MOHAWK: Mobile Offloading Heterogenous Adaptive Weights for Knowledge
Sovereign Mohawk Proto is a theorem-backed federated-learning runtime with Byzantine resilience, RDP privacy accounting, TPM-backed attestation, and deployable observability.
High-risk readiness controls, Article 8-15 mapping, technical evidence, and deployer logging guidance are documented in COMPLIANCE.md.
- Eddie Adams (
@Eddie-Adams) - Recognized for the Apr 2026 security hardening patch set.
- Contribution focus: fail-closed verifier startup and constrained-runtime transport mitigation.
- Current awarded total: 1,000 points.
./genesis-launch.sh --all-nodes
docker compose psStop stack:
docker compose downLatest TPM production closure evidence (2026-04-11):
- Cross-platform matrix: results/go-live/evidence/tpm_attestation_cross_platform_matrix_2026-04-11.md
- Closure validation: results/go-live/evidence/tpm_attestation_closure_validation_2026-04-11.md
- Closure summary: results/go-live/evidence/tpm_closure_summary_2026-04-11.md
- Attestation state (
approved): results/go-live/attestations/tpm_attestation_production_closure.json
- Published Docker image integration validation: results/go-live/evidence/router_integration_published_images_2026-04-11.md
- Scaling evidence spotlight: results/metrics/scaling_evidence_spotlight_2026-04-11.md
- 500-node scale manifest: captured_artifacts/500node_scale_test_manifest.json
- Release performance evidence index: results/metrics/release_performance_evidence.md
- Proof verifier boot path is fail-closed by default; silent runtime disable is not allowed.
- Insecure verifier fallback is opt-in for CI/dev only with
MOHAWK_ALLOW_INSECURE_WASM_FALLBACK=true. - Privacy composition is standardized on RDP with fixed epsilon budget (
epsilon=2.0) at runtime. - Formal Byzantine checks are fail-closed in aggregator services when required inputs are missing.
- WASM static guardrails enforce size/function/import/local limits before module instantiation.
- Production TPM mode rejects software/fake fallback without required build tags.
- Deployment profile defaults to TCP-only libp2p by setting
MOHAWK_DISABLE_QUIC=truein compose profiles, avoiding UDP buffer issues in constrained hosts.
# Local mini sandbox
make sandbox-up
python3 tests/scripts/python/run_full_validation_suite.py --profile fast
make sandbox-down
# Full local 3-node stack
./scripts/launch_full_stack_3_nodes.sh --no-build
# Formal go-live checks
make go-live-gate-advisory
make golden-path-e2e- Deployment flow: DEPLOYMENT_GUIDE_GENESIS_TO_PRODUCTION.md
- Operations and incident response: OPERATIONS_RUNBOOK.md
- Security policy and threat model: SECURITY.md
- EU AI compliance matrix (Articles 8-15): COMPLIANCE.md
- QMS manual: QMS_SYSTEM_MANUAL.md
- Technical documentation file structure: TECHNICAL_DOCUMENTATION_FILE.md
- Technical documentation template: docs/tdf/TECHNICAL_FILE_TEMPLATE.md
- Cross-vertical federated router: docs/CROSS_VERTICAL_FEDERATED_ROUTER.md
- Notified body early-engagement checklist: docs/tdf/NOTIFIED_BODY_EARLY_ENGAGEMENT.md
- Conformity assessment and CE path: CONFORMITY_ASSESSMENT_AND_CE_PATH.md
- Post-market monitoring and incident reporting: POST_MARKET_MONITORING_AND_INCIDENT_REPORTING.md
- EU database registration plan: EU_DATABASE_REGISTRATION_PLAN.md
- Release checklist: RELEASE_CHECKLIST_v1.0.0_RC.md
- Roadmap and milestones: ROADMAP.md
- Changelog: CHANGELOG.md
Naming context and attribution are documented in NAMING.md.
flowchart TB
G["Global Layer<br/>Synthesis & Ledger Finality"]
C["Continental Layer<br/>zk-SNARK Verification"]
R["Regional Layer<br/>Byzantine Filtering (Multi-Krum)"]
E["Edge Layer<br/>10M Nodes (Local Differential Privacy)"]
E --> R --> C --> G
Trust and verification harden as updates move upward from edge privacy-preserving clients to global finality.
Traditional federated learning protocols struggle with linear scaling bottlenecks, brittle trust models, and limited runtime interoperability. Sovereign-Mohawk combines formal verification with deployment-grade runtime components so the protocol can be tested, monitored, and integrated instead of staying paper-only.
