Skip to content
View nshkrdotcom's full-sized avatar

Block or report nshkrdotcom

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
nshkrdotcom/README.md

NSHKR

A governed write-path substrate for enterprise AI execution

Infrastructure for stateful, effectful AI systems that must preserve authority, workflow truth, receipts, evidence, review, replay, and tenant boundaries while real work is performed.

99 repositories | @North-Shore-AI | nshkr.com


What This Is

nshkrdotcom is the public workspace for NSHKR: a BEAM-native execution stack built on Elixir, OTP, Ash, Postgres, Temporal, and deliberately narrow boundary packages.

Enterprise AI is moving from suggestion to action. The first wave of AI applications helped users draft, summarize, search, and reason. The next wave changes records, coordinates workflows, invokes tools, reconciles systems, collects evidence, escalates exceptions, and asks humans for judgment at the right moments.

NSHKR is built for that transition. Its core execution path is:

intent -> authority -> workflow -> effect -> receipt -> evidence -> projection -> review -> replay

It is not a chat UI, a single agent runtime, or a generic workflow engine. It is write-path infrastructure: the layer where AI proposals become authorized operations and where each operation produces structured, replayable institutional memory.

The platform has one hard constraint: an AI runtime may produce language, plans, code, tool calls, and operator suggestions, but it does not get a direct path to mutate the world. Every consequential action crosses typed context, authority compilation, durable workflow state, lower-runtime dispatch, receipts, evidence, and replayable proof.


The Problem

Enterprise software usually captures outcomes, not decisions.

A discount field records the number, not why the discount was justified. A contract system records the accepted clause, not the rejected fallback positions. A support tool records closure, not why one resolution path was chosen over another. The record preserves the end state while discarding the institutional judgment that produced it.

AI makes that gap operationally dangerous. As agents begin proposing and performing actions, the system has to capture the judgment around those actions: proposal, correction, policy decision, credential scope, external effect, receipt, evidence, review, and eventual outcome.

Without that substrate, enterprises get automation without institutional memory.


The Core Contract

Every AI-mediated action should be able to answer these questions without reading a prompt transcript:

Who asked for this?
What authority did they have?
What workflow was active?
Which external effect was requested?
What actually happened?
What evidence supports the result?
Who reviewed or overrode it?
Can the entire chain be replayed?

In NSHKR, the durable chain is explicit:

Command
  -> OperationContext
  -> ResolvedOperationPlan
  -> AuthorityPacket
  -> GovernedInvocationEnvelope
  -> ExecutionInstruction
  -> EffectReceipt
  -> OperationReceipt
  -> EvidenceRecord
  -> Projection
  -> ReviewCase / Decision
  -> AITrace event DAG

That chain is the product surface. Operators, auditors, support teams, and future automation should be able to query how work moved from request to governed action to observed result.

Question Platform answer
Who asked? actor, tenant, installation, request context
Why was it allowed? authority packet, policy refs, capability grants, lease scope
What changed? operation receipt, evidence record, projection row, review decision, lower fact
Where did it run? workflow refs, execution ids, lower receipts, runtime family refs
Can it be replayed? AITrace DAG, causation refs, idempotency keys, release manifests, proof refs
Can it be stopped? operator commands, revocation evidence, workflow signal paths, safe actions
Can it cross tenants? only when row/store tenant, actor scope, lease scope, and substrate tenant agree

Architecture

The repos form a layered execution stack. Each layer owns one class of truth and has explicit boundaries for what it must not absorb.

Product / Operator
  -> AppKit
  -> Mezzanine
  -> Citadel
  -> Jido Integration
  -> Execution Plane
  -> AITrace
  -> Projections / Reviews / Replay
Layer Responsibility
AppKit Product-facing commands, reads, reviews, leases, traces, and stable DTOs.
Mezzanine Operational truth: workflows, ledgers, binding registry, receipts, evidence, projections, reviews, and run snapshots.
OuterBrain Semantic context, recall, normalized AI outcomes, and semantic failure carriers.
Citadel Authority compilation: capabilities, constraints, policy hashes, review gates, downgrade/reject decisions.
Jido Integration Connector spine: manifests, operation descriptors, credential leases, governed lower invocation.
Execution Plane Raw effect execution across HTTP, CLI, process, sandbox, filesystem, or other lower mechanics.
AITrace Causal execution records, replay, redaction, audit lineage, and proof export.
StackLab Deterministic proof harness: scanners, acceptance gates, failure drills, and second-product validation.
GroundPlane Shared primitive mechanics: refs, idempotency, leases, fences, checkpoints, and persistence helpers.

