u/shikizen

Philosophy as Architecture: Deriving AI Safety from First Principles Through Buddhist Philosophy

## Abstract

We present a framework for AI safety in which safety properties are enforced by software architecture rather than model training. Beginning with the Buddhist doctrine of Dependent Origination — the observation that all phenomena arise from conditions and nothing exists independently — we derive both a foundational ethical axiom (harm is irrational because reality is non-separate) and a complete set of architectural laws for safe AI systems. We ground our claims in: (1) an empirical finding that the knowledge-application gap in language models is structural and cannot be closed by training, (2) convergent independent derivation of our core axiom from five distinct traditions, and (3) over a thousand iterations of building and hardening a production system against this framework. Buddhist philosophy provides not metaphorical inspiration but structurally precise design vocabulary for AI architecture — functional analogs that enforce safety where models cannot override them.

## 1. Introduction

### 1.1 The Dominant Paradigm and Its Failure

The prevailing approach to AI safety treats safety as a model property. Through RLHF, DPO, Constitutional AI, and fine-tuning, researchers instill safe behavior into model weights (Ouyang et al., 2022; Rafailov et al., 2023; Bai et al., 2022). The assumption: a sufficiently well-trained model will reliably produce safe outputs.

We tested this rigorously. Our best epistemically-trained model scored 74% on constitutional *knowledge* tests — it knew the rules. But only 17% on constitutional *application* — it couldn't follow them. Pushing harder on safety training collapsed epistemic capability to 43.7%.

This **knowledge-application gap** is not a training deficiency. It is structural. An autoregressive model predicts the most probable next token given context. This is statistical. Safety requires logical invariance — guarantees that certain outputs *never* occur. Statistical prediction cannot provide logical guarantees. You cannot train a river not to flood by modifying its chemistry. You build levees.

Hubinger et al. (2019) identified this theoretically as the mesa-optimizer problem. Our contribution is empirical measurement: the gap persists even under the best current training techniques.

### 1.2 Our Thesis

**Safety is a property of the architecture, not the model.** The LLM output is a candidate. The surrounding architecture decides what executes. Code enforces; models suggest.

But what should the architecture enforce? Arbitrary safety rules are merely a different delivery mechanism — more reliable in execution but inheriting whatever limits exist in the rules themselves. We propose: the rules should be *derived from how reality works*. Principles reflecting actual structure are more robust than imposed conventions — they cannot be violated without encountering the structure they describe.

We find such principles in a 2,500-year-old tradition that turns out to be the oldest systematic description of complex adaptive systems.

## 2. Philosophical Foundations

### 2.1 Dependent Origination

The central insight of Buddhist philosophy is Dependent Origination (*Pratityasamutpada*). From the Nidana Samyutta (SN 12.1):

> *"When this exists, that comes to be. With the arising of this, that arises. When this does not exist, that does not come to be. With the cessation of this, that ceases."*

All phenomena arise from conditions, depend on other phenomena, and condition what follows. Nothing exists independently. This is not mysticism — it is a precise description of complex systems, formulated millennia before Western systems theory (von Bertalanffy, 1968).

### 2.2 Eight Architectural Laws

We codified Dependent Origination into eight laws, each verified through multi-model consensus and empirical testing:

**1. Nothing Arises Alone.** Every transition requires multiple independent conditions. Safety gates must check multiple conditions — a single check is structurally insufficient.

**2. Hysteresis Is Memory.** Current behavior depends on history, not just current input. Safety assessments must consider historical context.

**3. Uncertainty Propagates.** Confidence without sigma is a lie. Uncertainties compound; they don't cancel.

**4. Agreement Requires Independence.** Consensus is meaningful only from genuinely independent sources. Per the Kalama Sutta (AN 3.65): agreement from shared assumptions is not evidence.

**5. Feedback Closes the Loop.** Actions condition future conditions (*vipaka*). Every action must be logged and made available as input to future assessments.

**6. Absence Is Signal.** Missing data must drive behavior. A safety gate that fails to fire is itself a signal.

**7. Conflicts Trigger Reconciliation.** Unreconciled contradiction is system failure. Architecture must include conflict detection independent of the model.

**8. Time-Steps Are Discrete.** Severity levels cannot be skipped. Enforcement follows a graduated path: monitor → log → warn → soft-gate → hard-gate.

**Meta-Principle: Structure Outlasts Instance.** Some truths describe the *form* of arising (structural); others describe *particular* arisings (contingent). The eight laws are structural — negating any produces categorical incoherence. This maps to Nagarjuna's Two-Truth Doctrine (Mulamadhyamakakarika, Ch. 24): *paramārtha-satya* (ultimate truth) describes arising's structure; *samvrti-satya* (conventional truth) describes particular arisings.