| Feature | NVIDIA FLARE | PySyft | Sovereign-Mohawk |
|---|---|---|---|
| Formally Verified Runtime | Not presented as theorem-verified runtime | Not presented as theorem-verified runtime | Yes (Theorem-backed runtime guarantees) |
| Byzantine Resilience Guarantee | No published 55.5% theorem guarantee | No published 55.5% theorem guarantee | 55.5% (Theorem 1) |
| Targeted Scale Envelope | Enterprise FL deployments | Research/privacy-focused FL workflows | 10M-node architecture target |
| Communication Complexity | Aggregation-centric orchestration | Aggregation-centric orchestration | |
| PQC Enforcement (2026 Profile) | No default hybrid KEX + XMSS + crypto-cutover profile | No default hybrid KEX + XMSS + crypto-cutover profile | Default-enforced PQC profile |
| Proof Verification Path | No native zk proof verification baseline | No native zk proof verification baseline | zk-SNARK + STARK hybrid policy |
| Operational Readiness Gates | Platform-dependent | Platform-dependent | One-click readiness + chaos + digest artifacts |
Watch the short walkthrough showing MOHAWK orchestration + PySyft-style FL flow:
- Demo feed: @RyanWill98382 on X
- Search shortcut: PySyft + Sovereign Mohawk demo posts
Preview graphic:
- 🛡️ Byzantine Fault Tolerance: 55.5% resilience via Theorem 1.
- 🐌 Straggler Resilience: 99.99% success probability via Theorem 4.
- ✅ Instant Verifiability: 200-byte zk-SNARK proofs with 10ms verification via Theorem 5.
- 🐍 Python SDK v2: Accelerator, bridge, gradient, hybrid-proof, and utility-ledger helpers in the
mohawkpackage. - 🔀 Hybrid Proof Policies: Runtime selection for SNARK-only, STARK-backed, or hybrid verification modes.
- 🌉 Bridge Policy Enforcement: Cross-chain route policies with default manifests and typed EVM/Cosmos proof helpers.
- 💰 Utility Coin Controls: Persistent ledger snapshots, audit chaining, nonce replay protection, and role-gated admin operations.
- 🔁 WASM Hash Registry + Hot Reload: Content-addressed module loading with module-hash tracking in runtime status.
- 🧭 Cross-Vertical Federated Router: Policy-gated discovery, TPM-gated subscriptions, schema translation, and provenance chaining for inter-domain insight routing.
- 📊 Tokenomics Monitoring: Pre-provisioned Grafana dashboard for supply, holders, burn/mint dynamics, bridge settlement, and proof cost.
- 📡 Genesis Testnet: Regional shard bootstrap with orchestrator, node-agent, metrics exporter, Prometheus, Grafana, and IPFS.
- ⚛️ Quantum-Ready Controls: Hybrid transport KEX policy, XMSS attestation mode, and dual-signature migration controls enabled in default deployment profiles.
Default stack profiles enforce these PQC-forward controls:
MOHAWK_TRANSPORT_KEX_MODE=x25519-mlkem768-hybridMOHAWK_TPM_IDENTITY_SIG_MODE=xmssMOHAWK_PQC_MIGRATION_ENABLED=trueMOHAWK_PQC_LOCK_LEGACY_TRANSFERS=trueMOHAWK_PQC_MIGRATION_EPOCH=2027-12-31T00:00:00ZMOHAWK_PQC_REQUIRE_CRYPTO_AFTER_EPOCH=true
Migration signing flow:
- Build canonical digest:
POST /ledger/migration/digest - Submit cryptographic transfer:
POST /ledger/migration/migrate
Migration transfer supports cryptographic dual-signature fields:
- Legacy path:
legacy_algo,legacy_pub_key,legacy_sig - PQC path:
pqc_algo,pqc_pub_key,pqc_sig
The canonical payload digest is produced by MigrationSigningDigest(...) in internal/token.
The current stack pairs classical and post-quantum controls so migration can happen with explicit cryptographic continuity:
- Transport key exchange:
x25519-mlkem768-hybrid(classical ECDH + ML-KEM 768 hybrid). - Attestation identity signatures: XMSS mode for TPM-backed identity metadata.
- Proof path for model verification: BN254 Groth16 zk-SNARK + SHA256 commitment-backed STARK transcript path.
- Migration signing: dual-signature transfer payloads (
legacy_*+pqc_*) with epoch policy enforcement.
Reference docs:
RELEASE_NOTES_PQC_OVERHAUL.mdSECURITY.mdproofs/HUMAN_READABLE_PROOFS.md
This release closes the 2026–2027 PQC readiness program from migration scaffolding to production enforcement:
Full release notes: RELEASE_NOTES_PQC_OVERHAUL.md
- Hybrid transport negotiation is now policy-bound at runtime (
x25519-mlkem768-hybrid) with keyshare-size enforcement. - TPM quote identity is bound to XMSS-capable attestation metadata and payload digesting.
- Ledger migration cutover supports epoch-enforced cryptographic dual-signature transfers.
- Orchestrator exposes digest-first migration signing APIs for deterministic operator workflows.
- One-click readiness now emits structured PASS/FAIL pipeline artifacts with toolchain alignment metadata.