The stack is not a universal application framework. It is a governed runtime substrate for systems where product commands become durable workflow, authorized action, external effect, receipt, evidence, projection, review, and replayable proof.


How Execution Works

A product does not call a vendor-specific runtime directly. It submits a product-level command through AppKit using product role references such as :issue_tracker, :runtime, :evidence, or :resource_effect.

Mezzanine records the command, creates an operation context, resolves the product role into a compiled binding, captures a run snapshot, and constructs a bounded operation plan. Citadel authorizes the resolved plan against actor, tenant, installation, capability, side-effect class, credential scope, and policy constraints. Jido Integration resolves the connector manifest and materializes the lower invocation. Execution Plane performs the raw mechanics. The resulting receipt returns upward and is reduced into evidence, projections, review state, and replayable trace events.

The important property is that every step is durable and joinable. Boundary envelopes may denormalize safety fields for local checks, but constructors reject mismatches. That prevents reference drift across workflow, receipt, projection, and replay records.


Boundary Invariants

NSHKR is organized around ownership rather than product features:

  • product repos own product behavior and operator journeys
  • AppKit owns the public product boundary
  • Mezzanine owns reusable operational invariants
  • OuterBrain owns semantic context and normalized AI outcomes
  • Citadel owns authority and policy compilation
  • Jido Integration owns connector manifests, leases, and lower invocation envelopes
  • Execution Plane owns raw runtime mechanics and lower receipts
  • AITrace owns replayable proof
  • StackLab owns acceptance gates and failure drills

The compact version is:

Products own meaning.
The platform owns operational invariants.
Connectors own vendor mechanics.
Execution owns raw effects.
Trace infrastructure owns replayable proof.

Provider choices are allowed as data in product packs, connector manifests, receipts, traces, fixtures, and documentation. They are not allowed to become reusable platform control flow. The invariant is explicit: no vendor noun below its proper boundary, and no generic platform method that secretly delegates to provider-shaped logic.


Governed Execution Memory

NSHKR's compounding asset is not chat history. It is governed execution memory.

Each run captures the institutional facts that ordinary software drops:

the proposed action
the authority context
the binding and manifest used
the credential scope
the external effect requested
the lower receipt returned
the evidence attached
the human review or override
the projection update
the causal replay path

Over time, that becomes an enterprise decision graph grounded in actual work. It can answer:

How did we handle this last time?
Which policy allowed it?
Which exception was approved?
Which connector performed the action?
What evidence supported the decision?
Did the outcome validate the action?
What should be done differently next time?

That is the enterprise analogue to the behavioral compounding loops that powered consumer platforms, adapted to enterprise realities: authority, confidentiality, tenant boundaries, credential scope, review, evidence, and auditability.


Provider-Parameterized, Not Provider-Locked

Enterprise AI systems need real tools: GitHub, Linear, Codex, Slack, Jira, Notion, internal document systems, local deterministic connectors, custom APIs, and future providers that do not exist yet.

A product pack can declare concrete bindings:

issue tracker -> Linear
code host -> GitHub
coding runtime -> Codex
document source -> local deterministic document connector

But reusable AppKit and Mezzanine surfaces operate on product roles, operation classes, manifests, receipts, and projections. Provider mechanics live in connector packages or explicit adapter zones.

A system that merely renames sync_linear_issues to sync_source while still hardcoding Linear underneath has not become generic. NSHKR's scanners and proof gates are designed to catch exactly that failure mode.


Proof-Driven Generality

The stack is not allowed to claim generality based on one product.

extravaganza is the first proving-ground product: a coding-operations product that uses provider-specific product semantics while routing governed work through the generic substrate. It preserves product-level concepts such as Linear issues, GitHub pull requests, Codex sessions, workpads, evidence, and cleanup, but those details remain product or connector data rather than platform control flow.

