AXIOM-MESH is a multi-service runtime built around four core services. Current milestone: (see
docs/PROJECT-STATUS-2026.md).
- Gateway (TypeScript/Node): API ingress, UX delivery, and channel adapters.
- Hypervisor (Python/FastAPI): orchestration, policy routing, context/memory, and execution planning.
- Sandbox (TypeScript/Node + Docker): isolated code execution with security controls.
- Grid (Go + Solidity): ledger, consensus components, and contract integration.
To avoid ambiguity in downstream docs:
- Runtime architecture = 4 pillars (Gateway, Hypervisor, Sandbox, Grid).
- Platform sovereignty program = 8 pillars (see
docs/MASTER-INTEGRATION.md).
Both descriptions are intentional and refer to different abstraction layers.
Current repository status (March 2026): AXIOM-MESH is in repository/staging hardening. The codebase includes implementation across all four services, but this repository is not declaring live testnet/mainnet deployment from this README.
# macOS/Linux
./install.sh
# Windows
.\install.batThe installer delegates to install.py, detects host capabilities, and supports unattended mode for automation.
docker compose up -d --buildThis starts the default local stack defined in docker-compose.yml (including core runtime services and observability components).
gateway/— Gateway API and dashboard surface.hypervisor/— orchestration and reasoning engine.sandbox/— secure execution subsystem.grid/— Go ledger/P2P + Solidity contracts.shared/— shared TypeScript utility modules (resilience, observability).schemas/— Cap'n Proto and shared schema definitions.scripts/— operational checks, verification scripts, and tooling.docs/— canonical architecture, roadmap, governance, and operations docs.
Use the top-level Makefile for common workflows:
# Bring services up/down
docker compose up -d --build
docker compose down
# Contract workflow
make contracts-compile
make contracts-test
# Transformer gate checks
make transformer-gate
# Evidence/control verification examples
make verify-evidence-bundles
make verify-tokenomics-controls
make verify-genesis-ceremonyFor service-specific development, see each service README:
gateway/README.mdhypervisor/README.mdsandbox/README.mdgrid/README.md
Start with:
docs/README.md— canonical documentation index.
Primary control documents:
- The Sovereign Execution Queue — on-chain execution queue replacing MASTER-TODO.md. The network is governed by math and thermodynamics from Day 1, not a developer roadmap.
- Genesis Decay — Mathematical protocol for automatic phase-out of centralized founder permissions over time.
docs/PROJECT-STATUS-2026.md— project/repo status snapshot.docs/AUDIT_REPORT.mdanddocs/audits/— audit and remediation material.docs/assessments/SOCIETAL-OS-EVERYTHING-APP-AUDIT-PLAYBOOK-2026-04-08.md— integrated audit operating playbook for the societal OS / everything-app program.docs/architecture/ARCHITECTURE.mdanddocs/TECHNICAL-SPECIFICATION.md— architecture/spec baseline.- Trust-boundary + mTLS flow diagrams:
docs/architecture/ARCHITECTURE.md#34-trust-boundary-diagram-mermaid docs/GRID-CONSENSUS-SPEC.md— Grid consensus, finality semantics, and upgrade controls baseline.
This repository currently uses Main (capital M) as the primary branch name. Prefer relative documentation links inside the repo to avoid case-sensitive URL issues in external tooling.
This top-level README is intentionally kept as a current orientation guide (what exists, how to run it, where authoritative docs live). Detailed roadmap, tokenomics, and deployment claims are maintained in the canonical documents under docs/.
AXIOM-MESH is built with a "security-first" mindset. All inter-service communication is secured via mTLS, and execution is isolated within sandboxes.
- Vulnerability Reporting: Please refer to our Security Policy for instructions on how to report vulnerabilities.
- Configuration: See Configuration Guide for environment variable setup and security best practices.
- Hardening: Use the provided
scripts/harden-before-public.shto verify your local repository configuration before deployment. - CI/CD: Automated security scanning (Secret scanning, Trivy, CodeQL) is integrated into our GitHub Actions workflows.