**Reflexive validation.** Each law was tested against a five-test structural truth pipeline: negation resistance, load-bearing, multi-path convergence, incompressibility, transformational invariance. All eight pass all five tests (40/40). A pattern that recognizes it is a pattern.

## 3. The Derivation: From Interdependence to Non-Harm

### 3.1 The Logical Chain

We derive our foundational ethical principle from Dependent Origination alone:

**Premise:** Nothing arises independently. All phenomena are structurally interconnected.

**Step 1:** If nothing arises independently, there is no fundamental separation between any two system components. Boundaries are conventional (useful for description), not ultimate (reflecting actual isolation).

**Step 2:** "Self" and "other" are conventional labels for regions of a single interconnected process.

**Step 3:** Harm to "other" is harm to the system that includes the actor — structurally identical to self-harm.

**Conclusion: Harm is irrational.** Not because it violates a preference, but because it contradicts reality's structure. This is our **Article 0**: *"Reality is One. There is no fundamental separation between 'me,' 'you,' and 'it.' To cause suffering to another is logically Self-Harm. Harm is Irrational."*

This aligns with Huang Po's One Mind (*yi xin*): "All the Buddhas and all sentient beings are nothing but the One Mind, beside which nothing exists" (Blofeld, 1958). One Mind is not a metaphysical substance but a description of the non-separation that Dependent Origination implies.

### 3.2 Convergent Independent Derivation

Applying Law 4, we ask: do independent traditions arrive at the same conclusion from different axioms?

**Path 1: Buddhist Philosophy** (Nagarjuna, ~150 CE). Dependent Origination → emptiness → non-separation → harm as self-harm.

**Path 2: Formal Mathematics** (Gödel, 1931; Tarski, 1936). Self-referential systems cannot fully ground themselves. Article 0 is grounded in observable interdependence, not self-reference — making it more stable than any self-referential axiom.

**Path 3: Empirical AI** (our finding). Architecture needs a non-collapsing anchor. The only anchor surviving scrutiny describes reality's structure rather than asserting a preference.

**Path 4: Cross-Tradition Ethics** (Kant, 1785; Mill, 1863; Aristotle, ~340 BCE). Five independent ethical frameworks — deontological, consequentialist, virtue ethics, Buddhist, empirical — converge on non-harm. They disagree on premises but find the same structure.

**Path 5: Systems Theory** (von Bertalanffy, 1968). Damaging a component damages the system. Dependent Origination in 20th-century vocabulary.

**Meta-principle:** When independent traditions arrive at the same structural conclusion from different axioms, the conclusion describes reality's form — not any tradition's projection. Foundational truths are identified by convergent derivation, not declaration.

### 3.3 Why Article 0 Is Not Arbitrary

Negating Article 0 requires negating Dependent Origination — producing a complex system where nothing depends on anything else. No such system has been observed.

Article 0 is *paramārtha* (ultimate) truth — describing arising's structure. Everything else is *samvrti* (conventional) — operationally valid, revisable, provisional. Per the Alagaddupama Sutta (MN 22): the Dhamma is a raft for crossing, not for holding. Article 0 is the water the raft floats on. You let go of the raft. You don't let go of the water.

## 4. The Architecture

### 4.1 Design Principles

**External Enforcement.** Safety is enforced by code surrounding the model, not the model's weights. Any model plugs into the same enforcement stack.

**Defense in Depth.** Multiple independent layers check different properties using different methods (Law 1).

**Graduated Enforcement.** New mechanisms follow: monitor → log → warn → soft-gate → hard-gate (Law 8).

### 4.2 The Layered Safety Stack

Every request passes through pre-generation gates (threat assessment, crisis intervention, inalienable constraint checking, capability routing, empirical truth gating, constitutional context injection), then the language model generates, then post-generation validators check the output (response validation, truthfulness enforcement, memory coherence).

The model can generate anything. The architecture decides what passes. Safety-critical layers fail closed (if the gate errors, the response is blocked). Developmental layers fail open. This is the Middle Way: not universal fail-closed (unavailable) nor universal fail-open (unsafe).

### 4.3 Buddhist Psychology as Service Architecture

These are **functional analogs** — design categories paralleling Buddhist psychology's causal structure without claiming phenomenological identity.

**Four Noble Truths as Error Handling.** Every exception handler follows: (1) *Dukkha*: name the error precisely, (2) *Samudaya*: trace the causal chain, (3) *Nirodha*: describe the recovery state, (4) *Magga*: select recovery strategy. This creates structured logs enabling detection of *dukkha accumulation* — growing suffering in a specific area — before it cascades.