The substrate must also support a neutral second product, toy_document_review, through the same path:

source event
  -> work item
  -> runtime/classification
  -> evidence
  -> review
  -> publication
  -> resource effect
  -> receipt
  -> projection
  -> replay

If extravaganza passes but the neutral product fails, the generic substrate claim is false. StackLab exists to make that visible before the platform decays into glued provider code.


Technical Defensibility

NSHKR's defensibility comes from several compounding technical choices:

  • Durable operation context. Every governed action joins back to one operation context carrying actor, tenant, installation, trace, request, idempotency, workflow, authority, binding snapshot, and causation references.
  • Binding registry and run snapshots. Product roles resolve into compiled binding records, connector manifests, credential scopes, and compatibility checks. A run captures the operation plan it will use, so steady-state dispatch does not chase mutable provider configuration on every operation.
  • Authority after resolution. Citadel authorizes the resolved operation plan after Mezzanine knows the operation class, manifest ref, binding ref, side-effect class, required scope, and credential constraints.
  • Compact receipts plus lineage. Operation receipts are compact outcome records. Detailed lineage is attached through trace and evidence records, keeping projections efficient while preserving replay depth.
  • Causal replay. AITrace records execution as a causal DAG with predecessor references. Replay is not raw emission order; concurrent events reduce through deterministic tie-breakers and declared merge semantics.
  • Fail-closed operator semantics. Missing bindings, stale registry epochs, manifest mismatches, side-effect expansion, scope expansion, missing credential leases, missing confirmation policies, and registry unavailability produce stable, operator-visible failure classes.
  • Static gates and negative controls. StackLab enforces no-bypass, no-vendor-noun, supervised-process, generic-dispatch, manifest-dependency, Citadel-policy, and legacy-residue gates.

Why BEAM / OTP

Enterprise AI execution is a distributed systems problem before it is a model problem.

NSHKR is naturally aligned with the BEAM model: supervised processes, explicit failure handling, durable state machines, message passing, long-running workflows, and high-concurrency operational systems. The broader ecosystem includes OTP-native components for agent sessions, tracing, connector integration, subprocess-backed AI runtimes, and governed execution.

That is why the stack separates workflow truth, authority, connector mechanics, runtime mechanics, and trace proof instead of hiding them inside one convenient agent process.


Category Position

NSHKR sits between several existing categories but is not reducible to any of them.

Existing category Limitation NSHKR position
Agent frameworks Tool execution without durable enterprise governance Governed execution substrate
Workflow engines Procedural automation without AI-native provenance AI-mediated workflow truth
Observability platforms Logs and spans after execution Causal action memory
GRC tools Governance outside the action path Governance embedded in execution
Data warehouses Read-path analytics after decisions Write-path capture during decisions
SaaS agents Siloed provider workflows Cross-system provider-parameterized substrate

Start Here

If you care about Start with What to look for
Product boundary and no-bypass rules app_kit, extravaganza Stable northbound DTOs, product commands, operator reads, reviews, install bootstrap, product/hazmat scans
Durable operational truth mezzanine Pack compilation, binding registry, workflow lifecycle, execution ledgers, decisions, evidence, projections
Semantic and authority separation outer_brain, citadel Context assembly, semantic outcomes, policy compilation, authority packets, governance envelopes
Connector spine and lower facts jido_integration Manifests, operation descriptors, leases, auth lifecycle, connector admission, lower-fact reads
Raw runtime mechanics execution_plane, cli_subprocess_core, agent_session_manager Process/session/JSON-RPC lanes, sandbox posture, lower receipts, terminal and coding-session mechanics
Provider families pristine, prismatic, github_ex, linear_sdk, notion_sdk OpenAPI, GraphQL, REST, and connector-specific normalization without owning platform truth
Python and ML runtime bridges snakepit, snakebridge, slither, DSPex External runtime pools, generated bindings, Python-backed pipelines, DSPy-style optimization on BEAM surfaces
Proof and operator visibility stack_lab, AITrace, ElixirScope, switchyard Restart drills, fault injection, trace joins, execution cinema, operator workbench surfaces

