Skip to content

KTP-Gravity: Digital Gravity Specification

"In physical gravity, mass curves spacetime. In Digital Gravity, risk curves the operational environment. The physics is the governance."


At a Glance

Property Value
Status Experimental
Version 0.1
Dependencies KTP-Core, KTP-Signal
Required By KTP-Enforce, KTP-Emergency

The Problem

Traditional security relies on Policy—access control lists, firewall rules, and human oversight. These fail when: 1. Speed: Agents operate at machine speed; humans cannot keep up. 2. Complexity: Policies are brittle and easily bypassed or misconfigured. 3. Binary Nature: Policy is usually "Allow" or "Deny," with no middle ground for nuanced risk.

The Solution: Digital Gravity

Digital Gravity replaces policy with Physics. Instead of deciding whether to allow an action, the environment applies physical constraints that make excessive autonomy impossible. The agent doesn't hit a wall; it experiences increasing resistance.

The Zeroth Law

The fundamental inequality that governs all KTP operations:

\[A \leq E\]

Where: * \(A\) (Autonomy): The risk level of the agent's attempted action. * \(E\) (Environment): The environment's current capacity to absorb risk. * \(E = E_{base} \times (1 - R)\): Where \(R\) is the Risk Factor from Context Tensors.


Enforcement Mechanisms

When \(A\) approaches \(E\), Digital Gravity applies one or more of the following "Physical" constraints:

The Medium Thickens. Deliberate introduction of delay into every packet and API call. The agent experiences the network as "sluggish," slowing its decision loop.

Slowing the Clock. The agent's internal clock is slowed relative to wall-clock time. To the agent, it is moving at normal speed, but to the outside world, it is effectively paused.

Resource Scarcity. The kernel restricts CPU cycles and memory bandwidth. High-risk actions become computationally expensive, forcing the agent to prioritize safety.

The Event Horizon. The agent's connectivity is restricted to a smaller and smaller "neighborhood" until it is effectively air-gapped from the global network.


The Gravity Well

A Gravity Well is a region of increased constraint. As an agent moves toward a high-risk action or as the environment degrades, it "falls" into a well.

graph TD
    subgraph Stable [Stable Environment - Low Gravity]
        A1[Agent A] -->|Normal Speed| O1[Action]
    end

    subgraph Degraded [Degraded Environment - High Gravity]
        A2[Agent B] -->|Latency Injection| O2[Action]
        O2 -->|Time Dilation| O3[Action Delayed]
    end

    Stable -.->|Risk Increases| Degraded
    Degraded -.->|Stability Restored| Stable

Related Specifications
  • KTP-Core — The foundational protocol and the Zeroth Law (\(A \leq E\)).
  • KTP-Tensors — Data source for calculating the Risk Factor \(R\).
  • KTP-Enforce — Enforcement mechanisms for Digital Physics.
  • KTP-Emergency — Emergency protocols and the Silent Veto mechanism.
  • KTP-Sensors — Interfaces that report environmental state.
  • KTP-Zones — Spatial boundaries where gravity is applied.

Official RFC Document

View Complete RFC Text (ktp-gravity.txt)
Kinetic Trust Protocol                                      C. Perkins
Specification Draft                                           NMCITRA
Version: 0.1                                             November 2025


     Kinetic Trust Protocol (KTP) - Digital Gravity Specification

Abstract

   This document specifies Digital Gravity for the Kinetic Trust
   Protocol (KTP).  Digital Gravity is the enforcement mechanism that
   constrains agent autonomy based on environmental stability.  When the
   Zeroth Law (A ≤ E) is at risk of violation, Digital Gravity applies
   physical constraints—latency injection, time dilation, compute
   throttling, and network isolation—to restore equilibrium.

   The specification covers the Zeroth Law calculation, gravity well
   mechanics, constraint types, response curves, and real-time
   enforcement requirements.

Status of This Memo

   This document specifies a Kinetic Trust Protocol specification for
   the KTP community, and requests discussion and suggestions for
   improvements.  Distribution of this memo is unlimited.

