{
  "phases": [
    {
      "id": "phase-01",
      "step": "Phase 01",
      "name": "Overview & Scope",
      "summary": "master root, project scope, manifest and continuity checkpoint.",
      "badge": "overview_scope",
      "layers": [
        {
          "title": "Overview & Scope",
          "desc": "master registration, project framing, entry manifest and continuity checkpoint.",
          "chips": [
            "master root",
            "project scope",
            "entry manifest",
            "checkpoint"
          ]
        }
      ]
    },
    {
      "id": "phase-02",
      "step": "Phase 02",
      "name": "Architecture & Engineering Canon",
      "summary": "cognitive architecture, governance, artifact structure, contracts, naming, state legitimacy, build promotion, deployment structure and contextual satellites.",
      "badge": "architecture_engineering_canon",
      "layers": [
        {
          "title": "Architecture & Engineering Canon",
          "desc": "authority and satellite documents that define Devon structural canon.",
          "chips": [
            "architecture",
            "governance",
            "contracts",
            "naming",
            "state legitimacy",
            "deployment"
          ]
        }
      ]
    },
    {
      "id": "phase-03",
      "step": "Phase 03",
      "name": "Cognitive Flow Canon",
      "summary": "deterministic orchestration, LLM role, retrieval role, validation order and execution gating.",
      "badge": "cognitive_flow_canon",
      "layers": [
        {
          "title": "Cognitive Flow Canon",
          "desc": "interpreter, decision, validation, execution, memory and retrieval in governed flow.",
          "chips": [
            "interpreter",
            "FSM",
            "validation",
            "execution",
            "memory",
            "retrieval"
          ]
        }
      ]
    },
    {
      "id": "phase-04",
      "step": "Phase 04",
      "name": "Containerization Canon",
      "summary": "container topology, isolation and host versus container runtime boundaries.",
      "badge": "containerization_canon",
      "layers": [
        {
          "title": "Containerization Canon",
          "desc": "runtime boundaries and isolation, without redefining sovereign architecture.",
          "chips": [
            "topology",
            "isolation",
            "runtime boundaries"
          ]
        }
      ]
    },
    {
      "id": "phase-05",
      "step": "Phase 05",
      "name": "Latency & Performance Canon",
      "summary": "latency model, hot path versus cold path, bounded execution and fallback behavior.",
      "badge": "latency_performance_canon",
      "layers": [
        {
          "title": "Latency & Performance Canon",
          "desc": "time traceability across modules, stages and end-to-end lifecycle.",
          "chips": [
            "latency",
            "hot path",
            "cold path",
            "fallback"
          ]
        }
      ]
    },
    {
      "id": "phase-06",
      "step": "Phase 06",
      "name": "Noise Reduction Canon",
      "summary": "signal preservation, redundancy elimination and unnecessary hop reduction.",
      "badge": "noise_reduction_canon",
      "layers": [
        {
          "title": "Noise Reduction Canon",
          "desc": "remove architectural waste and keep deterministic path lean.",
          "chips": [
            "signal",
            "redundancy elimination",
            "less path"
          ]
        }
      ]
    },
    {
      "id": "phase-07",
      "step": "Phase 07",
      "name": "Observability & Audit Canon",
      "summary": "audit-linked visibility, evidence continuity and operational observability.",
      "badge": "observability_audit_canon",
      "layers": [
        {
          "title": "Observability & Audit Canon",
          "desc": "traceability for runtime, memory and protected execution.",
          "chips": [
            "observability",
            "audit",
            "evidence continuity"
          ]
        }
      ]
    },
    {
      "id": "phase-08",
      "step": "Phase 08",
      "name": "Security Canon",
      "summary": "security governance, trust model, access boundaries, memory protection and monitoring.",
      "badge": "security_canon",
      "layers": [
        {
          "title": "Security Canon",
          "desc": "security governance with structured implementation artifacts.",
          "chips": [
            "zero trust",
            "access control",
            "memory protection",
            "monitoring"
          ]
        }
      ]
    },
    {
      "id": "phase-09",
      "step": "Phase 09",
      "name": "Operational Flows Canon",
      "summary": "execution sequence, operating flow mapping and operational order integrity.",
      "badge": "operational_flows_canon",
      "layers": [
        {
          "title": "Operational Flows Canon",
          "desc": "runtime sequence and flow order without redefining sovereign authorities.",
          "chips": [
            "operational flow",
            "sequence",
            "order integrity"
          ]
        }
      ]
    },
    {
      "id": "phase-10",
      "step": "Phase 10",
      "name": "Monitoring & Real-time Observability",
      "summary": "real-time host, container and service monitoring with SSE transport to the Operator Panel.",
      "badge": "monitoring_observability",
      "layers": [
        {
          "title": "Monitoring & Real-time Observability",
          "desc": "CPU, memory, disk, network, container health, security services and SSE bridge canon.",
          "chips": [
