Skip to content

Architecture Overview

RCT Platform is organized as an 11-layer constitutional AI stack.


Layer Diagram

┌──────────────────────────────────────────────────────────┐
│               RCT PLATFORM SDK v1.0.2a0                  │
│         Intent-Centric AI Operating System               │
└──────────────────────────────────────────────────────────┘

Layer 11: CI/CD & Quality Gates
├─ GitHub Actions (ci.yml + security-scan.yml)
├─ 723 passing tests · 87% coverage · Python 3.10/3.11/3.12
└─ Bandit 0 HIGH · mypy 32 files clean

Layer 10: Enterprise Hardening
├─ Pre-commit hooks (black, isort, bandit)
├─ Semantic versioning (1.0.2a0)
└─ CITATION.cff · CODE_OF_CONDUCT.md · CONTRIBUTING.md

Layer 9: Regional & Compliance
├─ 8 regional pairs (TH, JP, KR, CN, VN, ID, TW, US)
├─ PDPA / PIPA / PIPL / GDPR adapters
└─ core/regional_adapter/

Layer 8: Reference Microservices (5)
├─ intent-loop         ← 7-state pipeline, FDIA gating
├─ analysearch-intent  ← GIGOProtector, adversarial self-refinement
├─ vector-search       ← FAISS + Qdrant backends
├─ crystallizer        ← concept graph, keyword extraction
└─ gateway-api         ← routing, CORS, health

Layer 7: Intent Loop Engine
├─ RECEIVED → VALIDATED → MEMORY_CHECK → COMPUTING
├─ → VERIFYING → COMMITTING → COMPLETED
├─ Cold start: 3–5s   Warm recall: <50ms
└─ rct_control_plane/intent_compiler.py

Layer 6: SignedAI Consensus
├─ S/4/6/8 tier framework
├─ ED25519 cryptographic attestation
├─ 7 HexaCore models (3 Western + 3 Eastern + 1 Thai)
└─ signedai/core/

Layer 5: Delta Engine
├─ 74% compression (stores diffs, not full state)
├─ SHA-256 per-record deduplication
├─ Full rollback to any past tick
└─ core/delta_engine/

Layer 4: FDIA Engine
├─ F = D^I × A  (constitutional equation)
├─ A=0 → full block (governance guarantee)
├─ Accuracy: 0.92 vs industry 0.65
└─ core/fdia/fdia.py

Layer 3: Control Plane DSL (15 modules)
├─ intent_schema · dsl_parser · execution_graph_ir
├─ policy_language · observability · replay_engine
├─ jitna_protocol · signed_execution · cli · api
└─ rct_control_plane/

Layer 2: JITNA Protocol (RFC-001 v2.0)
├─ Wire format: { I, D, Δ, A, R, M }
├─ Standard for cross-agent intent negotiation
└─ signedai/core/models.py

Layer 1: Core SDK Primitives
├─ IntentObject · ExecutionGraph · DSLParser
├─ FDIAScorer · SignedAIRegistry · MemoryDeltaEngine
└─ Exportable under Apache 2.0

Data Flow — Single Intent Request

sequenceDiagram
    participant U as User/Agent
    participant CP as Control Plane
    participant FDIA as FDIA Engine
    participant SAI as SignedAI Consensus
    participant DE as Delta Engine

    U->>CP: POST /compile (JITNAPacket)
    CP->>FDIA: score_action(intent, data, architect)
    FDIA-->>CP: score ∈ [0.0, 1.0]
    alt score < threshold or A=0
        CP-->>U: 403 Blocked (constitutional gate)
    else score ≥ threshold
        CP->>SAI: verify(action, tier)
        SAI-->>CP: consensus + ED25519 signature
        CP->>DE: record_delta(agent_id, tick, changes)
        DE-->>CP: compressed delta saved
        CP-->>U: 200 OK (signed execution graph)
    end

Key Design Decisions

Why the FDIA equation is not a config option

The equation F = D^I × A is enforced at the mathematics level. Governance is not a switch — when A=0, F=0 by arithmetic, not by condition check. This makes the guarantee unforgeable.

Why deltas instead of state snapshots

Storing full agent state at every tick is O(n×t). Delta Engine stores only changed_fields with SHA-256 content hashing, achieving 74% compression on typical agent trajectories. Full rollback is still possible by replaying the delta chain.

Why ED25519 over RSA

ED25519 signatures are 64 bytes vs RSA-2048's 256 bytes, verify 3× faster, and offer equivalent security. Critical for high-throughput multi-LLM consensus where thousands of decisions need attestation per second.