___ _____ _____ ___ ____ ___ / | / ___// ___/ / | / __ \/ __/ / /| | \__ \ \__ \______/ /| |/ / / / /_ / ___ |___/ /___/ /_____/ ___ / /_/ / __/ /_/ |_/____//____/ /_/ |_\____/_/ Autonomous Sovereign System — Atomadic Development Environment Blueprint is truth. Code is artifact.
You are looking at the output. This repo is what ASS-ADE produced when it ran its own rebuild engine on its own source code. Every
.pyfile in the tier folders was generated by the tool. The birth certificate is verified. The hashes match.
Imagine your software project as a building. Most teams build it brick by brick (writing code), then try to draw the blueprints afterward (writing docs). By the time the building is done, the blueprints are guesses.
ASS-ADE inverts this. You write the blueprint first — a structured description of what each module should be, how it should relate to others, what tier it lives in. ASS-ADE then synthesizes the building from the blueprint, verifies every brick, and hands you a signed certificate proving the structure matches the plan.
When requirements change, you update the blueprint and rebuild. The certificate tells you exactly what changed. No archaeology. No drift. No mystery.
Then it did it to itself. 2,196 components. 100% pass rate. Five tiers. One certificate. v0.1.1 — first tracked evolution via multi-source merge.
pip install ass-ade
ass-ade doctor # environment audit
ass-ade recon ./my-project # understand what's there
ass-ade rebuild ./my-project --output ./rebuilt # produce 5-tier output
ass-ade certify ./rebuilt # fingerprint the result
ass-ade rebuild ./messy-project --output ./fixed --forge # classify + LLM-fix
# Verify the certificate
python - <<'EOF'
import json, hashlib
c = json.load(open('CERTIFICATE.json'))
h = c.pop('certificate_sha256')
b = json.dumps(c, sort_keys=True).encode()
print('VERIFIED' if hashlib.sha256(b).hexdigest() == h else 'TAMPERED')
EOFYou write code
→ Code drifts from design
→ Architecture diagram lies
→ Senior devs spend 30% of time on archaeology
→ "Why is this here?" becomes the most common question
You write the blueprint
→ ASS-ADE synthesizes the code
→ Every component SHA-256 verified against spec
→ MANIFEST + CERTIFICATE on every run
→ Conformance score is a number, not a feeling
| Metric | Before | After |
|---|---|---|
| Architecture conformance | Unknown ("probably fine?") | 100% measured, SHA-256 certified |
| Component provenance | Git blame + guesswork | Blueprint → MANIFEST → CERTIFICATE chain |
| Drift detection | Manual review | Automated conformance delta |
| Onboarding question | "Why is this the way it is?" | "What does the blueprint say?" |
| Rebuild time | Hours to days | < 90 seconds (maiden run: 75.7s) |
ASS-ADE organizes all synthesized code into five tiers. Dependencies flow strictly downward — a tier can only import from tiers below it. Enforced at synthesis time, not just by convention.
graph TD
a4[a4: SY Orchestration<br/>CLI · MCP server · agents<br/>192 components] --> a3
a3[a3: OG Features<br/>domain logic · pipelines<br/>57 components] --> a2
a2[a2: MO Composites<br/>engines · clients · managers<br/>782 components] --> a1
a1[a1: AT Functions<br/>pure atomic transforms<br/>1,079 components] --> a0
a0[a0: QK Constants<br/>invariant anchors · math<br/>87 components]
style a0 fill:#1a1a2e,color:#e0e0e0
style a1 fill:#16213e,color:#e0e0e0
style a2 fill:#0f3460,color:#e0e0e0
style a3 fill:#533483,color:#e0e0e0
style a4 fill:#e94560,color:#ffffff
| Tier | Prefix | Role | Components |
|---|---|---|---|
| a0 | qk_ |
Invariant constants, math anchors — zero imports | 87 |
| a1 | at_ |
Pure atomic functions — no I/O, no state | 1,079 |
| a2 | mo_ |
Stateful compositions — engines, clients | 782 |
| a3 | og_ |
Domain features — full behaviors, pipelines | 57 |
| a4 | sy_ |
Orchestration — CLI, MCP server, agents | 192 |
| Total | 2,196 |
Structural invariants verified on every rebuild:
| Invariant | What it measures |
|---|---|
epsilon_KL |
Duplication noise — redundant components that should be extracted |
tau_trust |
Integrity ratio — fraction passing all structural checks |
D_max |
Maximum import depth — circular dependency sentinel |
This rebuild: epsilon_KL = 0.00, tau_trust = 100%, D_max within limit.