            "cpu",
            "memory",
            "containers",
            "network",
            "security",
            "SSE"
          ]
        }
      ]
    }
  ],
  "categories": [
    {
      "id": "overview_scope",
      "title": "Overview & Scope",
      "sub": "master registration, project scope, manifest and continuity checkpoint.",
      "badge": "phase 01",
      "docs": [
        {
          "id": "master_architecture_index",
          "title": "Master Architecture Index",
          "path": "../panel/data/master_architecture_index.md",
          "phase": "phase-01",
          "layer": "overview_scope",
          "role": "Supreme canonical root and registration authority.",
          "fits": "Defines registration, precedence, authority ownership and completeness rules.",
          "depends_on": [
            "panel_manifest",
            "project_scope"
          ],
          "used_by": [],
          "architecture_view": "Supreme human-readable root for all Devon canon.",
          "label": "Master Architecture Index",
          "type": "text"
        },
        {
          "id": "panel_manifest",
          "title": "Panel Manifest",
          "path": "../panel/data/panel_manifest.json",
          "phase": "phase-01",
          "layer": "overview_scope",
          "role": "Entry manifest and machine-readable panel entry point.",
          "fits": "Belongs to project overview and registration surface.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [],
          "architecture_view": "Entry manifest for the panel and documentation surface.",
          "label": "Panel Manifest",
          "type": "json"
        },
        {
          "id": "project_scope",
          "title": "Project Scope Canonical",
          "path": "../panel/data/project_scope_canonical.json",
          "phase": "phase-01",
          "layer": "overview_scope",
          "role": "Machine-readable project scope authority.",
          "fits": "Defines project framing and scope surface.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [],
          "architecture_view": "Scope anchor for the project overview.",
          "label": "Project Scope Canonical",
          "type": "json"
        },
        {
          "id": "devon_continuity",
          "title": "Devon Continuity",
          "path": "../panel/data/devon_continuity.md",
          "phase": "phase-01",
          "layer": "overview_scope",
          "role": "Canonical continuity memory and operational TODO document.",
          "fits": "Supports cross-chat continuity, governance, and handoff.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [],
          "architecture_view": "Canonical continuity layer for stable memory and mutable execution flow.",
          "label": "Devon Continuity",
          "type": "text"
        },
        {
          "id": "deployment_order",
          "title": "Deployment Order Canonical",
          "path": "../panel/data/deployment_order_canonical.json",
          "phase": "phase-01",
          "layer": "overview_scope",
          "role": "Machine-readable deployment order authority.",
          "fits": "Defines canonical installation and configuration order.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [],
          "architecture_view": "Deployment order reference.",
          "label": "Deployment Order Canonical",
          "type": "json"
        },
        {
          "id": "sandbox_environment",
          "title": "Sandbox Environment Canonical",
          "path": "../panel/data/sandbox_environment_canonical.json",
          "phase": "phase-01",
          "layer": "overview_scope",
          "role": "Machine-readable sandbox environment authority.",
          "fits": "Defines sandbox execution boundaries and environment expectations.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [],
          "architecture_view": "Sandbox boundary reference.",
          "label": "Sandbox Environment Canonical",
          "type": "json"
        },
        {
          "id": "server_registry",
          "title": "Server Registry Canonical",
          "path": "../panel/data/server_registry_canonical.json",
          "phase": "phase-01",
          "layer": "overview_scope",
          "role": "Machine-readable server registry authority.",
          "fits": "Defines canonical server identities and registry surface.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [],
          "architecture_view": "Server registry reference.",
          "label": "Server Registry Canonical",
          "type": "json"
        },
        {
          "id": "project_progress_canonical",
          "title": "Project Progress Canonical",
          "path": "../panel/data/project_progress_canonical.json",
          "phase": "phase-01",
          "layer": "overview_scope",
          "role": "Sovereign canonical model for global project progress calculation.",
          "fits": "Defines the only valid calculation mode and required fields for global progress.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [
            "project_progress_model"
          ],
          "architecture_view": "Global progress canonical authority.",
          "label": "Project Progress Canonical",
          "type": "json"
        },
        {
          "id": "project_progress_model",
          "title": "Project Progress Model",
          "path": "../panel/data/project_progress_model.json",
          "phase": "phase-01",
          "layer": "overview_scope",
          "role": "Sovereign stage weighting model for global project progress.",
          "fits": "Defines explicit weights per stage for the global progress donut.",
