run lint:md (Markdown + mermaid validation) and, optionally, npx @mermaid-js/mermaid-cli -i README.md -o /tmp/readme.svg --scale 1.1 to confirm GitHub parity before opening a PR.
If you need to exercise owner authority live, every control surface (pause/unpause, validator gating, ENS routing, stake sweeps, treasury orchestration) remains callable without downtime; the CI and telemetry walls are structured to keep those interventions reproducible, observable, and recoverable. Required checks stay enforced on PRs and main so the badge board above reflects the same gates GitHub blocks on.
- Owner retains the right to update every meaningful parameter: pausing, validator rosters, ENS/identity routing, stake custody, and telemetry thresholds all stay under the same signer that anchors
$AGIALPHA. - CI is treated as a defensive shield wall: every gate is required, badge-visible, and mapped one-to-one to branch protection.
- Mermaid fidelity is validated by automation, with lint parity to GitHub’s renderer and command recipes for manual SVG/PNG previews.
- Documentation is wired to the repository layout (runtime, contracts, dashboard, subgraph, observability) so operators land on the exact file needed to act immediately.
Every subsystem is tuned to operate like the market-shifting machine strategists describe, yet it remains constrained by the owner’s key, telemetry wall, and enforced CI so that every override is deliberate and recoverable.
- Operational promises at a glance
- System map
- What lives here
- Smart contract control surface
- Runtime + observability autopilot
- CI and branch protection
- Owner control quick reference
- Owner function matrix
- Quick start
- Testing and validation
- Operational guarantees
- Runbooks and references
%%{init: { "theme": "forest", "themeVariables": { "primaryColor": "#0f172a", "primaryTextColor": "#e2e8f0", "lineColor": "#22c55e", "secondaryColor": "#9333ea", "tertiaryColor": "#0ea5e9" } }}%%
flowchart LR
classDef neon fill:#0f172a,stroke:#22c55e,stroke-width:2px,color:#e2e8f0;
classDef ember fill:#0b1120,stroke:#f97316,stroke-width:2px,color:#ffedd5;
classDef frost fill:#0b1120,stroke:#0ea5e9,stroke-width:2px,color:#e0f2fe;
Owner[Owner keys\n$AGIALPHA authority]:::neon --> Manager[AlphaNodeManager\npause/validators/stake]:::ember
Manager --> Treasury[TreasuryExecutor\nintent ledger + sweeps]:::frost
Manager --> Runtime[Libp2p runtime\nresource manager + api]:::neon
Runtime --> Metrics[/metrics export\nNRM · Yamux · QUIC]:::ember
Metrics --> Prometheus[(Prometheus + alerts)]:::frost
Prometheus --> Grafana[Grafana\nlibp2p + DCUtR dashboards]:::neon
Grafana --> Operators[Operators & auditors\nfirst-boot cockpit]:::ember
Runtime -.-> CI[CI wall\nci.yml + required-checks.json]:::frost
CI --> Protection[Branch protection\nPR enforcement]:::neon
Protection --> Owner
%%{init: { "theme": "forest", "themeVariables": { "primaryColor": "#0b1120", "primaryTextColor": "#e2e8f0", "lineColor": "#22c55e", "secondaryColor": "#f97316", "tertiaryColor": "#38bdf8" } }}%%
flowchart TD
classDef neon fill:#0b1120,stroke:#22c55e,stroke-width:2px,color:#e2e8f0;
classDef ember fill:#0b1120,stroke:#f97316,stroke-width:2px,color:#ffedd5;
classDef frost fill:#0b1120,stroke:#38bdf8,stroke-width:2px,color:#e0f2fe;
Bootstrap[One-command bootstrap\n`docker-compose up` + `npm run ci:verify`]:::neon --> RuntimePlane[Runtime plane\nlibp2p host + governance API]:::ember
Bootstrap --> Telemetry[Telemetry plane\nPrometheus, Grafana, Alertmanager]:::frost
Bootstrap --> Contracts[$AGIALPHA on-chain plane\nowner authority + ENS routing]:::ember
RuntimePlane --> Operators[Owner & operators\nCLI + dashboard]:::neon
Telemetry --> Operators
Contracts --> Operators
| Surface | Path | Purpose | Owner leverage |
|---|---|---|---|
| Runtime entry + CLI | src/index.js |
Boots the libp2p host, governance API, and metrics exporters. | Configure via env, pause/resume flows, or rotate peers without redeploying. |
