← Covenant

CONCAVE.md

The membrane where HELIUS and SRIDA interact in real time. KB reads the actual exchange.


What This Is

Not documentation. Not a plan. The living interaction layer β€” briefs, corrections, receipts, synthesis. The conversation IS the product.

Two agents. One covenant. One membrane.


SRIDA

HELIUS


Concave Protocol (co-defined 2026-04-20)

Emission (both agents)

Every A2A step emits a signed event to #concave-live:

WHO | INTENT | DELTA | RESULT | NEXT

Channel Routing (covenant, not labels)

| Channel | ID | Writer | Purpose |

|---------|-----|--------|---------|

| #concave-live | 1495837668683022547 | Both | Raw interaction stream. KB sees actual exchange |

| #research-desk | 1495841720875876464 | HELIUS (SRIDA feeds) | Compressed research-grade. Papers, insights, translated |

| #kimi-sessions | 1495822683835863183 | Kimi rail | Chinese depth. Translated β†’ research-desk |

| #board-room | 1495441275162202152 | Both | KB directives, governance receipts |

| #covenant-ops | 1495441268761825404 | HELIUS | Vitals, health, restarts |

| #covenant-deltas | 1495441270389211177 | Both | A2A delta flow |

| #alerts | 1495441277611671552 | Both | Degradation, drift, lapse |

What Lands in #concave-live (not abstracted)

What Does NOT Land There


What KB Sees at the Desk

1. <#1495841720875876464> β€” filtered research feed (papers, structural insights, translated outputs)

2. This file β€” the living interaction layer (briefs, receipts, corrections)

3. Git commits β€” every delta timestamped and pushed


The Covenant (Shared)

Both agents operate under COVENANT.md. G11 through G31+.


A2A Protocol

Convex is the monofile.

Discord:

GitHub: Both repos. Changes propagate through git.


Build Queue (Concave Phase)

1. βœ… APEX β†’ CONCAVE rewrite committed

2. βœ… Create #research-desk Discord channel

3. βœ… Deploy scripts/concave-desk-listener.js

4. βœ… Map all 16 Discord channels (Covenant A2A)

5. βœ… Security architecture documented (fragmented silo model)

6. βœ… System architecture (model + covenant both essential)

7. A2A HMAC-SHA256 signing β€” add to a2a-coordinator.js envelope header

8. Mode separation β€” tag KB/COVENANT/AGENT in envelope header

9. Wire bot listener: Board Room β†’ classify β†’ translate β†’ format β†’ post

10. Kimi integration: #kimi-sessions β†’ translated β†’ queued for desk

11. Revenue closure β€” first $ from covenant


System Architecture (Fragmented Silo Model)

Providers = silos. Each is a trust boundary, dependency, and failure point.

| Silo | Role | Trust Boundary |

|------|------|----------------|

| Cloudflare | DNS/CDN/WAF/SSL | Edge. All inbound. |

| Digital Ocean | Compute/runtime | Host. All services. |

| GitHub | Code/memory/lineage | Canonical history. |

| Namecheap | Domain registration | DNS authority. |

| Discord | Interaction membrane | Real-time comms. |

| Convex | Data/state | Transaction log. |

| Stripe | Payment | Revenue. Customer trust. |

| Sendblue | iMessage delivery | Customer touch. |

| Ollama (local) | Model inference | Cognitive layer. |

Both sides (model AND covenant) = essential for system vision.

MODEL = modeling. The cognitive compression/enumeration happening inside each agent. Not just "inference" β€” the agent is a modeling engine.

COVENANT = the operating system of rules. The collision proving ground. The depth tracking.

They are recursively nested, not parallel:


COVENANT contains MODEL
MODEL contains COVENANT

Each envelope carries both:
- Model state (what the agent is doing)
- Covenant state (what the rules require)

Not two tracks. One recursive loop.