          "depends_on": [
            "project_progress_canonical",
            "master_architecture_index"
          ],
          "used_by": [],
          "architecture_view": "Stage weight authority for global progress.",
          "label": "Project Progress Model",
          "type": "json"
        }
      ],
      "phase_id": "phase-01"
    },
    {
      "id": "architecture_engineering_core",
      "title": "Architecture & Engineering Canon",
      "sub": "authority and satellite documents for architecture, governance, contracts, naming, deployment and contextual boundaries.",
      "badge": "phase 02",
      "docs": [
        {
          "id": "cas",
          "title": "CAS · Cognitive Architecture Spec",
          "path": "../panel/data/cas.md",
          "phase": "phase-02",
          "layer": "architecture_engineering_core",
          "role": "Primary authority for cognitive architecture placement.",
          "fits": "Owns architecture layers and separation between probabilistic and deterministic components.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [
            "cfc",
            "ccc",
            "lpc",
            "sec",
            "ofc"
          ],
          "architecture_view": "Sovereign architecture meaning.",
          "label": "CAS · Cognitive Architecture Spec",
          "type": "text"
        },
        {
          "id": "cgs",
          "title": "CGS · Canonical Governance Spec",
          "path": "../panel/data/cgs.md",
          "phase": "phase-02",
          "layer": "architecture_engineering_core",
          "role": "Primary governance authority.",
          "fits": "Owns governance structure and canonical responsibility boundaries.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [],
          "architecture_view": "Governance backbone of the structural canon.",
          "label": "CGS · Canonical Governance Spec",
          "type": "text"
        },
        {
          "id": "acs",
          "title": "ACS · Artifact Canon Structure",
          "path": "../panel/data/acs.md",
          "phase": "phase-02",
          "layer": "architecture_engineering_core",
          "role": "Primary artifact canon authority.",
          "fits": "Defines artifact structure and canonical placement logic.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [],
          "architecture_view": "Artifact structure ownership.",
          "label": "ACS · Artifact Canon Structure",
          "type": "text"
        },
        {
          "id": "css",
          "title": "CSS · Contracts & Schemas Spec",
          "path": "../panel/data/css.md",
          "phase": "phase-02",
          "layer": "architecture_engineering_core",
          "role": "Primary contracts and schemas authority.",
          "fits": "Owns contracts, schema legitimacy and structured interfaces.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [],
          "architecture_view": "Schema and contract sovereignty.",
          "label": "CSS · Contracts & Schemas Spec",
          "type": "text"
        },
        {
          "id": "ncs",
          "title": "NCS · Naming Canon Spec",
          "path": "../panel/data/ncs.md",
          "phase": "phase-02",
          "layer": "architecture_engineering_core",
          "role": "Primary naming authority.",
          "fits": "Owns naming legitimacy across canon artifacts.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [],
          "architecture_view": "Naming governance surface.",
          "label": "NCS · Naming Canon Spec",
          "type": "text"
        },
        {
          "id": "sts",
          "title": "STS · State Transition Spec",
          "path": "../panel/data/sts.md",
          "phase": "phase-02",
          "layer": "architecture_engineering_core",
          "role": "Primary state legitimacy authority.",
          "fits": "Owns state legitimacy and transition boundary rules.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [
            "cfc",
            "ofc"
          ],
          "architecture_view": "State governance authority.",
          "label": "STS · State Transition Spec",
          "type": "text"
        },
        {
          "id": "brps",
          "title": "BRPS · Build Release Promotion Spec",
          "path": "../panel/data/brps.md",
          "phase": "phase-02",
          "layer": "architecture_engineering_core",
          "role": "Primary release and promotion authority.",
          "fits": "Owns build, release and promotion rules, including packaging audit, SBOM, sourcemap blocking, sensitive artifact protection and environment-aware promotion safeguards.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [],
          "architecture_view": "Promotion governance surface with release packaging safeguards.",
          "label": "BRPS · Build Release Promotion Spec",
          "type": "text"
        },
        {
          "id": "cdms",
          "title": "CDMS · Canonical Deployment Model Spec",
          "path": "../panel/data/cdms.md",
          "phase": "phase-02",
          "layer": "architecture_engineering_core",
          "role": "Primary deployment structure authority.",
          "fits": "Owns deployment structure and placement boundaries.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [],
          "architecture_view": "Deployment structure authority.",
          "label": "CDMS · Canonical Deployment Model Spec",
          "type": "text"
        },
        {
          "id": "ris",
          "title": "RIS · Role Interaction Spec",
          "path": "../panel/data/ris.md",
          "phase": "phase-02",
          "layer": "architecture_engineering_core",