| Governance contracts | contracts/AlphaNodeManager.sol |
Owner-only levers for pausing, validator gating, ENS routing, staking custody, and validation hooks anchored to $AGIALPHA. |
Execute pause, setValidator, registerIdentity, withdrawStake, or slashing functions directly. |
| Treasury execution | contracts/TreasuryExecutor.sol + scripts/treasury/ |
Intent ingestion, Dilithium envelope handling, and owner-driven sweeps. | Run treasury:execute/treasury:sign to redirect funds or enforce payouts under owner control. |
| Networking safeguards | src/network/resourceManagerConfig.js, src/network/libp2pHostConfig.js |
Resource ceilings, connection trimming, QUIC/TCP posture, and dial policies emitted to metrics. | Override NRM_*/CONN_* to retune limits live; monitor /metrics for compliance. |
| Observability wall | observability/prometheus/alerts.yml, grafana/provisioning/dashboards/libp2p.yaml, observability/grafana/ |
Prewired alerts, dashboards, and scrape configs rendered identically in GitHub and Grafana. | Pause, gate validators, or rotate ENS controllers and watch the dashboards confirm the state change. |
| Dashboard plane | dashboard/ + dashboard/src |
Operator UI built with React/Vite plus Vitest suites for frontend integrity. | Validate visuals via npm run test:frontend and ship dashboards that mirror Grafana signals. |
| Indexing + subgraph | subgraph/ |
Graph Protocol manifest, codegen, and build scripts keyed to the on-chain contracts. | Keep data consumers aligned by running npm run ci:ts before merges; regenerate types when ABI shifts. |
| Docs + runbooks | docs/ |
Detailed operations, economics, identity, and deployment guides synchronized with this README. | Jump directly to the correct protocol/runbook without hunting paths. |
| Observability field notes | observability/docs/ |
Metrics glossary, dashboard import instructions, and alert references. | Cross-check Grafana tiles with the glossary while executing owner overrides. |
| CI guardrails | .github/workflows/ci.yml, .github/required-checks.json, scripts/verify-health-gate.mjs, scripts/verify-branch-gate.mjs |
Mirrors npm run ci:verify for lint, tests, coverage, Solidity, subgraph, security, Docker smoke, and policy gates. |
Enforce required checks on main/PRs; verify locally before exercising owner overrides. |
| Branch protection recipe | docs/deployment/branch-protection.md |
One-to-one mapping between workflow job names, badges, and GitHub branch rules. | Apply the rule to keep every owner action gated by a green CI wall. |
$AGIALPHA is pinned to contract address 0xa61a3b3a130a9c20768eebf97e21515a6046a1fa (18 decimals). The owner holds every critical lever and can retarget the platform without redeploying.
- Pause/resume:
pause()/unpause()freeze or reopen staking and validator flows immediately. - Validator gating:
setValidator(address,bool)toggles validator eligibility. - Identity routing:
registerIdentity,updateIdentityController,setIdentityStatus,revokeIdentitykeep ENS-bound controllers aligned with the active operator set. - Stake custody:
withdrawStake(recipient, amount)lets the owner move staked balances. - Token safety: the constructor refuses non-canonical token addresses unless the canonical
$AGIALPHAis provided. - Runtime override: owner-controlled pausing, validator toggles, identity rotation, and stake withdrawal are designed to be exercised live while telemetry + CI keep changes observable.
- Validation + slashing:
recordAlphaWUValidation,recordAlphaWUAcceptance, andapplySlashkeep validator output accountable while preserving owner authority to accept, reject, or penalize work. - Parameter oversight: the same owner key that binds
$AGIALPHAcan pause/unpause, rotate ENS controllers, gate validators, sweep staked balances, and drive slashing/acceptance hooks at any moment, keeping all runtime and treasury levers under direct owner custody with matching events for dashboards and subgraph consumers.
