Documentation Index
Fetch the complete documentation index at: https://docs.cronozen.com/llms.txt
Use this file to discover all available pages before exploring further.
DPU Engine
The Problem
When organizations adopt AI, decisions get faster. But one question becomes unanswerable: “Why was this decision made, on what basis, and under whose approval?”| Problem | Current State | Real Impact |
|---|---|---|
| No decision provenance | Logs only record “approved” | Cannot explain during audit |
| No policy versioning | Only current policy exists | Cannot verify past decisions’ legality |
| AI black box | Only model output stored | Context of confidence scores lost |
| Unclear responsibility | Only approver ID logged | Decision chain untraceable |
| No integrity guarantee | Regular DB records | Post-hoc tampering undetectable |
What is DPU?
DPU (Decision Proof Unit) is a sealed proof structure that bundles input data, applied policies, AI reasoning, approval chains, and hash links into a single tamper-evident unit.Three Design Principles
1. Point-in-Time Capture
DPU stores a snapshot of the applied policy at the moment of decision. Even if the policy changes later, you can always verify whether the decision was legal at the time.2. Hash Chain Integrity
Every DPU references the previous DPU’s hash, forming a sequential chain. If any record in the chain is tampered with, all subsequent hashes become inconsistent — immediately detectable.3. Governance Guards
Before a DPU can be sealed, it must pass through a series of verification steps. Evidence level, human review, risk threshold, dual approval — all policy-defined conditions must be satisfied.3-Layer Architecture
DPU Core — Pure Computation Engine
DPU Core has zero external dependencies. This is intentional.- Hash Chain: Each DPU takes the previous DPU’s hash as input, forming a sequential chain verifiable at any point
- Canonicalization: Normalizes data so identical content always produces identical hashes regardless of JSON key order, whitespace, or encoding
- Policy Hash: Hashes the policy document itself for integrity — compare creation-time hash with current hash to detect policy changes
- Envelope: Packages all components into a single sealed unit
Core has no external dependencies because proof reliability depends on computational determinism. Same input must produce same output everywhere, and library version changes must never alter hash results.
DPU Pro — Governance Layer (v2+)
The governance guard system is designed and the
@cronozen/dpu-pro package structure exists, but the 5-guard pipeline is not yet active in v1. v1 uses single-approval sealing via the Proof API.| Level | Meaning | DPU Creation |
|---|---|---|
DRAFT | Draft, key evidence missing | Policy-dependent |
DOCUMENTED | Partially documented | Conditional |
AUDIT_READY | Complete, audit-ready | Allowed |
| AI Mode | Description | Human Review Required |
|---|---|---|
RECOMMENDATION | AI suggests only | Low |
ANALYSIS | AI analyzes/classifies | Medium |
PREDICTION | AI predicts outcomes | High |
AUTONOMOUS | AI decides independently | Maximum — human approval mandatory |
LOW, MEDIUM, HIGH, CRITICAL) falls within policy-allowed thresholds. Combined with data sensitivity (PUBLIC, INTERNAL, PII, PHI).
Guard 4 — Dual Approval
High-risk decisions require two independent approvers. Self-approval is blocked.
Guard 5 — Compliance Logging
All guard results (pass or fail) are permanently logged. Guard bypass attempts themselves become evidence.
Connector Layer — Storage Abstraction
DPU Core defines aDPUStorageAdapter interface. The connector implements it. Currently Prisma + PostgreSQL is provided. Core doesn’t know Prisma exists.
Evidence Levels
| Level | Name | Value | Mutability |
|---|---|---|---|
| 0 | DRAFT | Draft state | Editable |
| 1 | DOCUMENTED | Formally documented | Editable with audit trail |
| 2 | AUDIT_READY | Locked for audit | Immutable — modification breaks chain |
Version Scope
v1 (Current): Record → Approve → Hash Chain Seal → Export. Single approval policy, API key auth, SDK (
npm install cronozen).v2+ (Planned): 5 governance guards, policy snapshot, 6W auto-extraction, voice input, responsibility graph, dual approval, risk threshold guards. See Proof Pipeline Roadmap.Packages
| Package | Purpose | Dependencies |
|---|---|---|
@cronozen/dpu-core | Domain-independent engine | Zero (pure computation) |
@cronozen/dpu-pro | Governance + compliance (v2+) | dpu-core only |
dpu-connector-prisma | PostgreSQL adapter | Prisma |
Export Format
DPU records export as JSON-LD v2:Audit: DPU vs Traditional Logging
Traditional system:Audit System
- Append-only SQL protection — audit logs cannot be modified or deleted
- 12 event types tracked across all operations
- All
basePrismacross-center operations are audited - Guard failures are permanently recorded as DENIED events