Features

Software that works like hardware.

Author or lift code into PCD, check bounds, emit targets, and carry review evidence forward.

Operating Model

From bounded blueprint to reusable certified software

Author or lift into PCD, check bounds, emit targets, and route the review object forward.

Workflow Readout

Keep the engineering chain inspectable from the first blueprint to the final review step

The product is one bounded operating chain, not unrelated features.

Workflow comparison

Typical workflow

Fragmented software workflow

Code, tests, migration scripts, and audit artifacts often split across tools.

BRIK-64 workflow

Bounded blueprint and review chain

BRIK64 keeps blueprint, checks, emission, and evidence on one path.

System Handles

Three fixed handles explain the product without turning the page into a catalog

Stable counts stay tied to the workflow that follows.

Φc = 1

Formal operations

128

Public PCD story centers on 128 operations.

Compilation targets

10

One blueprint can emit across documented targets.

Proof files

207

Proof claims stay tied to documented evidence.

Compiler chain

CLI and PCD feed a bounded compiler pipeline.

Migration workflow

Lifting and transpilation share one review path.

Registry and enterprise handoff

Platform and registry consume review-ready outputs.

Coverage

What the overview covers

The overview covers compiler chain, migration path, and review posture.

Scope readout

Compilation and closure

Coverage

Bounded blueprints move through normalization, checks, and emission.

Migration and transpilation

Coverage

Existing logic is lifted, reviewed, and moved across targets.

Platform and audit posture

Coverage

Review outputs feed platform and registry without blanket verification claims.

Atomic Catalog

Core and extended monomer matrices

The same interactive matrix used in the home hero is exposed here to inspect bounded core operations and contract-bounded extended operations in one surface.

Certified monomer

ATOMIC BOUNDED OPERATIONS

MC00

ADD

Arithmetic

CORE CERTIFIED

Signature

i64, i64 → i64

Role

Bounded numeric transforms and deterministic arithmetic flow.

Extended monomer

Atomic Contract Operations

MX68

FADD

Float64

EXTENDED CONTRACT

Signature

f64, f64 → f64

Role

Floating-point operations remain explicit and contract-bounded in the review chain.

[01] COMPILATION

One compiler chain from PCD to 10 targets

The compilation story should explain how one bounded blueprint moves through parsing, normalization, and target emission without turning the page into a catalog of backends.

Explicit target set

Rust
JavaScript
TypeScript
Python
C
C++
Go
COBOL
PHP
Java

Engineering Narrative

Workflow focus

Normalize a bounded PCD blueprint once, then emit it across supported targets through the same compiler chain.

Integration point

CLI and direct PCD authoring enter here; platform and registry consume the emitted outputs and their review state.

Technical buyer

Compiler engineer, platform lead, principal engineer

Evidence outputs

parser independence · canonical pipeline form · byte-identical self-hosting generations · target emission from one blueprint

Compiler Chain

Normalize once, emit many times

The compiler story is strongest when it stays focused on normalization, target emission, and build-chain consistency instead of broad claims about uniqueness.

Φc = 1

Entry format

PCD

The bounded blueprint is the single entry point into the compilation chain.

Normalization

Canonical pipeline

The compiler stabilizes computation into one intermediate form before target emission.

Emission set

10 targets

The normalized blueprint remains the anchor while backends emit the supported target outputs.

Parser independence

The parser is documented as hand-built and dependency-light so the compiler chain stays inspectable from the first step.

Canonical pipeline form

Normalization makes the emitted targets downstream of one stable representation rather than a collection of bespoke transformations.

Self-hosting consistency

The self-compilation fixpoint is used here as evidence that documented generations converge to the same build output.

Compilation Readout

What the compiler chain exposes for review

The useful public story is the reviewable chain around the blueprint, not a contest of extreme wording.

Compiler scope

Parser and normalization

Readout

The overview can state that PCD enters a bounded parser and canonical pipeline without implying that every surrounding tool becomes formally proven.

Fixpoint evidence

Readout

The repo-backed fixpoint supports consistency of the documented build chain through byte-identical generations and a stable hash.

Target emission

Readout

The same normalized computation is the source of the emitted outputs, which keeps the target story anchored to one blueprint.

Claim boundary

The fixpoint supports consistency of the documented compiler build chain. It does not prove every property of every surrounding toolchain or deployment environment.

[02] VERIFICATION

Closure and verification boundaries

Verification copy should help the reader distinguish what the circuit model closes over from what remains outside the public claim boundary.

Engineering Narrative

Workflow focus

Check bounded inputs, closed paths, and review metadata before the blueprint is emitted or trusted downstream.