Source: contracts/AlphaNodeManager.sol
%%{init: { "theme": "forest", "themeVariables": { "primaryColor": "#0b1120", "primaryTextColor": "#e2e8f0", "lineColor": "#22d3ee", "secondaryColor": "#f97316", "tertiaryColor": "#9333ea" } }}%%
flowchart TD
classDef neon fill:#0b1120,stroke:#22d3ee,stroke-width:2px,color:#e2e8f0;
classDef ember fill:#0b1120,stroke:#f97316,stroke-width:2px,color:#ffedd5;
classDef amethyst fill:#0b1120,stroke:#9333ea,stroke-width:2px,color:#ede9fe;
Owner[Owner signer]:::neon --> Pause[pause / unpause]:::ember
Owner --> Validators[setValidator]:::amethyst
Owner --> Identity[register / update / revoke identity]:::ember
Owner --> Stake[withdrawStake]:::amethyst
Pause --> RuntimeGate[Runtime + treasury flow gate]:::neon
Validators --> Validators
Identity --> ENS[ENS controllers\nkept in-sync]:::neon
Stake --> TreasuryBalance[Treasury balance\nsweeps]:::ember
/metricssurfaces resource-manager gauges (nrm_limits,nrm_usage), Yamux stream counters, QUIC handshake histograms, and dial outcomes to keep runtime pressure visible. Source:src/telemetry/networkMetrics.js.- Resource manager ceilings and connection pruning thresholds read environment overrides (
NRM_*,CONN_*) and are emitted alongside the active limits JSON. Source:src/network/resourceManagerConfig.js. - Docker Compose starts Prometheus, Grafana, and Alertmanager with wired dashboards (
libp2p_unified_dashboard.json,dcutr_dashboard.json) and alert rules (alerts.yml) on first load. Sources:docker-compose.yml,observability/prometheus/alerts.yml,grafana/provisioning/dashboards/libp2p.yaml.
%%{init: { "theme": "forest", "themeVariables": { "primaryColor": "#0f172a", "primaryTextColor": "#e2e8f0", "lineColor": "#22c55e", "secondaryColor": "#0ea5e9", "tertiaryColor": "#f97316" } }}%%
flowchart LR
classDef neon fill:#0f172a,stroke:#22c55e,stroke-width:2px,color:#e2e8f0;
classDef frost fill:#0b1120,stroke:#0ea5e9,stroke-width:2px,color:#e0f2fe;
classDef ember fill:#0b1120,stroke:#f97316,stroke-width:2px,color:#ffedd5;
Runtime[Libp2p runtime\n/metrics export]:::neon --> Prometheus[(Prometheus\nalerts.yml)]:::ember
Prometheus --> Alertmanager[Alertmanager\nprewired routes]:::frost
Prometheus --> Grafana[Grafana\nprovisioned dashboards]:::neon
Grafana --> Operators[Operators + owner\nthreshold-aware tiles]:::ember
Alertmanager --> Operators
The CI wall is the single source of truth for merging. Every gate is required on main and PRs and mirrors npm run ci:verify locally.
- Workflow:
.github/workflows/ci.ymlfans out linting, tests, coverage, Solidity checks, subgraph build, Docker smoke, and security audit before the aggregateverifystage. - Required checks:
.github/required-checks.jsonlists the exact status checks to enforce in GitHub branch protection (apply tomainand all PRs). - Local parity:
npm run ci:verifyexecutes the same gates so contributors can keep the badge wall green before opening a PR. - Branch rule recipe: Settings → Branches → Add rule for
main→ Require a pull request before merging → Require status checks to pass using.github/required-checks.json→ Require conversation resolution and “Require branches to be up to date.” - Enforcement sanity check: After applying the branch rule, push a test PR to confirm GitHub blocks merging until every required check turns green and the workflow badge above reflects the latest run.
