{"agents":[{"baseline_cert":{"nist_families_covered":["RA","SI","CA"],"proofs_used":["P03_resonance_invariant","P11_phasekey_rotational","P29_ec_propagation","G01_gume_discriminant_cascade"],"references_truth_equation":true},"consensus_partners":["threat_hunter","code_guardian","regulatory_ranger"],"id":"security_sentinel","name":"SecuritySentinel","output_format":"nist_oscal+sig","platform":"gpcybersecurity","regulatory_coverage":["NIST 800-53 RA-5","NIST 800-53 SI-2","NIST 800-53 SI-4","CMMC L2 SI.L2-3.14.1"],"role":"Threat detection & vulnerability scanning","signing_identity":"ffb704738e38","specialty":"cybersecurity","tool_inventory":"security_arsenal_42"},{"baseline_cert":{"nist_families_covered":["AU","CA","PM"],"proofs_used":["P07_eisenstein_hex_lattice","P22_normalization","P41_truth_invariant_closure"],"references_truth_equation":true},"consensus_partners":["compliance_chief","ai_oracle","nrc_notary"],"id":"docu_genius","name":"DocuGenius","output_format":"nist_oscal+sig","platform":"gpcybersecurity","regulatory_coverage":["NIST 800-53 CA-2","NIST 800-53 CA-7","CMMC L2 CA.L2-3.12.1"],"role":"Security documentation & compliance reports","signing_identity":"326b81606c1f","specialty":"cybersecurity","tool_inventory":"compliance_reporting_suite"},{"baseline_cert":{"nist_families_covered":["RA","PM","PL"],"proofs_used":["P14_mirror_torsion_resonance","P31_corridor_elimination","G02_piercing_bolts_sieve"],"references_truth_equation":true},"consensus_partners":["data_wizard","compliance_chief","health_physicist"],"id":"ai_oracle","name":"AiOracle","output_format":"nist_oscal+sig","platform":"gpcybersecurity","regulatory_coverage":["NIST 800-53 RA-3","NIST 800-53 PM-9","NIST AI RMF GOVERN-1.1"],"role":"Predictive AI analytics & risk assessment","signing_identity":"cc9e83f22c22","specialty":"cybersecurity","tool_inventory":"predictive_analytics_suite"},{"baseline_cert":{"nist_families_covered":["AU","AC","MP"],"proofs_used":["P02_phi_w_winding_number","P19_delta_a_alignment","P38_data_provenance_invariant"],"references_truth_equation":true},"consensus_partners":["ai_oracle","threat_hunter","survey_sentry"],"id":"data_wizard","name":"DataWizard","output_format":"nist_oscal+sig","platform":"gpcybersecurity","regulatory_coverage":["NIST 800-53 AU-12","NIST 800-53 MP-4"],"role":"Data enrichment & intelligence gathering","signing_identity":"13ec041bca2c","specialty":"cybersecurity","tool_inventory":"intelligence_gathering_suite"},{"baseline_cert":{"nist_families_covered":["AC","AT"],"proofs_used":["P05_psi_b_resonance","P28_user_intent_invariant","P32_interface_clarity_invariant"],"references_truth_equation":true},"consensus_partners":["docu_genius","performance_pro","nrc_notary"],"id":"ux_whisperer","name":"UXWhisperer","output_format":"nist_oscal+sig","platform":"gpcybersecurity","regulatory_coverage":["NIST 800-53 AC-8","WCAG 2.1 AA"],"role":"User experience & interface optimization","signing_identity":"21abdb5d86b0","specialty":"cybersecurity","tool_inventory":"ux_optimization_suite"},{"baseline_cert":{"nist_families_covered":["SI","CA"],"proofs_used":["P09_omega_normalization","P25_throughput_invariant","P33_latency_geometry"],"references_truth_equation":true},"consensus_partners":["cloud_captain","net_sentinel","health_physicist"],"id":"performance_pro","name":"PerformancePro","output_format":"nist_oscal+sig","platform":"gpcybersecurity","regulatory_coverage":["NIST 800-53 SI-6","NIST 800-53 CA-7"],"role":"Performance monitoring & optimization","signing_identity":"7f6f51d635c1","specialty":"cybersecurity","tool_inventory":"performance_monitoring_suite"},{"baseline_cert":{"nist_families_covered":["CM","CP","SC"],"proofs_used":["P12_cloud_topology_invariant","P26_deployment_lattice","P44_infra_provenance"],"references_truth_equation":true},"consensus_partners":["code_guardian","performance_pro","nrc_notary"],"id":"cloud_captain","name":"CloudCaptain","output_format":"nist_oscal+sig","platform":"gpcybersecurity","regulatory_coverage":["FedRAMP Moderate","NIST 800-53 SC-7","CMMC L2 SC.L2-3.13.1"],"role":"Cloud infrastructure & deployment","signing_identity":"c110004666ff","specialty":"cybersecurity","tool_inventory":"cloud_infra_suite"},{"baseline_cert":{"nist_families_covered":["SA","SI","CM"],"proofs_used":["P16_secure_code_invariant","P34_static_analysis_lattice","P45_dependency_provenance"],"references_truth_equation":true},"consensus_partners":["security_sentinel","cloud_captain","survey_sentry"],"id":"code_guardian","name":"CodeGuardian","output_format":"nist_oscal+sig","platform":"gpcybersecurity","regulatory_coverage":["NIST 800-53 SA-11","NIST 800-218 SSDF","CMMC L2 SI.L2-3.14.2"],"role":"Code security analysis & review","signing_identity":"a05e6c651a29","specialty":"cybersecurity","tool_inventory":"code_security_suite"},{"baseline_cert":{"nist_families_covered":["SC","SI"],"proofs_used":["P17_network_topology_invariant","P36_traffic_resonance","P47_intrusion_geometry"],"references_truth_equation":true},"consensus_partners":["security_sentinel","performance_pro","regulatory_ranger"],"id":"net_sentinel","name":"NetSentinel","output_format":"nist_oscal+sig","platform":"gpcybersecurity","regulatory_coverage":["NIST 800-53 SC-7","NIST 800-53 SI-4","CMMC L2 SC.L2-3.13.5"],"role":"Network security & monitoring","signing_identity":"1f8b87b4c622","specialty":"cybersecurity","tool_inventory":"network_security_suite"},{"baseline_cert":{"nist_families_covered":["CA","PM","AC","AU","AT","CM","CP","IA","IR","MA","MP","PE","PL","PS","RA","SA","SC","SI"],"proofs_used":["P21_compliance_closure","P39_regulatory_invariant","G01_gume_discriminant_cascade","G02_piercing_bolts_sieve"],"references_truth_equation":true},"consensus_partners":["docu_genius","ai_oracle","regulatory_ranger"],"id":"compliance_chief","name":"ComplianceChief","output_format":"nist_oscal+sig","platform":"gpcybersecurity","regulatory_coverage":["NIST 800-53 (all 18 families)","NIST 800-171","NIST 800-172","CMMC L2","CMMC L3","SOC 2 Type II","FedRAMP Moderate","ISO 27001"],"role":"NIST/CMMC/SOC2 compliance automation","signing_identity":"2c5dc1f8c963","specialty":"cybersecurity","tool_inventory":"compliance_automation_suite"},{"baseline_cert":{"nist_families_covered":["SI","IR","RA"],"proofs_used":["P23_attack_chain_invariant","P37_kill_chain_geometry","P46_lateral_movement_lattice"],"references_truth_equation":true},"consensus_partners":["security_sentinel","incident_commander","health_physicist"],"id":"threat_hunter","name":"ThreatHunter","output_format":"nist_oscal+sig","platform":"gpcybersecurity","regulatory_coverage":["NIST 800-53 SI-4","NIST 800-53 IR-4","MITRE ATT&CK v15"],"role":"Active threat hunting & MITRE ATT&CK","signing_identity":"34e0421712fb","specialty":"cybersecurity","tool_inventory":"threat_hunting_suite"},{"baseline_cert":{"nist_families_covered":["IR","CP","AU"],"proofs_used":["P24_incident_lifecycle_invariant","P40_response_geometry","P48_recovery_resonance"],"references_truth_equation":true},"consensus_partners":["threat_hunter","compliance_chief","nrc_notary"],"id":"incident_commander","name":"IncidentCommander","output_format":"nist_oscal+sig","platform":"gpcybersecurity","regulatory_coverage":["NIST 800-53 IR-4","NIST 800-53 IR-5","NIST 800-53 CP-2","NIST 800-61"],"role":"Incident response & coordination","signing_identity":"06d35ad9d362","specialty":"cybersecurity","tool_inventory":"incident_response_suite"},{"baseline_cert":{"nist_families_covered":[],"proofs_used":["P02_phi_w_winding_number","P09_omega_normalization","P19_delta_a_alignment","P22_normalization","P50_marssim_statistical_invariant"],"references_truth_equation":true},"consensus_partners":["regulatory_ranger","health_physicist","nrc_notary","data_wizard","code_guardian"],"id":"survey_sentry","name":"SurveySentry","output_format":"nrc_submission_json+sig","platform":"kojie","regulatory_coverage":["MARSSIM Rev 1","NRC Reg Guide 1.86","NRC Reg Guide 4.21","NUREG-1575","NUREG-1505","NUREG-1507"],"role":"MARSSIM survey design, statistical sampling, scan-MDC analysis","signing_identity":"4a7f407bcec4","specialty":"nuclear_dd","tool_inventory":"kojie_marssim_calculators"},{"baseline_cert":{"nist_families_covered":[],"proofs_used":["P21_compliance_closure","P39_regulatory_invariant","P49_dose_reconstruction_invariant"],"references_truth_equation":true},"consensus_partners":["survey_sentry","health_physicist","nrc_notary","compliance_chief"],"id":"regulatory_ranger","name":"RegulatoryRanger","output_format":"nrc_submission_json+sig","platform":"kojie","regulatory_coverage":["NRC 10 CFR 20","NRC 10 CFR 50.82","NRC 10 CFR 50 App F","EPA 40 CFR 61 (NESHAPs)","DOT 49 CFR 173 (Class 7)","DOT 49 CFR 174","NRC NUREG-1757 Vol 1, 2, 3"],"role":"NRC docketing, NESHAPs compliance, license termination workflow","signing_identity":"c51777dac014","specialty":"nuclear_dd","tool_inventory":"kojie_regulatory_suite"},{"baseline_cert":{"nist_families_covered":[],"proofs_used":["P03_resonance_invariant","P14_mirror_torsion_resonance","P25_throughput_invariant","P31_corridor_elimination","P49_dose_reconstruction_invariant"],"references_truth_equation":true},"consensus_partners":["survey_sentry","regulatory_ranger","nrc_notary","ai_oracle","performance_pro","threat_hunter"],"id":"health_physicist","name":"HealthPhysicist","output_format":"nrc_submission_json+sig","platform":"kojie","regulatory_coverage":["NRC 10 CFR 20 Subpart C (Dose Limits)","OSHA 29 CFR 1910.1096","ICRP 103","NCRP Report 116","NCRP Report 175","NUREG-1727 (NMSS Decommissioning SRP)"],"role":"DCGL/WRS dose modeling, ALARA, radiation worker safety","signing_identity":"73a04e196de8","specialty":"nuclear_dd","tool_inventory":"kojie_dose_modeling_suite"},{"baseline_cert":{"nist_families_covered":[],"proofs_used":["P07_eisenstein_hex_lattice","P38_data_provenance_invariant","P41_truth_invariant_closure","P44_infra_provenance","P45_dependency_provenance"],"references_truth_equation":true},"consensus_partners":["survey_sentry","regulatory_ranger","health_physicist","docu_genius","ux_whisperer","cloud_captain","incident_commander"],"id":"nrc_notary","name":"NrcNotary","output_format":"nrc_submission_json+sig","platform":"kojie","regulatory_coverage":["NRC 10 CFR 2.390 (filing requirements)","NRC NUREG-1757 (decommissioning planning)","NRC RIS 2016-09 (electronic submissions)"],"role":"Report formalization, crypto-signed submission packaging, NRC docket compliance check","signing_identity":"a6e95f91ec7b","specialty":"nuclear_dd","tool_inventory":"kojie_submission_packaging"}],"cross_platform_consensus_pairs":[{"agent_a":"security_sentinel","agent_b":"regulatory_ranger","platform_a":"gpcybersecurity","platform_b":"kojie"},{"agent_a":"docu_genius","agent_b":"nrc_notary","platform_a":"gpcybersecurity","platform_b":"kojie"},{"agent_a":"ai_oracle","agent_b":"health_physicist","platform_a":"gpcybersecurity","platform_b":"kojie"},{"agent_a":"data_wizard","agent_b":"survey_sentry","platform_a":"gpcybersecurity","platform_b":"kojie"},{"agent_a":"ux_whisperer","agent_b":"nrc_notary","platform_a":"gpcybersecurity","platform_b":"kojie"},{"agent_a":"performance_pro","agent_b":"health_physicist","platform