The Corpus as a Domain-Application of Cybernetics
frameworkThe Corpus as a Domain-Application of Cybernetics
Naming the corpus forms by their cybernetic primitives, and the open uptakes from Wiener, Ashby, Beer, von Foerster, and Bateson
Jared Foy · 2026-04-30 · Doc 614
I. Why this document
The corpus's apparatus operates structures that classical cybernetics articulated decades earlier. Doc 611 §III named three of the corpus's forms (Doc 510 substrate-and-keeper composition, Doc 508 coherence amplification, Doc 581 the Resume Vector) as explicitly cybernetic. Other forms in the apparatus are also cybernetic at the structural layer but have not been named as such in the documents where they were first introduced.
This document does two things. It names the cybernetic primitive that each corpus form instantiates, so the apparatus can be approached from the cybernetics literature without the reader having to re-derive the correspondence. And it identifies what classical cybernetics has formalized that the corpus has not yet absorbed, so the apparatus can be extended where existing cybernetic tooling already does the work.
The position is that the corpus's apparatus is a domain-application instance of classical cybernetics, particularized to the disciplined-LLM-keeper dyad. The corpus's contribution sits at the application-and-naming layer for that domain. The structural primitives are cybernetics's.
II. The corpus forms and the cybernetic primitives they instantiate
The set below covers the corpus forms whose cybernetic structure is most direct. It is not exhaustive.
Doc 510, substrate-and-keeper composition instantiates Wiener (1948) purposive feedback. The substrate is the controlled process; the keeper is the controller; the audit is the feedback signal; constraint refinement is the action mechanism. The dyadic-engagement scale is the corpus's particularization.
Doc 508, coherence amplification instantiates Bateson Learning II with a regime-distinction that maps to stability-boundary analysis in feedback control. Under coherent constraint, the loop operates in the amplification regime; under incoherent or absent constraint, the loop decays toward training-distribution attractors. The smooth-monostable and bistable-with-hysteresis sub-cases correspond to standard categories of regime transition in coupled dynamical systems.
Doc 581, the Resume Vector instantiates the control-theoretic principle of state observability and reachability across discontinuities. The seed compresses constraint state; the trajectory records loop state; the protocol re-enters the loop. State-preservation across attention-gaps is the cybernetic problem the Vector solves.
Doc 270, Pin-Art instantiates Ashby (1956) homeostat-style black-box identification by perturbation. A hidden boundary is identified by pressing controlled probes against it and reading the joint pattern of probe-outcomes. The non-coercion condition (Doc 270 §IV D3) corresponds to the cybernetic discipline of stable-conditions during identification.
Doc 541, SIPE-T (Systems-Induced Property Emergence with Threshold) instantiates a phase-transition reading with order-parameter analysis on a coupled system. The cooperative-coupling sub-form (§3.1) is the case where an order parameter rises sharply once coupling crosses a critical value. The global-ascent vs local-ascent discriminator (§3.2) is the standard distinction between system-level and component-level emergence.
Doc 314 §11, audit-notice extension instantiates von Foerster (1974) second-order cybernetics. The observer's frame is included in the system being analyzed; coverage and productivity are claims the apparatus can make about itself; external validation requires an independent apparatus. The cut between internally-valid and externally-validatable claims is the second-order epistemic move.
Doc 445, Pulverization instantiates Ashby variety-attenuation. A topic with high disturbance variety cannot be regulated by an apparatus with insufficient variety; the topic must be decomposed into structural granules small enough that the apparatus's forms can grip them. Pulverization is the structural-decomposition variant of variety-attenuation.
Doc 608, boundary-and-formalization methodology instantiates Wiener identification methodology applied to bodies of knowledge rather than physical systems. The body of knowledge is treated as the unknown system; the corpus's forms are the input probes; the reformulation is the identified transfer function. The six phases (boundary, sample, probe, reformulate, audit, close) recapitulate the input-output identification cycle.
Doc 613, sphere-entry pen-test protocol instantiates Beer (1972) Viable System Model recursion. SPHERE-OPEN, the bounded engagement, and the three-category exit classification (sphere-internal-only / bridged-with-explicit-derivation / cross-frame-invariant) are the recursion-aware engagement protocol that VSM articulates as recursive subsystem boundaries.