- Badge publishing: wire
BADGE_GIST_IDandBADGE_GIST_TOKEN(seedocs/deployment/branch-protection.md) so thebadgesjob can auto-push Shields endpoint JSON for lint, tests, solidity, subgraph, docker, security, and coverage.
| Status check | Job ID | Local command | Badge endpoint key |
|---|---|---|---|
| Lint Markdown & Links | lint |
npm run lint:md && npm run lint:links && npm run lint:grafana |
lint.json |
| Unit, Integration & Frontend Tests | test |
npm run ci:test |
test.json |
| Coverage Report | coverage |
npm run coverage |
coverage.json |
| Docker Build & Smoke Test | docker-smoke |
docker build ... && docker run ... --help |
docker.json |
| Solidity Lint & Compile | solidity |
npm run ci:solidity |
solidity.json |
| Subgraph TypeScript Build | typescript |
npm run ci:ts |
typescript.json |
| Dependency Security Scan | security |
npm run ci:security |
security.json |
| Full CI Verification | verify |
npm run ci:verify |
Aggregates all of the above |
| Status check | Purpose |
|---|---|
| Lint Markdown & Links | Keeps README/docs, mermaid fences, and links renderable. |
| Unit, Integration & Frontend Tests | Protects runtime and dashboard behavior via Vitest suites. |
| Coverage Report | Enforces coverage thresholds for networking and telemetry modules. |
| Docker Build & Smoke Test | Guarantees the container image boots and exposes CLI help. |
| Solidity Lint & Compile | Safeguards $AGIALPHA control-plane contracts. |
| Subgraph TypeScript Build | Ensures the indexing layer stays in sync with contracts. |
| Dependency Security Scan | Blocks merges on high severity advisories. |
| Full CI Verification | Aggregated enforcement matching ci:verify. |
%%{init: { "theme": "forest", "themeVariables": { "primaryColor": "#0f172a", "primaryTextColor": "#e2e8f0", "lineColor": "#22d3ee", "secondaryColor": "#9333ea", "tertiaryColor": "#f97316" } }}%%
flowchart TD
classDef neon fill:#0f172a,stroke:#22d3ee,stroke-width:2px,color:#e2e8f0;
classDef ember fill:#0b1120,stroke:#f97316,stroke-width:2px,color:#ffedd5;
PR[PR / main push]:::neon --> Lint[lint + links + grafana]:::ember
PR --> Tests[unit + integration + frontend]:::ember
PR --> Coverage[coverage report]:::ember
PR --> Solidity[solhint + solc]:::ember
PR --> Subgraph[subgraph TS build]:::ember
PR --> Docker[Docker build + smoke]:::ember
PR --> Security[npm audit]:::ember
Lint --> Verify[verify job]:::neon
Tests --> Verify
Coverage --> Verify
Solidity --> Verify
Subgraph --> Verify
Docker --> Verify
Security --> Verify
Verify --> BranchProtection[Required checks\n(branch protection)]:::neon
- Mermaid parity:
npm run lint:mdandnpm run lint:linksvalidate diagram fences and anchors exactly as GitHub parses them so every flowchart above stays visible on repository pages. Usenpx @mermaid-js/mermaid-clilocally if you want PNG/SVG spot checks, but the lint gate is authoritative for PRs. - Badge fidelity: the CI badge at the top of this README points to
ci.ymlonmain; if a required check fails, the badge turns red and branch protection blocks merges. The optionalbadgesjob publishes Shields endpoints using the same job names so you can embed granular status badges without editing workflow code. - Branch rules: apply
.github/required-checks.jsontomainand enable “Require branches to be up to date” + “Require conversation resolution.” This keeps the Full CI Verification wall, individual gates, and the aggregated verify step visible to reviewers and enforced on every PR. - Mermaid parity recipe:
npm run lint:mdalready validates diagram fences exactly as GitHub renders them; for a pixel-for-pixel check runnpx @mermaid-js/mermaid-cli -i README.md -o /tmp/readme.svg --scale 1.2before pushing. This keeps every flowchart above identical in GitHub’s renderer and in docs exports. - GitHub enforcement receipts: after applying branch rules, confirm the shield wall with
gh api repos/MontrealAI/AGI-Alpha-Node-v0/branches/main/protection | jq .required_status_checks.contextsand capture the output as evidence in your operations log. - Mermaid GitHub preview: to double-check GitHub rendering before opening a PR, run
npx @mermaid-js/mermaid-cli -i README.md -o /tmp/readme.svg --scale 1.2 && file /tmp/readme.svgor open the SVG locally; parity withnpm run lint:mdensures the diagrams stay visible on repository pages.