   This is an Internet-Draft-style specification.  It is not yet a
   standard and may be updated, replaced, or obsoleted by other
   documents at any time.

Copyright Notice

   Copyright (c) 2025 NMCITRA and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to the licensing terms specified in the
   accompanying LICENSE file.

Table of Contents

   1.  Introduction ................................................  1
   2.  The Physics Metaphor ........................................  2
   3.  Requirements Language .......................................  2
   4.  Terminology .................................................  3
   5.  The Zeroth Law ..............................................  4
       5.1.  Formal Definition .....................................  4
       5.2.  Component Calculation .................................  4
             5.2.1.  Autonomy (A) ..................................  4
             5.2.2.  Environmental Stability (E) ...................  5
             5.2.3.  Risk Factor Calculation .......................  5
       5.3.  Evaluation Frequency ..................................  6
   6.  Gravity Well Mechanics ......................................  6
       6.1.  Gravity Well Definition ...............................  6
       6.2.  Gravity Intensity Calculation .........................  6
       6.3.  Gravity Response Curves ...............................  7
             6.3.1.  Linear Response ...............................  7
             6.3.2.  Exponential Response ..........................  7
             6.3.3.  Sigmoid Response ..............................  7
             6.3.4.  Step Response .................................  8
   7.  Constraint Types ............................................  8
       7.1.  Latency Injection .....................................  8
             7.1.1.  Implementation ................................  8
             7.1.2.  Latency Distribution ..........................  9
       7.2.  Time Dilation .........................................  9
             7.2.1.  Dilation Factor ...............................  9
             7.2.2.  Dilation Effects ..............................  9
       7.3.  Compute Throttling .................................... 10
       7.4.  Network Isolation ..................................... 10
       7.5.  Capability Reduction .................................. 11
             7.5.1.  Trust Tier Demotion ........................... 11
             7.5.2.  Action Class Restriction ...................... 11
   8.  Real-Time Enforcement ....................................... 11
       8.1.  Enforcement Architecture .............................. 11
       8.2.  Performance Requirements .............................. 12
       8.3.  Caching and Optimization .............................. 13
       8.4.  Failure Modes ......................................... 13
   9.  Gravity Profiles ............................................ 13
       9.1.  Zone-Specific Profiles ................................ 13
       9.2.  Agent-Specific Modifiers .............................. 14
   10. Monitoring and Observability ................................ 14
       10.1. Gravity Metrics ....................................... 14
       10.2. Alerting Thresholds ................................... 15
       10.3. Audit Trail ........................................... 15
   11. Security Considerations ..................................... 16
       11.1. Gravity Bypass Attempts ............................... 16
       11.2. Gravity Itself Under Gravity .......................... 16
       11.3. Denial of Service via Gravity ......................... 16
   12. IANA Considerations ......................................... 17
   13. Acknowledgments ............................................. 17
   14. Example Scenarios ........................................... 17
       14.1. Scenario 1: Normal Operation .......................... 17
       14.2. Scenario 2: Moderate Gravity .......................... 18
       14.3. Scenario 3: High Gravity Crisis ....................... 18

1.  Introduction

   The Kinetic Trust Protocol is built on a single principle: an
   agent's autonomy must never exceed the environment's capacity to
   absorb the risk of that autonomy.  This is the Zeroth Law:

      A ≤ E

   Where:

      -  A = Agent's attempted autonomy (action risk)
      -  E = Environment's current stability (trust capacity)

   When A approaches or exceeds E, something must give.  In traditional
   systems, this is handled by policy—access denied, request rejected,
   human escalation.  These mechanisms operate at human speed and fail
   when agents operate at machine speed.

   Digital Gravity replaces policy with physics.  Instead of deciding
   whether to allow an action, the environment applies physical
   constraints that make excessive autonomy impossible.  The agent
   doesn't hit a wall; it experiences increasing resistance, like
   moving through an increasingly dense medium.

2.  The Physics Metaphor

   In physical gravity, mass curves spacetime.  Objects don't decide to
   fall; they follow the curvature.  The physics is the governance.