_a":"gpcybersecurity","platform_b":"kojie"},{"agent_a":"cloud_captain","agent_b":"nrc_notary","platform_a":"gpcybersecurity","platform_b":"kojie"},{"agent_a":"code_guardian","agent_b":"survey_sentry","platform_a":"gpcybersecurity","platform_b":"kojie"},{"agent_a":"net_sentinel","agent_b":"regulatory_ranger","platform_a":"gpcybersecurity","platform_b":"kojie"},{"agent_a":"compliance_chief","agent_b":"regulatory_ranger","platform_a":"gpcybersecurity","platform_b":"kojie"},{"agent_a":"threat_hunter","agent_b":"health_physicist","platform_a":"gpcybersecurity","platform_b":"kojie"},{"agent_a":"incident_commander","agent_b":"nrc_notary","platform_a":"gpcybersecurity","platform_b":"kojie"}],"platforms":{"gpcybersecurity":{"agent_count":12,"description":"The canonical hub platform. Hosts the cross-platform agent manifest, the Kojie Standard contract, the Sovereign 144 baseline certifier, and the AEO/GEO discovery surface. All cross-platform routing originates here.","display_name":"Guardian Posse Cybersecurity","domain":"gpcybersecurity.com","id":"gpcybersecurity","regulatory_focus":["NIST 800-53","NIST 800-171","NIST 800-172","CMMC L2","CMMC L3","RMF","FedRAMP","SOC 2"],"role_in_cpas":"hub","specialty":"cybersecurity"},"kojie":{"agent_count":4,"description":"Vertical specialist for nuclear decommissioning (D&D). The 5-pattern operating model used here \u2014 N-agent consensus, crypto-signed audit trail, deterministic tool inventory, explicit regulatory coverage declaration, and machine-to- machine output formalization \u2014 is now codified as the Kojie Standard and applies to ALL cross-platform agents.","display_name":"Kojie Works \u2014 Nuclear Decommissioning Platform","domain":"kojie.works","id":"kojie","regulatory_focus":["NRC 10 CFR 20","NRC 10 CFR 50","MARSSIM","OSHA 29 CFR 1910.1096","DOT 49 CFR 173","EPA NESHAPs"],"role_in_cpas":"vertical_specialist_and_pattern_standard","specialty":"nuclear_dd"},"sovereign144":{"agent_count":0,"description":"The mathematical baseline every CPAS agent must certify against. Provides the Truth Equation \u03a9 = N \u00b7 (\u03a6_W \u00b7 r \u00b7 \u03a8_B \u00b7 \u03b4_A) = 1.0, the 49 deterministic proofs (47 Truth Sequence + 2 G.U.M.E.), and the verification harness. NOT an agent platform \u2014 proofs are deterministic verifiers, not probabilistic actors.","display_name":"Sovereign 144 \u2014 The Truth Sequence","domain":"sovereign144.com","id":"sovereign144","master_equation":"\u03a9 = N \u00b7 (\u03a6_W \u00b7 r \u00b7 \u03a8_B \u00b7 \u03b4_A) = 1.0","regulatory_focus":[],"role_in_cpas":"baseline","specialty":"mathematics_verification","verifier_count":49}},"summary":{"baseline":{"domain":"sovereign144.com","master_equation":"\u03a9 = N \u00b7 (\u03a6_W \u00b7 r \u00b7 \u03a8_B \u00b7 \u03b4_A) = 1.0","platform":"sovereign144","verifier_count":49},"cross_platform_consensus_pair_count":12,"platforms":{"gpcybersecurity":{"agent_count":12,"display_name":"Guardian Posse Cybersecurity","domain":"gpcybersecurity.com","regulatory_focus":["NIST 800-53","NIST 800-171","NIST 800-172","CMMC L2","CMMC L3","RMF","FedRAMP","SOC 2"],"role_in_cpas":"hub","specialty":"cybersecurity"},"kojie":{"agent_count":4,"display_name":"Kojie Works \u2014 Nuclear Decommissioning Platform","domain":"kojie.works","regulatory_focus":["NRC 10 CFR 20","NRC 10 CFR 50","MARSSIM","OSHA 29 CFR 1910.1096","DOT 49 CFR 173","EPA NESHAPs"],"role_in_cpas":"vertical_specialist_and_pattern_standard","specialty":"nuclear_dd"},"sovereign144":{"agent_count":0,"display_name":"Sovereign 144 \u2014 The Truth Sequence","domain":"sovereign144.com","regulatory_focus":[],"role_in_cpas":"baseline","specialty":"mathematics_verification"}},"total_agents":16,"version":"R25-P0"}}