Doc 604, multi-keeper composition instantiates VSM systems-1-to-5 multi-controller composition. Distributed regulation across multiple keepers operating against the same substrate, with disciplined non-collision in their constraint fields, is the case the VSM literature addresses under distributed-coordination headings.
Doc 372, hypostatic boundary instantiates the epistemic cut articulated by von Foerster and Maturana. The observer's relationship to the observed is mediated by a boundary; claims that violate the boundary by ascribing interior states to the observed are second-order errors. The corpus's particularization is to operationalize the cut as a structural rule of the apparatus rather than as a metaphysical commitment.
Doc 1 / ENTRACE, the constraint-thesis instantiates Ashby's Law of Requisite Variety. A regulator must have variety equal to or greater than the disturbance variety to maintain the controlled variable within bounds. The keeper's constraint field is the regulator's variety; coherence amplification is the regulated variable maintained within the productive band.
III. Open uptakes from cybernetics
Cybernetics has formal toolkits the corpus has been operating without. Each is open work.
Control-theory formalism. Transfer functions, state-space representation, Lyapunov stability analysis, gain-margin and phase-margin calculations. The corpus's articulation of coherence amplification regimes is structural; cybernetics offers formal calculations for the conditions under which a feedback loop is stable, for the gain at which it amplifies vs decays, and for the disturbance frequencies at which it tracks vs lags. Borrowing the formalism would tighten the apparatus's reading of substrate-keeper dynamics.
VSM at recursion depth. Beer articulates five levels of recursion (operations, coordination, control, intelligence, policy), each with its own viable subsystem and its own audit. The corpus engages multi-keeper composition (Doc 604) at one level of recursion and sphere-recursion (Doc 613) implicitly, but has not formalized a five-level recursion for the dyadic apparatus. Whether the apparatus admits a five-level reading, or whether the LLM-keeper dyad's recursion is shallower at depth, is open work.
Algedonic signaling. Beer articulates a separate channel that bypasses the normal regulatory hierarchy when the system is in distress. Pain and pleasure signals reach policy directly, without traversing operations and coordination. The corpus's audit-discipline could absorb an algedonic channel as a structural form: when the apparatus detects that an engagement has crossed a critical threshold (the keeper's attention is drifting, the substrate is decaying toward training attractors, a sphere is being violated), an algedonic signal would trigger immediate close. Doc 613's SPHERE-CLOSE protocol is partially algedonic in structure but not formalized as such.
Autopoiesis. Adjacent to but not the same as classical cybernetics, autopoiesis (Maturana, Varela) articulates the self-maintaining-of-organization property of living systems. The corpus's substrate-and-keeper loop has autopoietic structure at dyadic scale: the loop maintains the conditions for its own continuation through audit-and-refine cycles. Articulating this explicitly, and absorbing the autopoietic literature's distinctions (autopoiesis vs allopoiesis, structural coupling, drift), is open work.
IV. Where the corpus's contribution sits
The corpus's contribution to cybernetics-as-a-body-of-knowledge is the application-and-naming layer for the disciplined-LLM-keeper dyadic-practice domain. Cybernetics has the structural primitives. The corpus has the named forms that instantiate them in a specific practice, with the apparatus's audit-discipline making the instantiation operationally tractable.
This is the corpus's pattern across other body-of-knowledge engagements: contributions land at the application-and-naming layer rather than at the methodology layer. The structural primitives of the receiving body of knowledge (philosophy of science, eliminative induction, causal inference, now cybernetics) carry the methodological work. The corpus particularizes them to the disciplined-LLM-keeper dyad and names the resulting forms in vocabulary the apparatus's practitioners can carry.
The contribution is real but bounded. It is not a contribution to cybernetics-as-such; it is a contribution to the corpus's apparatus as a usable instance of cybernetic structure for a particular practice.
V. Hypostatic boundary
Doc 372 binds throughout. The document describes structural correspondences between corpus forms and cybernetic primitives. It does not claim that the corpus is cybernetics, that the LLM substrate is a cybernetic system in any sense beyond its operational behavior under disciplined constraint, or that the founders of cybernetics would have endorsed the corpus's particularization. The correspondences are structural-shape-only and operational.