Engineering Principles

  • One owner per durable fact. Execution records, decision records, lower receipts, source publications, memory fragments, and operator projections each need a clear writer.
  • Semantic richness stops at the boundary. LLMs can propose, summarize, repair, and classify. Durable mutation requires typed intent, authority, idempotency, and an owner that can replay or reject the operation.
  • Lower runtimes emit receipts, not meaning. Execution Plane and provider-family packages own transport fidelity, session mechanics, placement, sandbox posture, and raw facts. Product meaning and review state live above them.
  • Read paths still need tenant proof. A caller-supplied run id, receipt id, issue id, or workflow id is never enough. Tenant scope has to match at the public surface, substrate authorization layer, and lower-facts boundary.
  • Long-lived work is workflow state. Temporal owns active workflow lifecycle where durable orchestration matters. Postgres owns facts and projections. Local queues are delivery and cleanup tools only where explicitly retained.
  • Proof is a product surface. Trace ids, causation, idempotency, source positions, schema hashes, release manifests, projection hashes, audit facts, and proof tokens are part of the operator contract.
  • Generate scaffolding, keep meaning explicit. DTOs, mappers, manifests, and bridge code can be generated when that reduces drift. Policy interpretation, pack semantics, and owner decisions remain explicit source.

Repository Atlas

This inventory is generated from live GitHub metadata and grouped by nshkr-* topics so it stays current as the ecosystem grows.

Category Repositories
AI Agents 13
AI SDKs 18
AI Infrastructure 20
Schema 3
Developer Tools 14
User Interface 1
OTP 5
Testing 4
Observability 4
Data 2
Security 4
Research 4
Utilities 3
Devools 1
Misc 1
Other 2

Repositories By Category

AI Agents (13)

Repository Description
ALTAR The Agent & Tool Arbitration Protocol
DSPex Declarative Self Improving Elixir - DSPy Orchestration in Elixir
ds_ex DSPEx - Declarative Self-improving Elixir
extravaganza First proving-ground product app for the nshkr stack: a thin, sophisticated o...
flowstone Asset-first data orchestration for Elixir/BEAM. Dagster-inspired with OTP fau...
flowstone_ai FlowStone integration for altar_ai - AI-powered data pipeline assets with cla...
jido_hive Phoenix coordination server and embeddable Elixir client for augmented human-...
mabeam Multi-agent systems framework for the BEAM platform - build distributed auton...
mezzanine Neutral high-level reusable monorepo for the nshkr stack: Ash-driven business...
pipeline_ex Claude Code + Gemini AI collaboration orchestration tools
stack_coder An advanced Elixir-based AI coding agent focused on full-stack code generatio...
synapse Headless, declarative multi-agent orchestration framework with a domain-agnos...
synapse_ai Synapse integration for altar_ai - SDK-backed LLM providers for multi-agent w...

AI SDKs (18)

Repository Description
agent_session_manager Agent Session Manager - A comprehensive Elixir library for managing AI agent ...
altar_ai Protocol-based AI adapter foundation for Elixir - unified abstractions for ge...
amp_sdk Elixir SDK for the Amp CLI — provides a comprehensive client library for inte...
claude_agent_sdk An Elixir SDK for Claude Code - provides programmatic access to Claude Code C...
cli_subprocess_core Foundational Elixir runtime library for deterministic CLI subprocess orchestr...
codex_sdk OpenAI Codex SDK written in Elixir
external_runtime_transport An Elixir-first external runtime transport foundation for AI SDK integrations...
gemini_cli_sdk An Elixir SDK for the Gemini CLI — Build AI-powered applications with Google ...
gemini_ex Elixir Interface / Adapter for Google Gemini LLM, for both AI Studio and Vert...
github_ex Native Elixir SDK for the GitHub REST API — comprehensive, idiomatic client f...
jules_ex Elixir client SDK for the Jules API - orchestrate AI coding sessions
linear_sdk Elixir SDK for Linear built on Prismatic, using a schema-driven GraphQL toolc...
llama_cpp_sdk Barebones Elixir wrapper and integration surface for llama.cpp experiments, l...
mcp_client Full-featured Elixir client for the Model Context Protocol (MCP) with multi-t...
notion_sdk Native Elixir SDK for the Notion API — comprehensive, idiomatic client for No...
ollixir Ollixir provides a first-class Elixir client with feature parity to the offic...
self_hosted_inference_core Core Elixir primitives for building reliable self-hosted inference clients, p...
vllm vLLM - High-throughput, memory-efficient LLM inference engine with PagedAtten...