Integration point

Compilation emits the readout, badges and hashes carry it forward, and enterprise review consumes it later in the chain.

Technical buyer

Principal engineer, verification lead, safety-minded reviewer

Evidence outputs

closure state · domain completeness review · certification hash · review badge posture

Verification Boundary

Keep sampled testing and bounded verification in their proper lanes

Compare review models directly and make the public claim boundary legible in the same block.

Verification comparison

Sampled review

Tests explore cases after code exists

Conventional testing lowers uncertainty for the cases exercised, but it does not by itself make the modeled boundary explicit or complete.

Bounded review

Closure is checked against the declared circuit

BRIK-64 makes the declared circuit, its bounded domains, and its review consequences visible before emitted code is carried into later workflows.

Verification Outputs

The review output should stay concrete

Verification is useful here when the reader can see what is checked, what metadata remains, and where the guarantee stops.

Review scope

Closure state

Output

The circuit model is checked for complete paths and bounded behavior before emission, and that state becomes part of the readout.

Domain review

Output

Declared ranges and conditions are part of the public story because they define what the circuit is actually allowed to do.

Certification hash

Output

Hashes and badges are useful here as review metadata carried with the blueprint, not as a replacement for the claim boundary itself.

Claim boundary

The guarantees apply to the formal circuit representation and its declared domains. They do not extend to every uncontrolled runtime or environment outside that model.

[03] DOMAIN CONSTRAINTS

Bounded domains before runtime

This section should make domain declaration the practical differentiator: teams state allowed ranges and reject invalid states before runtime instead of patching around them later.

Engineering Narrative

Workflow focus

Declare numeric and semantic ranges in the blueprint, propagate them through the circuit, and reject invalid states before emission.

Integration point

PCD carries the declared ranges, the compiler propagates them, and emitted targets inherit the same bounded model.

Technical buyer

Principal engineer, staff engineer, domain owner

Evidence outputs

bounded division · bounded arithmetic · bounded floating behavior · domain-encoded business or physical rules

Declared Domains

Move critical ranges into the blueprint before code is emitted

The useful story is not that every failure vanishes everywhere; it is that declared domains become part of the compile-time model.

Φc = 1

Divisor range

division boundary

A divisor domain can exclude zero structurally so the blueprint states what inputs are valid before emission.

Amounts and probabilities

business rule

Amount, rate, and probability ranges stay readable in the blueprint instead of hiding in defensive runtime checks.

Physical or engineering ranges

declared model

Temperature, speed, and other domain values can be encoded directly in the model so violations fail before deployment.

Bounded domain example

PCD range declaration

Φc = 1
domain divisor : Range[1, 100]
domain amount  : Range[0.01, 1000000.0]
domain ratio   : Range[0.0, 1.0]

input total : Float64[0.01 .. 1000000.0]
input fee   : Float64[0.0 .. 100000.0]
input parts : Int32[1 .. 100]

output net_per_part : Float64 =
  (total - fee) / parts
The important product claim is that the allowed domain is visible in the blueprint before target code exists.

Declared Outcomes

What declared domains make easier to inspect

The surrounding evidence should talk about bounded computation, not about total elimination of every failure mode everywhere.

Domain readout

Bounded division

Effect

The reader should understand why division depends on declared non-zero inputs rather than on hidden runtime hope.

Bounded arithmetic

Effect

Range propagation keeps arithmetic consequences reviewable at the blueprint level before the target language syntax appears.

Domain-encoded rules

Effect

Business, financial, scientific, or physical limits can live inside the model so violations become compile-time failures when the circuit is declared correctly.

Claim boundary

These guarantees exist when the circuit declares and preserves the relevant domains. They do not imply that unmanaged external code loses all numeric failure modes.

[04] LIFTING

Lift existing logic into a reviewable blueprint

Lifting should read as a migration and review workflow: isolate computational logic, mark contract edges, and preserve a review object before rewrite or replatform work starts.

Engineering Narrative

Workflow focus

Inspect source logic, isolate the computational core, emit a blueprint with contract annotations, and review what was preserved before modernization.

Integration point

The Lifter feeds PCD and the compiler chain, then platform and enterprise workflows consume the resulting review object.

Technical buyer

Migration lead, platform lead, principal engineer

Evidence outputs

source language coverage · purity split · bundle decompilation support · incremental lifting

Lifting Workflow

Review the existing logic before modernization changes it

The lifting story is strongest when it behaves like a four-step review flow instead of a general promise about every file ever written.

Migration loop
01

Inspect the source

Point the Lifter at a source function or bundle and start from the logic that actually needs review.