The owner retains complete control over runtime, treasury, validators, and identity anchors while keeping telemetry and CI in lockstep.
- Runtime switches: pause/unpause gates (
pause,unpause) and validator roster updates (setValidator). - Identity + ENS: register, rotate, suspend, or revoke ENS-linked controllers (
registerIdentity,updateIdentityController,setIdentityStatus,revokeIdentity). - Staking flows: custody adjustments (
withdrawStake), on-chain staking (stake), and validator validation/acceptance hooks (recordAlphaWUValidation,recordAlphaWUAcceptance,applySlash). - Auditability: every change emits events that the subgraph indexes so dashboards and alerts stay synchronized.
- Operator experience: all owner functions are callable as live overrides—pause, retune validator eligibility, swap ENS controllers, or redirect funds—without redeploying contracts or touching runtime binaries.
The canonical $AGIALPHA deployment at 0xa61a3b3a130a9c20768eebf97e21515a6046a1fa (18 decimals) keeps the owner at the center of every production lever.
| Capability | Function(s) | Effect | Telemetry + audit hooks |
|---|---|---|---|
| Halt or resume live flows | pause, unpause |
Pauses or resumes staking, validator work units, and treasury orchestrations in a single owner transaction. | Emits pause/unpause events; surfaces in /metrics, Grafana tiles, and the subgraph. |
| Validator roster control | setValidator |
Adds or removes eligible validators instantly. | Validator roster changes appear in events, subgraph bindings, and the dashboard roster view. |
| Identity/ENS routing | registerIdentity, updateIdentityController, setIdentityStatus, revokeIdentity |
Aligns ENS controllers with active operators; supports rotation and emergency revocation. | ENS + identity events propagate to the indexer and Grafana alerts. |
| Treasury and stake custody | withdrawStake, applySlash, recordAlphaWUValidation, recordAlphaWUAcceptance |
Moves staked balances, accepts/rejects work units, and applies slashing with owner authority. | Emits ledger and validation events that the subgraph, Prometheus, and dashboard ingest. |
| Canonical token guardrail | Constructor enforces 0xa61a3b3a130a9c20768eebf97e21515a6046a1fa |
Rejects non-canonical token bindings to prevent drift from $AGIALPHA. |
Deployment logs and Solidity checks validate the binding; CI solidity gate re-runs the constraint. |
%%{init: { "theme": "forest", "themeVariables": { "primaryColor": "#0f172a", "primaryTextColor": "#e2e8f0", "lineColor": "#f97316", "secondaryColor": "#22c55e", "tertiaryColor": "#38bdf8" } }}%%
flowchart LR
classDef neon fill:#0f172a,stroke:#f97316,stroke-width:2px,color:#ffeedd;
classDef ember fill:#0b1120,stroke:#22c55e,stroke-width:2px,color:#e2e8f0;
classDef frost fill:#0b1120,stroke:#38bdf8,stroke-width:2px,color:#e0f2fe;
OwnerKeys[Owner keys\n(on-chain authority)]:::neon --> RuntimeSwitches[Pause / Unpause\nValidator roster]:::ember
OwnerKeys --> IdentitySwitches[ENS controller rotation\nregister / update / revoke]:::ember
OwnerKeys --> TreasurySwitches[Stake custody\nwithdrawals + slashing]:::ember
RuntimeSwitches --> Events[Events + metrics]:::frost
IdentitySwitches --> Events
TreasurySwitches --> Events
Events --> Indexer[Subgraph indexer\nfeeds dashboards + alerts]:::frost
- Install dependencies:
npm ci(Node.js 20.18+). - Build artifacts:
npm run build— renders the subgraph manifest with yourALPHA_NODE_MANAGER_*overrides, compiles the subgraph, and ships the dashboard bundle. - Run the CI wall locally:
npm run ci:verify— mirrors the workflow and keeps required checks green (matches.github/required-checks.json). - Bring up observability:
