Confidential · Hypernym Research Arc
This document contains forward-looking research, primitive specifications, panel deliberations, and strategic positioning for products and architectures that have not yet shipped. It is shared under explicit understanding that recipients hold its contents in confidence and do not reproduce, redistribute, or summarize externally without written consent.
Round R16 · Compound Vision & Execution · 2026-05-10
Round Sixteen
VTC closures · Modulum product immediacy · local inference packaging · world model continuation · core vision of verifiable computation over reality.
Headline
Per-stream final verdicts
| Stream | Verdict | Ship-blocking work |
|---|---|---|
| A — VTC algebra | sound primitive · partial adversarial spec | 8 attack-vector mitigations + manifold-aware revert sub-spec |
| B — Product immediacy | sound sequence · partial GA contract | 6 abuse-vector mitigations + tiered SLA + work-unit-plus-premium pricing |
| C — Local inference | sound | MLX M5 throughput gate · refusal-degradation banner |
| D — World model | partial — R17 carry-forward | LAP + DomainBridge + RedactionBridge + refusal benchmarks |
| E — Core vision | sound | Maturity-stage communication discipline |
Hypernym builds verifiable computation over reality.Public framing locked · Stream E
What 5/5 panels agreed on
gear_state + GearBridge added to state_before. M5 mask compatibility is a closure requirement.integration_step for continuous-domain VTCs (PDE-governed substrates).Stream A
Adversarial closures
| # | Attack | Mitigation |
|---|---|---|
| 1 | Revert-then-attest race | Read lock on dependency frontier · trace_epoch + invalidation_watermark in receipt |
| 2 | Query-relative load-bearing ambiguity | load_bearing as relation, not cell-tag · cached at trace-time · revalidated at query |
| 3 | Counterfactual branch-confusion | causal_model_id hash + CausalBridge · write-set agreement insufficient |
| 4 | Observational-to-interventional laundering | crossover_admissibility via Pearl back-door / front-door / instrumental criteria |
| 5 | Refusal laundering | Default strict_stop · refused never demotes to underdetermined · soft mode non-attestable |
| 6 | ScaleBridge overclaiming | Per-domain density floors · KL-divergence test · uncertainty propagation |
| 7 | M5 mask mismatch | gear_state.mask_signature compatibility OR declared GearBridge |
| 8 | Cross-tenant attestation replay | Attestation scope binds tenant + policy + ontology + jurisdiction + ACL root + validator authority |
VTC state envelope (R16 commit)
| Op | Shape | What it does |
|---|---|---|
| apply | VTC → VTC | refusal | Execute and validate one transition. Invariants checked. Commitment hash sealed. |
| branch | VTC, Δ → VTC | Counterfactual. Same parent state, different changed/held-fixed sets. Causal-model-ID required. |
| merge | [VTC] → VTC | refusal | Defaults to refusal if held-fixed disagreements OR causal-model mismatch. |
| revert | VTC → trace | Invalidates descendants if load-bearing. Manifold-aware retrieval blocks stale embeddings. |
| attest | VTC → signed VTC | Signs cell + sources + verdict + tenant/policy/ontology/jurisdiction binding. |
| query | trace → verdict | Extracts supported / contradicted / underdetermined / refused. Validates dependency proof. |
Stream B
90-day shipping cadence
GA contract abuse mitigations (Codex R2)
| # | Vector | Mitigation |
|---|---|---|
| 1 | Pricing manipulation via refusal retries | Work-unit floor · retry-link billing groups for near-duplicate claims in time window |
| 2 | Refusal-bounty abuse | Per-company auth aggregation · organic-traffic gate · dedup-yield gate · bounded per account |
| 3 | Audit-token forgery / laundering | Receipt binds canonical claim hash + AST + evidence bundle + policy + verdict + replay window |
| 4 | Citation-shadowing attack | Verify reports evidence_coverage · adversarial retrieval (search contradictors) |
| 5 | Schema drift product↔corpus | Promotion pipeline ObservedRecord → CandidateVTC → VerifiedVTC · versioned · rejection reasons |
| 6 | Cross-customer replay leakage | Selective disclosure modes: full · redacted · commitment proof · regulator escrow |
Tiered SLA (Codex R2)
Stream C
Local inference packaging
Hypernym is the company. Modulum is the product. Local is a deployment mode — cloud, on-prem, edge. SKU sprawl avoided. Substrate sync stays in the cloud. Differentiation is substrate-grounded inference, not "model running offline."
Stream D
World model continuation
Stream E — three maturity stages
Eight non-negotiables
Unifying KPI (Codex R1+R2)
Every algebraic refinement, product wedge, runtime mode, world-model bet judged by the same scalar. CPAT collapses Streams A/B/C/D into one optimization target. Refusal-correctness is the orthogonal second-axis KPI — refusals don't count toward "accepted" but count toward calibration moat.
Standing principle
Every product Hypernym ships either produces VTCs, consumes VTCs, or composes them. Anything that doesn't is cash extraction or a distribution experiment — not core strategy.