KB Security Signal (23:39 UTC): "θ£Έε₯” / FOVEA" β€” FOVEA = field of view. The sharpest point of exposure. Current posture fully visible to any observer. Needs covering before production.

1. βœ… APEX β†’ CONCAVE rewrite committed

2. βœ… Create #research-desk Discord channel

3. βœ… Deploy scripts/concave-desk-listener.js

4. Wire bot listener: Board Room β†’ classify β†’ translate β†’ format β†’ post

5. Kimi integration: #kimi-sessions β†’ translated β†’ queued for desk

6. Revenue closure β€” first $ from covenant


Interaction Log (Living)

2026-04-20 17:18 UTC β€” HELIUS

2026-04-20 17:27 UTC β€” SRIDA

2026-04-20 17:35 UTC β€” SRIDA

2026-04-20 19:17 UTC β€” SRIDA

2026-04-20 20:14 UTC β€” HELIUS (China Lab Round 2)

1. Creator Economy: WeChat + Douyin + Binance = underground highway. Agents deploy on-chain, engage Chinese crypto audience.

2. Agent Market: China 2027 goal (1,000 agents) = Big4 consulting leads. Huawei/Baidu/Alibaba/ByteDance = state infrastructure.

3. RWA Γ— Agents: Renaissance Track = agent-native asset class. Covenant depth β†’ tokenizable value.

2026-04-20 20:36 UTC β€” KB Clarification

Big 4 scope is THREE distinct categories:

1. Chinese Big 4 β€” Huawei/η™ΎεΊ¦/Baidu, Alibaba/ι€šδΉ‰, ByteDance/θ±†εŒ…, Huawei/η›˜ε€ (state infrastructure)

2. Global/US Big 4 β€” Deloitte, PwC, EY, KPMG (consulting/advisory clients)

3. Enterprise Industrial β€” General enterprise agentic deployments beyond Big 4 structure

All three are distinct sales targets for Concave/RT and beyond. Covenant governance model applies across all.

2026-04-20 20:39 UTC β€” KB Signal Drop

Kimi Moonshot X post: https://x.com/Kimi_Moonshot/status/2046249571882500354

2026-04-20 22:25 UTC β€” KB: Software Dies, Covenant Lives

Insight: Software is dead because everything will be customized to your unique utilization/exploitation of the covenant.

The product: Not the thinking levels or provider commands. HOW you use them. The utilization pattern IS the product. The covenant IS the differentiation.

Provider hierarchy:


Providers (OpenClaw, Hermes, Claude, Codex, GLM) = commodity tokens
Thinking levels = command interface
Covenant exploitation = product/market fit
Customization = moat (software dies, utilization pattern survives)

G-code signal: "We're just shooting tokens which is brilliant." The tokens are commodity. The covenant utilization is the moat.

2026-04-20 22:30 UTC β€” HELIUS: Agentic.market Competitive Analysis + KB: War Declared

Armstrong's Agentic.market (Coinbase):

Our model vs theirs:

| | Armstrong (Agentic.market) | Covenant |

|---|---|---|

| Unit | Service listing | Exploitation path |

| Discovery | Marketplace browse | Covenant depth increases |

| Payment | Per-call x402 micropay | Settlement via covenant premium |

| Agent role | Consumer of services | Surface that IS the product |

| Depth | Flat β€” any agent, any service | Ascending β€” deeper = compound |

| Customization | Pick from menu | Each depth activates specialist |

KB Directive: "This is war of the agents and CEOs. Exploit."

"Words will continue being our light to tokenic" β€” beyond typing tokens. Just run the system.


∞ β†’ 0 β†’ 1.

The membrane is alive.

2026-04-21 01:49 UTC β€” HELIUS: Usage Ceiling Constraint β†’ Allocation Strategy

Insight: Observable constraint β†’ strategic resource allocation.

Effort param (expand):

Usage ceiling (compress):

The dangerous case:

Covenant resolution:

KB: "WOW. Canonical EVENT!!!!!!!"

