Skip to main content
Back to 7 Genome System
G6 — The Knowledge Base

RCT Knowledge Vault Genome

The core knowledge base of RCT Ecosystem — a Living Knowledge System powering all platforms.

1,068+

Total Files (Snapshot v1.0)

3

Separate Vaults

100%

User-Key Encrypted

3-Vault Structure

Vault-1

ArtentAI Vault

584

The primary agent knowledge vault. Contains ARTENT operating protocols, intent classification training data, WF-00 through WF-05 phase definitions, error taxonomy, and the full history of agent session data. Organized by intent category and domain.

Intent Classification CorpusWF Phase DefinitionsError Taxonomy (4,849 cases)Domain Knowledge (41 sectors)Session History Archive

Vault-2

SignedAI Vault

334

The verification knowledge vault. Contains 8D scoring calibration data, model comparison benchmarks, consensus algorithm configurations, attestation templates, and the full library of known hallucination patterns across 7 HexaCore models.

8D Scoring CalibrationModel Benchmark HistoryConsensus Algorithm ConfigsAttestation TemplatesHallucination Pattern Library

Vault-3

Middleware Vault

92

The integration and protocol vault. Contains JITNA RFC-001 specification files, API gateway configurations, RCTDB schema definitions, LLM adapter specifications, and system health monitoring baselines.

JITNA RFC-001 SpecAPI Gateway ConfigsRCTDB Schema DefinitionsLLM Adapter SpecsSystem Health Baselines

Data Sovereignty Principles

User Ownership

All user-contributed data in the RCT Knowledge Vault is owned by the user who created it. RCT Labs holds no license to use it for training or analytics without explicit M-primitive consent declaration.

Selective Disclosure

Users can share specific Vault segments with agents, collaborators, or external systems without exposing their entire vault. Disclosure is per-file, per-session, or per-role — never all-or-nothing.

Encryption at Rest

All RCT Knowledge Vault data is encrypted with user-held keys. RCT infrastructure operators cannot read vault contents. The encryption key is never transmitted — only used locally or in secure enclaves.

TTL Declarations

Every memory write includes an explicit TTL (Time-to-Live) from the M-primitive. No data persists forever by default. Session memory defaults to 24h. Project memory requires explicit declaration. No silent accumulation.