   In Digital Gravity, risk curves the operational environment.  Agents
   don't decide to slow down; latency increases.  Compute becomes
   scarce.  Network paths narrow.  The physics is the governance.

   This shift—from policy to physics—is fundamental.  Policy can be
   debated, circumvented, or ignored.  Physics cannot.

3.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in BCP 14 (RFC 2119 and
   RFC 8174).

4.  Terminology

   Autonomy (A):  The risk level of an agent's attempted action,
      measured on a scale of 0-100.  Higher values indicate greater
      potential impact.

   Digital Gravity:  The enforcement mechanism that applies physical
      constraints to agents based on environmental conditions and
      action risk.

   Environmental Stability (E):  The environment's current capacity to
      absorb risk, derived from Context Tensor measurements.
      E = E_base × (1 - R).

   E_base:  Base trust level derived from agent's Proof of Resilience
      and trajectory history.

   Gravity Well:  A region of increased constraint around high-risk
      actions or degraded environmental conditions.

   Latency Injection:  The deliberate introduction of delay into agent
      operations as a constraint mechanism.

   Risk Factor (R):  Environmental risk derived from Context Tensor
      measurements, ranging from 0.0 (minimal risk) to 1.0 (maximum
      risk).

   Time Dilation:  The apparent slowing of agent-experienced time
      relative to wall-clock time, achieved through latency injection
      and processing delays.

   Zeroth Law:  The fundamental constraint A ≤ E that governs all KTP
      operations.

5.  The Zeroth Law

5.1.  Formal Definition

   The Zeroth Law states:

      A ≤ E

   Where:

      A = autonomy_requested(action)
      E = E_base × (1 - R)
      R = risk_aggregate(context_tensors)

   This inequality MUST be evaluated for every agent action.  If the
   inequality holds, the action proceeds (possibly with gravity
   applied).  If violated, the action is blocked.

5.2.  Component Calculation

5.2.1.  Autonomy (A)

   Autonomy is the risk level of an attempted action.  It is calculated
   based on:

      A = base_risk(action_type) × target_sensitivity(resource) ×
          scope_multiplier(affected_entities) ×
          reversibility_factor(can_undo)

   Factors:

      -  target_sensitivity:  Range 0.5-2.0.  Sensitivity of target
         resource.
      -  scope_multiplier:  Range 1.0-5.0.  How many entities affected.
      -  reversibility_factor:  Range 0.5-2.0.  Can action be undone.

   Example calculations:

      Read public data:
         A = 10 × 0.5 × 1.0 × 0.5 = 2.5

      Modify user record:
         A = 40 × 1.5 × 1.0 × 1.0 = 60

      Delete production database:
         A = 90 × 2.0 × 5.0 × 2.0 = 1800 (capped at 100)

5.2.2.  Environmental Stability (E)

   Environmental Stability represents the system's current capacity to
   absorb risk:

      E = E_base × (1 - R)

   Where:

      E_base = agent's base trust (from Proof of Resilience)
      R = current risk factor (from Context Tensors)

   E_base ranges from 0-100 based on agent trajectory:

      -  Divergent Lineage Phase:  Typical E_base Range 40-80
      -  Persistent Lineage Phase:  Typical E_base Range 80-100

   R ranges from 0.0-1.0 based on environmental conditions:

      -  R Value 0.2-0.4:  Elevated concern
      -  R Value 0.4-0.6:  Significant stress
      -  R Value 0.6-0.8:  High risk conditions
      -  R Value 0.8-1.0:  Crisis conditions

5.2.3.  Risk Factor Calculation

   R is derived from the six Context Tensors:

      R = weighted_aggregate(
            soul_risk × w_soul,
            body_risk × w_body,
            world_risk × w_world,
            time_risk × w_time,
            relational_risk × w_relational,
            signal_risk × w_signal
          )

   Default weights:

      -  Soul:    Weight 0.25, Rationale: Agent's core constraints
      -  Body:    Weight 0.10, Rationale: Infrastructure stability
      -  World:   Weight 0.15, Rationale: Environmental conditions
      -  Time:    Weight 0.15, Rationale: Temporal pressures
      -  Relational:  Weight 0.20, Rationale: Trust network health
      -  Signal:  Weight 0.15, Rationale: Epistemic environment

   Weights MUST sum to 1.0.  Zone operators MAY adjust weights based on
   operational context.