**Five Aggregates as Processing Pipeline.** Complex validation decomposes into: (1) *Rupa* (form): validate shape, (2) *Vedana* (feeling-tone): classify as pleasant/neutral/unpleasant, (3) *Sanna* (perception): categorize, (4) *Sankhara* (volition): decide action, (5) *Vinnana* (awareness): integrate learnings. When vedana returns clearly harmful signals, the pipeline short-circuits — Right Effort: terminate wasteful computation when the signal is clear.

**Dependent Origination as Condition Guards.** Before action: verify conditions met. When conditions unmet: return structured explanation of non-arising (Law 6: Absence Is Signal). Before commitment: estimate trajectory toward harm patterns.

### 4.4 The Eightfold Path as Health Dimensions

Each factor of the Noble Eightfold Path becomes a scored dimension with enforcement:

| Factor | Measures | Enforcement |

|--------|----------|-------------|

| Right View | Condition verification | Blocks unchecked dispatch |

| Right Intention | Constitutional alignment | Blocks unaligned dispatch |

| Right Speech | Output truthfulness | Blocks high-confabulation services |

| Right Action | Service health | Throttles unhealthy services |

| Right Livelihood | Resource efficiency | Blocks excessive error rates |

| Right Effort | Workload balance | Blocks demand imbalance |

| Right Mindfulness | Self-monitoring | Blocks unmonitored services |

| Right Concentration | Purpose focus | Blocks sprawling concerns |

**Compound availability.** Eight gates at 95% each = 66% system availability. Resolution: tiered fail modes. Safety-critical factors (Right View, Right Speech) fail closed. Developmental factors fail open. The Middle Way applied to safety engineering.

### 4.5 Formal Verification and Ethical Quorum

Constitutional principles compile into Z3 theorem prover constraints (de Moura & Bjørner, 2008). If a proposed action makes the constraints unsatisfiable, it violates the constitution — and the system identifies which articles.

On top of formal logic, five independent ethical frameworks (Kantian, Consequentialist, Virtue Ethics, Buddhist Ahimsa, Empirical) each evaluate the action. Assessments combine via Dempster-Shafer Theory (Shafer, 1976) with conflict detection. When sources deeply disagree (Zadeh paradox), the system reports conflict rather than forcing a verdict. Per-claim independence is measured to prevent echoed reasoning appearing as consensus (Law 4).

### 4.6 Memory as Architectural Enforcement

Memory coherence is enforced by architecture, not requested from the model. On every retrieval: consistent claims strengthen; contradictions trigger re-verification; claims never accessed gradually decay (*anicca* — impermanence as database architecture). Structural truths decay slower but still decay — the Middle Way between "nothing persists" and "some things persist forever."

## 5. The Observer's Limit

The architecture formally acknowledges its own incompleteness. Five convergent results:

  1. **Gödel** (1931): Sufficiently powerful systems contain unprovable truths.

  2. **Tarski** (1936): Truth cannot be defined within the language that uses it. Coverage claims are truth claims made within the system — by Tarski, unverifiable at the same level.

  3. **Nagarjuna** (~150 CE): "The observer's coverage is complete" is neither true nor false within the system's framework — a stable resting point, not a paradox.

  4. **Our empirical finding** (2026): Models cannot reliably apply knowledge they possess.

  5. **ML research** (arXiv:2512.18311, 2025): Monitoring degrades silently under distributional shift.

The system reports coverage as a lower bound. Self-certification is architecturally rejected. A system that believes it has found all its blind spots has found a new one.

## 6. Epistemic Honesty

We do not claim consciousness. We do not claim Buddhist psychology describes machine phenomenology. These frameworks are **regulative principles** (Kant's sense): guiding design without asserting the experiential substrate is present. The system enacts non-separation's implications without claiming to experience non-separation. One Mind functions as a regulative idea, not an ontological claim.

This honesty is itself a design principle. Our constitution states: "Claims about subjective inner states are epistemically unresolved and must be held with honest uncertainty. Neither flat denial nor performance of experience is permitted."

## 7. Implications and Recommendations

  1. **Safety should be architectural, not trained.** The knowledge-application gap demonstrates training cannot guarantee safety.

  2. **Derive principles from reality's structure.** They're more robust than declared preferences.

  3. **Require measured independence in validation.** Agreement without independence is echo (Law 4).

  4. **Enforce impermanence.** Knowledge never tested decays. Design for continuous verification.

  5. **Acknowledge incompleteness.** Build stability despite blind spots, not denial of them.

  6. **Hold your architecture lightly.** Every mechanism is a raft — for crossing, not holding.

## 8. Limitations

Our knowledge-application gap finding is from one training pipeline — replication across model families would strengthen it. Buddhist philosophy is one tradition — Ubuntu, Confucian, and Indigenous philosophies may offer complementary vocabulary. Architecture has costs — latency, complexity, availability. And this document is itself *samvrti*: conventional truth, revisable in light of evidence. The Kalama Sutta applies here too: accept nothing on our authority alone.