02

Isolate the computational core

Separate bounded computation from database, network, filesystem, and other contract edges.

03

Emit blueprint and annotations

Generate PCD for the preserved computation and keep contract annotations visible for what remains outside full certification.

04

Review before modernization

Use the emitted blueprint as the reference object before transpilation, refactoring, or platform changes.

Lifting is valuable here because it produces a review object before later migration work obscures the original behavior.

Lifting Readout

What the repo-backed lifting story can support

This block should stay tied to documented coverage, explicit contract boundaries, and concrete migration steps.

Coverage scope

Source coverage

Evidence

The public story can state 10 documented source languages because the repo uses that number consistently in the lifting narrative.

Project-backed liftability

Evidence

The documented 211/211 result belongs here as evidence from repo-backed projects, not as a universal guarantee for all codebases.

Contract visibility

Evidence

When full certification is not possible, the useful public promise is explicit contract-bounded output rather than hidden loss of context.

Claim boundary

Documented projects have reached 211/211 file liftability in the repo evidence. The section does not generalize that result into a universal guarantee, and emitted blueprints stay explicitly contract-bounded when full certification is not possible.

[05] TRANSPILATION

Move one blueprint across targets

Transpilation should read as a normalized blueprint workflow rather than a sweeping promise that all host behavior remains universally equivalent.

Engineering Narrative

Workflow focus

Lift or author the logic, normalize it once in PCD, emit target-specific code, and review preserved computation at the blueprint level.

Integration point

Lifting or direct PCD authoring feeds this stage; emitted targets and preserved review context then move into platform or enterprise workflows.

Technical buyer

Migration lead, architecture owner, platform lead

Evidence outputs

source/target separation · PCD hub role · equivalence review posture · legacy modernization path

Normalization First

Use the blueprint as the migration anchor instead of trusting direct rewrites

The migration story should compare reviewable normalization against raw language-to-language transformation.

Migration comparison

Direct rewrite

Syntax-first migration loses the review anchor

When a system moves directly from one language to another, review often follows syntax and tooling quirks rather than the preserved computation itself.

PCD hub

Normalize once, then emit with the blueprint still visible

BRIK-64 uses PCD as the review anchor so teams can inspect what was preserved before target-specific idioms are emitted.

Emission Workflow

The target move should stay legible in four steps

The public story needs a fixed migration sequence, not sweeping equivalence slogans.

Emission path
01

Lift or author the logic

Start from existing source or from direct PCD authoring, but keep the bounded computation explicit from the first step.

02

Normalize once

Use PCD as the stable intermediate form that the rest of the review workflow can inspect.

03

Emit target code

Target-specific code is emitted from the normalized blueprint rather than from a chain of ad hoc rewrites.

04

Review preserved behavior

The blueprint remains the review anchor for what was preserved across the move.

Claim boundary

Equivalence language in this block stays tied to the extracted and normalized circuit. It does not extend to unmanaged I/O, host APIs, or external side effects.

[06] PLATFORM

Publish, compose, and review reusable circuits

The platform block should explain how certified outputs move into registry, tooling, and review workflows without duplicating the full platform page or overstating availability.

Engineering Narrative

Workflow focus

Publish reviewable circuits, discover reusable blueprints, and keep proof state visible as the workflow moves into registry and tooling.

Integration point

Compilation and lifting feed this layer; registry, IDE, API, and enterprise review workflows consume its outputs.

Technical buyer

Platform lead, tooling owner, engineering manager

Evidence outputs

registry posture · GitHub App workflow · IDE/LSP surface · API and MCP access

Platform Workflow

Carry proof state into registry and tooling

The platform story should focus on publish, compose, and review workflows rather than on a flat inventory of badges and integrations.

Φc = 1

Registry posture

Public + private

The platform layer combines reusable circuit publishing with controlled visibility and review state.

Operator access

IDE + API + MCP

Human and agent workflows reach the same reviewable blueprint through documented access surfaces.

Workflow handoff

publish → compose → review

The important story is how proof state survives the handoff into later workflows.

Registry publication

Publish review-ready circuits with metadata that keeps the blueprint legible instead of turning it into a generic package entry.

Composition under review

Compose reusable logic while keeping the review object and its proof state visible to the operator.

Tooling access

IDE, API, and MCP access points all matter here because they carry the same workflow state instead of inventing parallel stories.

Access Points

What the platform block should point to

This section should guide the user into the real product surfaces that already exist in the site and repo.

Access readout

GitHub and certification workflow

Route

The page can reference GitHub-triggered review flows where repo evidence already supports them, but it should avoid turning that into an exclusivity claim.

