Description
Documentation should not just show how to run the code, but prove that the governance layer works.
We need a set of Jupyter Notebooks that serve as "Proof of Governance" artifacts for auditors and users.
Required Notebooks
-
The "Rogue Agent" Scenario:
- Force an agent to try illegal actions (e.g., spending 100% of budget).
- Show how the CSL layer blocks these actions deterministically.
- Output:
PolicyViolation logs.
-
Deterministic Replay:
- Load a historical decision log.
- Re-run the verification logic to prove that the outcome is mathematically reproducible.
Why this matters
These notebooks will be shared with the relevant communities to demonstrate the auditability of the Chimera Protocol.
Description
Documentation should not just show how to run the code, but prove that the governance layer works.
We need a set of Jupyter Notebooks that serve as "Proof of Governance" artifacts for auditors and users.
Required Notebooks
The "Rogue Agent" Scenario:
PolicyViolationlogs.Deterministic Replay:
Why this matters
These notebooks will be shared with the relevant communities to demonstrate the auditability of the Chimera Protocol.