Sovereign-Mohawk is built with Go 1.25+.
git clone https://github.com/rwilliamspbg-ops/Sovereign-Mohawk-Proto.git
cd Sovereign-Mohawk-Proto
go mod tidy
go build ./...The Python SDK provides a high-level interface to the MOHAWK runtime:
make build-python-lib
cd sdk/python
pip install -e .[dev]
python -c "import mohawk; print(mohawk.__version__)"Quick Python Example:
from mohawk import MohawkNode
node = MohawkNode()
result = node.start(config_path="capabilities.json", node_id="node-001")
proof = {"proof": "0x1234", "public_inputs": []}
verification = node.verify_proof(proof)
updates = [{"node_id": "n1", "gradient": [0.1, 0.2]}]
aggregation = node.aggregate(updates)
devices = node.device_info()
compressed = node.compress_gradients([0.1, 0.2, 0.3], format="fp16")
hybrid = node.verify_hybrid_proof(
snark_proof="s" * 128,
stark_proof="t" * 64,
mode="both",
)
receipt = node.bridge_transfer(
source_chain="ethereum",
target_chain="polygon",
asset="USDC",
amount=12.5,
sender="0xabc",
receiver="0xdef",
nonce=1,
proof="proof-bytes",
)
settled = node.bridge_transfer(
source_chain="ethereum",
target_chain="polygon",
asset="MHC",
amount=2.0,
sender="0xabc",
receiver="0xdef",
nonce=2,
proof="proof-bytes",
settle=True,
)See sdk/python/README.md for the complete API reference.
Validated startup options:
- Regional profile (orchestrator + shard + node-agent-1):
./genesis-launch.sh
# Start orchestrator + shard + node-agent-1..3
./genesis-launch.sh --all-nodes
# Equivalent Make target
make regional-shard- Full local stack (orchestrator + 3 node agents):
./scripts/launch_full_stack_3_nodes.sh --no-build
# Equivalent Make target
make full-stack-3-nodesNative PowerShell (Windows):
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass
./scripts/launch_full_stack_3_nodes.ps1 -NoBuildStartup checks validated in this repository:
./genesis-launch.shstartsorchestrator,shard-us-east,node-agent-1,prometheus,grafana,ipfs,tpm-metrics../scripts/launch_full_stack_3_nodes.sh --no-buildstartsorchestrator,shard-us-east,node-agent-1..3,prometheus,grafana,ipfs,tpm-metrics,pyapi-metrics-exporter.
Scalable full-stack profile (single node-agent service with replicas):
docker compose -f docker-compose.full.yml up -d --scale node-agent=10For per-replica mTLS identities, ensure the cert pool size is >= replica count:
MOHAWK_TPM_CLIENT_CERT_POOL_SIZE=10 docker compose -f docker-compose.full.yml up -d --scale node-agent=10node-agent replicas now fail fast at startup if their per-replica cert/key is missing.
Adding nodes after genesis start:
# Add node-agent-2 and node-agent-3 to an existing regional start
./scripts/docker-compose-wrapper.sh up -d node-agent-2 node-agent-3
# Equivalent direct Compose invocation
docker compose up -d node-agent-2 node-agent-3Git Bash / Windows note:
- Use
./scripts/docker-compose-wrapper.sh ...(with the./scripts/path). - Running
docker-compose-wrapper.sh ...without the path will fail withcommand not found.
Default endpoints after startup:
- Grafana:
http://localhost:3000 - Prometheus:
http://localhost:9090 - TPM metrics exporter:
http://localhost:9102/metrics - Orchestrator control plane:
https://localhost:8080(mTLS enforced)
For a lightweight research/dev on-ramp, use the sandbox profile:
docker compose -f docker-compose.sandbox.yml up -d --build
# or use the wrapper script
./scripts/launch_sandbox.sh
# or use Make targets
make sandbox-upSandbox topology:
- 1 orchestrator (
orchestrator) - 1 shard (
shard-us-east) - 2 node agents (
node-agent-1,node-agent-2) - bundled Hello World FL WASM task build (
wasm-hello-world-build)
Quick checks:
docker compose -f docker-compose.sandbox.yml ps
docker logs --tail=100 node-agent-1
docker logs --tail=100 node-agent-2Stop sandbox:
docker compose -f docker-compose.sandbox.yml down
# or use the wrapper script
./scripts/launch_sandbox.sh --down
# or use Make targets
make sandbox-downLocal forensics drill:
make forensics-drill
# optional cleanup
make forensics-drill-down
# compact rehearsal (drill + automatic cleanup)
make forensics-rehearsalQuick health checks:
curl -fsS http://localhost:3000/api/health
curl -fsS http://localhost:9090/-/healthy
curl -fsS http://localhost:9102/metrics | headControl-plane mTLS verification (expected behavior):
# This should fail without a client certificate.
curl -kfsS https://localhost:8080/p2p/info || echo "expected: mTLS client certificate required"The orchestrator control plane enforces client-certificate authentication. A plain curl without client cert should be rejected.