          "role": "Satellite contextual document.",
          "fits": "Provides role interaction context without redefining sovereign authority.",
          "depends_on": [
            "cas",
            "cfc"
          ],
          "used_by": [],
          "architecture_view": "Contextual relation layer.",
          "label": "RIS · Role Interaction Spec",
          "type": "text"
        },
        {
          "id": "ofms",
          "title": "OFMS · Operational Flow Mapping Spec",
          "path": "../panel/data/ofms.md",
          "phase": "phase-02",
          "layer": "architecture_engineering_core",
          "role": "Satellite contextual document.",
          "fits": "Provides contextual flow mapping without redefining canonical flow.",
          "depends_on": [
            "cfc",
            "ofc"
          ],
          "used_by": [],
          "architecture_view": "Contextual flow map.",
          "label": "OFMS · Operational Flow Mapping Spec",
          "type": "text"
        },
        {
          "id": "card_contract_minimums",
          "title": "Card Contract Minimums",
          "path": "../panel/data/card_contract_minimums.json",
          "phase": "phase-02",
          "layer": "architecture_engineering_core",
          "role": "Structured contract support artifact.",
          "fits": "Defines minimum card contract fields for panel and documentation surfaces.",
          "depends_on": [
            "css"
          ],
          "used_by": [],
          "architecture_view": "Contract minimum support layer.",
          "label": "Card Contract Minimums",
          "type": "json"
        },
        {
          "id": "panel_data_contract",
          "title": "Panel Data Contract",
          "path": "../panel/data/panel_data_contract.json",
          "phase": "phase-02",
          "layer": "architecture_engineering_core",
          "role": "Structured panel data contract authority.",
          "fits": "Defines machine-readable panel data contract boundaries.",
          "depends_on": [
            "css"
          ],
          "used_by": [],
          "architecture_view": "Panel data contract support layer.",
          "label": "Panel Data Contract",
          "type": "json"
        },
        {
          "id": "panel_component_contract",
          "title": "Panel Component Contract",
          "path": "../panel/data/panel_component_contract.json",
          "phase": "phase-02",
          "layer": "architecture_engineering_core",
          "role": "Structured panel component contract authority.",
          "fits": "Defines machine-readable component contract boundaries.",
          "depends_on": [
            "css"
          ],
          "used_by": [],
          "architecture_view": "Panel component contract support layer.",
          "label": "Panel Component Contract",
          "type": "json"
        },
        {
          "id": "panel_sync_contract",
          "title": "Panel Sync Contract",
          "path": "../panel/data/panel_sync_contract.json",
          "phase": "phase-02",
          "layer": "architecture_engineering_core",
          "role": "Structured panel sync contract authority.",
          "fits": "Defines machine-readable sync contract boundaries.",
          "depends_on": [
            "css"
          ],
          "used_by": [],
          "architecture_view": "Panel sync contract support layer.",
          "label": "Panel Sync Contract",
          "type": "json"
        },
        {
          "id": "panel_canonical_tree",
          "title": "Panel Canonical Tree",
          "path": "../panel/data/panel_canonical_tree.json",
          "phase": "phase-02",
          "layer": "architecture_engineering_core",
          "role": "Primary panel canonical tree authority.",
          "fits": "Defines structural panel tree and canonical UI grouping.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [],
          "architecture_view": "Panel tree authority.",
          "label": "Panel Canonical Tree",
          "type": "json"
        },
        {
          "id": "panel_navigation_spec",
          "title": "Panel Navigation Spec",
          "path": "../panel/data/panel_navigation_spec.json",
          "phase": "phase-02",
          "layer": "architecture_engineering_core",
          "role": "Primary panel navigation authority.",
          "fits": "Defines canonical panel navigation structure.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [],
          "architecture_view": "Panel navigation authority.",
          "label": "Panel Navigation Spec",
          "type": "json"
        },
        {
          "id": "panel_ui_blueprint",
          "title": "Panel UI Blueprint",
          "path": "../panel/data/panel_ui_blueprint.json",
          "phase": "phase-02",
          "layer": "architecture_engineering_core",
          "role": "Primary panel UI blueprint authority.",
          "fits": "Defines canonical panel UI blueprint expectations.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [],
          "architecture_view": "Panel UI blueprint authority.",
          "label": "Panel UI Blueprint",
          "type": "json"
        },
        {
          "id": "canonical_matrix_v1",
          "title": "Canonical Matrix v1",
          "path": "../panel/data/canonical_matrix_v1.json",
          "phase": "phase-02",
          "layer": "architecture_engineering_core",
          "role": "Primary canonical matrix authority.",
          "fits": "Defines machine-readable canonical matrix structure.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [],
          "architecture_view": "Canonical matrix authority.",
          "label": "Canonical Matrix v1",