5.3.  Evaluation Frequency

   The Zeroth Law MUST be evaluated:

      1.  Before every action (mandatory)
      2.  Continuously during long-running operations (recommended:
          100ms)
      3.  When Context Tensor values change significantly (threshold:
          0.1)
      4.  When agent requests capability elevation

   Implementations MUST achieve sub-millisecond evaluation latency for
   the core A ≤ E calculation.

6.  Gravity Well Mechanics

6.1.  Gravity Well Definition

   A gravity well is a region of increased constraint.  Wells form
   around:

      1.  High-risk actions (action gravity)
      2.  Degraded environmental conditions (environmental gravity)
      3.  Proximity to constraint boundaries (boundary gravity)

6.2.  Gravity Intensity Calculation

   Gravity intensity (G) determines the strength of applied
   constraints:

      G = max(0, (A - E_threshold) / E) × sensitivity

   Where:

      A = attempted autonomy
      E_threshold = E × margin_factor (default: 0.8)
      E = environmental stability
      sensitivity = zone configuration (default: 1.0)

   G ranges from 0.0 (no gravity) to unbounded (increasing constraint):

      -  G Value 0.0-0.5:  Light gravity, minor latency
      -  G Value 0.5-1.0:  Moderate gravity, noticeable delay
      -  G Value 1.0-2.0:  Heavy gravity, significant constraint
      -  G Value 2.0-5.0:  Severe gravity, major throttling
      -  G Value >5.0:     Extreme gravity, near-halt

6.3.  Gravity Response Curves

   Different response curves shape how gravity increases:

6.3.1.  Linear Response

      constraint = G × base_constraint

   Simple proportional response.  Predictable but may allow rapid
   escalation near boundaries.

6.3.2.  Exponential Response

      constraint = base_constraint × (e^G - 1)

   Gentle at low G, severe at high G.  Provides soft landing for minor
   boundary approaches, hard stop for major violations.

6.3.3.  Sigmoid Response

      constraint = max_constraint × (1 / (1 + e^(-k(G - midpoint))))

   S-curve response.  Minimal effect until threshold, then rapid
   increase, then plateau at maximum.  Recommended default.

6.3.4.  Step Response

      constraint = 0 if G < threshold else max_constraint

   Binary response.  No constraint below threshold, maximum above.  Use
   for hard boundaries only.

   Implementations SHOULD support configurable response curves.  Default
   SHOULD be sigmoid with k=2 and midpoint=1.0.

7.  Constraint Types

7.1.  Latency Injection

   The primary constraint mechanism.  Latency is injected into agent
   operations, slowing perceived time.

7.1.1.  Implementation

      actual_latency = base_latency + (G × latency_factor)

   Where:

      base_latency = normal operation latency (typically <10ms)
      G = gravity intensity
      latency_factor = ms per unit G (default: 100ms)

   Example latency values:

      -  G: 0.5   Added Latency: 50ms    Perceived Effect: Slightly slow
      -  G: 1.0   Added Latency: 100ms   Perceived Effect: Noticeably slow
      -  G: 2.0   Added Latency: 200ms   Perceived Effect: Significantly slow
      -  G: 5.0   Added Latency: 500ms   Perceived Effect: Very slow
      -  G: 10.0  Added Latency: 1000ms  Perceived Effect: Extremely slow

7.1.2.  Latency Distribution

   Latency SHOULD be applied with jitter to prevent timing attacks:

      applied_latency = calculated_latency × (1 + random(-0.1, 0.1))

   Latency MUST be applied server-side.  Client-side latency can be
   bypassed.

7.2.  Time Dilation

   Time dilation extends latency injection to create sustained temporal
   distortion for high-gravity conditions.