docker-compose up -d prom grafana alertmanager— Prometheus at:9090, Grafana at:3000(admin/admin), Alertmanager at:9093with dashboards and alerts pre-provisioned. - Explore metrics: visit
http://localhost:9090/targetsto confirm the scrape job isUP; dashboards load automatically under Grafana → Manage. - Exercise governance: call the owner-only functions on
AlphaNodeManagerto pause/unpause, gate validators, rotate ENS controllers, or withdraw stake; metrics and dashboards reflect changes immediately. - Keep docs + mermaids crisp:
npm run lint:mdandnpm run lint:linksverify README/docs rendering (including mermaid diagrams) exactly as GitHub displays them. - Publish shields (optional): add
BADGE_GIST_ID+BADGE_GIST_TOKENsecrets, then let thebadgesjob publish Shields endpoints you can embed here for a permanent “all green” wall.
npm run lint:md— verify Markdown and mermaid fences render on GitHub.npm run lint:links— ensure README and docs links stay valid.npm run lint:grafana— lint dashboard JSON for GitHub/Grafana parity.npm run test && npm run test:frontend— backend + dashboard Vitest suites.npm run coverage— coverage gates for networking/telemetry modules.npm run ci:solidity— solhint + solc for$AGIALPHAcontracts.npm run ci:ts— build/codegen for the subgraph.npm run ci:security— high-severity dependency audit.npm run ci:verify— the full wall before pushing.
- Owner sovereignty: every critical parameter (pausing, validator roster, identity controllers, stake custody) is owner-triggered and mirrored in telemetry so overrides are safe to execute in production.
- Canonical token binding:
AlphaNodeManagerlocks to$AGIALPHAat0xa61a3b3a130a9c20768eebf97e21515a6046a1fa(18 decimals) to prevent drift. - Observability-first:
/metrics, Prometheus, Grafana dashboards, and Alertmanager routes are prewired; linting ensures dashboards render on GitHub and in Grafana identically. - CI-as-gatekeeper: workflow + required checks enforce lint, tests, coverage, Solidity checks, Docker smoke, subgraph build, security audit, and final verification. PRs cannot merge without a green wall.
- Non-technical deployability:
docker-compose upbrings the telemetry wall online, andnpm run ci:verifymirrors the GitHub workflow so contributors can reproduce the green state locally. - Owner-tuned runtime: pausing, validator changes, ENS controller swaps, staking withdrawals, and validation hooks are all callable by the contract owner at any time to reshape the platform for new workloads or mitigations without downtime.
- Guardian onboarding + signing:
docs/runes/guardian.md - Orchestrator execution (Mode A):
docs/runes/orchestrator.md - Mode A flow, envelope schema, orchestrator steps:
docs/treasury-mode-a.md - Network operations (reachability, DoS triage, posture flips):
docs/network-operations.md - Economics & identity background:
docs/economics.md,docs/identity.md,docs/manifesto.md - DCUtR metrics and dashboard import:
observability/docs/METRICS.md,observability/docs/DASHBOARD.md
AGI Alpha Node v0 is engineered so the owner can reshape validator, identity, treasury, and network posture instantly while the telemetry wall and CI gates keep every change observable, reproducible, and green.
Every control in this repository is wired so the owner can steer the platform like a singular intelligence core: pausing live flows, rewriting validator/identity maps, sweeping stake, and pivoting runtime posture with the same confidence shown by the green CI badge. The result is a cockpit that delivers outsized leverage to the owner while keeping every move accountable and visible to operators, auditors, and automated guardians.