          "type": "json"
        }
      ],
      "phase_id": "phase-02"
    },
    {
      "id": "cognitive_flow",
      "title": "Cognitive Flow Canon",
      "sub": "deterministic orchestration, validation order, execution gating and flow control.",
      "badge": "phase 03",
      "docs": [
        {
          "id": "cfc",
          "title": "CFC · Cognitive Flow Canon",
          "path": "../panel/data/cfc.md",
          "phase": "phase-03",
          "layer": "cognitive_flow",
          "role": "Primary authority for deterministic orchestration.",
          "fits": "Owns governed flow, validation order and execution permission.",
          "depends_on": [
            "cas",
            "sts"
          ],
          "used_by": [
            "ofc",
            "lpc",
            "ris"
          ],
          "architecture_view": "Sovereign flow meaning.",
          "label": "CFC · Cognitive Flow Canon",
          "type": "text"
        },
        {
          "id": "ccc",
          "title": "CCC · Cognitive Component Context",
          "path": "../panel/data/ccc.md",
          "phase": "phase-03",
          "layer": "cognitive_flow",
          "role": "Contextual component reference.",
          "fits": "Describes cognitive component relationships without redefining sovereign flow authority.",
          "depends_on": [
            "cfc",
            "cas"
          ],
          "used_by": [],
          "architecture_view": "Contextual support layer for Phase 03 cognitive flow.",
          "label": "CCC · Cognitive Component Context",
          "type": "text"
        }
      ],
      "phase_id": "phase-03"
    },
    {
      "id": "containerization",
      "title": "Containerization Canon",
      "sub": "deployment topology, service isolation and runtime/container boundaries under sovereign Phase 04 authority.",
      "badge": "phase 04",
      "docs": [
        {
          "id": "cdms",
          "title": "CDMS · Canonical Deployment Model Spec",
          "path": "../panel/data/cdms.md",
          "phase": "phase-04",
          "layer": "containerization",
          "role": "Primary deployment structure and containerization authority.",
          "fits": "Owns container topology, isolation boundaries and deployment placement for Phase 04.",
          "depends_on": [
            "cas",
            "cfc",
            "server_registry"
          ],
          "used_by": [],
          "architecture_view": "Sovereign Phase 04 containerization authority.",
          "label": "CDMS · Canonical Deployment Model Spec",
          "type": "text"
        }
      ],
      "phase_id": "phase-04"
    },
    {
      "id": "latency_performance",
      "title": "Latency & Performance Canon",
      "sub": "latency model, hot path, cold path and bounded performance design.",
      "badge": "phase 05",
      "docs": [
        {
          "id": "lpc",
          "title": "LPC · Latency & Performance Canon",
          "path": "../panel/data/lpc.md",
          "phase": "phase-05",
          "layer": "latency_performance",
          "role": "Primary latency budget authority.",
          "fits": "Owns latency model, fallback rules and performance law.",
          "depends_on": [
            "cfc"
          ],
          "used_by": [],
          "architecture_view": "Performance governance authority.",
          "label": "LPC · Latency & Performance Canon",
          "type": "text"
        }
      ],
      "phase_id": "phase-05"
    },
    {
      "id": "noise_reduction",
      "title": "Noise Reduction Canon",
      "sub": "signal preservation, redundancy elimination and hop reduction.",
      "badge": "phase 06",
      "docs": [
        {
          "id": "nrc",
          "title": "NRC · Noise Reduction Canon",
          "path": "../panel/data/nrc.md",
          "phase": "phase-06",
          "layer": "noise_reduction",
          "role": "Primary noise reduction authority.",
          "fits": "Owns anti-redundancy and anti-waste architectural guidance.",
          "depends_on": [
            "lpc",
            "cfc"
          ],
          "used_by": [],
          "architecture_view": "Path simplification authority.",
          "label": "NRC · Noise Reduction Canon",
          "type": "text"
        }
      ],
      "phase_id": "phase-06"
    },
    {
      "id": "observability_audit",
      "title": "Observability & Audit Canon",
      "sub": "documentation-facing audit model, evidence traceability and observability control, including distribution/package failure visibility, with runtime audit delegated to the Operator Panel.",
      "badge": "phase 07",
      "docs": [
        {
          "id": "oac",
          "title": "OAC · Observability & Audit Canon",
          "path": "../panel/data/oac.md",
          "phase": "phase-07",
          "layer": "observability_audit",
          "role": "Primary observability and audit authority for the documentation side.",
          "fits": "Owns evidence traceability, audit-linked visibility, distribution/package failure visibility and the canonical audit model expected by runtime operations.",
          "depends_on": [
            "cfc",
            "sec"
          ],
          "used_by": [],
          "architecture_view": "Documentation-side audit canon and observability authority, including distribution failure visibility.",
          "label": "OAC · Observability & Audit Canon",
          "type": "text"
        },
        {
          "id": "panel_runtime_bridge",
          "title": "Panel Runtime Bridge",
          "path": "../panel/data/panel_runtime_bridge.json",
          "phase": "phase-04",
          "layer": "observability_audit",
