KB-4592

dot-iu-cutter v0.3 / App-Tooling Next-Phase Routing Note (no runtime authorized) (2026-05-16)

5 min read Revision 1
dot-iu-cutterdieu44v0.3planningrouting-noteapp-toolingno-runtime-authorized

dot-iu-cutter v0.3 / App-Tooling — Next-Phase Routing Note

document_path: knowledge/dev/laws/dieu44-trien-khai/v0.2-planning/dot-iu-cutter-v0.3-app-tooling-routing-note-2026-05-16.md
revision: r1
date: 2026-05-16
author: Agent (Claude Code CLI, Opus 4.7 1M)
phase: post-v0.2 ROUTING NOTE (planning pointer only — NOT a design, NOT a build)
status: no_runtime_work_authorized

No runtime / app / tooling / integration work is authorized yet. This note only routes what could come next for a future scoping decision. Every workstream below is gated on its own design → GPT review → dry-run → command-review → execution chain, plus an explicit User prompt. Agent self-advance to any of these is PROHIBITED.


§1 — Where We Are

schema_layer: DONE  (v0.2 structural schema complete — 12 cutter_governance
  tables, all empty, GPT-ratified 2026-05-16)
next_layer: app / tooling / integration DESIGN
runtime_authorized: false

The structural foundation (entry/backlog family, signing, change-set, verify, manifest, review_decision, canonical-address alias) exists and is empty. The next layer is the runtime that uses it — but that layer is design-first and unauthorized until reviewed.

§2 — Candidate Workstreams (unordered catalogue)

1. cutter_agent_write_path:
   the authorized agent path that creates cut_change_set / affected_row /
   decision_backlog_entry rows. First writer into the empty schema.
2. canonicalization_library_runtime:
   runtime that produces/resolves canonical_address + canonical_address_alias
   (alias coining, validity windows). Today alias table is empty.
3. signing_scheme_runtime:
   dot_pair_signature production/verification (executor/verifier pair,
   prior_signature lineage) — the dual-signature mechanism.
4. signal_routing:
   how backlog entries (decision_backlog_entry) are emitted, swept
   (decision_backlog_sweep_log), and chained (history / dependency).
5. directus_permissions_RLS_read_roles:
   expose the 12 tables safely — read roles, row-level security, no UI write
   path until governed. Currently NOT configured.
6. api_tooling_integration:
   external/tooling API surface over manifest + review_decision + verify_result.
7. integration_tests_and_dry_run_CUT_VERIFY:
   end-to-end CUT/VERIFY exercised in an isolated dry-run env (NEVER production)
   before any production CUT/VERIFY is ever proposed.

§3 — Explicit Authorization State

authorized_now: NOTHING in §2 (closeout only)
not_authorized:
  - production CUT
  - production VERIFY
  - data writes into cutter_governance
  - Qdrant / vector mutation
  - app / tooling deploy or integration
  - Directus permissions / RLS / UI changes
  - any further schema migration
  - self-advance to v0.3 or any runtime phase
each_workstream_gate: own design → GPT review → dry-run → command-review →
  production-execution chain + explicit User prompt + separate session
recommendation: begin with the LOWEST-RISK, read-side, reversible workstream:
  #5 directus_permissions_RLS_read_roles  (read-only exposure design)
why:
  - the schema is empty, so a read-role/RLS design carries no data risk
  - it unblocks safe inspection/observability of the new tables without any
    write path or runtime build
  - it is independent of the canonicalization / signing runtime decisions,
    which are heavier and should be scoped after the data model is observable
  - natural precursor to #6 (API/tooling) and #7 (integration tests)
deliverable_of_that_step: a DESIGN document only (no Directus change), authored
  for GPT review. Directus permission/RLS changes themselves remain forbidden
  until that design is reviewed and explicitly authorized.
alternative_if_user_prioritises_function_over_safety_ordering:
  #1 cutter_agent_write_path design (defines the first governed writer) — higher
  conceptual risk, still design-only, also acceptable as a starting scope.
agent_action_now: NONE. Await explicit User direction + GPT review before any
  workstream design begins. Self-advance PROHIBITED.

End of v0.3 / app-tooling next-phase routing note (no runtime authorized).

Back to Knowledge Hub knowledge/dev/laws/dieu44-trien-khai/v0.2-planning/dot-iu-cutter-v0.3-app-tooling-routing-note-2026-05-16.md