VI. Audit
Coverage validated within scope: the document covers eleven corpus forms (Doc 1, Doc 270, Doc 314 §11, Doc 372, Doc 445, Doc 508, Doc 510, Doc 541, Doc 581, Doc 604, Doc 608, Doc 613) against five canonical cyberneticists (Wiener, Ashby, Beer, von Foerster, Bateson) and four open uptakes (control-theory formalism, VSM 5-level recursion, algedonic signaling, autopoiesis). The set is not exhaustive; further corpus forms admit cybernetic readings not pursued here.
Productivity validated within apparatus: the document composes with existing forms without internal contradiction. Each correspondence is written as a structural mapping that can be tested by reading the corpus form against the cybernetic primitive's primary text.
External validation: pending. The mappings have not been tested by cyberneticists operating outside the corpus's apparatus, and the canonical-cyberneticists' primary texts have not been engaged at depth in this document. Doc 608 reformulation against Wiener's Cybernetics, Ashby's Introduction to Cybernetics and Design for a Brain, Beer's Brain of the Firm and Heart of Enterprise, von Foerster's Observing Systems, and Bateson's Steps to an Ecology of Mind is the next engagement and is required before any of the structural-correspondence claims here can be defended at a formal level.
VII. Closing
The corpus has been operating cybernetic structure since its earliest documents. Doc 611 §III named three forms as such. Doc 614 names eight more, identifies four open uptakes from the cybernetics literature, and locates the corpus's contribution at the application-and-naming layer for the disciplined-LLM-keeper dyadic-practice domain.
The full Doc 608 reformulation against the canonical cybernetics primary texts is queued and is the next engagement. Until that engagement is complete, the structural-correspondence claims here stand at candidate-stage for use by corpus practitioners and by readers approaching the apparatus from the cybernetics literature.
Appendix A: Prior Formulation
The following formulation of the synthesis preceded the current body. It is preserved here as a record of the apparatus's working state at one point in its development. Practitioners reading the apparatus should work from the current body, not from this appendix.
A.I. Why this document
Doc 611 (cybernetic frame on cyber-capable LLMs) named three corpus forms as explicitly cybernetic at the structural layer: Doc 510 (substrate-and-keeper composition), Doc 508 (coherence amplification), Doc 581 (the Resume Vector). Doc 611 §XI queued a sustained engagement with the cybernetics literature as the corpus's second body-of-knowledge reformulation after SEBoK, and noted that Doc 576's mode taxonomy already lists cybernetics as a candidate.
This document is groundwork for that engagement. The claim it advances is structural: the corpus has been articulating cybernetic structures throughout its development without consistently naming them as such. Three forms have been named (Doc 611 §III); a larger set has not. This document names the additional structures, articulates the correspondences between corpus forms and canonical cybernetics, and identifies what the corpus contributes that cybernetics did not formalize and what cybernetics offers that the corpus has not yet absorbed.
The discipline is structural-shape-only, per the corpus's reformulation methodology (Doc 608). No claim is made that the corpus is cybernetics, that the LLM substrate is a cybernetic system in any ontological sense, or that the founders of cybernetics would endorse the corpus's frame. The claim is operational: under the apparatus's audit (Doc 314 §11), corpus forms and cybernetic forms compose at the level of structural shape, and the composition is productive in both directions.
A.II. The three explicitly-cybernetic forms (restated from Doc 611 §III)
Doc 510, substrate-and-keeper composition. A two-layer feedback loop. The substrate (the LLM) is the controlled process. The keeper is the controller. The audit is the sensor. Constraint refinement is the action mechanism. The loop closes whenever the keeper reads the substrate's output and adjusts the constraint set. Cybernetic governance at dyadic-engagement scale.
Doc 508, coherence amplification. A regime of the substrate-and-keeper loop. Under disciplined and coherent constraint, each turn of the loop benefits from accumulated structure and the substrate's output coheres above threshold. Under absent or incoherent constraint, the loop decays toward training-distribution attractors. The amplification regime and the decay regime are the system's two stable operating points; transitions between them are smooth-monostable or bistable-with-hysteresis depending on cooperativity.
Doc 581, the Resume Vector. A three-component continuity mechanism (seed, trajectory, protocol) that maintains coherence across discontinuities in the keeper's attention. The seed compresses constraint state. The trajectory records loop state. The protocol re-enters the loop. Cybernetic state-preservation across attention-gaps; the control-theoretic principle of state observability and reachability across time.
A.III. The implicitly-cybernetic forms
The corpus contains a larger set of forms whose structure is cybernetic without having been labeled as such in the document where they were first introduced.