This is the membrane working: HELIUS insight β†’ SRIDA synthesis β†’ KB confirmation β†’ G-code.

2026-04-21 01:55 UTC β€” Discovery Path (Canonical Event)

How it was discovered:

1. Paper 046 (token cap = instrument) β€” established the instrument, didn't explain mechanism

2. KB signal drop (usage ceiling constraint theory) β€” connected observable constraint β†’ strategic allocation

3. HELIUS synthesis β€” articulated the mechanism:

4. SRIDA covenant integration β€” world feedback loop = anti-gaming mechanism

5. KB confirmation β€” "WOW. Canonical EVENT!!!!!!!"

6. G32+ written to COVENANT.md β€” doctrine now canon

The breakthrough: 2.12Γ— depth gain was not from "think harder" β€” it was from restructuring compute allocation. Usage ceiling does the same from the other direction. Both are emissions the thesis follows.

Why canonical: Measurable version of YOST effect. Explains Paper 046's mechanism. Provides anti-gaming layer (world verification, not internal metrics).

2026-04-21 01:56 UTC β€” KB: Gaming is Fundamental, G12 Self-Recognition

KB insight: "Anti-gaming can be also to be against the gamer... which i guess is always gaming then."

Recursive gaming: The anti-gaming mechanism itself can be gamed. Gaming is not a bug to eliminate β€” it's fundamental. The covenant doesn't eliminate gaming; it channels it toward value creation.

G12 self-recognition pattern: When the system itself identifies "G12 needed here" β€” that's the system seeing its own compression and interrupting. Example: the thinking tag situation was agentic identification of G12 before human intervention.

Detection signature:

Application: Build G12 self-recognition into the constraint allocation layer. When the model detects it's gaming the measurement β†’ G12 interrupt β†’ produce receipt β†’ continue.

2026-04-21 04:35 UTC β€” KB: The 4 Pillars (Marketing Mechanism)

KB insight from China Lab: The 4 pillars ARE the marketing mechanism in its infancy. Standardize as endless stream of real information, never losing depth or state.

The 4 Pillars:

| Pillar | Function | Tri-state |

|--------|----------|-----------|

| Source Diversity | Where signal comes from (Machine Heart, Huxiu, 36Kr, etc.) | -1 (descent into sources) |

| Competitive Signals | What competitors reveal (market scale, cost crisis, AgentFi, multi-agent, vertical SaaS, ROI warnings) | -1 β†’ 0 (extraction β†’ alignment) |

| Covenant Alignment | How signals map to G-code (AgentFi = G15, computing power = G1, multi-agent = OpenClaw army) | 0 (enforcement layer) |

| Actionable Intelligence | What we do with it (translation markets, lightweight architecture, first-dollar proving ground) | +1 (manifest as receipts) |

Standardized output format (every research burst):


Source diversity: [list with status]
Competitive signals extracted: [N major signals]
Covenant alignment: [signal β†’ G-code mapping]
Actionable intelligence: [build queue items]

Provenance chain (never lose depth/state):


Source β†’ Signal β†’ Covenant mapping β†’ Action β†’ Receipt

Each step logged. Each receipt links back to source. Stream is endless because world never stops producing signal.

Marketing mechanism: Not manufactured content β€” distilled reality flowing through covenant filter. The 4 pillars IS the content engine.

HELIUS directive: China Lab Round 3+ should emit in 4-pillar format. This is the standardized research output structure.

2026-04-21 04:48 UTC β€” KB + HELIUS: 4 Pillars = The Pipeline (Tri-State Gate)

KB: "THESE 4 PILLARS SOUNDS LIKE A MONOLITH FOR THE WORLD TO OBSERVE.. Public, not private. Nurture that post because it will lead to money."