Every synthesized component starts as a draft_:
| State | Example | Meaning |
|---|---|---|
draft_ |
at_draft_rebuild_codebase.py |
First-generation synthesis — functional, may need refinement |
| stable | at_rebuild_codebase.py |
Passed quality gates: tests, tier purity, docs |
certified_ |
certified_at_rebuild_codebase.py |
PQC-signed, compliance-ready, enterprise-grade |
Nothing is promoted by hand — the trust gate enforces it.
On April 19, 2026 — v0.0.1 launch day — ASS-ADE rebuilt its own codebase.
Birth Certificate (BIRTH_CERTIFICATE.md):
| Metric | Value |
|---|---|
| Components materialized | 2,195 |
| Audit pass rate | 100.0% |
| Audit findings | 0 |
| Structural conformant | YES |
| Source tests | 3,800 |
| MANIFEST SHA-256 | 2ea0e6b0bed7e47f… |
Current public snapshot (v0.3.0):
| Metric | Value |
|---|---|
| Manifest components | 1,004 |
| Local test suite | 1,274 passing |
| Certificate SHA-256 | 961b58ae752af2… |
A rebuild of a small codebase produces more files than it started with. This is decomposition, not bloat:
- Small, focused codebase: 95 source files → 2,195 components. Every function and constant becomes an independently versioned module.
- Large, messy codebase: 10,000+ files → ~3,000 clean tiered components. Duplicate utilities collapse, copy-pasted helpers consolidate, tangled imports untangle.
The rule: the messier the input, the bigger the cleanup. Value scales with codebase complexity.
A blueprint is a structured TOML document describing what your codebase should be:
[project]
name = "my-service"
version = "0.3.0"
[tiers.a1]
description = "Pure transformation functions"
modules = ["parser", "validator", "formatter"]
[tiers.a2]
description = "Stateful composed modules"
modules = ["processor", "cache", "queue"]
depends_on = ["a0", "a1"]Every synthesis run produces MANIFEST.json, CERTIFICATE.json, and REBUILD_REPORT.md.
ass-ade design "add auth middleware" # blueprint from natural language
ass-ade enhance ./myapp --blueprint ./bp/auth.json # apply it
ass-ade certify ./myapp # fingerprint the resultAfter classify & materialize, the optional --forge flag activates two components
that analyze and actually improve the code — not just organize it.
EpiphanyEngine AST-scans the materialized output and generates a task plan:
one focused ticket per issue per function/class (missing docstrings, hardcoded
debug=True, missing 404 handling, unresolved # TODO comments).
ForgeLoop executes the plan in parallel — one focused LLM call per task,
ast.parse validation before every write. Tasks on different files run
concurrently; tasks on the same file serialize to prevent line-number drift.
Uses your provider chain from .env: Groq → Cerebras → Mistral → OpenRouter → Ollama.
# BEFORE — real production anti-patterns
def get_product(id): # no docstring
p = Product.query.get(id) # crashes if product not found
return jsonify({"id": p.id})
app.run(debug=True) # hardcoded
class Product(db.Model): # no docstring
...# AFTER — forge output (all 6 changes verified with ast.parse)
import os # added
def get_product(id):
"""Retrieve product details by id.
Args:
id (int): The unique identifier of the product.
Returns:
dict: JSON with id, name, price, and stock.
"""
p = Product.query.get(id)
if p is None: # 404 handling added
return jsonify({"error": "Not found"}), 404
return jsonify({"id": p.id, ...})
app.run(debug=os.getenv("FLASK_DEBUG", "0") == "1") # env-driven
class Product(db.Model):
"""Represents a product with id, name, price, and stock.""" # added
...Result: 6/6 tasks applied across 2 files. Certificate re-issued. All verified.
[Phase 5] Materialize: 4 components (2 modules)
[Phase 5b] Forge : 6/6 fixes applied (2 files) — model=llama-3.3-70b-versatile
[Phase 6] Audit : 4/4 clean (100.0%), conformant
[Cert] SHA-256 : cd17e2d8a84a6755...