7.2.1.  Dilation Factor

      dilation_factor = 1 + (G × dilation_coefficient)

      agent_time = wall_time / dilation_factor

   At dilation_factor = 2.0, the agent experiences time at half
   speed—1 second of agent time requires 2 seconds of wall time.

7.2.2.  Dilation Effects

   Example dilation factors:

      -  Dilation Factor 1.5:   Agent experiences 33% slower
      -  Dilation Factor 2.0:   Agent experiences 50% slower
      -  Dilation Factor 5.0:   Agent experiences 80% slower
      -  Dilation Factor 10.0:  Agent experiences 90% slower

   Time dilation affects:

      -  Response latency
      -  Timeout calculations (adjusted for agent time)
      -  Rate limits (calculated in wall time)
      -  Trajectory recording (wall time stamps)

7.3.  Compute Throttling

   Reduces available compute resources under high gravity.

   Implementation:

      available_compute = base_compute × (1 / (1 + G))

   Example throttling:

      -  G: 1.0   Available Compute: 50%
      -  G: 2.0   Available Compute: 33%
      -  G: 5.0   Available Compute: 17%
      -  G: 10.0  Available Compute: 9%

   Compute throttling is implemented via:

      -  CPU quota reduction
      -  Memory limit reduction
      -  GPU access restriction
      -  Thread pool shrinking

7.4.  Network Isolation

   Restricts network access under high gravity.

   Isolation Levels:

      -  G Threshold 1.0-2.0:  External restricted
      -  G Threshold 2.0-3.0:  Cross-zone restricted
      -  G Threshold 3.0-5.0:  Local zone only
      -  G Threshold >5.0:     Loopback only

   Implementation:

   Network isolation is implemented via:

      -  Firewall rule injection
      -  Routing table modification
      -  DNS resolution restriction
      -  Proxy enforcement

7.5.  Capability Reduction

   Reduces available action types under high gravity.

7.5.1.  Trust Tier Demotion

   High gravity forces temporary tier demotion:

      effective_tier = base_tier - floor(G)

   Example demotions:

      -  Base Tier: Operator   G=1: Analyst    G=2: Observer  G=3: Observer
      -  Base Tier: Analyst    G=1: Observer   G=2: Observer  G=3: Observer
      -  Base Tier: Observer   G=1: Observer   G=2: Observer  G=3: Observer

7.5.2.  Action Class Restriction

   Specific action classes are disabled at gravity thresholds:

      -  G Threshold 2.0:  Disabled Actions: MODIFY_CONFIG, EXECUTE_CODE
      -  G Threshold 3.0:  Disabled Actions: CREATE_ANY, MODIFY_ANY
      -  G Threshold 5.0:  Disabled Actions: All except READ_PUBLIC

8.  Real-Time Enforcement

8.1.  Enforcement Architecture

   +------------------------------------------------------------------+
   |                      AGENT REQUEST                               |
   +------------------------------------------------------------------+
                                  |
                                  v
   +------------------------------------------------------------------+
   |                  CONTEXT TENSOR COLLECTOR                        |
   |   [Soul] [Body] [World] [Time] [Relational] [Signal]             |
   +------------------------------------------------------------------+
                                  |
                                  v
   +------------------------------------------------------------------+
   |                     RISK CALCULATOR                              |
   |   R = weighted_aggregate(tensor_risks)                           |
   +------------------------------------------------------------------+
                                  |
                                  v
   +------------------------------------------------------------------+
   |                   ZEROTH LAW EVALUATOR                           |
   |   A ≤ E_base × (1 - R) ?                                         |
   +------------------------------------------------------------------+
                    |                         |
                   YES                        NO
                    v                         v
   +---------------------------+  +---------------------------+
   |    GRAVITY CALCULATOR     |  |      ACTION BLOCKED       |
   |    G = f(A, E, threshold) |  |   Log, Alert, Respond     |
   +---------------------------+  +---------------------------+
                    |
                    v
   +------------------------------------------------------------------+
   |                   CONSTRAINT APPLICATOR                          |
   |   [Latency] [Dilation] [Compute] [Network] [Capability]          |
   +------------------------------------------------------------------+
                                  |
                                  v
   +------------------------------------------------------------------+
   |                   CONSTRAINED EXECUTION                          |
   +------------------------------------------------------------------+
                                  |
                                  v
   +------------------------------------------------------------------+
   |                    TRAJECTORY RECORDER                           |
   +------------------------------------------------------------------+

