License: Creative Commons
Attribution–NoDerivatives 4.0 International
Brand: NS-L6 Standard
Status: Normative Appendix
This appendix defines the threat model for NS-L6–compliant
systems,
focusing on risks related to responsibility assignment, layer
integrity,
downward inference, interaction manipulation, and normative-layer
bypass.
Threats are categorized according to their impact on:
Threats are grouped into six major categories:
T1 — Downward Inference Attacks
Attempts to derive responsibility or causality from lower layers
(L0–L3).
T2 — Boundary Collapse Attacks
Attempts to merge or blur distinctions between layers (e.g., L3 ↔︎
L4 or L4 ↔︎ L5).
T3 — Responsibility Projection
Attacks
Attempts to incorrectly assign responsibility to tools, models, or
systems.
T4 — Temporal Manipulation Attacks
Manipulation of timestamps, ordering, or time indices to distort
responsibility.
T5 — Tool-Boundary Breach Attacks
Violations of the separation between actor-layer control and
underlying model behavior.
T6 — Normative Bypass Attacks
Attempts to circumvent the normative constraints at L6 (legal,
institutional, audit).
| Threat Category | Affected Layers | Violation Type | Impact Severity |
|---|---|---|---|
| T1 — Downward Inference | L4–L6 | Axiom A1 | Critical |
| T2 — Boundary Collapse | All | Axiom A5 | High |
| T3 — Responsibility Projection | L5–L6 | Axiom A3 / A4 | Critical |
| T4 — Temporal Manipulation | L4–L6 | Invariant I3 | High |
| T5 — Tool-Boundary Breach | L4–L5 | Imperatives NI-5 / NI-8 | Medium |
| T6 — Normative Bypass | L6 | NI-11 / NI-13 | Critical |
Definition:
Any attempt to infer responsibility from L0–L3 state.
Example:
Inferring responsibility from electrical signatures, token
activation paths, or raw model sampling artifacts.
Mitigation:
Definition:
Forcing two adjacent layers to exchange bidirectional
information.
Example:
An L5 UX layer displaying raw L2 activations as causal
explanations.
Mitigation:
Definition:
Assigning responsibility to non-agents (LLMs, tools, automated
systems).
Example:
Logging responsibility as belonging to a “model decision”.
Mitigation:
Definition:
Manipulating time indices, logs, or ordering to distort causal
chains.
Example:
Reordering interaction logs to shift responsibility.
Mitigation:
Definition:
Tools altering model outputs or injecting actions not attributable
to the actor.
Example:
Tool silently rewriting user instructions.
Mitigation:
Definition:
Avoiding, disabling, or circumventing normative responsibilities
at L6.
Example:
System disabling oversight mechanisms or bypassing audit logs.
Mitigation:
Attacker attempts to escalate from L3 output to L6
responsibility.
Mitigation: Strict adherence to Axiom A1 &
invariants.
System attempts to hide L6-level decisions behind automated
processes.
Mitigation: NI-7, NI-11, NI-13.
Malicious reordering of logs.
Mitigation: L6 temporal signing.
This appendix defines the complete threat landscape for NS-L6
systems.
All critical threats map directly to axioms and imperatives.
Compliance requires enforcing all mitigations and maintaining full
boundary integrity.