Lineage-Recorded Provenance for Every Actuation

by Nick Clark | Published April 25, 2026 | PDF

Every actuator commit, every mode selection, every harm-minimization deviation, every post-actuation verification is recorded in lineage with credentialed signatures. Forensic reconstruction of any incident operates structurally rather than through log archaeology.


What Lineage-Recorded Provenance Specifies

Each actuation event produces a lineage entry containing: the contemplated action, the composite admissibility computation that gated it (with all credentialed observations that contributed), the selected mode, any harm-minimization deviation with the policy under which it was evaluated, the actual commit, the post-actuation verification result, and the credentialing chain for each element.

The lineage is structurally tamper-evident. The credentialed observations and signatures together produce a reconstruction-grade record that survives challenge. Forensic analysis can walk the lineage to reconstruct exactly what happened, when, under what authority, with what supporting evidence.

Why Process-Level Logging Misses Architectural Provenance

Conventional autonomous-system logging records what happened operationally — sensor readings, planner outputs, actuator commands. The logging supports engineering analysis but doesn't capture the architectural provenance that legal and regulatory reconstruction require: under what credentialing authority was each step taken, with what supporting evidence, against what governance policy.

Architectural provenance is what current systems reconstruct from non-architectural sources (engineering documentation, configuration management, OTA update records). The reconstruction has structural gaps that legal challenge surfaces. Lineage-recorded provenance closes the gap.

How Lineage Composes Across the Architecture

Lineage is uniform across the spatial-mesh architecture. The same lineage primitive that records actuation provenance records observation provenance, policy update provenance, mode-selection provenance, and credential-continuity provenance. Cross-primitive forensic reconstruction operates through the unified lineage rather than through per-primitive log integration.

The lineage propagates through the mesh. A unit's lineage events are credentialed observations consumed by audit authorities through their own admissibility framework. Cross-jurisdictional audit (a state DOT auditing fleet operations in its territory, a federal regulator auditing aviation operations across state lines) operates through credentialed cross-recognition.

What This Enables for Audit and Litigation

Regulatory audit gains structural support. EU AI Act audits, FDA AI/ML SaMD post-market surveillance, NHTSA autonomous-vehicle safety review all benefit from the architectural provenance. The compliance pathway maps directly to architectural primitives.

Legal-grade reconstruction in autonomous-incident litigation gains the same structural support. The court's question — what did the system know, under what rules, at what time — has architecturally-supported answers rather than reconstructed-from-engineering-knowledge answers.

Nick Clark Invented by Nick Clark Founding Investors: Devin Wilkie