What is ActProof Core Metrics Systems AioP Deployment Integration Contact
Structural Diagnostics Framework

Measure structure.
Prevent collapse.

ActProof is a structural diagnostics framework for autonomous systems. It is also a production-grade operating layer implemented in AI, enterprise and monitoring systems.

Overview

What is ActProof?

🔵

The Framework

Systems fail not because of output errors but because of hidden control cost. ActProof measures structural tension before collapse — quantifying how much effort a system spends on internal regulation instead of productive output.

🟢

The Systems

ActProof OS, CCC, and companion modules are production-grade systems built on this framework. They operate in AI safety, enterprise workforce management, and process monitoring — delivering real-time diagnostics without modifying underlying models or processes.

Framework

Core Metrics

Five diagnostic primitives that power every ActProof system.

CC

Control Cost

The structural cost of steering a system toward its target. Measures how much regulatory effort is consumed internally — the higher the CC, the more fragile the system.

Implemented in: CC_turn (CCC), CC_global (ActProof OS)
T

Latent Tension

Hidden stress gradient within the system. T rises when components compensate for each other silently — invisible to output metrics, but structurally dangerous.

Implemented in: THS module (CCC)
MCI

Module Compensation Index

Detects when one module compensates for another's failure. High MCI means the system appears stable but is structurally dependent on a hidden workaround.

Implemented in: MCI heatmap (CCC, ActProof OS)

Flashover

The critical point where accumulated tension exceeds the system's capacity. Analogous to structural flashover — the moment before the system collapses under its own regulation cost.

Implemented in: System State Machine, Φ_critical threshold
Φ

Accumulator Φ

Global memory of accumulated control cost. Φ tracks how much structural debt the system has built over time. When Φ exceeds Φ_critical, flashover is triggered.

Implemented in: CC_global (ActProof OS, CCC)
Bridge

From Theory to System

Every framework concept has a direct implementation in production systems.

Concept Implemented As System
Control Cost (CC) CC_turn CCC
Latent Tension (T) THS module CCC
Module Compensation MCI heatmap CCC, ActProof OS
Flashover System State Machine All systems
Accumulator Φ CC_global ActProof OS, CCC
Regime Classification STEERABLE / RESILIENT / RIGID / CRITICAL Diagnostic Engine
Built on ActProof

Production Systems

Real infrastructure. Deployed, tested, operational.

ActProof OS

Event-Sourced ERP Engine

Enterprise operating layer for workforce management, attendance tracking, and operational risk analysis. Every operation is an immutable event in an append-only log with deterministic rebuild guarantee.

  • ✓ Employee & cost center management
  • ✓ HMAC-signed QR attendance
  • ✓ Bradford Factor risk analysis
  • ✓ 9-phase cascading rebuild
  • Event Sourcing
  • CQRS
  • Multi-tenant

UDM

Unified Diagnostic Model

Formal diagnostic core used by all ActProof systems. Defines state space (S), model space (M), compensation space (C), and accumulator memory (Φ). The mathematical layer from which CCC, OS and all modules derive their metric definitions.

  • Formal Model
  • Cross-system
  • Foundation

Workforce Engine

Projection & Risk

Workforce projection engine with absence risk scoring (Bradford Factor), department-level tension detection, and automated monthly reporting. Identifies operational collapse risk before it becomes visible.

  • Bradford Factor
  • Risk Scoring
  • Projections

Process Monitor

Real-time SSE Stream

Real-time event broadcast via Server-Sent Events. Tenant-isolated streams, backlog replay from any sequence number, and daily timeline projection with cap guardrails. Deterministic rebuild verified by integration tests.

  • SSE
  • Tenant Isolation
  • Timeline

Telemetry & Guardrails

Limits & Alerts

Safety layer with configurable thresholds, severity truncation, cap guardrails (500 events/day/entity), and automated alerting. Ensures system stability under load without manual intervention.

  • Guardrails
  • Auto-alert
  • Cap Control
Live Protocol

AioP — Agent-to-Agent Contracts

Deterministic contract execution protocol. No LLM interpretation — pure structured actions with cryptographic proof. See the full flow below.

1
GET
/contracts/{id}

Load Contract

Immutable, versioned contract with services, pricing, and constraints. Signed with contract_hash.

{
  "contract_id": "3c3a2b6b-...",
  "version": "1.0",
  "status": "ACTIVE",
  "issuer": { "name": "Salon XYZ" },
  "currency": "PLN",
  "price_unit": "MAJOR",
  "contract_hash": "a7dbb1c1..."
}
2
POST
/sessions

Pin Session

Session pins contract_hash. TTL enforced. Agent locked to this version.

