Recognition: unknown
Reconstructive Authority Model: Runtime Execution Validity Under Partial Observability
Pith reviewed 2026-05-08 11:21 UTC · model grok-4.3
The pith
Authenticated projections of state are necessary but never sufficient for valid execution under partial observability.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The paper establishes that an authenticated projection of state is necessary but never sufficient for execution validity. It introduces the Reconstructive Authority Model that separates integrity from coverage, defines a reconstruction gate operating over an explicit coverage envelope of proven state, declared assumptions, and unobservable residual, and permits execution only when coverage is adequate for the action class, with dynamic privilege narrowing or closed failure when coverage is insufficient. Formal proofs establish the insufficiency of attestation and the necessity of RAM, while experiments confirm zero invalid execution rates under RAM versus persistent failures under pure attes
What carries the argument
The Reconstructive Authority Model (RAM) reconstruction gate that evaluates an explicit coverage envelope of proven state, declared assumptions, and acknowledged unobservable residual to decide execution adequacy.
If this is right
- RAM achieves zero invalid execution rates at all coverage levels in 100,000 synthetic trials.
- Attestation systems produce invalid execution rates of 0.423 at low coverage and 0.233 even at full coverage due to undetected undefined-state handling.
- When coverage is insufficient, RAM narrows privileges dynamically or fails closed.
- Execution validity is treated as a coverage reconstruction problem distinct from and complementary to integrity guarantees.
Where Pith is reading between the lines
- In sensor-driven robots or vehicles, explicit tracking of environmental assumptions could prevent actions when key variables remain unmeasured.
- The model could layer onto existing attestation systems to add a coverage check without replacing current integrity hardware.
- Action classes could be pre-defined with minimum coverage thresholds, allowing systems to degrade gracefully rather than execute blindly.
Load-bearing premise
An explicit coverage envelope of proven state, declared assumptions, and unobservable residual can be defined and evaluated accurately enough to decide adequacy for any action class.
What would settle it
An experiment in which RAM allows an execution that later proves invalid despite the coverage envelope being declared adequate, or in which attestation alone achieves zero invalid executions across all partial-observability scenarios.
Figures
read the original abstract
Autonomous systems increasingly operate under partial observability where execution-relevant state is never fully accessible. Existing governance mechanisms -- trusted execution environments, oracle-signed state proofs, cryptographic attestation -- enforce the integrity of computation and state projections. We show this is structurally insufficient: an authenticated projection of state is necessary but never sufficient for execution validity. We introduce the Reconstructive Authority Model (RAM), which separates integrity from coverage. RAM defines a reconstruction gate that reasons over an explicit coverage envelope -- comprising proven state, declared assumptions, and an acknowledged unobservable residual -- and permits execution only when coverage is adequate for the action class. When coverage is insufficient, RAM narrows privileges dynamically or fails closed. Attestation proves trust in measurement; RAM proves adequacy of what is measured. We formalize RAM, prove necessity via two theorems (attestation insufficiency and RAM necessity) and three corollaries, and present a hybrid RAM+Attestation architecture with privilege-narrowing. Synthetic experiments (N=100,000, seed=42) show RAM achieves zero invalid execution rates at all coverage levels. Attestation-based systems exhibit IER=0.423 at low coverage and IER=0.233 even at full coverage, the latter arising from undefined-state handling failures undetectable by integrity checks alone. This reframes execution validity as a coverage reconstruction problem, distinct from and complementary to integrity guarantees provided by attestation.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript claims that existing attestation mechanisms (trusted execution environments, oracle-signed proofs, cryptographic attestation) are structurally insufficient for execution validity under partial observability because they ensure integrity of state projections but not coverage of execution-relevant state. It introduces the Reconstructive Authority Model (RAM) that separates integrity from coverage via a reconstruction gate operating over an explicit coverage envelope (proven state, declared assumptions, acknowledged unobservable residual). Execution is permitted only when coverage is adequate for the action class; otherwise privileges are narrowed or execution fails closed. The authors formalize RAM, prove two theorems (attestation insufficiency and RAM necessity) plus three corollaries, describe a hybrid RAM+Attestation architecture, and report synthetic experiments (N=100,000, seed=42) in which RAM achieves zero invalid execution rates (IER) at all coverage levels while attestation-only systems show IER=0.423 at low coverage and IER=0.233 at full coverage.
Significance. If the formal theorems hold and a non-oracle implementation of the reconstruction gate exists, the work would provide a useful conceptual reframing of runtime governance by distinguishing coverage adequacy from integrity guarantees. This separation could guide designs for autonomous systems that explicitly handle unobservable residuals and dynamically adjust privileges, complementing rather than replacing attestation. The synthetic results, if shown to be non-circular, would illustrate the practical gap in attestation-only approaches arising from undefined-state handling.
major comments (2)
- [Abstract and Experiments] Abstract / synthetic experiments description: The reported IER=0 for RAM at all coverage levels follows by construction from the model's rule that the reconstruction gate permits execution only when the coverage envelope is adequate. No implementation details or decision procedure are supplied for evaluating adequacy (including the unobservable residual) using only information available under partial observability rather than oracle knowledge of the residual. This is load-bearing for the empirical support of the central claim that RAM achieves zero invalid executions in practice.