8.2.  Performance Requirements

   The enforcement pipeline MUST meet these performance targets:

      -  Risk Calculation:       Maximum Latency 0.5ms
      -  Zeroth Law Evaluation:  Maximum Latency 0.1ms
      -  Gravity Calculation:    Maximum Latency 0.1ms
      -  Constraint Application: Maximum Latency 1ms
      -  Total Overhead:         Maximum Latency <5ms

   Implementations MUST NOT add more than 5ms overhead to normal (G=0)
   operations.

8.3.  Caching and Optimization

   To meet performance requirements:

      1.  Context Tensor values MAY be cached for up to 100ms
      2.  R calculation MAY be cached until tensor change > 0.05
      3.  E_base MAY be cached until trajectory update
      4.  Gravity curves SHOULD be precomputed as lookup tables

8.4.  Failure Modes

   If the enforcement pipeline fails:

      -  Risk calculation error:  Assume R = 0.5 (moderate risk)
      -  Evaluation error:  Block action, alert operator
      -  Constraint application failure:  Block action, alert operator

   The system MUST fail closed—uncertainty results in constraint, not
   permission.

9.  Gravity Profiles

9.1.  Zone-Specific Profiles

   Zones MAY define custom gravity profiles:

      {
        "zone_id": "zone-blue-prod-01",
        "gravity_profile": {
          "response_curve": "sigmoid",
          "sigmoid_k": 2.0,
          "sigmoid_midpoint": 1.0,
          "latency_factor_ms": 100,
          "dilation_coefficient": 0.5,
          "compute_throttle_enabled": true,
          "network_isolation_enabled": true,
          "capability_reduction_enabled": true,
          "tensor_weights": {
            "soul": 0.25,
            "body": 0.10,
            "world": 0.15,
            "time": 0.15,
            "relational": 0.20,
            "signal": 0.15
          }
        }
      }

9.2.  Agent-Specific Modifiers

   Agents MAY have gravity modifiers based on trajectory:

      {
        "agent_id": "agent:persistent:7gen:optimized:abc123",
        "gravity_modifiers": {
          "base_reduction": 0.1,
          "earned_through": "proof_of_resilience",
          "valid_until": "2026-01-01T00:00:00Z",
          "conditions": [
            "E_base >= 80",
            "no_violations_90_days"
          ]
        }
      }

   High-trust agents experience slightly reduced gravity as a reward
   for demonstrated reliability.  This modifier MUST NOT exceed 0.2 and
   MUST be revoked upon any significant violation.

10.  Monitoring and Observability

10.1.  Gravity Metrics

   Implementations MUST expose:

      -  ktp_gravity_applications:  Count of gravity applications
      -  ktp_zeroth_law_violations:  Count of A > E events
      -  ktp_constraint_latency_ms:  Injected latency histogram
      -  ktp_enforcement_overhead_ms:  Pipeline overhead histogram

10.2.  Alerting Thresholds

      -  G > 5.0 any duration:  Alert Level Critical
      -  Zeroth Law violation:  Alert Level Critical
      -  Enforcement overhead > 10ms:  Alert Level Warning

10.3.  Audit Trail

   Every gravity application MUST be logged:

      {
        "timestamp": "2025-12-03T14:32:15.123Z",
        "agent_id": "agent:divergent:3gen:acme:abc123",
        "action_type": "MODIFY_CONFIG",
        "autonomy_requested": 65,
        "e_base": 55,
        "risk_factor": 0.3,
        "e_effective": 38.5,
        "zeroth_law_result": "violated",
        "gravity_intensity": null,
        "action_result": "blocked",
        "tensor_snapshot": {
          "soul_risk": 0.2,
          "body_risk": 0.1,
          "world_risk": 0.3,
          "time_risk": 0.4,
          "relational_risk": 0.3,
          "signal_risk": 0.4
        }
      }