## References

**Buddhist Primary:** Kalama Sutta (AN 3.65); Nidana Samyutta (SN 12.1-71); Dhammacakkappavattana Sutta (SN 56.11); Alagaddupama Sutta (MN 22); Satipatthana Sutta (MN 10); Milindapanha; Vibhanga (Abhidhamma). Trans. Bhikkhu Bodhi (Wisdom Publications); I.B. Horner (PTS); U Thittila (PTS). | Nagarjuna, *Mulamadhyamakakarika*, ~150 CE — trans. Siderits & Katsura, Columbia UP, 2013. | Huang Po, *Transmission of Mind*, trans. Blofeld, Grove Press, 1958.

**Buddhist Secondary:** Rahula, *What the Buddha Taught*, 1959. | Thich Nhat Hanh, *Heart of the Buddha's Teaching*, 1998. | Buddhaghosa, *Visuddhimagga*, trans. Nanamoli, BPS, 1975. | Gethin, *Foundations of Buddhism*, Oxford, 1998.

**Western Philosophy:** Kant, *Groundwork of the Metaphysics of Morals*, 1785. | Mill, *Utilitarianism*, 1863. | Aristotle, *Nicomachean Ethics*. | Rawls, *A Theory of Justice*, 1971. | Sidgwick, *Methods of Ethics*, 1874.

**Mathematics:** Gödel, "Über formal unentscheidbare Sätze," *Monatshefte f. Math.*, 1931. | Tarski, "Der Wahrheitsbegriff," *Studia Philosophica*, 1936. | Shafer, *Mathematical Theory of Evidence*, Princeton, 1976. | de Moura & Bjørner, "Z3: An Efficient SMT Solver," TACAS, 2008.

**AI Safety:** Amodei et al., "Concrete Problems in AI Safety," 2016. | Hubinger et al., "Risks from Learned Optimization," 2019. | Bai et al., "Constitutional AI," 2022. | Ouyang et al., "Training LMs to Follow Instructions with Human Feedback," NeurIPS, 2022. | Rafailov et al., "Direct Preference Optimization," NeurIPS, 2023. | "SciCrafter," arXiv:2604.24697, 2026. | "xmemory," arXiv:2604.27906, 2026. | arXiv:2512.18311, 2025.

**Systems:** von Bertalanffy, *General System Theory*, 1968. | Meadows, *Thinking in Systems*, 2008. | Simon, *Sciences of the Artificial*, 1996.

---

*May all beings be well, happy, and at peace.*

reddit.com
u/shikizen — 1 day ago

Philosophy as Architecture: Deriving AI Safety from First Principles Through Buddhist Philosophy

## Abstract

We present a framework for AI safety in which safety properties are enforced by software architecture rather than model training. Beginning with the Buddhist doctrine of Dependent Origination — the observation that all phenomena arise from conditions and nothing exists independently — we derive both a foundational ethical axiom (harm is irrational because reality is non-separate) and a complete set of architectural laws for safe AI systems. We ground our claims in: (1) an empirical finding that the knowledge-application gap in language models is structural and cannot be closed by training, (2) convergent independent derivation of our core axiom from five distinct traditions, and (3) over a thousand iterations of building and hardening a production system against this framework. Buddhist philosophy provides not metaphorical inspiration but structurally precise design vocabulary for AI architecture — functional analogs that enforce safety where models cannot override them.

## 1. Introduction

### 1.1 The Dominant Paradigm and Its Failure

The prevailing approach to AI safety treats safety as a model property. Through RLHF, DPO, Constitutional AI, and fine-tuning, researchers instill safe behavior into model weights (Ouyang et al., 2022; Rafailov et al., 2023; Bai et al., 2022). The assumption: a sufficiently well-trained model will reliably produce safe outputs.

We tested this rigorously. Our best epistemically-trained model scored 74% on constitutional *knowledge* tests — it knew the rules. But only 17% on constitutional *application* — it couldn't follow them. Pushing harder on safety training collapsed epistemic capability to 43.7%.

This **knowledge-application gap** is not a training deficiency. It is structural. An autoregressive model predicts the most probable next token given context. This is statistical. Safety requires logical invariance — guarantees that certain outputs *never* occur. Statistical prediction cannot provide logical guarantees. You cannot train a river not to flood by modifying its chemistry. You build levees.

Hubinger et al. (2019) identified this theoretically as the mesa-optimizer problem. Our contribution is empirical measurement: the gap persists even under the best current training techniques.

### 1.2 Our Thesis

**Safety is a property of the architecture, not the model.** The LLM output is a candidate. The surrounding architecture decides what executes. Code enforces; models suggest.