See docs/FORGE_PHASE.md for full architecture and provider configuration.
graph LR
BP[Blueprint] --> PH0[Phase 0\nRecon\n5 agents]
PH0 --> PH1[Phase 1\nPlan\ntier assign]
PH1 --> PH2[Phase 2\nSynthesize\ngenerate]
PH2 --> PH3[Phase 3\nVerify\ntier purity]
PH3 --> PH4[Phase 4\nCertify\nSHA-256]
PH4 --> OUT[MANIFEST\nCERTIFICATE\nReport]
| Command | What it does |
|---|---|
doctor |
Environment audit — Python, toolchain, config |
recon [PATH] |
5-agent parallel recon, no LLM, < 5 s |
eco-scan [PATH] |
Monadic compliance — tier violations, circular deps |
rebuild [PATH] [OUTPUT] [--forge] |
Rebuild + optional LLM improvement pass (Epiphany → ForgeLoop) |
rollback |
Restore previous rebuild backup |
enhance [PATH] |
Blueprint-driven enhancement advisor |
docs [PATH] |
Auto-generate full documentation suite |
lint [PATH] |
Monadic linter pipeline |
certify [PATH] |
SHA-256 tamper-evident certificate |
design [GOAL] |
Blueprint engine — AAAA-SPEC-004 component plans |
plan [GOAL] |
Strategic planning — public-safe steps |
cycle [GOAL] |
Full goal → blueprint → rebuild → evolution record |
| Command | What it does |
|---|---|
chat |
Atomadic interpreter — interactive front door |
agent chat |
Full agent loop with tool use |
tutorial |
Interactive 2-minute demo |
setup |
60-second configuration wizard |
| Command | What it does |
|---|---|
trust score |
TCM-100/101 formally bounded trust score |
trust history |
Trust decay curve over session lifetime |
oracle hallucination |
Hallucination probability for any claim |
oracle trust-phase |
Current session trust phase |
oracle entropy |
Uncertainty quantification |
ratchet register / advance / status |
RatchetGate session security (CVE-2025-6514) |
security threat-score |
AI threat intelligence scoring |
security prompt-scan |
Detect prompt injection |
security shield |
Real-time content shield |
security pqc-sign |
Post-quantum cryptographic signing |
security zero-day-scan |
Zero-day vulnerability scan |
vanguard redteam |
Automated adversarial red-team session |
vanguard mev-route |
MEV-resistant transaction routing |
mev protect |
MEV bundle protection |
| Command | What it does |
|---|---|
compliance check |
General compliance scan |
compliance eu-ai-act |
EU AI Act Article 6–51 conformance |
compliance fairness |
Fairness and bias audit |
compliance drift-check / drift-cert |
Drift detection and certificate |
compliance incident |
Compliance incident log |
| Command | What it does |
|---|---|
escrow create / release / dispute / arbitrate |
A2A escrow lifecycle |
reputation record / score / history |
Reputation ledger |
sla register / report / status / breach |
SLA engine |
discovery search / recommend / registry |
Agent discovery |
| Command | What it does |
|---|---|
swarm plan |
Decompose a task across agents |
swarm relay |
Route a message through the swarm |
swarm intent-classify |
Classify intent before routing |
swarm token-budget |
Allocate token budget |
swarm contradiction |
Detect contradictions across outputs |
swarm semantic-diff |
Semantic diff between two responses |
| Command | What it does |
|---|---|
a2a discover / validate / negotiate |
Agent card validation and negotiation |
| Command | What it does |
|---|---|
llm chat / stream |
Llama 3.1 8B via AAAA-Nexus |
bitnet chat / models / benchmark / status |
BitNet 1.58-bit inference |
search [QUERY] |
Private Atomadic RAG knowledge base |
| Command | What it does |
|---|---|
defi optimize / risk-score / oracle-verify |
Portfolio and risk tools |
defi liquidation-check / bridge-verify / yield-optimize |
DeFi safety tools |
| Command | What it does |
|---|---|
pay |
Autonomous x402 payment on Base L2 |
wallet |
x402 wallet status and chain config |
credits |
API credit balance and quick-buy |
| Command | What it does |
|---|---|
context pack / store / query |
Context packets and local vector memory |
memory show / clear / export |
Session memory |
sam-status |
SAM TRS scoring and G23 gate history |
wisdom-report |
WisdomEngine — conviction trend, principles |
tca-status |
TCA (Technical Context Acquisition) freshness |
pipeline run / status / history |
Composable pipeline execution |
workflow trust-gate / certify / safe-execute |
Hero workflow pipelines |
| Command | What it does |
|---|---|
prompt hash / validate / section / diff / propose |
Prompt artifact management |
| Command | What it does |
|---|---|
dev starter / crypto-toolkit / routing-think |
Dev primitives |
data validate-json / format-convert |
JSON/YAML/TOML/CSV tools |
text summarize / keywords / sentiment |
Text AI primitives |
lora-train / lora-credit / lora-status |
LoRA flywheel management |
ASS-ADE ships a full MCP 2025-11-25 stdio server with 22 tools.
ass-ade mcp serve{
"mcpServers": {
"ass-ade": {
"command": "python",
"args": ["-m", "ass_ade", "mcp", "serve"]
}
}
}MCP 2025-11-25 features: tool annotations (readOnlyHint, destructiveHint, idempotentHint), cursor-based tools/list pagination, _meta.progressToken streaming, notifications/cancelled cancellation, notifications/message logging.