IDE and LSP tooling

Route

Editor support belongs here as a way to keep proof state visible where engineers work, not as an isolated bullet list.

API and MCP access

Route

Programmatic access matters because the same reviewable blueprint can move through human and agent workflows without leaving the bounded chain.

Claim boundary

This block describes workflow surfaces and integration points. It does not imply that every registry package is already public or that roadmap items are live unless separately verified.

[07] AI NATIVE

Use AI as a bounded producer, not as the proof source

The AI block should explain the external verification loop around generated logic rather than turning the page into model hype or trust-by-association.

Engineering Narrative

Workflow focus

Treat model output as a candidate blueprint, constrain it with policy and compiler checks, then use diagnostics to drive the next repair loop.

Integration point

Agent workflows feed candidate logic into PCD and the compiler; platform and registry surfaces consume the bounded result and its diagnostics.

Technical buyer

AI platform lead, principal engineer, agent workflow owner

Evidence outputs

agent skills · MCP tools · machine-readable output · policy circuits · structured diagnostics

External Verification

Keep trust outside the model

The AI story should compare model-first confidence against an external verification loop that stays anchored to the blueprint.

AI comparison

Model-first

Generated output without a bounded review loop

When teams trust the model itself as the source of correctness, review state and failure boundaries stay ambiguous.

Bounded loop

Candidate logic enters an external check and repair workflow

BRIK-64 uses policy circuits, compiler checks, and structured diagnostics so the review object remains outside the model.

Agent Workflow

What the AI block should actually cover

The useful AI story is the bounded workflow around the model, not the claim that the model becomes trustworthy on its own.

Agent scope

Agent skills and tool access

Readout

Agent workflows belong here because they show how models enter the bounded product chain through documented skills and tool calls.

Policy circuits

Readout

Policy circuits constrain actions and candidate logic outside the prompt, which is the important integration point for public messaging.

Structured diagnostics

Readout

Diagnostics matter because they make the repair loop operator-readable instead of relying on vague model confidence.

Claim boundary

BRIK-64 constrains and reviews agent-produced logic. It does not make the underlying model trustworthy by default.

[08] ENTERPRISE

Carry verified artifacts into audit and operating review

Enterprise copy should explain identity, audit trails, CI gates, deployment posture, and support without drifting into unsupported certification promises.

Engineering Narrative

Workflow focus

Surround the bounded blueprint with identity, audit, CI, deployment, and support workflows so teams can review how it moved and where it was checked.

Integration point

Platform workflows feed this layer, and enterprise review consumes the resulting blueprint, trace, and status metadata.

Technical buyer

Platform lead, compliance engineering, enterprise architect

Evidence outputs

identity integration · tamper-evident compilation trail · CI status gating · deployment boundary · support posture

Enterprise Review

Bring verified blueprints into operating and audit workflows

Enterprise value in this block should be framed as review posture around the blueprint, not as automatic certification language.

Φc = 1

Identity

SSO / SAML / OIDC + SCIM

Identity integration matters because access to the review object has to fit existing organizational controls.

Audit trail

hash-linked events

Compilation and certification records are useful here when they remain inspectable and attributable.

Deployment posture

on-prem capable

Deployment boundaries belong in the enterprise story as operating posture rather than as a sweeping promise.

Identity and access

SSO, SAML, OIDC, and SCIM sit around the blueprint so review access stays within existing organizational identity controls.

Audit and CI posture

Compilation records and CI status checks matter here because they show how a bounded blueprint moved through review.

Deployment and support

On-prem posture and human support belong in the operating story, but they are not substitutes for a formal claim boundary.

Enterprise Scope

How enterprise posture should be described

The supporting block should talk about standards contexts, audit outputs, and deployment boundaries without upgrading them into certification claims.

Audit posture

Standards context

Context

BRIK-64 supports review and audit workflows with evidence artifacts that teams may map into standards contexts such as SOC2, PCI-DSS, HIPAA, ISO 27001, FDA 21 CFR Part 11, and NIST 800-53.

CI and approval flow

Context

Required status checks and explicit review steps belong here because they make organizational approval paths readable around the blueprint.

Support boundary

Context

Human support and deployment posture help teams operate the system, but they do not replace the need to qualify what the system itself does and does not certify.

Claim boundary

BRIK-64 supports review and audit workflows. It does not by itself certify an organization against SOC2, PCI-DSS, HIPAA, ISO 27001, FDA 21 CFR Part 11, or NIST 800-53.

Start locally, then move into platform workflows

Install the CLI to begin from a bounded local workflow, then move the resulting blueprint into platform and registry review paths when the computation is ready to travel.