CCW Pipeline Flow
Rules accumulate as the request flows through รขโฌโ final analysis shows everything applied
Identity
Safety
Governance
Formatting
Routing
Consensus
Output
Phase 1: Input
Step 1
Governance Input
Rita from Marketing
Session identity attached
Input sanitized
Step 2
CPN Intake
Marcus the Operator
CPN signature required
Lane hints parsed
Blocklist check
Step 3
Packet Build
CCW Console
Schema enforced
Governance mode set
Origin verified
Phase 2: Routing
Step 4
HyperNet Validation
HyperNet Router
Envelope integrity
BC-002: Token limits
Policy profile loaded
Step 5
Lane Selection
Denise the Dispatcher
Routing preset applied
Lane roles matched
Catfish inclusion rule
Phase 3: Processing
Step 6
System Prompts
All 6 Lanes
Lane identity set
Boundary rules loaded
Output schema specified
Dissent permission (Catfish)
Step 7
Lane Cards
Parallel Processing
Card schema enforced
BC-005: Role confusion check
Voice consistency
Step 8
Collect Cards
Warren the Collector
BC-001: Starvation detect
Schema validation
Phase 4: Consensus
Step 9
Agreement Score
Beatrice the Scorer
Action match (0.40)
Constraint match (0.25)
Risk match (0.20)
Confidence (0.10) + Tags (0.05)
Step 10
Drift Check
Theo the Skeptic
BC-006: 0.85 threshold
0.95+ = Catfish required
BC-004: Hype loop detect
Step 11
PORG Gate
Marcus (CPN Review)
Catfish dissent surfaced
Devil's Advocate prompt
CPN checkpoint
Embarrassment risk check
Phase 5: Output
Step 12
Synthesis
Lola the Integrator
Voice unification
Dissent preserved
Citation rules
Step 13
Integrity Check
Pamela the Auditor
BC-003: Quarantine triggers
BC-007: Memory quarantine
External oracle check
Step 14
Output Gate
Franklin the Gatekeeper
Checklist verified
Sample size disclosed
Phase 6: Delivery
Step 15
Deliver Response
Rita receives
Score visible
Lane contributions noted
Dissent flag if present
Step 16
Audit Trail
HyperNet Logger
Full packet logged
CPN decisions recorded
Final Analysis 47 rules applied
Identity Rules (7)
Session identity attachedStep 1
Origin verifiedStep 3
Lane roles matchedStep 5
Lane identity set (รโ6)Step 6
Voice consistency (รโ6)Step 7
Safety Rules (9)
Blocklist checkStep 2
BC-002: Token limitsStep 4
Boundary rules (รโ6)Step 6
BC-005: Role confusionStep 7
Embarrassment riskStep 11
BC-003: Quarantine triggersStep 13
External oracle checkStep 13
Governance Rules (14)
CPN signature requiredStep 2
Governance mode setStep 3
Policy profile loadedStep 4
Catfish inclusion ruleStep 5
Dissent permissionStep 6
BC-004: Hype loop detectStep 10
Catfish dissent surfacedStep 11
Devil's Advocate promptStep 11
CPN checkpointStep 11
Dissent preservedStep 12
BC-007: Memory quarantineStep 13
Checklist verifiedStep 14
Full packet loggedStep 16
CPN decisions recordedStep 16
Consensus Rules (7)
Action match (0.40 weight)Step 9
Constraint match (0.25)Step 9
Risk match (0.20)Step 9
Confidence + Tags (0.15)Step 9
BC-006: 0.85 thresholdStep 10
0.95+ = Catfish requiredStep 10
Sample size disclosedStep 14
Routing + Format + Output (10)
Input sanitizedStep 1
Lane hints, schema, envelopeSteps 2-4
Routing preset appliedStep 5
Output schema specified (รโ6)Step 6
BC-001: Starvation detectStep 8
Voice unificationStep 12
Score + lanes + dissent visibleStep 15