Skip to content

Index

Mobius Cycle Protocol (MCP)

Paper: The Mobius Cycle Protocol: Operationally-Enforced Recursive Intelligence
Status: Ready for IEEE TSE / ACM TOSEM submission
Key Result: 99.7% compliance in 46 production cycles


Abstract

Current AI governance relies on voluntary guidelines and post-hoc audits, providing insufficient assurance of system integrity. We present the Mobius Cycle Protocol (MCP), the first operationally-enforced framework for recursive intelligence that makes AI safety systematically enforceable. MCP implements a four-phase validation pipeline with multi-LLM consensus and cryptographic attestation. Production deployment demonstrates 99.7% compliance over 46 cycles with zero critical failures.


Files

File Description
mcp-paper.tex Full LaTeX source
mcp-paper.pdf Compiled paper
figures/ Architecture diagrams
appendix/ Implementation details
bibliography.bib References

Key Contributions

1. Four-Phase Validation Pipeline

Phase 1: Pre-Commit Check
├── Code quality (lint)
├── Type safety
├── Test coverage
└── Documentation

Phase 2: Integrity Scoring
├── GI = 0.25M + 0.20H + 0.30I + 0.25E
├── Memory (test coverage, docs)
├── Human (review, audit)
├── Integrity (security, patterns)
└── Ethics (charter, virtues)

Phase 3: Multi-LLM Consensus
├── ATLAS evaluation
├── AUREA evaluation
├── Consensus verification
└── Disagreement resolution

Phase 4: Attestation
├── Cryptographic hash
├── HMAC signature
├── Ledger storage
└── Public transparency

2. Governance Integrity Score

GI = 0.25M + 0.20H + 0.30I + 0.25E

Components:
- M (Memory): Test coverage × doc quality
- H (Human): Review completion × audit compliance  
- I (Integrity): Security score × pattern compliance
- E (Ethics): Charter alignment × virtue coverage

Threshold: GI ≥ 0.95 required

3. Multi-Sentinel Architecture

┌─────────────────────────────────────┐
│           MCP CONSENSUS             │
├─────────────────────────────────────┤
│                                     │
│   ATLAS ──┬──► Consensus ◄──┬── AUREA
│   (Claude)│     Engine     │(OpenAI)
│           │                │
│           ▼                ▼
│    Attestation ◄────────► Ledger
│                                     │
└─────────────────────────────────────┘

Consensus Rule:
  PASS if: ATLAS ≥ 0.95 AND AUREA ≥ 0.95
  FAIL if: Either < 0.95 OR |diff| > 0.05

4. Cryptographic Attestation

attestation = {
  cycle_id: "C-148",
  timestamp: "2025-11-28T23:45:00Z",
  gi_score: 0.97,
  consensus: {
    atlas: 0.97,
    aurea: 0.96,
    agreement: true
  },
  hash: SHA256(data),
  hmac: HMAC-SHA256(hash, key)
}

Production Results

46-Cycle Performance

Metric Value Target
Compliance rate 99.7% ≥99%
Mean GI score 0.956 ≥0.95
Consensus agreement 100% 100%
Critical failures 0 0
Mean cycle time 18.4 hrs <24 hrs

Component Breakdown

Component Mean Std
Memory (M) 0.948 0.021
Human (H) 0.941 0.024
Integrity (I) 0.972 0.014
Ethics (E) 0.956 0.018

Trend Analysis

GI Score Evolution (C-103 to C-148):
  Start: 0.94
  End: 0.97
  Trend: +0.03 (+3.2%)

  Interpretation: System integrity improving over time

Implementation

GitHub Actions Integration

name: MCP Compliance Gate
on: [push, pull_request]

jobs:
  mcp-check:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4

      - name: Calculate GI Score
        id: gi
        run: npm run integrity:check

      - name: Multi-LLM Consensus
        run: npm run consensus:validate

      - name: Verify Threshold
        run: |
          if [ "${{ steps.gi.outputs.score }}" < "0.95" ]; then
            exit 1
          fi

      - name: Attest to Ledger
        if: github.ref == 'refs/heads/main'
        run: npm run attest:cycle

Attestation Schema

interface MCPAttestation {
  cycle_id: string;
  timestamp: string;
  gi_score: number;
  components: {
    memory: number;
    human: number;
    integrity: number;
    ethics: number;
  };
  consensus: {
    atlas_score: number;
    aurea_score: number;
    agreement: boolean;
  };
  attestation_hash: string;
  hmac_signature: string;
}

Security Analysis

Threat Model

Threat Mitigation
Single sentinel compromise Multi-LLM consensus
Attestation forgery HMAC signatures
History manipulation Immutable ledger
Score gaming Cross-validation
Collusion Independent sentinels

Formal Properties

Property 1: Non-Repudiation

∀ attestation a, ∃ signature σ: Verify(σ, a, key) = true

Property 2: Tamper Evidence

Modify(ledger) → Hash(ledger) ≠ Expected

Property 3: Consensus Integrity

Deployed ⟹ ATLAS ≥ 0.95 ∧ AUREA ≥ 0.95


Comparison

vs. Existing Approaches

Approach Enforcement Consensus Attestation
ISO 27001 Audit-based None Manual
SOC 2 Periodic None Reports
NIST AI RMF Voluntary None None
MCP Automated Multi-LLM Cryptographic

Key Differentiators

  1. Preventive — Blocks non-compliant deployments
  2. Automated — No manual audit delays
  3. Consensus-based — Multiple AI validators
  4. Continuous — Real-time monitoring
  5. Immutable — Cryptographic record

Citation

@article{mobius2025mcp,
  title={The Mobius Cycle Protocol: Operationally-Enforced Recursive Intelligence},
  author={Judan, Michael},
  journal={Submitted to IEEE TSE},
  year={2025},
  note={Available at: github.com/kaizencycle/Mobius-Substrate}
}

Reproducibility

Requirements

  • Node.js 18+
  • PostgreSQL 14+
  • OpenAI API key
  • Anthropic API key

Quick Start

git clone https://github.com/kaizencycle/Mobius-Substrate
cd Mobius-Substrate
npm install
npm run integrity:check
npm run consensus:validate

  • NIST AI Risk Management Framework
  • ISO/IEC 42001 AI Management Systems
  • EU AI Act requirements
  • IEEE standards for AI governance

"MCP makes AI safety enforceable, not aspirational."