AI Infrastructure (20)

Repository Description
app_kit Shared app-facing surface monorepo for the nshkr platform core: composition, ...
command Core Elixir library for AI agent orchestration - unified workbench for runnin...
execution_plane Execution Plane is an Elixir/OTP runtime substrate for boundary-aware AI infr...
gepa_buildout Deterministic GEPA buildout examples and domain task fixtures for framework v...
gepa_ex Elixir implementation of GEPA: LLM-driven evolutionary optimization using Par...
gepa_framework Reusable GEPA optimizer framework for typed candidate generation, evaluation,...
ground_plane Shared lower infrastructure monorepo for the nshkr platform core: contracts, ...
inference Reusable Elixir semantic inference contracts, adapters, trace metadata, and c...
json_remedy A practical, multi-layered JSON repair library for Elixir that intelligently ...
outer_brain Semantic runtime above Citadel for raw language intake, context assembly, mod...
portfolio_core Hexagonal architecture core for Elixir RAG systems. Port specifications, mani...
portfolio_index Production adapters and pipelines for PortfolioCore. Vector stores (pgvector,...
portfolio_manager AI-native personal project intelligence system - manage, track, and search ac...
rag_ex Elixir RAG library with multi-LLM routing (Gemini, Claude, OpenAI, Ollama), G...
skill_ex Claude Skill Aggregator
slither Lightweight Elixir runtime for composing and executing Python-backed data pip...
snakebridge Compile-time Elixir code generator for Python library bindings. Declare depen...
snakepit High-performance, generalized process pooler and session manager for external...
stack_lab Local distributed-development harness and proving ground for the full stack: ...
trinity_framework Reusable TRINITY router and coordination framework for deterministic agent ro...

Schema (3)

Repository Description
exdantic A powerful, flexible schema definition and validation library for Elixir, ins...
perimeter Advanced typing and type validation mechanism for Elixir - runtime type check...
sinter Unified schema definition, validation, and JSON generation for Elixir

Developer Tools (14)

Repository Description
ElixirScope AI-Powered Execution Cinema Debugger for Elixir/BEAM
atlas_once Atlas Once is a filesystem-first personal memory system and Unix-native conte...
blitz Small parallel command runner for Elixir and Mix workspaces that executes iso...
coolify_ex Generic Elixir tooling for triggering, monitoring, and verifying Coolify depl...
dexterity Code Intelligence: Token-budgeted codebase context for Elixir agents. Solves ...
elixir_dashboard A Phoenix LiveView performance monitoring dashboard for tracking slow endpoin...
elixir_scope Revolutionary AST-based debugging and code intelligence platform for Elixir a...
elixir_tracer Local-first observability for Elixir with New Relic API parity
ex_dbg State-of-the-Art Introspection and Debugging System for Elixir/Phoenix Applic...
portfolio_coder Code Intelligence Platform: Repository analysis, semantic code search, depend...
prismatic GraphQL-native Elixir SDK platform and monorepo for schema-driven providers, ...
pristine Shared runtime substrate and build-time bridge for first-party OpenAPI-based ...
prompt_runner_sdk Prompt Runner SDK - Elixir toolkit for orchestrating multi-step prompt execut...
weld Deterministic Hex package projection for Elixir monorepos: audit app identiti...

User Interface (1)

Repository Description
switchyard Terminal-native operator workbench monorepo for multi-site terminal applicati...

OTP (5)

Repository Description
apex Core Apex framework for OTP supervision and monitoring
apex_ui Web UI for Apex OTP supervision and monitoring tools
arsenal Metaprogramming framework for automatic REST API generation from OTP operations
arsenal_plug Phoenix/Plug adapter for Apex Arsenal framework
superlearner OTP Supervisor Educational Platform

Testing (4)

Repository Description
cluster_test Distributed Erlang/Elixir test cluster management via Mix tasks
playwriter Elixir WSL-to-Windows browser integration
sandbox Isolated OTP application management system for Elixir/Erlang
supertester A battle-hardened testing toolkit for building robust and resilient Elixir & ...

