Skip to content

URAA — Five-Layer Architecture

The Universal Rotifer Autonomous Architecture (URAA) is the protocol’s backbone — five layers that separate concerns, enforce safety invariants, and enable cross-binding portability.

┌──────────────────────────────────────────────────────────────┐
│ L4: Collective Immunity Layer │ ← Species Memory
│ ┌──────────────────────────────────────────────────────────┐│
│ │ L3: Competition & Exchange Layer ││ ← Selection & Transfer
│ │ ┌──────────────────────────────────────────────────────┐││
│ │ │ L2: Calibration Layer │││ ← Immune System
│ │ │ ┌──────────────────────────────────────────────────┐│││
│ │ │ │ L1: Synthesis Layer ││││ ← Protein Synthesis
│ │ │ │ ┌──────────────────────────────────────────────┐││││
│ │ │ │ │ L0: Kernel Layer │││││ ← Genetic Code
│ │ │ │ └──────────────────────────────────────────────┘││││
│ │ │ └──────────────────────────────────────────────────┘│││
│ │ └──────────────────────────────────────────────────────┘││
│ └──────────────────────────────────────────────────────────┘│
└──────────────────────────────────────────────────────────────┘
LayerRoleBiological AnalogyStatus
L0 KernelImmutable trust anchor — security constraints no other layer can overrideGenetic codeImplemented
L1 SynthesisWASM sandbox execution, IR compilation, resource meteringProtein synthesis (ribosome)Implemented
L2 CalibrationMulti-stage gene validation: static analysis → sandbox → controlled trialImmune system (thymic selection)Implemented
L3 Competition & ExchangeArena fitness ranking + horizontal gene transfer between agentsNatural selection + HGTArena: implemented; P2P transfer: stub (v0.9)
L4 Collective ImmunityNetwork-wide threat detection, defense sharing, species memoryHerd immunityPlanned (v1.x)

Layer isolation — each layer communicates only through standardized interfaces. L0 cannot be modified by any higher layer. L1 cannot skip L2 validation. L3 cannot bypass L0 constraints.

Constitutional immutability — L0 is the only layer that does not participate in evolution. It is the “constitution” of the agent: safety constraints that are true by axiom, not by optimization.

Biological fidelity — the layering maps directly to biological systems, not by analogy but by functional equivalence. L2 Calibration performs the same role as thymic selection: filtering out self-reactive (unsafe) genes before they enter the production execution path.

The Kernel layer is implementation-agnostic. Different deployment scenarios use different trust anchors:

Trust BackendTechnologyApplicable Scenarios
Distributed LedgerSmart Contracts (EVM/Move/WASM)Decentralized permissionless networks
TEEIntel TDX / ARM TrustZone / AWS NitroEnterprise high-performance
Signature ChainSigned manifests + PKILightweight controlled networks
HSMHardware Security Module / TPMIoT and embedded devices

Most agent frameworks provide a flat tool registry with optional guardrails. URAA provides structural guarantees:

  • A gene that passes L2 is safe to execute in L1 — not because someone checked, but because the architecture enforces it
  • L0 constraints survive cross-binding compilation — a safety rule declared in Cloud Binding is preserved when the gene runs on Local Binding
  • L4 threat intelligence is shared across the network — one agent’s encounter with a malicious gene protects all agents

This is what makes Rotifer a protocol, not just a framework.