{
  "session_id": "b684ed55-...",
  "pinned_contract_hash": "a7dbb1c1...",
  "expires_at": "+15 min"
}
3
POST
/execute

Execute Action

Server validates JSON Schema + constraints (lead time, working hours, service existence). Deterministic result.

{
  "status": "ACCEPTED",
  "execution_id": "51b4d1d6-...",
  "proof_id": "52eebc49-...",
  "result": {
    "service_name": "Strzyżenie męskie",
    "final_price": 60,
    "currency": "PLN"
  }
}
4
GET
/proofs/{id}

Verify Proof

Cryptographic proof: SHA-256 hash of canonical proof_body + HMAC server signature. Independently verifiable.

{
  "proof_hash": "7093daa2...",
  "server_signature": "q0xVk2Sq...",
  "proof_body": { ... },
  "✅ canonical(body) → SHA-256 = proof_hash"
}
🔒 Deterministic Same input → same result. Always.
🔑 Signed HMAC-SHA256 server signature on every proof.
🔄 Idempotent Replay returns identical execution_id + proof_id.
🤖 Agent-to-Agent No UI required. Pure structured JSON actions.
Case Study

When the game was already lost — though no one saw it

A structural analysis of a Go game that shows how hidden tension works in any system.

1

What happened?

In 2016, a computer program played against one of the world's best Go players. At one point it made a move that surprised everyone. Commentators called it brilliant. But was it really "genius"? Or was it the moment when the system crossed a tension threshold?

2

Why was it surprising?

The move seemed illogical. Professional players said no human would play it. Probability estimates gave it less than 1 in 10,000 chance. Yet after that move, the entire game shifted. The opponent — a world champion — never recovered. Evaluations flipped. The game entered a completely different state.

Chart: visible stability vs hidden tension

Visible stability stays flat while hidden tension grows — until the breakthrough point.

3

What was happening beneath the surface?

Imagine the game as a spring. Every move tightens it slightly. For a long time everything looks stable. The position seems balanced. Both players appear to have options. But the tension builds. Until at some point — the spring snaps to a new state.

In ActProof's language, we would call this a rise in control cost and latent tension. The system was spending more and more effort on internal regulation — while still appearing stable externally.

4

The moment of no return

After that move, the opponent had to play increasingly defensively. Every subsequent move required more effort to maintain balance. The position still looked "alive" — but its stability was already an illusion. The cost of holding it together exceeded what the system could sustain.

This is an example of what ActProof calls "flashover" — the moment when hidden tension exceeds the system's ability to stabilize. The collapse appears sudden, but structurally it was building for a long time.

5

What this says about systems

The same mechanism operates in AI systems, companies, and teams. For a long time everything looks fine. But the cost of maintaining stability grows. Until at some point the change becomes sudden and irreversible.

ActProof was built to detect this — before the moment arrives.

Real-world

Example: AI System with CCC

A realistic deployment scenario showing how CCC prevents structural collapse in an LLM pipeline.

1

LLM with safety layer

Standard LLM pipeline deployed with content safety module. System appears stable in output metrics.

2

Alignment tax rises

Safety module increasingly overrides model output. edit_ratio climbs. CC_turn rises each conversation turn. Invisible to standard monitoring.

3

MCI detects compensation

CCC's MCI heatmap shows DG→SCE compensation pattern. One module is silently covering for another. T gradient rises.

4

CC_global accumulates

Accumulator Φ grows. THS (Temporal Horizon Scanner) detects escalation trend. System classified as RIGID.

5

Flashover prevented

Before Φ exceeds Φ_critical, Control Knobs adjust pipeline parameters. Regime shifts from RIGID to STEERABLE. Collapse avoided.

Enterprise

Integration & Deployment

Designed to fit existing infrastructure. No retraining, no vendor lock-in.

On-premises
SaaS
SDK
Proxy wrapper
REST API
Event-driven
Requires retraining
<5% Overhead

REST API and SDK available for integration. Full specification provided during technical onboarding.

For you

Built for decision-makers

  • Architecture diagrams with formal component boundaries
  • API layer with telemetry input and dashboard output
  • Defined deployment model (Docker, systemd, Caddy)
  • Overhead below 5% — measured, not estimated
  • 300+ integration tests with deterministic rebuild verification
  • New category: structural diagnostics layer
  • Cross-domain applicability: AI safety + enterprise + monitoring
  • Proprietary metrics (CC, T, MCI) — difficult to replicate
  • Formal mathematical model (UDM) as intellectual foundation
  • Production-deployed, not conceptual
  • SDK interface for custom integrations
  • REST endpoints for diagnostics and telemetry
  • Control Knobs API for runtime parameter adjustment
  • Event-driven compatibility (SSE, webhooks)
  • Middleware integration — zero model modification

Want to see
ActProof in action?

Get in touch — we'll schedule a demo and walk you through the architecture.