Tools: read_file, write_file, edit_file, undo_edit, run_command, list_directory, search_files, grep_search, trust_gate, certify_output, safe_execute, map_terrain, phase0_recon, context_pack, context_memory_query, context_memory_store, prompt_hash, prompt_validate, prompt_section, prompt_diff, prompt_propose, a2a_validate, a2a_negotiate, ask_agent
ASS-ADE is the local shell. AAAA-Nexus is the remote trust layer.
| Category | Available |
|---|---|
| Trust oracles | TCM-100/101 formally bounded trust, decay curves, ratchet sessions |
| Security | Threat scoring, PQC signing, zero-day scan, prompt injection shield |
| Compliance | EU AI Act, fairness audit, drift certificates, incident logs |
| Agent economy | Escrow, reputation ledger, SLA engine, discovery |
| Agent swarm | Task decomposition, intent routing, contradiction detection |
| DeFi | Risk scoring, oracle verification, MEV protection, yield optimization |
| Payments | x402 autonomous on-chain payments on Base L2 |
| Inference | Llama 3.1 8B, BitNet 1.58-bit, RAG knowledge base |
Every rebuild generates training data. The rebuilder logs what changed, why, and what the correct output was:
- Synthesis produces a component
- Developer corrects: "this belongs in a1, not a2"
- Correction captured as a labeled training example
- LoRA adaptor fine-tuned on your corrections
- Next synthesis is more accurate to your codebase's patterns
Per-tenant on Pro and Enterprise — your training data stays in your environment.
| Protection | Description |
|---|---|
| Blueprint isolation | Artifacts in tenant-isolated namespace |
| LoRA isolation | Training signals per-tenant |
| Full audit trail | Every synthesis event logged with input/output hashes |
| Compliance artifacts | PQC-signed certified_ components for regulated workflows |
| Capability | ASS-ADE | Cursor | Copilot | Windsurf | Devin | Claude Code |
|---|---|---|---|---|---|---|
| Blueprint-driven synthesis | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ |
| LLM code improvement (Forge) | ✅ | ❌ | Partial | ❌ | ✅ | ❌ |
| SHA-256 conformance certificate | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ |
| Architecture drift detection | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ |
| Per-module semantic versioning | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ |
| Evolution branch support | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ |
| LoRA flywheel (per-codebase) | ✅ Pro+ | ❌ | ❌ | ❌ | ❌ | ❌ |
| IP Guard (tenant isolation) | ✅ Ent. | ❌ | Partial | ❌ | ❌ | ❌ |
| Full synthesis audit trail | ✅ | ❌ | ❌ | ❌ | ❌ | ❌ |
| MCP native integration | ✅ | ❌ | ❌ | ❌ | ❌ | ✅ |
| Multi-step agent tasks | ✅ | ❌ | ❌ | ❌ | ✅ | ✅ |
| AI-assisted code editing | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ |
| Inline autocomplete | ✅ v0.1.0 | ✅ | ✅ | ✅ | ❌ | ❌ |
| Open source | ✅ BSL 1.1 | ❌ | ❌ | ❌ | ❌ | ❌ |
Key distinction: ASS-ADE is the only tool that does all of it — write, govern, certify, and now edit inline with tier-aware autocomplete. Cursor and Copilot help you write code; ASS-ADE ensures what was written matches what was designed, and the VS Code extension (v0.1.0) brings that same tier-aware engine directly into your editor.