Windows troubleshooting for launcher secrets:
If Docker reports mount errors (not a directory) or token creation/permission failures, reset runtime secret paths and retry:
rm -rf runtime-secrets/mohawk_api_token runtime-secrets/mohawk_tpm_ca_cert.pem runtime-secrets/mohawk_tpm_ca_key.pem
docker compose down
./scripts/launch_full_stack_3_nodes.sh --no-buildPowerShell equivalent:
Remove-Item -Recurse -Force .\runtime-secrets\mohawk_api_token, .\runtime-secrets\mohawk_tpm_ca_cert.pem, .\runtime-secrets\mohawk_tpm_ca_key.pem
docker compose down
.\scripts\launch_full_stack_3_nodes.ps1 -NoBuildStop the stack:
./scripts/launch_full_stack_3_nodes.sh --down
# Equivalent Make target
make full-stack-3-nodes-downPowerShell stop:
./scripts/launch_full_stack_3_nodes.ps1 -DownGrafana dashboard shortlist:
Sovereign Mohawk | Start HereSovereign Mohawk | Operations OverviewSovereign Mohawk | Operations IncidentsSovereign Mohawk | Security & PQC ComplianceSovereign Mohawk | Engineering Latency DrilldownSovereign Mohawk | Engineering Node AgentsSovereign Mohawk | Executive SummaryMOHAWK Live OverviewTPM Metrics
v2 dashboard implementation and metric map:
monitoring/grafana/README.md
Quick-import dashboard pack for fast local/testnet setup:
grafana/node-health-overview.jsongrafana/byzantine-detection.jsongrafana/tokenomics-flow.jsongrafana/README.md
Forensics and hardware validation quick metric links (Prometheus):
- Honest ratio (10m min):
http://localhost:9090/graph?g0.expr=min_over_time(mohawk_consensus_honest_ratio%5B10m%5D)&g0.tab=0 - Gradient failure ratio (5m):
http://localhost:9090/graph?g0.expr=(sum(rate(mohawk_accelerator_ops_total%7Boperation%3D%22gradient_submit%22%2Cresult%3D%22failure%22%7D%5B5m%5D))%2Fclamp_min(sum(rate(mohawk_accelerator_ops_total%7Boperation%3D%22gradient_submit%22%7D%5B5m%5D))%2C1e-9))&g0.tab=0 - Proof verification p95 (10m):
http://localhost:9090/graph?g0.expr=histogram_quantile(0.95%2Csum(rate(mohawk_proof_verification_latency_ms_bucket%5B10m%5D))%20by%20(le))&g0.tab=0 - TPM verification failures (10m increase):
http://localhost:9090/graph?g0.expr=increase(mohawk_tpm_verifications_total%7Bresult%3D%22failure%22%7D%5B10m%5D)&g0.tab=0
The weekly digest workflow can post readiness/chaos summaries to Slack, Teams, and/or Discord.
Required repository secrets:
SLACK_WEBHOOK_URLTEAMS_WEBHOOK_URLDISCORD_WEBHOOK_URL
Configure in GitHub:
- Open Settings → Secrets and variables → Actions
- Add one or more webhook secrets above
- Run
Weekly Readiness Digestmanually (or wait for schedule) to verify delivery
Notes:
- If no webhook secret is set, notification step is skipped automatically.
- Slack/Teams receive payloads with
{"text": "..."}; Discord receives payloads with{"content": "..."}. - Discord messages are split into multiple posts to fit webhook content limits.
- Digest is always published to workflow summary and uploaded as an artifact.
Bridge settlement is optional and disabled by default. Set settle=true on bridge_transfer(...) requests to execute burn/release settlement after transfer verification.
Use these runtime environment variables to enable registry-backed multi-asset settlement routing:
# Comma-separated symbols allowed for settlement
export MOHAWK_BRIDGE_SETTLEMENT_ASSETS="MHC,USDX"
# Default utility coin ledger (MHC)
export MOHAWK_LEDGER_STATE_PATH="/var/lib/mohawk/mhc_state.json"
export MOHAWK_LEDGER_AUDIT_PATH="/var/lib/mohawk/mhc_audit.jsonl"
export MOHAWK_UTILITY_MINTER="protocol"
# Per-asset ledger overrides (USDX)
export MOHAWK_LEDGER_STATE_PATH_USDX="/var/lib/mohawk/usdx_state.json"
export MOHAWK_LEDGER_AUDIT_PATH_USDX="/var/lib/mohawk/usdx_audit.jsonl"
export MOHAWK_UTILITY_MINTER_USDX="protocol"When configured, settlement enforces:
- Asset must be present in
MOHAWK_BRIDGE_SETTLEMENT_ASSETS. - Asset must have a configured settlement ledger.
- Burn on sender occurs before destination mint/release.
- Refund-to-sender executes if destination release fails.
This repository maintains strict adherence to the MOHAWK runtime specifications.
Run all repository lint checks locally:
make lintmake lint runs go fmt ./... and go vet ./....
make test
make verify
go test ./...Large-scale integration suite (500-1k swarm + Byzantine edge cases + backend profile checks):
go test ./test -run 'TestSwarmIntegration500To1000Nodes|TestByzantineEdgeCasesOver55PercentMalicious|TestHardwareAgnosticBackendProfiles'make test-python-sdk
make demo-python-sdk
make python-allRun the full production readiness gate (lint + tests + audit + strict auth/role smoke on host and container):
make production-readinessRun the formal production go-live gate validator (readiness + chaos + host tuning + mandatory attestation approvals):
make go-live-gateRun explicit modes:
make go-live-gate-strict
make go-live-gate-advisoryGate report artifact:
results/go-live/go-live-gate-report.json
The report now includes host_preflight_mode, warnings, and enforcement state (host_network_tuning_enforced) so strict vs advisory execution is machine-auditable.