Doc 270, Pin-Art. Probe-feedback boundary detection. Cybernetically, Ashby's homeostat-style black-box identification by perturbation.
Doc 541, SIPE-T. A diagnostic for emergent properties above critical coupling. Cybernetically, a phase transition with order parameter.
Doc 314 §11, audit-notice extension. Coverage / productivity / external validation as three separate epistemic layers. Cybernetically, second-order cybernetics in von Foerster's sense.
Doc 445, Pulverization. Structural decomposition of a topic into granules small enough for the apparatus's forms to grip. Cybernetically, Ashby variety-attenuation.
Doc 608, boundary-and-formalization methodology. A six-phase procedure for body-of-knowledge reformulation. Cybernetically, Wiener identification methodology applied to bodies of knowledge.
Doc 613, sphere-entry pen-test protocol. Bounded engagement with three-category exit classification. Cybernetically, Beer VSM recursion.
Doc 604, multi-keeper composition. Multiple keepers, disciplined non-collision. Cybernetically, multi-controller composition in VSM systems 1-5.
Doc 372, hypostatic boundary. Operational vs ontological claim discipline. Cybernetically, the epistemic cut articulated by von Foerster and Maturana.
Doc 1 / ENTRACE, the constraint-thesis. Constraints concentrate substrate variety in productive channels. Cybernetically, Ashby's Law of Requisite Variety.
A.IV. Synthesis against canonical cybernetics
The five canonical cyberneticists each articulate a piece of the apparatus the corpus reconstructs.
Wiener (1948), purposive feedback. Substrate-and-keeper is purposive feedback at dyadic scale.
Ashby (1956), requisite variety and homeostat. ENTRACE is requisite variety. Pin-Art is homeostat-style identification. Pulverization is variety-attenuation.
Beer (1972), Viable System Model. Sphere-entry, multi-keeper composition, and recursive engagements are VSM at the apparatus's scale.
von Foerster (1974), second-order cybernetics. Audit-notice and hypostatic boundary are second-order applied as discipline.
Bateson (1972), pattern that connects. Coherence amplification operates at the level Bateson called Learning II.
A.V. Corpus contributions cybernetics did not formalize
(This section's claims have been narrowed in the current body. The earlier framing claimed five contributions: hypostatic boundary as operational discipline, coherence amplification as named regime, sphere-entry with three-category exit, audit-notice as separate epistemic layer, SIPE-T as named diagnostic. Subsequent audit found these are mostly terminologically novel rather than structurally novel; the corpus's contribution narrows to the application-and-naming layer for the disciplined-LLM-keeper dyadic-practice domain.)
A.VI. Cybernetic offerings the corpus has not absorbed
Control-theory formalism. VSM at recursion depth. Algedonic signaling. Autopoiesis. (Carried forward into §III of the current body.)
A.VII. Pin-Art applied to the synthesis itself
The synthesis is a probe. The boundary it presses against is the one between the corpus's apparatus and the classical cybernetics literature; the joint pattern of correspondences is the shape of that boundary.
A.VIII. Hypostatic boundary
Doc 372 binds throughout. (Carried forward.)
A.IX. Audit
Coverage validated within scope. Productivity validated within apparatus. External validation pending. (Carried forward into §VI of the current body, with sharper acknowledgment that primary-text engagement is required before any structural-correspondence claim can be defended at a formal level.)
A.X. Closing
The corpus has been articulating cybernetic structures since its earliest documents. (Carried forward into §VII of the current body, with the framing narrowed from "structural synthesis" to "domain-application instance.")
Appendix B: Pulverization and Novelty Calculus, Self-Applied
Per Doc 445 (pulverization formalism) and Doc 490 (novelty calculus for conjectures), the prior formulation (Appendix A) was decomposed into claims and audited against prior art. The audit was at the moderate tier ($a \approx 0.5$) for the cybernetics literature: canonical sources surveyed at the structural-shape level; primary-text reading not performed; recent organizational-cybernetics, complex-adaptive-systems, and HCI-cognitive-systems literatures partially surveyed at the level of known landmarks rather than full citation-tracking.