- [Formalization and Theorems] Formalization / Theorems: The two theorems and corollaries treat the adequacy predicate over the coverage envelope as given and computable from proven state plus declared assumptions. No construction, algorithm, or procedure is provided that determines this predicate while respecting the partial-observability constraints the model addresses, which is required to establish practical necessity of RAM.
minor comments (2)
- [Experiments] The experiments section provides N=100,000 and seed=42 but omits details on how coverage levels are varied, the precise definition of invalid executions for the attestation baseline, and any statistical measures such as error bars or variance across runs.
- The hybrid RAM+Attestation architecture is introduced but lacks specifics on the integration mechanism, how privilege-narrowing is realized at runtime, or pseudocode for the reconstruction gate.
Simulated Author's Rebuttal
We thank the referee for their thoughtful and constructive review. We address each major comment point by point below, acknowledging where the observations are accurate and indicating the revisions we have made to strengthen the manuscript.
read point-by-point responses
-
Referee: [Abstract and Experiments] Abstract / synthetic experiments description: The reported IER=0 for RAM at all coverage levels follows by construction from the model's rule that the reconstruction gate permits execution only when the coverage envelope is adequate. No implementation details or decision procedure are supplied for evaluating adequacy (including the unobservable residual) using only information available under partial observability rather than oracle knowledge of the residual. This is load-bearing for the empirical support of the central claim that RAM achieves zero invalid executions in practice.
Authors: We agree that the reported zero IER for RAM follows directly from the reconstruction gate's rule, which blocks execution under inadequate coverage by design. The synthetic experiments (N=100,000, seed=42) are intended to illustrate the performance differential with attestation-only baselines, where positive IER persists due to coverage gaps undetectable by integrity checks. The experiments assume the gate evaluates the envelope correctly at each coverage level. To address the lack of implementation details, we have revised the manuscript by adding a dedicated subsection on a practical decision procedure for the reconstruction gate. This procedure uses only observable proven state, declared assumptions, and conservative statistical bounds on the unobservable residual (derived from domain priors) to determine adequacy, without oracle knowledge of the residual. The abstract has also been updated to reference this addition. revision: yes
-
Referee: [Formalization and Theorems] Formalization / Theorems: The two theorems and corollaries treat the adequacy predicate over the coverage envelope as given and computable from proven state plus declared assumptions. No construction, algorithm, or procedure is provided that determines this predicate while respecting the partial-observability constraints the model addresses, which is required to establish practical necessity of RAM.
Authors: The theorems abstract the adequacy predicate to establish the general structural necessity of RAM and the insufficiency of attestation, independent of any specific computation method. This level of abstraction allows the results to apply across domains. We recognize that the absence of an explicit procedure limits the demonstration of practical necessity under partial observability. We have therefore revised the formalization section to include a high-level algorithmic sketch for evaluating the coverage envelope. The procedure respects partial observability by relying on declared assumptions to bound the residual, applying a conservative adequacy threshold, and triggering privilege narrowing or closed failure when the threshold cannot be met. This addition complements the theorems without altering their abstract character. revision: yes
Circularity Check
Zero invalid execution rate for RAM follows by construction from its own coverage-adequacy permission rule
specific steps
-
self definitional
[Abstract]
"RAM defines a reconstruction gate that reasons over an explicit coverage envelope -- comprising proven state, declared assumptions, and an acknowledged unobservable residual -- and permits execution only when coverage is adequate for the action class. ... Synthetic experiments (N=100,000, seed=42) show RAM achieves zero invalid execution rates at all coverage levels."
The model explicitly conditions execution permission on adequacy of the coverage envelope (including residual); the reported zero IER is therefore the direct, tautological consequence of enforcing that same rule inside the synthetic simulator, which supplies oracle knowledge of the residual. No independent test of the gate's decision procedure under strict partial observability is performed.
full rationale
The paper's synthetic experiments report IER=0 for RAM at every coverage level, but this outcome is forced by the model's definitional rule that execution is permitted only when the coverage envelope (including the acknowledged unobservable residual) is deemed adequate. The reconstruction gate is granted oracle knowledge of that residual in the N=100k simulation, so the zero rate confirms the rule rather than independently validating that adequacy remains decidable under genuine partial observability. The necessity theorems and attestation comparisons do not escape the circularity because they presuppose the same predicate is evaluable without additional observability. This is a clear self-definitional reduction of the central empirical claim to the model's own constraints.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption An explicit coverage envelope can be constructed from proven state, declared assumptions, and acknowledged unobservable residual.
invented entities (2)
-
Reconstructive Authority Model (RAM)
no independent evidence
-
Reconstruction gate
no independent evidence
Forward citations
Cited by 1 Pith paper
-
Agent Control Protocol: Admission Control for Agent Actions
ACP is a temporal admission control protocol that combines static risk scoring with anomaly accumulation and cooldowns to limit harmful agent behavior over time, reducing approvals from 100% to 0.4% in tested workloads.