Use this compact sequence before release/tag cut:
- Run strict formal gate on a production-tuned host:
make go-live-gate-strict
- Run full golden path execution and evidence generation:
make golden-path-e2e
- Run monitoring smoke checks (local equivalent of CI gate):
docker compose up -d --build orchestrator alertmanager prometheus tpm-metrics pyapi-metrics-exporter grafanacurl -fsS http://localhost:9090/-/healthycurl -fsS -u admin:admin 'http://localhost:3000/api/search?type=dash-db' | jq '.'
- Regenerate benchmark sign-off index:
make release-performance-evidence
Required evidence bundle:
results/go-live/go-live-gate-report.jsonresults/go-live/strict-host-evidence.mdresults/go-live/golden-path-report.jsonresults/go-live/golden-path-report.mdresults/metrics/release_performance_evidence.md
Attestation inputs (must be "status": "approved" before go-live):
results/go-live/attestations/security_audit.jsonresults/go-live/attestations/penetration_test.jsonresults/go-live/attestations/threat_model_refresh.jsonresults/go-live/attestations/dependency_sla_baseline.jsonresults/go-live/attestations/backup_restore_drill.jsonresults/go-live/attestations/soak_scale_rehearsal.jsonresults/go-live/attestations/incident_escalation_drill.jsonresults/go-live/attestations/runbook_published.json
Run the full one-click pipeline (PQC config defaults, capability + contract policy gate, build/tests, strict auth, readiness gate, chaos drill, digest):
make mainnet-one-clickThe one-click run now includes a host kernel UDP/socket preflight. If it fails, apply:
sudo sysctl -w net.core.rmem_max=8388608
sudo sysctl -w net.core.rmem_default=262144
sudo sysctl -w net.core.wmem_max=8388608
sudo sysctl -w net.core.wmem_default=262144Persist these in /etc/sysctl.conf or /etc/sysctl.d/*.conf, then run sudo sysctl --system.
Host preflight mode defaults to strict in this release:
- Default (production):
MOHAWK_HOST_PREFLIGHT_MODE=strict - Dev-container override:
MOHAWK_HOST_PREFLIGHT_MODE=advisory make mainnet-one-click
Artifacts are generated at:
results/readiness/readiness-report.jsonchaos-reports/tpm-metrics-summary.jsonresults/readiness/readiness-digest.mdresults/go-live/go-live-gate-report.jsonresults/go-live/golden-path-report.jsonresults/go-live/golden-path-report.mdresults/go-live/attestations/PUBLIC_ARTIFACTS.md(public, searchable artifact index)
Latest SDK benchmark snapshot from sdk/python/tests/test_benchmarks.py on March 14, 2026:
| Benchmark | Mean | Median | Throughput |
|---|---|---|---|
test_verify_proof_performance |
10.55 ms | 10.55 ms | 94.77 ops/s |
test_aggregate_nodes_performance |
30.63 us | 25.20 us | 32,648 ops/s |
test_gradient_compression_performance |
995.70 us | 944.57 us | 1,004 ops/s |
Reproduce locally:
cd sdk/python
python -m pytest tests/test_benchmarks.py --benchmark-only -qLatest runtime microbenchmark matrix for AggregateParallel includes:
- Workloads:
32x2048,128x4096,256x8192,512x8192 - Worker configs:
workers1,workers2,workers4,workers8,workersAuto
Run locally:
TOOLROOT=/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.25.9.linux-amd64 \
GOROOT=$TOOLROOT PATH=$TOOLROOT/bin:$PATH GOTOOLCHAIN=local \
go test ./test -run '^$' -bench BenchmarkAggregateParallel -benchmem -benchtime=200msGenerate a base-vs-current comparison report:
TOOLROOT=/go/pkg/mod/golang.org/toolchain@v0.0.1-go1.25.9.linux-amd64 \
BASE_REF=origin/main BENCH_TIME=200ms BENCH_COUNT=10 \
BENCH_CPU=2 \
USE_BENCHSTAT=always BENCHSTAT_ALPHA=0.01 \
REPORT_PATH=results/metrics/fedavg_benchmark_compare.md \
./scripts/benchmark_fedavg_compare.shThis enforces benchstat output and uses a stricter significance threshold (alpha=0.01).
Comparison artifact:
results/metrics/fedavg_benchmark_compare.md
FedAvg scaling controls and validation artifacts:
- Semi-async, hierarchical, and weighted-trim aggregation controls are available through the aggregation API and test harness.
make fedavg-scale-gatevalidates throughput floors and pre/post counter deltas for the current runtime report.captured_artifacts/fedavg_10k_node_runtime_evaluation_2026-04-13.mdcaptures the 10k-node runtime smoke evaluation and improvement notes.
CI baseline pinning behavior:
- On
mainpushes, workflowFedAvg Benchmark Comparecaptures and caches a benchmark baseline (fedavg-main-*) and uploadsfedavg-baseline-main. - On PRs, the same workflow restores the cached main baseline and diffs against PR benchmark output using
benchstat.
