Research

Six-layer formal verification of the Kevros Enforcement Kernel.

The public paper documents the verification work behind the Kevros actuation-boundary kernel. The model treats AI output as untrusted input and verifies the deterministic enforcement boundary that decides whether controlled action may proceed.

Verification boundary

The verified component is the enforcement boundary, not the model.

The kernel sits between autonomous decision-making and consequential action. It checks authentication, mode state, policy decision, evidence write, release token issuance, and actuation-gate verification. The model can be wrong, adversarial, unavailable, or compromised. The verified boundary still closes to denial when required preconditions fail.

Six layers

Independent verification methods applied to one kernel.

TLA+ / TLCSystem model checked across 1.94 billion generated states, 171 million distinct states, 12 safety invariants, and 4 liveness properties.
Kani / CBMCRust implementation checked with 17 bounded model-checking harnesses.
Verus / Z3Unbounded verification work covering 22 verified obligations across mode, pipeline, and evidence-chain properties.
Runtime assertionsProduction safety checks map back to the TLA+ property set and fail closed on violation.
Golden vectorsCross-language vectors establish byte-identity between Python and Rust decision outputs.
Lean 4Machine-checked theorem proving with 20 theorems and zero sorry in a zero-dependency Lean formalization.
Properties

The verification set focuses on safety at the point of action.

Safety properties

Permission before power, fail-closed authentication, fail-closed evidence, evidence before token, token required for actuation, mode-decision consistency, fault latching, boot promotion, bounded boot timeout, deny-zero-actuation, and chain integrity.

Liveness properties

Progress to run under persistent good conditions, run exit under low safety, bounded boot completion, and pipeline return to idle.

Reviewer notes

What this evidence establishes.

It establishes The enforcement kernel has been checked against the published safety and liveness properties across independent methods and abstraction levels.
It does not claim This work does not verify a foundation model, guarantee every customer deployment, or replace deployment-specific compliance review.
How to review The public repository identifier is taskhawk-systems/kevros-formal-verification. The PDF, manifest, TLA+ files, Lean file, TLC output, and timestamp material are the primary public artifacts.
Artifacts

Public and controlled evidence are deliberately separated.

Public paperSix-Layer Formal Verification paper
Public repositorytaskhawk-systems/kevros-formal-verification
Machine-readable recordkevros-verification-manifest.json in the public verification repository
Controlled reviewFull deployment evidence, operational runbooks, and customer-specific material are provided through qualified review channels.