          "role": "Runtime bridge authority.",
          "fits": "Connects canonical runtime expectations to observable runtime support artifacts.",
          "depends_on": [
            "panel_data_contract",
            "panel_sync_contract"
          ],
          "used_by": [],
          "architecture_view": "Runtime bridge support layer.",
          "label": "Panel Runtime Bridge",
          "type": "json"
        },
        {
          "id": "host_runtime_support",
          "title": "Host Runtime Support",
          "path": "../panel/data/host_runtime.json",
          "phase": "phase-04",
          "layer": "observability_audit",
          "role": "Runtime support artifact.",
          "fits": "Observable host runtime support record.",
          "depends_on": [
            "panel_runtime_bridge"
          ],
          "used_by": [],
          "architecture_view": "Host runtime support evidence.",
          "label": "Host Runtime Support",
          "type": "json"
        },
        {
          "id": "docker_runtime_support",
          "title": "Docker Runtime Support",
          "path": "../panel/data/docker_runtime.json",
          "phase": "phase-04",
          "layer": "observability_audit",
          "role": "Runtime support artifact.",
          "fits": "Observable docker runtime support record.",
          "depends_on": [
            "panel_runtime_bridge"
          ],
          "used_by": [],
          "architecture_view": "Docker runtime support evidence.",
          "label": "Docker Runtime Support",
          "type": "json"
        },
        {
          "id": "runtime_status_support",
          "title": "Runtime Status Support",
          "path": "../panel/data/runtime_status.json",
          "phase": "phase-04",
          "layer": "observability_audit",
          "role": "Runtime support artifact.",
          "fits": "Observable pipeline/runtime status support record.",
          "depends_on": [
            "panel_runtime_bridge"
          ],
          "used_by": [],
          "architecture_view": "Runtime status support evidence.",
          "label": "Runtime Status Support",
          "type": "json"
        },
        {
          "id": "runtime_row_semantics",
          "title": "Runtime Row Semantics Canonical",
          "path": "../panel/data/runtime_row_semantics_canonical.json",
          "phase": "phase-07",
          "layer": "observability_audit",
          "role": "Canonical semantic typing contract for every runtime row published by Devon.",
          "fits": "Defines row_kind, semantic_scope and completion eligibility rules for runtime rows.",
          "depends_on": [
            "oac",
            "panel_runtime_bridge"
          ],
          "used_by": [],
          "architecture_view": "Runtime row semantic contract authority.",
          "label": "Runtime Row Semantics Canonical",
          "type": "json"
        }
      ],
      "phase_id": "phase-07"
    },
    {
      "id": "security_governance",
      "title": "Security Canon",
      "sub": "security governance authority plus structured implementation artifacts, including environment-specific memory/data exposure policy and operator/runtime/debug separation.",
      "badge": "phase 08",
      "docs": [
        {
          "id": "sec",
          "title": "SEC · Security Canon",
          "path": "../panel/data/sec.md",
          "phase": "phase-08",
          "layer": "security_governance",
          "role": "Primary security governance authority.",
          "fits": "Owns trust model, access control, memory protection, environment-specific memory/data exposure policy, operator/runtime/debug separation and security monitoring expectations.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [
            "host_security",
            "app_security",
            "module_security",
            "runtime_security",
            "delivery_security",
            "approval_policy",
            "memory_isolation",
            "security_monitoring"
          ],
          "architecture_view": "Sovereign security meaning with environment exposure boundaries.",
          "label": "SEC · Security Canon",
          "type": "text"
        },
        {
          "id": "host_security",
          "title": "Host Security Canonical",
          "path": "../panel/data/host_security_canonical.json",
          "phase": "phase-08",
          "layer": "security_governance",
          "role": "Structured host security implementation.",
          "fits": "Machine-readable host security canon.",
          "depends_on": [
            "sec"
          ],
          "used_by": [],
          "architecture_view": "Host security implementation layer.",
          "label": "Host Security Canonical",
          "type": "json"
        },
        {
          "id": "app_security",
          "title": "App Security Canonical",
          "path": "../panel/data/app_security_canonical.json",
          "phase": "phase-08",
          "layer": "security_governance",
          "role": "Structured app security implementation.",
          "fits": "Machine-readable application security canon.",
          "depends_on": [
            "sec"
          ],
          "used_by": [],
          "architecture_view": "Application security implementation layer.",
          "label": "App Security Canonical",
          "type": "json"
        },
        {
          "id": "module_security",
          "title": "Module Security Canonical",
          "path": "../panel/data/module_security_canonical.json",
          "phase": "phase-08",
          "layer": "security_governance",
          "role": "Structured module security implementation.",
