Index
Mobius Cycle Protocol (MCP)¶
Paper: The Mobius Cycle Protocol: Operationally-Enforced Recursive Intelligence
Status: Ready for IEEE TSE / ACM TOSEM submission
Key Result: 99.7% compliance in 46 production cycles
Abstract¶
Current AI governance relies on voluntary guidelines and post-hoc audits, providing insufficient assurance of system integrity. We present the Mobius Cycle Protocol (MCP), the first operationally-enforced framework for recursive intelligence that makes AI safety systematically enforceable. MCP implements a four-phase validation pipeline with multi-LLM consensus and cryptographic attestation. Production deployment demonstrates 99.7% compliance over 46 cycles with zero critical failures.
Files¶
| File | Description |
|---|---|
mcp-paper.tex | Full LaTeX source |
mcp-paper.pdf | Compiled paper |
figures/ | Architecture diagrams |
appendix/ | Implementation details |
bibliography.bib | References |
Key Contributions¶
1. Four-Phase Validation Pipeline¶
Phase 1: Pre-Commit Check
├── Code quality (lint)
├── Type safety
├── Test coverage
└── Documentation
Phase 2: Integrity Scoring
├── GI = 0.25M + 0.20H + 0.30I + 0.25E
├── Memory (test coverage, docs)
├── Human (review, audit)
├── Integrity (security, patterns)
└── Ethics (charter, virtues)
Phase 3: Multi-LLM Consensus
├── ATLAS evaluation
├── AUREA evaluation
├── Consensus verification
└── Disagreement resolution
Phase 4: Attestation
├── Cryptographic hash
├── HMAC signature
├── Ledger storage
└── Public transparency
2. Governance Integrity Score¶
GI = 0.25M + 0.20H + 0.30I + 0.25E
Components:
- M (Memory): Test coverage × doc quality
- H (Human): Review completion × audit compliance
- I (Integrity): Security score × pattern compliance
- E (Ethics): Charter alignment × virtue coverage
Threshold: GI ≥ 0.95 required
3. Multi-Sentinel Architecture¶
┌─────────────────────────────────────┐
│ MCP CONSENSUS │
├─────────────────────────────────────┤
│ │
│ ATLAS ──┬──► Consensus ◄──┬── AUREA
│ (Claude)│ Engine │(OpenAI)
│ │ │
│ ▼ ▼
│ Attestation ◄────────► Ledger
│ │
└─────────────────────────────────────┘
Consensus Rule:
PASS if: ATLAS ≥ 0.95 AND AUREA ≥ 0.95
FAIL if: Either < 0.95 OR |diff| > 0.05
4. Cryptographic Attestation¶
attestation = {
cycle_id: "C-148",
timestamp: "2025-11-28T23:45:00Z",
gi_score: 0.97,
consensus: {
atlas: 0.97,
aurea: 0.96,
agreement: true
},
hash: SHA256(data),
hmac: HMAC-SHA256(hash, key)
}
Production Results¶
46-Cycle Performance¶
| Metric | Value | Target |
|---|---|---|
| Compliance rate | 99.7% | ≥99% |
| Mean GI score | 0.956 | ≥0.95 |
| Consensus agreement | 100% | 100% |
| Critical failures | 0 | 0 |
| Mean cycle time | 18.4 hrs | <24 hrs |
Component Breakdown¶
| Component | Mean | Std |
|---|---|---|
| Memory (M) | 0.948 | 0.021 |
| Human (H) | 0.941 | 0.024 |
| Integrity (I) | 0.972 | 0.014 |
| Ethics (E) | 0.956 | 0.018 |
Trend Analysis¶
GI Score Evolution (C-103 to C-148):
Start: 0.94
End: 0.97
Trend: +0.03 (+3.2%)
Interpretation: System integrity improving over time
Implementation¶
GitHub Actions Integration¶
name: MCP Compliance Gate
on: [push, pull_request]
jobs:
mcp-check:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- name: Calculate GI Score
id: gi
run: npm run integrity:check
- name: Multi-LLM Consensus
run: npm run consensus:validate
- name: Verify Threshold
run: |
if [ "${{ steps.gi.outputs.score }}" < "0.95" ]; then
exit 1
fi
- name: Attest to Ledger
if: github.ref == 'refs/heads/main'
run: npm run attest:cycle
Attestation Schema¶
interface MCPAttestation {
cycle_id: string;
timestamp: string;
gi_score: number;
components: {
memory: number;
human: number;
integrity: number;
ethics: number;
};
consensus: {
atlas_score: number;
aurea_score: number;
agreement: boolean;
};
attestation_hash: string;
hmac_signature: string;
}
Security Analysis¶
Threat Model¶
| Threat | Mitigation |
|---|---|
| Single sentinel compromise | Multi-LLM consensus |
| Attestation forgery | HMAC signatures |
| History manipulation | Immutable ledger |
| Score gaming | Cross-validation |
| Collusion | Independent sentinels |
Formal Properties¶
Property 1: Non-Repudiation
Property 2: Tamper Evidence
Property 3: Consensus Integrity
Comparison¶
vs. Existing Approaches¶
| Approach | Enforcement | Consensus | Attestation |
|---|---|---|---|
| ISO 27001 | Audit-based | None | Manual |
| SOC 2 | Periodic | None | Reports |
| NIST AI RMF | Voluntary | None | None |
| MCP | Automated | Multi-LLM | Cryptographic |
Key Differentiators¶
- Preventive — Blocks non-compliant deployments
- Automated — No manual audit delays
- Consensus-based — Multiple AI validators
- Continuous — Real-time monitoring
- Immutable — Cryptographic record
Citation¶
@article{mobius2025mcp,
title={The Mobius Cycle Protocol: Operationally-Enforced Recursive Intelligence},
author={Judan, Michael},
journal={Submitted to IEEE TSE},
year={2025},
note={Available at: github.com/kaizencycle/Mobius-Substrate}
}
Reproducibility¶
Requirements¶
- Node.js 18+
- PostgreSQL 14+
- OpenAI API key
- Anthropic API key
Quick Start¶
git clone https://github.com/kaizencycle/Mobius-Substrate
cd Mobius-Substrate
npm install
npm run integrity:check
npm run consensus:validate
Related Work¶
- NIST AI Risk Management Framework
- ISO/IEC 42001 AI Management Systems
- EU AI Act requirements
- IEEE standards for AI governance
"MCP makes AI safety enforceable, not aspirational."