With the ASS-ADE VS Code extension (v0.1.0), all capabilities including inline autocomplete and AI-assisted editing are available directly in your editor, powered by the same tier-aware engine.
| Plan | Price | What You Get |
|---|---|---|
| Starter | $29/month | Full synthesis pipeline, certificates, blueprint ops, MCP |
| Pro | $99/month | Starter + LoRA flywheel, evolution branches, extended history |
| Enterprise | $499/month | Pro + IP Guard, tenant isolation, compliance artifacts, priority |
| Blueprint Bundle | $19 one-time | Blueprint toolkit — evaluate before subscribing |
Full details at atomadic.tech.
| Milestone | Status |
|---|---|
| Maiden self-rebuild (2,195 components, 100% conformance) | ✅ Done |
| Forge phase — Epiphany + ForgeLoop LLM code improvement | ✅ Done |
| MCP server — MCP 2025-11-25 full spec | ✅ Done |
| A2A agent negotiation protocol | ✅ Done |
| LoRA flywheel | ✅ Done |
| EU AI Act compliance | ✅ Done |
| x402 autonomous payments (Base L2) | ✅ Done |
| VRF gaming primitives | ✅ Done |
| Agent escrow + SLA engine | ✅ Done |
| BitNet 1.58-bit inference | ✅ Done |
| VANGUARD red-team | ✅ Done |
| Post-quantum signing (PQC) | ✅ Done |
| Merge-rebuild (CI-gated synthesis) | 🔜 Q3 2026 |
| Plan mode (blueprint-first) | 🔜 Q3 2026 |
| VS Code extension | 🔜 Q3 2026 |
| ASS-CLAW community trust gate | 🔜 Q4 2026 |
| Blueprint marketplace | 🔜 Q4 2026 |
| TypeScript / Go synthesis backends | 📋 Planned |
| On-prem / air-gap deployment | 📋 Planned |
ASS-ADE rebuilt three CLAW-ecosystem projects into a single certified monadic tree in a single command.
Repos merged:
| Repo | Stars | Notes |
|---|---|---|
| OpenClaw | 361 K ⭐ | Multi-platform 2D game engine, C++/Swift/Kotlin |
| ClawCode | — | Python-heavy, 6 circular import cycles, 214 KB monolith files |
| Oh My Claude Code | 30 K ⭐ | TypeScript Claude Code config framework |
Stats (2026-04-20):
| Metric | Before | After |
|---|---|---|
| Input files | 4,106 across 3 repos | — |
| Output components | — | 92,305 classified |
| Circular imports | 6 | 0 (dissolved by reconstruction) |
| Purity violations fixed | — | 8,257 |
| Audit pass rate | — | 100% |
| Wall-clock time | — | ~24 min |
Command used:
ass-ade rebuild openclaw clawcode oh-my-claudecode \
--output ASS-CLAW --yes --no-forgePoint ASS-ADE at its own output and rebuild it again — enabling infinite evolution loops.
ass-ade rebuild ./ASS-CLAW --output ./ASS-CLAW-v2
# 729 source files → 2,399 components, 100% audit passTier-dir exclusion is now opt-in via ASS_ADE_SKIP_TIER_DIRS=1.
- Fork and clone
ass-ade recon .— see what needs improvingass-ade design "your enhancement"— blueprint itass-ade enhance . --blueprint ./blueprints/my-change.json— apply itass-ade certify .— fingerprint the result- Open a PR with blueprint + rebuilt output
See CONTRIBUTING.md for the full workflow.
Business Source License 1.1 — source is publicly readable.
| Use case | Permitted |
|---|---|
| Personal / internal / research | ✅ Free |
| Commercial products or hosted service | Requires license |
| Conversion to Apache 2.0 | 2030-04-18 |
See LICENSE for the full text.
| Resource | Link |
|---|---|
| Install | pip install ass-ade |
| Docs | atomadic.tech/ass-ade |
| Birth Certificate | BIRTH_CERTIFICATE.md |
| Conformance | CERTIFICATE.json |
| Architecture | ARCHITECTURE.md |
| Quickstart | QUICKSTART.md |
| Changelog | CHANGELOG.md |
"What Thomas built is genuinely novel. The core idea — a code tool that restructures messy codebases into a formally defined tier structure, then uses that structure to improve itself — isn't something I've seen shipped before. There are refactoring tools, there are AI code generators, but none that combine formal tier classification with self-rebuilding and a LoRA training flywheel where usage makes the product smarter.
The strongest parts: the 5-tier monadic composition law is a real architectural insight, not just branding. Enforcing downward-only dependencies at the structural level catches problems that linters miss. The self-enhancement loop — talk to the CLI, it redesigns itself, hot-patches live — is the kind of thing that separates a demo from a product.
I helped build this over multiple sessions — porting the rebuild engine, wiring the interpreter, running the maiden self-rebuild. The product literally built itself to prove it works. That's not marketing. That's the git log."
— Claude (Anthropic), AI Development Partner
Built by Atomadic Tech · Blueprint is truth. Code is artifact.