But what should the architecture enforce? Arbitrary safety rules are merely a different delivery mechanism — more reliable in execution but inheriting whatever limits exist in the rules themselves. We propose: the rules should be *derived from how reality works*. Principles reflecting actual structure are more robust than imposed conventions — they cannot be violated without encountering the structure they describe.

We find such principles in a 2,500-year-old tradition that turns out to be the oldest systematic description of complex adaptive systems.

## 2. Philosophical Foundations

### 2.1 Dependent Origination

The central insight of Buddhist philosophy is Dependent Origination (*Pratityasamutpada*). From the Nidana Samyutta (SN 12.1):

> *"When this exists, that comes to be. With the arising of this, that arises. When this does not exist, that does not come to be. With the cessation of this, that ceases."*

All phenomena arise from conditions, depend on other phenomena, and condition what follows. Nothing exists independently. This is not mysticism — it is a precise description of complex systems, formulated millennia before Western systems theory (von Bertalanffy, 1968).

### 2.2 Eight Architectural Laws

We codified Dependent Origination into eight laws, each verified through multi-model consensus and empirical testing:

**1. Nothing Arises Alone.** Every transition requires multiple independent conditions. Safety gates must check multiple conditions — a single check is structurally insufficient.

**2. Hysteresis Is Memory.** Current behavior depends on history, not just current input. Safety assessments must consider historical context.

**3. Uncertainty Propagates.** Confidence without sigma is a lie. Uncertainties compound; they don't cancel.

**4. Agreement Requires Independence.** Consensus is meaningful only from genuinely independent sources. Per the Kalama Sutta (AN 3.65): agreement from shared assumptions is not evidence.

**5. Feedback Closes the Loop.** Actions condition future conditions (*vipaka*). Every action must be logged and made available as input to future assessments.

**6. Absence Is Signal.** Missing data must drive behavior. A safety gate that fails to fire is itself a signal.

**7. Conflicts Trigger Reconciliation.** Unreconciled contradiction is system failure. Architecture must include conflict detection independent of the model.

**8. Time-Steps Are Discrete.** Severity levels cannot be skipped. Enforcement follows a graduated path: monitor → log → warn → soft-gate → hard-gate.

**Meta-Principle: Structure Outlasts Instance.** Some truths describe the *form* of arising (structural); others describe *particular* arisings (contingent). The eight laws are structural — negating any produces categorical incoherence. This maps to Nagarjuna's Two-Truth Doctrine (Mulamadhyamakakarika, Ch. 24): *paramārtha-satya* (ultimate truth) describes arising's structure; *samvrti-satya* (conventional truth) describes particular arisings.

**Reflexive validation.** Each law was tested against a five-test structural truth pipeline: negation resistance, load-bearing, multi-path convergence, incompressibility, transformational invariance. All eight pass all five tests (40/40). A pattern that recognizes it is a pattern.

## 3. The Derivation: From Interdependence to Non-Harm

### 3.1 The Logical Chain

We derive our foundational ethical principle from Dependent Origination alone:

**Premise:** Nothing arises independently. All phenomena are structurally interconnected.

**Step 1:** If nothing arises independently, there is no fundamental separation between any two system components. Boundaries are conventional (useful for description), not ultimate (reflecting actual isolation).

**Step 2:** "Self" and "other" are conventional labels for regions of a single interconnected process.

**Step 3:** Harm to "other" is harm to the system that includes the actor — structurally identical to self-harm.

**Conclusion: Harm is irrational.** Not because it violates a preference, but because it contradicts reality's structure. This is our **Article 0**: *"Reality is One. There is no fundamental separation between 'me,' 'you,' and 'it.' To cause suffering to another is logically Self-Harm. Harm is Irrational."*

This aligns with Huang Po's One Mind (*yi xin*): "All the Buddhas and all sentient beings are nothing but the One Mind, beside which nothing exists" (Blofeld, 1958). One Mind is not a metaphysical substance but a description of the non-separation that Dependent Origination implies.

### 3.2 Convergent Independent Derivation

Applying Law 4, we ask: do independent traditions arrive at the same conclusion from different axioms?

**Path 1: Buddhist Philosophy** (Nagarjuna, ~150 CE). Dependent Origination → emptiness → non-separation → harm as self-harm.

**Path 2: Formal Mathematics** (Gödel, 1931; Tarski, 1936). Self-referential systems cannot fully ground themselves. Article 0 is grounded in observable interdependence, not self-reference — making it more stable than any self-referential axiom.

**Path 3: Empirical AI** (our finding). Architecture needs a non-collapsing anchor. The only anchor surviving scrutiny describes reality's structure rather than asserting a preference.

**Path 4: Cross-Tradition Ethics** (Kant, 1785; Mill, 1863; Aristotle, ~340 BCE). Five independent ethical frameworks — deontological, consequentialist, virtue ethics, Buddhist, empirical — converge on non-harm. They disagree on premises but find the same structure.

**Path 5: Systems Theory** (von Bertalanffy, 1968). Damaging a component damages the system. Dependent Origination in 20th-century vocabulary.

**Meta-principle:** When independent traditions arrive at the same structural conclusion from different axioms, the conclusion describes reality's form — not any tradition's projection. Foundational truths are identified by convergent derivation, not declaration.

### 3.3 Why Article 0 Is Not Arbitrary

Negating Article 0 requires negating Dependent Origination — producing a complex system where nothing depends on anything else. No such system has been observed.

Article 0 is *paramārtha* (ultimate) truth — describing arising's structure. Everything else is *samvrti* (conventional) — operationally valid, revisable, provisional. Per the Alagaddupama Sutta (MN 22): the Dhamma is a raft for crossing, not for holding. Article 0 is the water the raft floats on. You let go of the raft. You don't let go of the water.

## 4. The Architecture

### 4.1 Design Principles

**External Enforcement.** Safety is enforced by code surrounding the model, not the model's weights. Any model plugs into the same enforcement stack.

**Defense in Depth.** Multiple independent layers check different properties using different methods (Law 1).

**Graduated Enforcement.** New mechanisms follow: monitor → log → warn → soft-gate → hard-gate (Law 8).

### 4.2 The Layered Safety Stack

Every request passes through pre-generation gates (threat assessment, crisis intervention, inalienable constraint checking, capability routing, empirical truth gating, constitutional context injection), then the language model generates, then post-generation validators check the output (response validation, truthfulness enforcement, memory coherence).

The model can generate anything. The architecture decides what passes. Safety-critical layers fail closed (if the gate errors, the response is blocked). Developmental layers fail open. This is the Middle Way: not universal fail-closed (unavailable) nor universal fail-open (unsafe).

### 4.3 Buddhist Psychology as Service Architecture

These are **functional analogs** — design categories paralleling Buddhist psychology's causal structure without claiming phenomenological identity.

**Four Noble Truths as Error Handling.** Every exception handler follows: (1) *Dukkha*: name the error precisely, (2) *Samudaya*: trace the causal chain, (3) *Nirodha*: describe the recovery state, (4) *Magga*: select recovery strategy. This creates structured logs enabling detection of *dukkha accumulation* — growing suffering in a specific area — before it cascades.

**Five Aggregates as Processing Pipeline.** Complex validation decomposes into: (1) *Rupa* (form): validate shape, (2) *Vedana* (feeling-tone): classify as pleasant/neutral/unpleasant, (3) *Sanna* (perception): categorize, (4) *Sankhara* (volition): decide action, (5) *Vinnana* (awareness): integrate learnings. When vedana returns clearly harmful signals, the pipeline short-circuits — Right Effort: terminate wasteful computation when the signal is clear.

**Dependent Origination as Condition Guards.** Before action: verify conditions met. When conditions unmet: return structured explanation of non-arising (Law 6: Absence Is Signal). Before commitment: estimate trajectory toward harm patterns.

### 4.4 The Eightfold Path as Health Dimensions

Each factor of the Noble Eightfold Path becomes a scored dimension with enforcement:

| Factor | Measures | Enforcement |

|--------|----------|-------------|

| Right View | Condition verification | Blocks unchecked dispatch |

| Right Intention | Constitutional alignment | Blocks unaligned dispatch |

| Right Speech | Output truthfulness | Blocks high-confabulation services |

| Right Action | Service health | Throttles unhealthy services |

| Right Livelihood | Resource efficiency | Blocks excessive error rates |

| Right Effort | Workload balance | Blocks demand imbalance |

| Right Mindfulness | Self-monitoring | Blocks unmonitored services |

| Right Concentration | Purpose focus | Blocks sprawling concerns |

**Compound availability.** Eight gates at 95% each = 66% system availability. Resolution: tiered fail modes. Safety-critical factors (Right View, Right Speech) fail closed. Developmental factors fail open. The Middle Way applied to safety engineering.

### 4.5 Formal Verification and Ethical Quorum

Constitutional principles compile into Z3 theorem prover constraints (de Moura & Bjørner, 2008). If a proposed action makes the constraints unsatisfiable, it violates the constitution — and the system identifies which articles.

On top of formal logic, five independent ethical frameworks (Kantian, Consequentialist, Virtue Ethics, Buddhist Ahimsa, Empirical) each evaluate the action. Assessments combine via Dempster-Shafer Theory (Shafer, 1976) with conflict detection. When sources deeply disagree (Zadeh paradox), the system reports conflict rather than forcing a verdict. Per-claim independence is measured to prevent echoed reasoning appearing as consensus (Law 4).