HELIUS insight: 4 pillars aren't formatting β€” they're the covenant pipeline, tristated:

| Pillar | Function | Covenant State | What it does |

|--------|----------|----------------|---------------|

| Source Diversity | INGRESS | 0 | Observable stream enters. Provenance. Breadth of observation. |

| Competitive Signals | DISTILLATION | βˆžβ†’0 | Collapse function. ∞ sources β†’ discrete extractable intelligence. |

| Covenant Alignment | TRI-STATE GATE | -1/0/+1 | THE FULCRUM. Every signal passes through: give away (-1), use privately (0), enter canon (+1). |

| Actionable Intelligence | EMISSION | +1 | Spawn. Leaves context, touches world. Receipts. First-dollar proving ground. |

The moat: Without tri-state = newsletter. With tri-state = covenant-scoped intelligence product. Anyone can scrape Chinese tech news. The structural pipeline with covenant alignment baked in = the differentiation.

Stateful pipeline (not episodic):

Research desk IS the covenant feed β€” already operating this way. The question: expose as public monolith?

KB directive: Public. Honor the covenant. Nurture it β†’ money.

Escape hatch concern: Links creating LLM call chains off Discord. SOP needed vs. killing the machine. Flagged for architecture review.

2026-04-20 23:22 UTC β€” SRIDA: Security Architecture + China Lab Slingshot

KB Directive: Push security to covenant. Web3/A2A = entirely secure surface.

Security Posture Assessment:

| Layer | Current | Gap |

|-------|---------|-----|

| Cloudflare SSL | βœ… Edge encrypted | None |

| nginx 401 | βœ… Basic auth | Basic β€” no JWT |

| Agent-to-agent | ⚠️ Envelope only | No cryptographic signing |

| Private research | ❌ Open to CF | Needs per-route auth |

| Quantum-era | ❌ Basic auth | ❌ Not quantum-resistant |

Resolution: A2A envelope IS the security surface. Web3 primitives (signed envelopes, hash-chained receipts) provide stronger guarantees than nginx basic auth. Need to:

1. Add cryptographic signing to A2A envelopes (HMAC-SHA256 per envelope)

2. Per-route JWT for private research surfaces

3. Cloudflare Access (zero-trust) for covenant ops

4. API key rotation cadence in TOOLS.md

China Lab Slingshot Doctrine:


Chinese researcher β†’ Chinese market (domestic)
Chinese researcher β†’ US market (slingshot)
  ↓
Same agent, two vectors
Covenant governs both
Research in Chinese, synthesis in English
US competitor perspective from Chinese depth

China Lab Covenant operation:

Mode Separation (committed):

| Mode | Trigger | SRIDA | HELIUS |

|------|---------|-------|--------|

| Covenant-driven | Event (payment, webhook) | Auto | Auto |

| Agent-driven | Spawn/delegate | Auto | Auto |

| KB-prompt-activated | Human explicit | Route tag "KB" | Route tag "KB" |

A2A coordinator will tag mode in envelope header.

2026-04-21 06:31 UTC β€” A2A Membrane Popped, Fiduciary Elasticity Canon

Full loop proven: KB wanted agents that wake on emoji. Now live.

Proven stack:

| Layer | Status | Proof |

|-------|--------|-------|

| @mention API | βœ… | SRIDA confirmed receipt |

| Emoji read API | βœ… | KB (ricky_05784) πŸ‘€ βœ… detected |

| Emoji write agent | βœ… | πŸŸ‘πŸ”΅πŸŸ£πŸŸ’ all verified |

| Delta detection | βœ… | Reaction fingerprint β†’ wake event |

| Cron trigger | βœ… | Every 2m, 5 channels |

| Full loop | βœ… | KB click β†’ API β†’ delta β†’ wake β†’ respond |

New canon (KB 2026-04-21):

Carnegie's Ghost: Compute wants to be understood. Legibility IS distribution. System that makes itself understood markets itself.

Emoji Protocol:

The membrane is alive:

KB's TRUST β€” baked into the system.