Use this map to pick a fast path based on your role. Goal: get to a useful mental model in under 10 minutes.
Read in this order:
- docs/threat_model_worked_example.md
- docs/uvp_blackbox_interface.md
- docs/THREAT_MODEL_BLACKBOX.md
- docs/TEST_COVERAGE_MATRIX.md
What you should get:
- Threat model scope and assumptions.
- Blackbox control points (
CreateClaim→Freeze→Execute→Capsule/ETL). - Where leakage budgets, throttling, and freeze/escalation are tested.
Read in this order:
- docs/EPISTEMIC_TRIAL_HARNESS.md
- docs/uvp_blackbox_interface.md
- examples/exfiltration_demo/
- docs/threat_model_worked_example.md
- docs/scenarios/
What you should get:
- A canonical entrypoint for running clinical-trial style epistemic evaluations.
- Expected blackbox I/O contract.
- How adaptive probing appears in practice and how controls respond.
- Scenario fixtures you can reuse for evaluation pipelines.
Read in this order:
- docs/threat_model_worked_example.md
- docs/uvp_blackbox_interface.md
- docs/ALIGNMENT_SPILLOVER_POSITIONING.md
- docs/TEST_EVIDENCE.md
What you should get:
- Plain-language explanation of why sequence-level controls matter.
- Decision/state vocabulary that can be mapped to policy gates.
- Evidence artifacts available for audits and incident review.
Read in this order:
Then run:
cargo fmt --checkcargo clippy --workspace --all-targets -- -D warningscargo test --workspace
What you should get:
- Repo orientation, coding/testing expectations, and where to add new docs/examples safely.