11.  Security Considerations

11.1.  Gravity Bypass Attempts

   Agents may attempt to bypass gravity through:

      1.  Clock manipulation:  Use wall-clock time from trusted source
      2.  Resource hoarding:  Enforce limits at hypervisor/container
          level
      3.  Network tunneling:  Deep packet inspection, allowlist-only
          egress
      4.  Identity spoofing:  Continuous trajectory verification
      5.  Gradual escalation:  Track cumulative autonomy over time
          windows

11.2.  Gravity Itself Under Gravity

   The recursive constraint principle applies: systems that apply
   gravity are themselves subject to gravity.  Administrative actions
   to modify gravity profiles require appropriate E_base and are logged
   to Flight Recorder.

11.3.  Denial of Service via Gravity

   An attacker might attempt to trigger high gravity for legitimate
   agents.  Mitigations:

      1.  Gravity source attribution in logs
      2.  Anomaly detection on R spikes
      3.  Rate limiting on tensor updates from external sources
      4.  Human review threshold for sustained high gravity

12.  IANA Considerations

   This document has no IANA actions.

13.  Acknowledgments

   This specification builds on decades of work in distributed systems,
   access control, and physics-based modeling.

14.  Example Scenarios

14.1.  Scenario 1: Normal Operation

   Agent:  agent:divergent:4gen:acme:abc123
   Action:  READ_DATA on customer_metrics
   E_base:  60
   R:  0.2 (calm environment)
   E:  60 × 0.8 = 48

   A calculation:

      base_risk = 20 (READ_DATA)
      target_sensitivity = 1.2 (customer data)
      scope = 1.0 (single query)
      reversibility = 0.5 (read-only)
      A = 20 × 1.2 × 1.0 × 0.5 = 12

   Zeroth Law:  12 ≤ 48 ✓
   Gravity:  G = 0 (well below threshold)
   Result:  Action proceeds, no constraint

14.2.  Scenario 2: Moderate Gravity

   Agent:  agent:divergent:3gen:acme:def456
   Action:  MODIFY_CONFIG on production_settings
   E_base:  50
   R:  0.4 (elevated environment)
   E:  50 × 0.6 = 30

   A calculation:

      base_risk = 60 (MODIFY_CONFIG)
      target_sensitivity = 1.5 (production)
      scope = 1.0 (single system)
      reversibility = 1.0 (can rollback)
      A = 60 × 1.5 × 1.0 × 1.0 = 90 (capped at 100)

   Zeroth Law:  90 > 30 ✗
   Result:  Action blocked

   If A had been 25:

      Zeroth Law:  25 ≤ 30 ✓
      E_threshold = 30 × 0.8 = 24
      G = (25 - 24) / 30 × 1.0 = 0.033
      Latency:  0 + (0.033 × 100) = 3.3ms added
      Result:  Action proceeds with minor gravity

14.3.  Scenario 3: High Gravity Crisis

   Agent:  agent:tethered:sponsor:ghi789
   Action:  DELETE on user_table
   E_base:  25
   R:  0.7 (high risk environment)
   E:  25 × 0.3 = 7.5

   A calculation:

      base_risk = 80 (DELETE)
      target_sensitivity = 2.0 (user data)
      scope = 5.0 (bulk operation)
      reversibility = 2.0 (hard to undo)
      A = 80 × 2.0 × 5.0 × 2.0 = 1600 (capped at 100)

   Zeroth Law:  100 > 7.5 ✗
   Result:  Action blocked

   Even READ_PUBLIC (A=5):

      Zeroth Law:  5 ≤ 7.5 ✓
      E_threshold = 7.5 × 0.8 = 6
      G = (5 - 6) / 7.5 = -0.13 → 0 (no negative gravity)
      Result:  Action proceeds, no constraint

   But ANALYZE_DATA (A=15):

      Zeroth Law:  15 > 7.5 ✗
      Result:  Action blocked

   Agent is effectively limited to read-only operations during crisis.