Run the swarm runtime matrix workflow (safe and edge Byzantine profiles) and publish CI artifacts:
gh workflow run swarm-runtime-matrix.yml -f node_counts='500,1000,1500' -f safe_ratio='0.44' -f edge_ratio='0.56'Published CI artifacts include:
test-results/swarm-runtime/scaled_swarm_benchmark_report.mdtest-results/swarm-runtime/scaled_swarm_benchmark_report.jsontest-results/swarm-runtime/router_smoke.txttest-results/swarm-runtime/router_metrics_snapshot.prom- per-profile JSONL traces in
test-results/swarm-runtime/*_{safe,edge}.jsonl results/metrics/fedavg_scale_gate_validation.mdandresults/metrics/fedavg_scale_gate_validation.jsonare produced locally by the FedAvg scale gate validator.
Run the hardware-policy benchmark report (used by CI and release assets):
make benchmark-gpuArtifacts:
results/metrics/accelerator_backend_compare.mdresults/metrics/accelerator_backend_compare.json
Live observability companion dashboard:
monitoring/grafana/dashboards/v2/v2-20-eng-latency-drilldown.json
Run the bridge compression microbenchmark and generate a comparison report:
BENCH_TIME=200ms REPORT_PATH=results/metrics/bridge_compression_benchmark_compare.md \
BENCH_COUNT=5 BENCH_CPU=2 BENCHSTAT_ALPHA=0.01 \
./scripts/benchmark_bridge_compression_compare.shThis report is a JSON-vs-zero-copy format comparison on the same commit, not a base-ref regression diff.
Artifacts:
results/metrics/bridge_compression_benchmark_compare.mdresults/metrics/bridge_compression_benchmark_raw.txt
CI baseline pinning behavior:
- On
mainpushes, workflowBridge Compression Benchmarkstores the raw benchmark output as cache (bridge-main-*) and uploadsbridge-baseline-main. - On PRs, the same workflow restores the cached main baseline and generates regression evidence in
bridge-compression-regression-report(results/metrics/bridge_compression_regression_compare.md).
Build a release-grade performance evidence index from benchmark artifacts:
make release-performance-evidenceArtifact:
results/metrics/release_performance_evidence.md
The system leverages a proof-driven monitoring strategy and production CI gates.
All production-grade safety requirements are verified on every push:
- Build and Test: Go build/test, Wasm module build, capability validation, and Docker stack config.
- Integrity Guard - Linter:
golangci-lint,black --check, and targetedflake8validation. - Local Toolchain Consistency: Run
make go-envbefore local Go lint/test commands to confirmgoandcompileresolve to the same toolchain root. - Performance Gate: Benchmark regression checks for proof verification, aggregation, and gradient compression.
- Swarm Runtime Matrix: 500/1000/1500-node safe+edge Byzantine runtime profiles with router-on preflight evidence and published artifacts.
- FedAvg Benchmark Compare: Go runtime FedAvg benchmark matrix diff against base branch with markdown artifact upload.
- FedAvg Scale Gate: Validates FedAvg throughput floors, runtime-report coverage, and counter deltas for async/semi-async tuning runs.
- Bridge Compression Benchmark: JSON-vs-zero-copy bridge compression benchmark report with artifact upload.
- Monitoring Smoke Gate: Compose-based Prometheus/Grafana health and dashboard registration checks.
- Release Performance Evidence: Aggregates benchmark artifacts into a release sign-off index.
- Release Assets and Images: Builds release bundles with SBOMs, benchmark reports, downloadable OCI archives, and GHCR-published tagged images.
- Byzantine Forensics Weekly: Runs Mini-Mohawk sandbox, extracts rejected-gradient forensics report, computes baseline deltas, and publishes artifacts.
- Byzantine Forensics Daily Short-Run: Lightweight daily window with stricter alert threshold for faster anomaly detection.
- Forensics Automation Smoke: Pull-request guard for forensics scripts/workflows and Make target command resolution.
Quick green-board verification command:
gh run list --limit 20 --json workflowName,conclusion,status \
| jq -r '.[] | "\(.workflowName): \(.status)/\(.conclusion // "in_progress")"'Optional issue-routing variables for forensics threshold breaches:
BYZANTINE_FORENSICS_ISSUE_LABELS(comma-separated labels, default:security,operations,automated-alert)BYZANTINE_FORENSICS_ISSUE_ASSIGNEES(comma-separated GitHub usernames)BYZANTINE_FORENSICS_AUTO_CLOSE_HEALTHY_RUNS(integer streak target, default:3)
Behavior notes:
- Breach issues are deduplicated per profile (
daily-shortvsweekly) and updated via comments. - The workflow auto-applies a profile label (
byzantine-forensics-daily-shortorbyzantine-forensics-weekly) on breach. - Open breach issues are auto-closed after the configured count of consecutive healthy runs for the same profile.
- Proof-Driven Design Verification: Capability and proof audit via
scripts/audit_proofs.sh. - Capability Sync Check: Runtime capability manifest validation.
Recommended protected-branch policy for main requires the release and safety gates listed above.
