DecisionGraph Core
DecisionGraph CoreCore Concept

Causal Reachability Model (CRM)

A Proposal for Secure and Responsible Systems in the Age of AI

1. Overview

Modern systems rely on rules.

We define policies, write guidelines, and instruct agents—human or artificial—on what they should or should not do. Yet, these rules are routinely violated, misunderstood, or bypassed.

  • Access control systems grant broad permissions that are difficult to constrain dynamically
  • RAG systems retrieve sensitive data before access checks are enforced
  • AI agents can be manipulated through prompt injection and adversarial inputs
  • Compliance frameworks depend on interpretation rather than enforcement

Across domains, the pattern is the same:

Rules exist, but they can be broken.

2. The Shift

Security should not rely on rules.
It should rely on reachability.

Instead of asking whether an action is allowed, CRM asks whether there exists a valid path to the action.

If no such path exists, the action is not merely forbidden—it is impossible.

3. Core Model

G = (V, E, Φ)

R(s, τ) = { t ∈ V | s ⇝ t is valid at commit τ }

Here, V represents immutable decision nodes,E directed causal edges, and Φ semantic relations.

A state is reachable if and only if there exists a valid causal path to it, where all constraints along the path are satisfied.

  • Systems are represented as graphs of states and transitions
  • Actions are reachable only through valid causal paths
  • Each transition is constrained by explicit conditions
  • Permissions are derived from structure, not assigned as static flags
No path means no capability.

4. From Permission to Path

Traditional Model
User → hasPermission → Action

CRM Model
Actor
 → Role
 → Context
 → Constraints
 → Approval
 → Action

Access is no longer a boolean decision. It becomes the result of a validated causal chain.

5. Key Principle

CRM does not control behavior.
It defines the space of reachable actions.

6. Why This Matters

6.1 AI Safety by Construction

AI systems do not need to perfectly interpret rules.

They may generate any intention internally, but:

They cannot execute actions without a valid path.

Prompt injection becomes insufficient, because persuasion cannot create structure.

6.2 Security as Topology

Security becomes a property of system structure.

  • No edge → no transition
  • No path → no execution

This eliminates entire classes of vulnerabilities rooted in misinterpretation or misuse.

6.3 Compliance as Reachability

Compliance shifts from:

Did anyone violate the rules?

to:

Is violation even reachable?

This enables:

  • Deterministic audits
  • Formal verification
  • Continuous validation

6.4 Explainability Through Causality

Every action is traceable through its path:

  • Why was it allowed?
  • Which constraints were satisfied?
  • What enabled the transition?
Explanation is not reconstructed—it is inherent.

7. Architecture

AI / Agent Layer
  → proposes actions

Reachability Layer (Graph)
  → validates possible paths

Execution Layer
  → executes only reachable actions

Agents are free to think.

They are not free to act beyond the graph.

Active(V) = {
  v ∈ V |
  ¬∃ v' ∈ V, v →supersedes v'
}

Only active nodes participate in valid traversal. Superseded nodes remain immutable but are structurally shadowed.

8. Implementation Stack

DecisionGraph Core
  = Reachability Engine

TraceOS
  = State Transition Layer

ClaimAtom
  = Causal Justification Layer

TraceSupport
  = Path Debugging / Explanation Layer

9. Implications

  • AI agents and autonomous systems
  • Financial transactions and approval workflows
  • Healthcare data access
  • Enterprise systems
  • Multi-agent coordination
  • Knowledge and reasoning systems
Control what is reachable, not what is intended.

10. Conclusion

A secure system is not one where bad behavior is forbidden.
A secure system is one where bad behavior is unreachable.

Define what is reachable.
Everything else becomes impossible.