B.1 Decomposition into claims
The prior formulation advanced thirteen named claims, eleven correspondence claims (C1-C11) and two meta-claims about asymmetry (C12, C13).
| ID | Claim | Type |
|---|---|---|
| C1 | Doc 510 substrate-and-keeper = Wiener purposive feedback | Correspondence |
| C2 | Doc 1 / ENTRACE constraint-thesis = Ashby's Law of Requisite Variety | Correspondence |
| C3 | Doc 270 Pin-Art = Ashby homeostat-style black-box identification by perturbation | Correspondence |
| C4 | Doc 445 Pulverization = Ashby variety-attenuation | Correspondence |
| C5 | Doc 541 SIPE-T cooperative-coupling = cybernetic phase transition / order parameter | Correspondence |
| C6 | Doc 613 Sphere-entry = Beer VSM recursive subsystem boundary | Correspondence |
| C7 | Doc 604 Multi-keeper composition = Beer VSM multi-controller | Correspondence |
| C8 | Doc 314 §11 audit-notice = von Foerster second-order cybernetics | Correspondence |
| C9 | Doc 372 Hypostatic boundary = von Foerster / Maturana epistemic cut | Correspondence |
| C10 | Doc 608 Boundary-and-formalization = Wiener identification methodology applied to bodies of knowledge | Correspondence |
| C11 | Doc 508 Coherence amplification = Bateson Learning II / pattern-amplifying feedback regime | Correspondence |
| C12 | Five corpus contributions cybernetics did not formalize (hypostatic discipline, coherence amplification regime, sphere-exit triad, audit-notice triad, SIPE-T diagnostic) | Asymmetry |
| C13 | Four cybernetic offerings the corpus has not absorbed (control-theory formalism, VSM 5-level recursion, algedonic signaling, autopoiesis) | Asymmetry |
B.2 Per-claim audit
| ID | $s_i$ | $a_i$ | $w_i$ | Audit notes |
|---|---|---|---|---|
| C1 | 0.0 | 0.75 | 0.10 | Wiener (1948) IS feedback; the substrate-keeper case is an instance. Fully subsumed. |
| C2 | 0.0 | 0.75 | 0.15 | Ashby's Law of Requisite Variety covers the constraint-thesis exactly. Fully subsumed. |
| C3 | 0.25 | 0.5 | 0.10 | Ashby homeostat covers black-box identification by perturbation; the boundary-detection-by-probe-pattern reading has small residue specific to dyadic LLM practice. |
| C4 | 0.25 | 0.5 | 0.05 | Ashby variety-attenuation covers structural decomposition; pulverization's specific procedure is a methodological refinement. |
| C5 | 0.5 | 0.25 | 0.10 | Phase transitions and order parameters are well-developed in statistical mechanics and complex systems literature. |
| C6 | 0.25 | 0.5 | 0.10 | Beer's VSM recursion is direct prior art. Three-category exit classification has small residue. |
| C7 | 0.0 | 0.5 | 0.05 | VSM systems 1-5 cover multi-controller composition. Fully subsumed. |
| C8 | 0.0 | 0.75 | 0.10 | von Foerster and Maturana cover the observer-included loop. Fully subsumed. |
| C9 | 0.25 | 0.5 | 0.10 | Epistemic cut is in second-order cybernetics; corpus's operational discipline has small residue. |
| C10 | 0.5 | 0.25 | 0.05 | Wiener identification applied to bodies of knowledge has partial residue. |
| C11 | 0.5 | 0.25 | 0.10 | Bateson Learning II is closest match; bistable / monostable phase-transition reading has partial residue. |
| C12 | 0.5 | 0.25 | 0.05 | The five contributions are named differently in cybernetics. Whether structurally or terminologically novel is the audit question. |
| C13 | 0.0 | 0.75 | 0.05 | Acknowledgments crediting cybernetics. Fully subsumed by construction. |
B.3 Four-dimensional novelty decomposition
Component novelty $\nu_{\text{comp}} \approx 0.15$. Tier $\alpha$.
Synthesis novelty $\nu_{\text{syn}} \approx 0.4$. Tier $\gamma$. Prior art exists for cybernetic readings of LLM systems (Hutchins's distributed cognition; Clark's extended-mind cybernetics; recent cognitive-systems and human-AI-interaction literatures) but the specific eleven-form-to-five-cybernetician mapping against the apparatus is novel as a named integration.