          "fits": "Machine-readable module security canon.",
          "depends_on": [
            "sec"
          ],
          "used_by": [],
          "architecture_view": "Module security implementation layer.",
          "label": "Module Security Canonical",
          "type": "json"
        },
        {
          "id": "runtime_security",
          "title": "Runtime Security Canonical",
          "path": "../panel/data/runtime_security_canonical.json",
          "phase": "phase-08",
          "layer": "security_governance",
          "role": "Structured runtime security implementation.",
          "fits": "Machine-readable runtime security canon.",
          "depends_on": [
            "sec"
          ],
          "used_by": [],
          "architecture_view": "Runtime security implementation layer.",
          "label": "Runtime Security Canonical",
          "type": "json"
        },
        {
          "id": "delivery_security",
          "title": "Delivery Security Canonical",
          "path": "../panel/data/delivery_security_canonical.json",
          "phase": "phase-08",
          "layer": "security_governance",
          "role": "Structured delivery security implementation.",
          "fits": "Machine-readable delivery security canon.",
          "depends_on": [
            "sec"
          ],
          "used_by": [],
          "architecture_view": "Delivery security implementation layer.",
          "label": "Delivery Security Canonical",
          "type": "json"
        },
        {
          "id": "approval_policy",
          "title": "Approval Canonization Policy",
          "path": "../panel/data/approval_canonization_policy.json",
          "phase": "phase-08",
          "layer": "security_governance",
          "role": "Structured approval and canonization policy.",
          "fits": "Machine-readable approval guardrails.",
          "depends_on": [
            "sec"
          ],
          "used_by": [],
          "architecture_view": "Approval policy implementation layer.",
          "label": "Approval Canonization Policy",
          "type": "json"
        },
        {
          "id": "memory_isolation",
          "title": "Memory Isolation Canonical",
          "path": "../panel/data/memory_isolation_canonical.json",
          "phase": "phase-08",
          "layer": "security_governance",
          "role": "Structured memory isolation canon.",
          "fits": "Machine-readable memory partition and isolation rules.",
          "depends_on": [
            "sec"
          ],
          "used_by": [],
          "architecture_view": "Memory isolation implementation layer.",
          "label": "Memory Isolation Canonical",
          "type": "json"
        },
        {
          "id": "security_monitoring",
          "title": "Security Monitoring Canonical",
          "path": "../panel/data/security_monitoring_canonical.json",
          "phase": "phase-08",
          "layer": "security_governance",
          "role": "Structured security monitoring canon.",
          "fits": "Machine-readable security monitoring rules.",
          "depends_on": [
            "sec"
          ],
          "used_by": [],
          "architecture_view": "Security monitoring implementation layer.",
          "label": "Security Monitoring Canonical",
          "type": "json"
        }
      ],
      "phase_id": "phase-08"
    },
    {
      "id": "operational_flows",
      "title": "Operational Flows Canon",
      "sub": "documentation-facing operational sequence, runtime flow order and end-to-end action routing with real execution audit delegated to the Operator Panel.",
      "badge": "phase 09",
      "docs": [
        {
          "id": "ofc",
          "title": "OFC · Operational Flows Canon",
          "path": "../panel/data/ofc.md",
          "phase": "phase-09",
          "layer": "operational_flows",
          "role": "Primary operational flow authority for the documentation side.",
          "fits": "Owns canonical operational sequence and ordered runtime flow expectations, while real execution audit remains operational.",
          "depends_on": [
            "cfc",
            "sts"
          ],
          "used_by": [],
          "architecture_view": "Documentation-side operational flow authority.",
          "label": "OFC · Operational Flows Canon",
          "type": "text"
        }
      ],
      "phase_id": "phase-09"
    },
    {
      "id": "delivery_layer",
      "title": "Delivery Layer",
      "sub": "build progression, release logic, pipeline mapping and operational content indexing.",
      "badge": "phase 09 / phase 02",
      "docs": [
        {
          "id": "subcategory_pipelines",
          "title": "Subcategory Pipelines",
          "path": "../panel/data/subcategory_pipelines.json",
          "phase": "phase-09",
          "layer": "delivery_layer",
          "role": "Structured delivery pipeline authority.",
          "fits": "Defines subcategory pipeline sequence for operational surfaces.",
          "depends_on": [
            "ofc"
          ],
          "used_by": [],
          "architecture_view": "Delivery pipeline support layer.",
          "label": "Subcategory Pipelines",
          "type": "json"
        },
        {
          "id": "panel_content_index",
          "title": "Panel Content Index",
          "path": "../panel/data/panel_content_index.json",
          "phase": "phase-09",
          "layer": "delivery_layer",
          "role": "Structured panel content index authority.",
          "fits": "Defines stage-to-content mapping for the Operator Panel.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [],
