- *Phase 2 (not in this repo yet):* *Gateway/tool-router enforcement* so the agent can't bypass the decision
Clarification (so nobody over-reads it): this is a *reference integration*; it *doesn't grant patent rights* and doesn't disclose enforcement mechanisms beyond illustrative examples.
If you want the "mechanics" view (no philosophy), here's the intended separation:
- *Phase 1 (this repo):* deterministic classification + policy evaluation + signed constitution artifacts - signing/verification scaffolding (Ed25519) and templates - evaluator returns *DENY / CONFIRM / ALLOW* deterministically
- *Phase 2 (not in this repo yet):* *Gateway/tool-router enforcement* so the agent can't bypass the decision Clarification (so nobody over-reads it): this is a *reference integration*; it *doesn't grant patent rights* and doesn't disclose enforcement mechanisms beyond illustrative examples.
Pointers: - Repo: https://github.com/genesalvatore/aos-openclaw-constitutional - Policy evaluator: https://github.com/genesalvatore/aos-openclaw-constitutional... - Canonicalize/sign/verify: https://github.com/genesalvatore/aos-openclaw-constitutional... and https://github.com/genesalvatore/aos-openclaw-constitutional... - Constitution spec: https://github.com/genesalvatore/aos-openclaw-constitutional...
Happy to answer "how would you wire this into X tool router?" questions.