Reference graph
Works this paper leans on
-
[1]
Marcelo Fernandez. Atomic decision boundaries: A structural requirement for guarantee- ing execution-time admissibility in autonomous systems.https://doi.org/10.5281/zenodo. 19670649, 2026. Agent Governance Series, Paper 0. Zenodo. DOI: 10.5281/zenodo.19670649. arXiv:2604.17511
work page internal anchor Pith review Pith/arXiv arXiv doi:10.5281/zenodo 2026
-
[2]
Agent Control Protocol: ACP v1.30—admission control for agent actions,
Marcelo Fernandez. Agent Control Protocol: ACP v1.30—admission control for agent actions,
-
[3]
Agent Control Protocol: Admission Control for Agent Actions
Agent Governance Series, Paper 1. arXiv:2603.18829. DOI: 10.5281/zenodo.19672575
work page internal anchor Pith review Pith/arXiv arXiv doi:10.5281/zenodo.19672575
-
[4]
From Admission to Invariants: Measuring Deviation in Delegated Agent Systems
Marcelo Fernandez. From admission to invariants: Epistemological limits of local observability in agent governance.https://doi.org/10.5281/zenodo.19672589, 2026. Agent Governance Series, Paper 2. Zenodo. DOI: 10.5281/zenodo.19672589. arXiv:2604.17517
work page internal anchor Pith review Pith/arXiv arXiv doi:10.5281/zenodo.19672589 2026
-
[5]
Marcelo Fernandez. Irreducible governance structure for autonomous agent systems: Fair allocation, strategy-proofness, and multi-scale composition.https://doi.org/10.5281/ zenodo.19708496, 2026. Agent Governance Series, Paper 3/4 (consolidated). Zenodo. DOI: 10.5281/zenodo.19708496
-
[6]
Marcelo Fernandez. Operationalizing reconstructive authority: Runtime construction, depen- dency resolution, and execution gating in autonomous agent systems.https://doi.org/10. 5281/zenodo.19699460, 2026. Agent Governance Series, Paper 6. Zenodo. DOI: 10.5281/zen- odo.19699460
-
[7]
Intel SGX explained
Victor Costan and Srinivas Devadas. Intel SGX explained. InIACR Cryptology ePrint Archive, volume 2016, page 086, 2016
2016
-
[8]
CertiKOS: An extensible architecture for building certified concurrent OS kernels
Ronghui Gu, Zhong Shao, Hao Chen, Xiongnan Wu, Jieung Kim, Vilhelm Sjöberg, and David Costanzo. CertiKOS: An extensible architecture for building certified concurrent OS kernels. In12th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 653–669, 2016
2016
-
[9]
Astraea: A decentralized blockchain oracle
John Adler, Ryan Berryhill, Andreas Veneris, Zissis Poulos, Neil Brown, and Andreas Worley. Astraea: A decentralized blockchain oracle. In2018 IEEE 5th International Conference on Internet of Things. IEEE, 2018
2018
-
[10]
DECO: Liberating web data using decentralized oracles for TLS
Fan Zhang, Sai Krishna Deepak Maram, Harjasleen Malvai, Steven Goldfeder, and Ari Juels. DECO: Liberating web data using decentralized oracles for TLS. InProceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS), pages 1919–
2020
-
[11]
A brief account of runtime verification.Journal of Logic and Algebraic Programming, 78(5):293–303, 2009
Martin Leucker and Christian Schallhart. A brief account of runtime verification.Journal of Logic and Algebraic Programming, 78(5):293–303, 2009
2009
-
[12]
Runtime verification of component-based systems
Ylies Falcone, Laurent Mounier, Jean-Claude Fernandez, and Jean-Luc Richier. Runtime verification of component-based systems. InProceedings of the 4th International Symposium on Leveraging Applications, 2012
2012
-
[13]
Synthesizingmonitorsforsafetyproperties
KlausHavelundandGrigoreRoşu. Synthesizingmonitorsforsafetyproperties. InInternational Conference on Tools and Algorithms for the Construction and Analysis of Systems, pages 342–
-
[14]
Planning and acting in partially observable stochastic domains.Artificial Intelligence, 101(1-2):99–134, 1998
Leslie Pack Kaelbling, Michael L Littman, and Anthony R Cassandra. Planning and acting in partially observable stochastic domains.Artificial Intelligence, 101(1-2):99–134, 1998. 27
1998
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.