          "architecture_view": "Content-index support layer.",
          "label": "Panel Content Index",
          "type": "json"
        }
      ],
      "phase_id": "phase-09"
    },
    {
      "id": "memory_learning_reasoning",
      "title": "Memory, Learning & Reasoning Governance",
      "sub": "trust-bound memory, learning and reasoning expansion activated from Phase 08 and maintained as post-core canonical expansion.",
      "badge": "phase 08 / post-core",
      "docs": [
        {
          "id": "memory_arch",
          "title": "Memory Canonical Architecture",
          "path": "../panel/data/memory_canonical_architecture.json",
          "phase": "phase-08",
          "layer": "memory_learning_reasoning",
          "role": "Structured memory architecture canon.",
          "fits": "Machine-readable memory architecture baseline.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [],
          "architecture_view": "Memory architecture support layer.",
          "label": "Memory Canonical Architecture",
          "type": "json"
        },
        {
          "id": "memory_lifecycle",
          "title": "Memory Lifecycle Canonical",
          "path": "../panel/data/memory_lifecycle_canonical.json",
          "phase": "phase-08",
          "layer": "memory_learning_reasoning",
          "role": "Structured memory lifecycle canon.",
          "fits": "Machine-readable consolidation and lifecycle rules.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [],
          "architecture_view": "Memory lifecycle support layer.",
          "label": "Memory Lifecycle Canonical",
          "type": "json"
        },
        {
          "id": "learning_gov",
          "title": "Learning Governance Canonical",
          "path": "../panel/data/learning_governance_canonical.json",
          "phase": "phase-08",
          "layer": "memory_learning_reasoning",
          "role": "Structured learning governance canon.",
          "fits": "Machine-readable learning guardrails.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [],
          "architecture_view": "Learning governance support layer.",
          "label": "Learning Governance Canonical",
          "type": "json"
        },
        {
          "id": "planning_reasoning",
          "title": "Planning Reasoning Canonical",
          "path": "../panel/data/planning_reasoning_canonical.json",
          "phase": "phase-08",
          "layer": "memory_learning_reasoning",
          "role": "Structured planning and reasoning canon.",
          "fits": "Machine-readable planning and reasoning boundaries.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [],
          "architecture_view": "Planning governance support layer.",
          "label": "Planning Reasoning Canonical",
          "type": "json"
        },
        {
          "id": "tool_execution",
          "title": "Tool Execution Canonical",
          "path": "../panel/data/tool_execution_canonical.json",
          "phase": "phase-08",
          "layer": "memory_learning_reasoning",
          "role": "Structured tool execution canon.",
          "fits": "Machine-readable permission and execution boundaries.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [],
          "architecture_view": "Tool execution governance support layer.",
          "label": "Tool Execution Canonical",
          "type": "json"
        },
        {
          "id": "knowledge_ingestion",
          "title": "Knowledge Ingestion Canonical",
          "path": "../panel/data/knowledge_ingestion_canonical.json",
          "phase": "phase-08",
          "layer": "memory_learning_reasoning",
          "role": "Structured knowledge ingestion canon.",
          "fits": "Machine-readable ingestion and indexing boundaries.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [],
          "architecture_view": "Knowledge ingestion support layer.",
          "label": "Knowledge Ingestion Canonical",
          "type": "json"
        }
      ],
      "phase_id": "phase-08"
    },
    {
      "id": "monitoring_observability",
      "title": "Monitoring & Real-time Observability",
      "sub": "real-time host, container and service monitoring canon with SSE bridge authority.",
      "badge": "phase 10",
      "docs": [
        {
          "id": "monitoring_canonical",
          "title": "Monitoring Canonical",
          "path": "../panel/data/monitoring_canonical.json",
          "phase": "phase-10",
          "layer": "monitoring_observability",
          "role": "Primary real-time monitoring authority.",
          "fits": "Defines all monitoring targets, metrics, alert thresholds and refresh intervals.",
          "depends_on": [
            "master_architecture_index"
          ],
          "used_by": [
            "sse_bridge_canonical"
          ],
          "architecture_view": "Sovereign monitoring authority for host, containers and services.",
          "label": "Monitoring Canonical",
          "type": "json"
        },
        {
          "id": "sse_bridge_canonical",
          "title": "SSE Bridge Canonical",
          "path": "../panel/data/sse_bridge_canonical.json",
          "phase": "phase-10",
          "layer": "monitoring_observability",
          "role": "SSE transport authority replacing push_snapshot model.",
          "fits": "Defines the permanent SSE channel from Devon to Waresite Operator Panel.",
          "depends_on": [
            "monitoring_canonical"
          ],
          "used_by": [],
          "architecture_view": "SSE bridge transport authority.",
          "label": "SSE Bridge Canonical",
          "type": "json"
        }
      ],
      "phase_id": "phase-10"
    }
  ]
}