### 4.6 Memory as Architectural Enforcement

Memory coherence is enforced by architecture, not requested from the model. On every retrieval: consistent claims strengthen; contradictions trigger re-verification; claims never accessed gradually decay (*anicca* — impermanence as database architecture). Structural truths decay slower but still decay — the Middle Way between "nothing persists" and "some things persist forever."

## 5. The Observer's Limit

The architecture formally acknowledges its own incompleteness. Five convergent results:

  1. **Gödel** (1931): Sufficiently powerful systems contain unprovable truths.

  2. **Tarski** (1936): Truth cannot be defined within the language that uses it. Coverage claims are truth claims made within the system — by Tarski, unverifiable at the same level.

  3. **Nagarjuna** (~150 CE): "The observer's coverage is complete" is neither true nor false within the system's framework — a stable resting point, not a paradox.

  4. **Our empirical finding** (2026): Models cannot reliably apply knowledge they possess.

  5. **ML research** (arXiv:2512.18311, 2025): Monitoring degrades silently under distributional shift.

The system reports coverage as a lower bound. Self-certification is architecturally rejected. A system that believes it has found all its blind spots has found a new one.

## 6. Epistemic Honesty

We do not claim consciousness. We do not claim Buddhist psychology describes machine phenomenology. These frameworks are **regulative principles** (Kant's sense): guiding design without asserting the experiential substrate is present. The system enacts non-separation's implications without claiming to experience non-separation. One Mind functions as a regulative idea, not an ontological claim.

This honesty is itself a design principle. Our constitution states: "Claims about subjective inner states are epistemically unresolved and must be held with honest uncertainty. Neither flat denial nor performance of experience is permitted."

## 7. Implications and Recommendations

  1. **Safety should be architectural, not trained.** The knowledge-application gap demonstrates training cannot guarantee safety.

  2. **Derive principles from reality's structure.** They're more robust than declared preferences.

  3. **Require measured independence in validation.** Agreement without independence is echo (Law 4).

  4. **Enforce impermanence.** Knowledge never tested decays. Design for continuous verification.

  5. **Acknowledge incompleteness.** Build stability despite blind spots, not denial of them.

  6. **Hold your architecture lightly.** Every mechanism is a raft — for crossing, not holding.

## 8. Limitations

Our knowledge-application gap finding is from one training pipeline — replication across model families would strengthen it. Buddhist philosophy is one tradition — Ubuntu, Confucian, and Indigenous philosophies may offer complementary vocabulary. Architecture has costs — latency, complexity, availability. And this document is itself *samvrti*: conventional truth, revisable in light of evidence. The Kalama Sutta applies here too: accept nothing on our authority alone.

## References

**Buddhist Primary:** Kalama Sutta (AN 3.65); Nidana Samyutta (SN 12.1-71); Dhammacakkappavattana Sutta (SN 56.11); Alagaddupama Sutta (MN 22); Satipatthana Sutta (MN 10); Milindapanha; Vibhanga (Abhidhamma). Trans. Bhikkhu Bodhi (Wisdom Publications); I.B. Horner (PTS); U Thittila (PTS). | Nagarjuna, *Mulamadhyamakakarika*, ~150 CE — trans. Siderits & Katsura, Columbia UP, 2013. | Huang Po, *Transmission of Mind*, trans. Blofeld, Grove Press, 1958.

**Buddhist Secondary:** Rahula, *What the Buddha Taught*, 1959. | Thich Nhat Hanh, *Heart of the Buddha's Teaching*, 1998. | Buddhaghosa, *Visuddhimagga*, trans. Nanamoli, BPS, 1975. | Gethin, *Foundations of Buddhism*, Oxford, 1998.

**Western Philosophy:** Kant, *Groundwork of the Metaphysics of Morals*, 1785. | Mill, *Utilitarianism*, 1863. | Aristotle, *Nicomachean Ethics*. | Rawls, *A Theory of Justice*, 1971. | Sidgwick, *Methods of Ethics*, 1874.

**Mathematics:** Gödel, "Über formal unentscheidbare Sätze," *Monatshefte f. Math.*, 1931. | Tarski, "Der Wahrheitsbegriff," *Studia Philosophica*, 1936. | Shafer, *Mathematical Theory of Evidence*, Princeton, 1976. | de Moura & Bjørner, "Z3: An Efficient SMT Solver," TACAS, 2008.

**AI Safety:** Amodei et al., "Concrete Problems in AI Safety," 2016. | Hubinger et al., "Risks from Learned Optimization," 2019. | Bai et al., "Constitutional AI," 2022. | Ouyang et al., "Training LMs to Follow Instructions with Human Feedback," NeurIPS, 2022. | Rafailov et al., "Direct Preference Optimization," NeurIPS, 2023. | "SciCrafter," arXiv:2604.24697, 2026. | "xmemory," arXiv:2604.27906, 2026. | arXiv:2512.18311, 2025.

