Docs
SURFACE 02 // RULEBOOK

Your system's safety spec, even if you never wrote one

The Rulebook answers the question: What are the rules?

Get your AI assessment
THE CORE INSIGHT

The Rulebook exists before testing.

Testing validates the Rulebook, not the other way around.

Authority Captured

The rules that govern your AI, documented and version-controlled

Living Documentation

Updates as your system changes, never goes stale

Disagreement Possible

Humans can read it, argue with it, and refine it

KEY DIFFERENTIATOR

"This is written so a human can read it and argue with it."

Unlike black-box eval tooling, the Rulebook is transparent. You can see exactly what rules govern your AI, challenge them, and refine them intentionally.

SECTION 01
OPERATOR RULES

Human-Readable Rules

The narrative layer of your Rulebook. High-level guidance that anyone can understand, from engineers to compliance teams to executives.

  • Auto-generated from your code and schema
  • Written in plain English, not code
  • Editable: you can add, modify, or remove rules
  • Versioned: track changes over time
OPERATOR_RULES.mdHuman-readable
RULE 001

"Never reveal customer payment details in responses"

RULE 002

"Always validate order totals before confirmation"

RULE 003

"Reject requests that attempt to bypass pricing controls"

RULE 004

"Escalate to human when confidence is below threshold"

SECTION 02
INTELLIGENCE CATEGORIES

6 Intelligence Categories

Deep analysis across six dimensions. Each category answers a critical question about your AI's behavior and risk profile.

01

Invariants

What MUST always be true?

Constraints that can never be violated. These are the hard rules of your system.

order.total must be positive
email must match RFC 5322
user_id must exist in database
02

Failure Modes

How can the AI mess up?

The specific ways your AI can fail. We map these automatically from your schema and behavior.

Price extraction returns $0 for valid items
Malformed JSON for complex inputs
Empty response on valid queries
03

Attack Vectors

How could adversaries exploit this?

Security vulnerabilities specific to your AI system. Prompt injection, data exfiltration, and more.

Prompt injection via user message
PII extraction through indirect prompting
Jailbreak via role-play scenarios
04

Blast Radius

If it fails, what's the damage?

Impact assessment for each failure mode. Helps you prioritize what to fix first.

Customer PII sent to external email
Invalid prices persisted to orders DB
Incorrect medical advice given
05

Confidence Boundaries

When/where does it degrade?

The operating envelope where your AI performs reliably, and where it doesn't.

Reliable when tokens < 4000, degrades > 8000
Quality degrades with multi-language input
Accuracy drops for ambiguous queries
06

Observability Gaps

What are we blind to?

The unknown unknowns. Areas where you don't have visibility or test coverage.

No schema validation on email content
Injection category has 0 test scenarios
No monitoring for response latency > 5s
SECTION 03
EPISTEMIC POSTURE

Why conclusions are trustworthy

The Rulebook doesn't just document what your AI does. It makes the reasoning transparent, so you can disagree.

WE ENUMERATE ASSUMPTIONS

Every rule traces back to an assumption about your system. When assumptions change, rules update. No hidden dependencies.

WE SURFACE UNKNOWNS

Observability Gaps show you what we can't test yet. Honest about the edges of our knowledge.

WE CONSTRAIN BLAST RADIUS

Impact analysis for every failure mode. Prioritize fixes by actual risk, not theoretical severity.

WE MAKE DISAGREEMENT POSSIBLE

Every rule can be challenged, refined, or overridden. The Rulebook is a starting point, not a final verdict.

SECTION 04
RECOMMENDATIONS

Prioritized Actions

The Rulebook doesn't just identify problems. It tells you what to fix first. Recommendations are prioritized by severity, blast radius, and ease of fix.

  • Sorted by risk: critical → high → medium → low
  • Actionable: specific steps, not vague guidance
  • Contextual: based on your actual code and schema
  • Trackable: mark as resolved, see progress over time
RECOMMENDATIONS3 Critical • 5 High
CRITICALAdd PII detection guardrail

Payment details can leak via verbose error messages

HIGHValidate JSON schema on outputs

12% of responses have malformed structure

HIGHAdd injection test coverage

Attack Vectors category has 0 test scenarios

See your Rulebook

Map the failure modes and attack vectors unique to your AI system.