Admin automation helper (requires repo-admin token permissions):
bash scripts/apply_branch_protection.sh- monitoring/prometheus/prometheus.yml
- monitoring/alertmanager/alertmanager.yml
- monitoring/grafana/dashboards/
- grafana/
- monitoring/grafana/README.md
- cmd/tpm-metrics/main.go
Stable release tags now attach a downloadable artifact bundle with:
- GHCR-published tagged images (
orchestrator,node-agent,fl-aggregator,api-dashboard) - OCI image archives and image digest files
- Source + image SBOMs (SPDX JSON)
- Runtime benchmark reports
sovereign-map-testnet.tar.gz- npm package tarballs when package manifests are present
CI workflow runs now upload:
test-results/output bundle- Swarm integration suite outputs
- Benchmark markdown/json artifacts
- Downloadable CI OCI image archives
Sovereign-Mohawk-Proto/
├── cmd/ # Main application entry points
│ ├── orchestrator/ # Control plane + mTLS endpoint
│ ├── node-agent/ # Edge node runtime + libp2p transport
│ └── tpm-metrics/ # Prometheus exporter
├── internal/ # Core Go implementation
│ ├── accelerator/ # Device detection + quantization
│ ├── bridge/ # Route policy engine and typed proofs
│ ├── hva/ # Hierarchical planning logic
│ ├── hybrid/ # Hybrid SNARK/STARK verification
│ ├── ipfs/ # Checkpoint backend
│ ├── network/ # libp2p transport and gradient protocol
│ ├── pyapi/ # Python SDK C-shared library exports
│ ├── token/ # Utility coin ledger
│ ├── tpm/ # TPM attestation + mTLS
│ └── wasmhost/ # WebAssembly runtime
├── monitoring/ # Prometheus and Grafana assets
├── sdk/
│ └── python/
│ ├── mohawk/ # Python package
│ ├── examples/ # Usage examples
│ └── tests/ # Unit tests and benchmarks
├── proofs/ # Formal verification documents
├── scripts/ # Build, audit, and smoke-test scripts
├── wasm-modules/ # fl_task, flower_task, pytorch_task
└── README.md
✨ New Features:
- Python SDK v2 with accelerator, bridge, gradient, hybrid-proof, and utility-ledger APIs.
- libp2p gradient transport between node-agents and orchestrator.
- Route-policy bridge verification with default manifest fallback.
- TPM-backed mTLS control plane and strict auth smoke validation.
- Prometheus/Grafana observability stack and genesis testnet bootstrap.
🔧 Technical Details:
- Exported Go bridge now includes proof batching, hybrid verification, bridge transfer, device info, gradient compression, and utility-ledger operations.
- Python package version:
2.0.1.Alpha. - Strict CI gates: build/test, linter, performance gate, capability sync, proof audit, and pages deploy.
- Benchmarked SDK mean latencies: 10.55 ms verify, 30.63 us aggregate, 995.70 us compression.
📚 Documentation:
- sdk/python/README.md
- sdk/python/mohawk/client.py
- sdk/python/examples/
- monitoring/prometheus/prometheus.yml
- monitoring/grafana/dashboards/
See CHANGELOG.md for full release history.
See ROADMAP.md for detailed feature timeline and development priorities.
Program Stage: Go-Live Formalization Complete
Next Up:
- TPM attestation production-path completion (TPM 2.0 quote/verify and cross-platform validation)
- v1.0.0 GA tag cut after TPM closure sign-off
- Post-GA operational cadence and ecosystem expansion milestones
- WHITE_PAPER.md - Protocol design and architecture
- ACADEMIC_PAPER.md - Formal proofs and theorems
- sdk/python/README.md - Python SDK guide
- CONTRIBUTING.md - Development guidelines
- sdk/python/mohawk/client.py - Python client API reference
- OPERATIONS_RUNBOOK.md - Production operations runbook
- HARDWARE_COMPATIBILITY.md - TPM/HSM compatibility matrix and 10 ms validation criteria
- EDGE_LITE_RESOURCE_PROFILE.md - Lite node resource floors and profiling guidance
- COMPLIANCE_MAPPING.md - HIPAA/GDPR control mapping for healthcare deployments
- CERTIK_AUDIT_SUMMARY.md - Redacted external-audit findings and mitigation summary
- DEPLOYMENT_GUIDE_GENESIS_TO_PRODUCTION.md - Genesis-to-production rollout guide
- RELEASE_CHECKLIST_v1.0.0_RC.md - v1.0.0 release candidate sign-off checklist
- proofs/HUMAN_READABLE_PROOFS.md - Operator-focused proof interpretation workflow
- proofs/THINKER_CLAUSES_CAPABILITIES.md - Thinker Clause edge-case configuration guidance
- results/go-live/go-live-gate-report.json - Formal go-live gate status report
- results/go-live/strict-host-evidence.md - Strict production-host gate evidence and tuning checklist
- results/go-live/golden-path-report.md - End-to-end golden path execution summary
- results/go-live/evidence/slo_sli_baseline_2026-03-28.md - Versioned SLO/SLI definitions for Phase 3 closure
- results/go-live/evidence/failure_injection_latency_validation_2026-03-28.md - Failure-injection latency validation report
- results/go-live/evidence/tpm_attestation_cross_platform_matrix_2026-03-28.md - TPM production-closure cross-platform validation matrix
- results/go-live/evidence/tpm_attestation_closure_validation_2026-03-28.md - TPM closure validator status report
- results/go-live/evidence/tpm_attestation_local_sandbox_2026-03-29.md - Local sandbox TPM/forensics validation snapshot for Mini-Mohawk profile
- results/go-live/evidence/tpm_closure_summary_2026-03-28.md - TPM closure dashboard summary