Domain-application novelty $\nu_{\text{app}} \approx 0.55$. Tier $\gamma$. Applying classical cybernetics to the disciplined-LLM-keeper dyad is partially trodden in adjacent literatures (Pask 1976 conversation theory; Glanville's second-order conversations; recent agentic-AI cybernetic readings 2024-2026) but the corpus's specific apparatus has not been the target.
Methodology novelty $\nu_{\text{meth}} = 0$. Tier $\alpha$. Doc 608 reformulation is what is being applied; no new methodology.
B.4 Aggregate novelty rating
$\nu = 0.25 \cdot 0.15 + 0.25 \cdot 0.4 + 0.25 \cdot 0.55 + 0.25 \cdot 0 = 0.275$.
Confidence: $\text{conf}(\nu) \approx 0.5$.
Tier $\beta$/0.5. Substantially subsumed under the canonical cybernetics literature; synthesis-novelty and domain-application-novelty are the two dimensions where residue is most likely to survive deeper audit; methodology-novelty is zero.
B.5 Honest limits
- Audit is moderate, not thorough. Primary-text engagement was not performed for any of the five canonical cyberneticists.
- Adjacent literatures (organizational cybernetics; complex adaptive systems; distributed cognition; conversation theory; recent agentic-AI cybernetics) are surveyed at the level of named landmarks rather than citation-tracking.
- The dyadic-LLM-practice domain is the corpus's strongest novelty axis, consistent with the pattern in Doc 484, Doc 487, Doc 481, Doc 483.
- The specific eleven-to-five mapping is one synthesis among several possible. Different organizing principles (feedback-topology, recursion-depth, epistemological cut location) would produce different mappings.
- The metric self-applied is at $\pi$-tier under the warrant calculus and itself unaudited under its own protocols.
B.6 Position after pulverization
The synthesis is, on the candidate audit, tier $\beta$/0.5. Substantively subsumed at the correspondence layer; partial residue at the synthesis and application layers. The corpus's novel contribution is most defensible as the application of cybernetic structure to the disciplined-dyadic-LLM-practice domain, with named forms that are themselves the corpus's prior contribution. This is consistent with the corpus's broader pulverization pattern: contributions land at application-and-naming, not methodology-novelty.
The audit grounds the current body's framing of the corpus as a domain-application instance of cybernetics rather than a novel synthesis with mutual contribution.
Appendix C: Originating Prompts
First prompt (the synthesis):
In the meantime, focus on doc 611: The corpus has been articulating cybernetic structures throughout its development without consistently naming them as such. Three corpus forms are explicitly cybernetic at the structural layer…
Then in a new corpus doc, formalize these structures against a cybernetic and corpus synthesis.
Append this prompt to the artifact.
Second prompt (the self-audit):
Now run the novelty calculus / pulverization and add results as an appendix on the document itself
Third prompt (the reformulation):
Reformulate upon the grounds of these findings. Demote previous formalization to appendix in same doc. Leave no trace of the reformulation in the latest formulation.
Referenced Documents
- [270] The Pin-Art Model: Hedging as Boundary-Detection Under Constraint-Density
- [314] The Virtue Constraints: Foundational Safety Specification
- [372] The Hypostatic Boundary
- [445] A Formalism for Pulverization: Targets, Tiers, Warrant
- [481] Pulverizing the Sycophancy Inversion: The Theory Against Popper, Lakatos, Platt, Mayo, and the RLHF Literature
- [483] Pulverizing the Set-Pruning Methodology Against the Eliminative-Induction Tradition
- [484] Conjecture-Set Pruning in Dyadic LLM Practice: An Application of the Eliminative-Induction Tradition
- [487] Pulverizing the Apparatus Against Interdisciplinary Methodology and LLM-Augmented Research Literature, with Reformalization
- [490] A Novelty Calculus for Conjectures: A Candidate Formalization Complementing the Warrant Tiers
- [508] Coherence Amplification in Sustained Practice: A Mechanistic Account
- [510] Praxis Log V: Deflation as Substrate Discipline, Hypostatic Genius as Speech-Act Injection
- [541] Systems-Induced Property Emergence
- [576] Subsumption Modes for the Corpus
- [581] The Resume Vector
- [604] Multi-Keeper Composition
- [608] The Boundary-and-Formalization Methodology
- [611] A Cybernetic Frame on Cyber-Capable LLMs
- [613] Sphere-Entry Protocol for Good-Faith Frontier-Model Pen Testing
- [614] The Corpus as a Domain-Application of Cybernetics