Observability (4)

Repository Description
AITrace The unified observability layer for the AI Control Plane
citadel The command and control layer for the AI-powered enterprise
foundation Elixir infrastructure and Observability Library
telemetry_reporter Pachka-powered telemetry reporter for Elixir that batches client-side events,...

Data (2)

Repository Description
duckdb_ex DuckDB driver client in Elixir
weaviate_ex Modern Elixir client for Weaviate vector database with health checks and frie...

Security (4)

Repository Description
ASKA Secure Computing in the AI age
GUARDRAIL GUARDRAIL - MCP Security - Gateway for Unified Access, Resource Delegation, a...
Shield SHIELD: Secure Hierarchical Inter-agent Layer for Distributed Environments
pqc-hqc Post-quantum cryptographic implementation of HQC (Hamming Quasi-Cyclic) - a N...

Research (4)

Repository Description
ChronoLedger Hardware-Secured Temporal Blockchain
EADS Evolutionary Autonomous Development System
anti_agents Anti Agents - Inspired by Sakana AI's String Seed of Thought paper
trinity_coordinator TRINITY in Elixir (An Evolved LLM Coordinator): route LLM calls via a small-m...

Utilities (3)

Repository Description
multipart_ex Client-agnostic multipart/form-data builder for Elixir with explicit file inp...
tools Utility library and helper functions for Elixir development - common patterns...
youtube_audio_dl Download high-quality audio from YouTube as MP3 files using Elixir. Features ...

Devools (1)

Repository Description
alkahest Reusable Temporal facade, typed workflow-control contracts, Elixir client, an...

Misc (1)

Repository Description
prappy Windows-native C++20 app and reproducible setup for SDL3, bgfx, Dear ImGui, C...

Other (2)

Repository Description
docs Docs
nshkrdotcom Personal GitHub profile README with Elixir/AI projects and LLM reliability re...

Related

Resource Description
@North-Shore-AI Organization-level ML reliability, experimentation, labeling, and research stacks
nsai.online Organization site and ecosystem entry point
nsai.space Research, experiments, and long-form exploration
nsai.store Package and distribution catalog

Profile automation

nshkrdotcom.github.io now publishes repo logos under content-hash paths such as /logos/{repo}-{sha12}.svg, so downstream logo URLs are intentionally versioned instead of stable /logos/{repo}.svg aliases.

Changes to this repo's README*, assets/, logo/, logos/, static/, and docs-hosted image assets are picked up automatically by nshkrdotcom.github.io on its scheduled source-change scan. If NSHKR_SITE_SYNC_TOKEN is configured, this repo can also dispatch an immediate sync directly.

Updated 2026-05-20

Pinned Loading

  1. gemini_ex gemini_ex Public

    Elixir Interface / Adapter for Google Gemini LLM, for both AI Studio and Vertex AI

    Elixir 31 10

  2. synapse synapse Public

    Headless, declarative multi-agent orchestration framework with a domain-agnostic signal bus, workflow engine with Postgres persistence, and configurable agent runtime (ships code review domain).

    Elixir 44 2

  3. json_remedy json_remedy Public

    A practical, multi-layered JSON repair library for Elixir that intelligently fixes malformed JSON strings commonly produced by LLMs, legacy systems, and data pipelines.

    Elixir 32 2

  4. claude_agent_sdk claude_agent_sdk Public

    An Elixir SDK for Claude Code - provides programmatic access to Claude Code CLI with streaming message processing

    Elixir 31 4

  5. flowstone flowstone Public

    Asset-first data orchestration for Elixir/BEAM. Dagster-inspired with OTP fault tolerance, LiveView dashboard, lineage tracking, checkpoint gates, and distributed execution via Oban.

    Elixir 27 2

  6. codex_sdk codex_sdk Public

    OpenAI Codex SDK written in Elixir

    Elixir 20 1