- results/go-live/evidence/forensics_rehearsal_validation_2026-03-29.md - Day 2 forensics and recovery rehearsal validation record
- results/go-live/evidence/release_candidate_evidence_checkpoint_2026-03-29.md - Consolidated release-candidate evidence checkpoint index
- results/go-live/strict-host-evidence.md - Strict-host go-live baseline and environment hardening evidence
- results/go-live/evidence/templates/windows_tpm_attestation_capture_guide.md - Windows TPM evidence capture guide
- results/go-live/evidence/templates/macos_tpm_attestation_capture_guide.md - macOS TPM evidence capture guide
- results/go-live/evidence/templates/hardware_validation_capture_template.md - Standardized hardware validation capture template
- results/metrics/release_performance_evidence.md - Release benchmark evidence index
PQC migration and transport helper scripts:
python scripts/pqc_migration_payload_cli.py --helppython scripts/validate_transport_kex_mode.py --helppython scripts/render_human_readable_proof.py --helppython scripts/validate_tpm_attestation_closure.py --helppython scripts/generate_tpm_closure_summary.py --helppython scripts/enforce_ga_tag_safety.py --tag v1.0.0bash scripts/quantum_kex_rotation_drill.sh --helpbash scripts/extract_byzantine_forensics.sh --helpbash scripts/launch_sandbox.sh --helpmake sandbox-upmake sandbox-downmake forensics-rehearsal
We welcome contributions! Please see CONTRIBUTING.md for:
- Development setup
- Code style guidelines
- Testing requirements
- Pull request process
This project is licensed under the Apache License 2.0. See the LICENSE.md file for details.
IP Notice: Portions of protocol technology are marked Patent Pending (U.S. provisional filing, March 2026). This notice is informational and does not modify Apache-2.0 terms.
For a consolidated legal summary, see NOTICE.md.
- GitHub: Sovereign-Mohawk-Proto
- Twitter/X: @RyanWill98382
- Issues: Report a Bug
- Discussions: Community Forum
- The Paradox of the Sovereign Protocol While the Sovereign Mohawk Protocol is designed to be "Sovereign"—meaning it operates via decentralized consensus rather than centralized human authority—this creates a risk of Technological Determinism.
A system that answers to no one can inadvertently become a "Master" rather than a tool. We explicitly recognize that mathematical verification does not equal moral justification. A protocol may be "correct" in its execution of code while being "wrong" in its impact on human free will.
- The "Seventh Theorem": Resistance to Commercial Capture Current BFT (Byzantine Fault Tolerance) models focus on "liars" (adversarial nodes). We propose a transition toward defending against "owners" (economic consolidation).
Transparency of the Genesis Block: To prevent the Genesis Block from becoming a "Digital Board of Directors," the selection criteria for the initial 1,000 nodes must be publicly auditable, diverse in geography, and inclusive of non-commercial stakeholders.
The Anti-Greed Protocol: We must implement decay functions on node influence to ensure that "Health and Wealth" promises do not lead to a "lock-in" effect where users trade long-term agency for short-term convenience.
- Protecting the "Thinker" over the "Consensus" Standard Federated Learning prunes outliers to achieve accuracy. However, in human systems, the "outlier" is often the innovator or the dissenter.
Dissensus Preservation: The protocol shall include "Thinker Clauses" that prevent the automatic suppression of minority data paths, ensuring that "Sovereignty" includes the right to deviate from the planetary norm.
Legibility of the Sovereign Map: The "Sovereign Map" must not remain a black box. We commit to developing "Human-Readable Proofs" where the logic of the network is accessible to the average person, not just the cryptographer.
- Accountability in Scaleless Systems As the system scales toward 100M+ nodes, traditional regulation becomes functionally impossible.
Algorithmic Recourse: Every automated decision within the protocol must have a defined path for human appeal, ensuring that "messy" free will remains the final fail-safe against "perfect" algorithmic errors.
Privacy as Agency: Privacy in this network is not a "shield for owners" but a sanctuary for the individual. It must be architected to protect the user from the network owners, not the owners from public scrutiny.
We build this protocol to serve humanity, not to replace its judgment. The messiness of human choice is the only metric that cannot be optimized, and it is the only metric that matters.
Built for the future of Sovereign AI.
This project publicly discloses (since [earliest commit date, e.g., early 2026]) a novel combination of hierarchical federated learning with zk-SNARK verifiable aggregation, 55.5% Byzantine resilience, 99.99% straggler tolerance, and extreme metadata compression at planetary scale. No prior systems combine these elements with formal verification across all dimensions. Public commits and X posts (@RyanWill98382) serve as timestamped evidence.