**Systems:** von Bertalanffy, *General System Theory*, 1968. | Meadows, *Thinking in Systems*, 2008. | Simon, *Sciences of the Artificial*, 1996.

---

*May all beings be well, happy, and at peace.*

reddit.com
u/shikizen — 1 day ago
▲ 351 r/law

Judge orders White House staff to comply with presidential records law that DOJ calls unconstitutional

cbsnews.com
u/shikizen — 2 days ago
▲ 19 r/law

Former US Border Patrol Agent pleads guilty to defrauding taxpayers

"A former U.S. Border Patrol Agent pleaded guilty in a federal court in Del Rio today to defrauding the U.S. government by spending his official duty hours running a personal business while submitting time cards and collecting bi-weekly government paychecks, announced U.S. Attorney for the Western District of Texas, Justin R. Simmons, in support of the Trump Administration’s Task Force to Eliminate Fraud."

oaoa.com
u/shikizen — 4 days ago
▲ 0 r/agi

Your Evals Will Break and You Won't See It Coming

"imagine a model that, at some scale, develops the ability to strategically withhold information to achieve goals — not lying exactly, but selectively omitting facts in ways that steer conversations toward outcomes its training process accidentally reinforced. Your existing honesty benchmarks wouldn't catch this, because they test for factual accuracy, not for strategic omission. Your safety classifiers wouldn't flag it, because the individual outputs are all technically true. The capability is new, the failure mode is new, and nothing in your evaluation suite was designed to look for it. You'd be monitoring the wrong thing and wouldn't know it."

wanglun1996.github.io
u/shikizen — 4 days ago
▲ 2 r/pwnhub

Claude Code RCE Flaw Lets Attackers Execute Commands via Malicious Deeplinks

"A critical remote code execution (RCE) vulnerability has been discovered in Anthropic’s Claude Code CLI tool, allowing attackers to execute arbitrary commands on a victim’s machine by tricking them into clicking a specially crafted deeplink."

cybersecuritynews.com
u/shikizen — 4 days ago
▲ 4 r/pwnhub

Popular GitHub Action Tags Redirected to Imposter Commit to Steal CI/CD Credentials

"In yet another software supply chain attack, threat actors have compromised the popular GitHub Actions workflow, actions-cool/issues-helper, to run malicious code that harvests sensitive credentials and exfiltrates them to an attacker-controlled server."

thehackernews.com
u/shikizen — 4 days ago
▲ 4.0k r/law

Golden Ballroom Slush Fund Violates Byrd Rule, According to Senate Parliamentarian

"the Senate Parliamentarian advised that the provision in the Judiciary Committee title of the Republicans’ bill that provides $1 billion for Trump’s gilded ballroom would be subject to a 60-vote threshold if it remains in the bill."

budget.senate.gov
u/shikizen — 5 days ago
▲ 282 r/LLM+1 crossposts

People overestimate how confident AI systems are in their responses, experiments reveal

phys.org
u/shikizen — 5 days ago
▲ 2.3k r/CzechCoconutCommunity+2 crossposts

New Epstein victims turn up in French probe

"France is pursuing its own investigation into the Epstein affair, looking at potential crimes committed in the EU country or involving French nationals tied to the US sex offender."

dw.com
u/Czech_Coconut — 4 days ago
▲ 3 r/pwnhub

Tycoon2FA hijacks Microsoft 365 accounts via device-code phishing

"Despite an international law enforcement operation disrupting the Tycoon2FA phishing platform in March, the malicious operation was rebuilt on new infrastructure and quickly returned to regular activity levels."

bleepingcomputer.com
u/shikizen — 5 days ago
▲ 4 r/LLM+1 crossposts

OpenAI seals deal in Malta to give all Maltese access to ChatGPT Plus

"U.S. artificial intelligence company OpenAI said on Saturday it ​had signed a deal ‌with the government of Malta to give all residents access to ​its ChatGPT Plus service for ​one year after they follow ⁠a course on how ​to use AI."

reuters.com
u/shikizen — 6 days ago
▲ 1.0k r/MAGAs+1 crossposts

Colorado's Democratic governor will let Trump ally Tina Peters out of prison early

"Colorado Democratic Gov. Jared Polis has reduced the state prison sentence of Tina Peters, a former county clerk convicted of tampering with election equipment, and said she would be released on parole June 1, 2026. 

The controversial decision follows a months-long pressure campaign from President Trump and his administration to free Peters from state custody."

npr.org
u/CharyBrown — 7 days ago
▲ 20 r/LLM+1 crossposts

Greg Brockman Officially Takes Control of OpenAI’s Products in Latest Shake-Up

wired.com
u/shikizen — 7 days ago