mirror of
https://github.com/syntrex-lab/gomcp.git
synced 2026-05-03 00:02:37 +02:00
docs: Localize Lattice specification within gomcp repo
This commit is contained in:
parent
c3ca6a322b
commit
2d653cf226
5 changed files with 1435 additions and 5 deletions
|
|
@ -10,4 +10,4 @@ Welcome to the GoMCP documentation. GoMCP is the open-source, mathematically pro
|
|||
|
||||
## About Sentinel Lattice
|
||||
|
||||
GoMCP uses the Sentinel Lattice framework to enforce security primitives. For in-depth theoretical understanding, see the [Sentinel Lattice Architecture Specification](https://github.com/syntrex-lab/sentinel-community/blob/main/docs/rnd/2026-02-25-sentinel-lattice-architecture.md).
|
||||
GoMCP uses the Sentinel Lattice framework to enforce security primitives. For in-depth theoretical understanding, see the [Sentinel Lattice Architecture Specification](lattice.md).
|
||||
|
|
|
|||
1430
docs/lattice.md
Normal file
1430
docs/lattice.md
Normal file
File diff suppressed because it is too large
Load diff
|
|
@ -28,4 +28,4 @@ Trust boundary crossings inherently attenuate capabilities unless explicitly aut
|
|||
|
||||
This means that even if a prompt injection tricks the LLM into initiating an exfiltration attempt, the mathematical capabilities of the data prevent the outbound network call.
|
||||
|
||||
See the full mathematical foundation in the [Sentinel Lattice Architecture Specification](https://github.com/syntrex-lab/sentinel-community/blob/main/docs/rnd/2026-02-25-sentinel-lattice-architecture.md).
|
||||
See the full mathematical foundation in the [Sentinel Lattice Architecture Specification](../lattice.md).
|
||||
|
|
|
|||
|
|
@ -12,4 +12,4 @@ Traditional security proxies rely heavily on blacklists, regex, or second-model
|
|||
|
||||
## Lattice Integration
|
||||
|
||||
DIP feeds directly into the larger [Sentinel Lattice](https://github.com/syntrex-lab/sentinel-community/blob/main/docs/rnd/2026-02-25-sentinel-lattice-architecture.md) architecture by creating early *Provenance Certificates*. This guarantees that even if a prompt "tricks" the semantic layers, the root source (the external untrusted user) is forever linked mathematically to the parsed intent.
|
||||
DIP feeds directly into the larger [Sentinel Lattice](../lattice.md) architecture by creating early *Provenance Certificates*. This guarantees that even if a prompt "tricks" the semantic layers, the root source (the external untrusted user) is forever linked mathematically to the parsed intent.
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue