proof-composer

proof-composer: System-Wide Proof Validation (DEPLOYMENT GATE)

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "proof-composer" with this command: npx skills add microck/ordinary-claude-skills/microck-ordinary-claude-skills-proof-composer

proof-composer: System-Wide Proof Validation (DEPLOYMENT GATE)

Purpose

Validate entire engineering proof chain and authorize deployment. This is the final deployment gate - nothing deploys without a valid composed proof.

Key insight: Each skill generates local proofs. proof-composer verifies they compose into a valid system-wide proof.

Process:

  • Collect all proofs (architecture, backend, frontend, infrastructure)

  • Verify version consistency (all use same spec version)

  • Validate proof chain (architecture → backend → standardization → frontend → infrastructure)

  • Check for gaps (missing proofs, incomplete verification)

  • Generate composed proof certificate (authorizes deployment)

Position in Engineering Layer

You are skill #6 of 6 (FINAL GATE):

  • system-architect - Requirements → Specifications + Curry-Howard proofs

  • backend-prover - Specifications → Maps → Code + Runtime monitors

  • standardization-layer - Code → Middleware injection (naturality proofs)

  • frontend-prover - OpenAPI → TypeScript + Framework bindings + Type correspondence

  • infrastructure-prover - Services spec → Deployment configs + Topology isomorphism

  • proof-composer (YOU) - Validates entire chain + Authorizes deployment

Input Requirements

All proofs from previous skills:

artifacts/engineering/proofs/ ├── architecture/ │ ├── adt-correctness/ │ ├── functor-laws/ │ ├── composition-correctness/ │ ├── state-machines/ │ └── curry-howard-proofs/ │ ├── backend/ │ ├── map-validation/ │ │ └── validation-report.json │ ├── implementation-correctness/ │ ├── standardization/ │ │ └── naturality-certificate.proof │ └── runtime-verification/ │ ├── frontend/ │ └── type-correspondence/ │ └── openapi-to-typescript.proof │ └── infrastructure/ └── topology/ └── deployment-isomorphism.proof

Specification manifest:

artifacts/engineering/specifications/manifest.json

Generated artifacts:

artifacts/engineering/ ├── specifications/v{X}/ # From system-architect ├── maps/backend/ # From backend-prover Phase 1 ├── code/backend/ # From backend-prover Phase 2 ├── code/frontend/ # From frontend-prover └── configs/ # From infrastructure-prover

Validation Process

Step 1: Collect All Proofs

def collect_proofs(): """ Collect all proof files from engineering artifacts

Returns dict of proofs by category
"""

proofs = {
    'architecture': collect_architecture_proofs(),
    'backend': collect_backend_proofs(),
    'frontend': collect_frontend_proofs(),
    'infrastructure': collect_infrastructure_proofs()
}

return proofs

def collect_architecture_proofs(): """Collect from system-architect""" return { 'adt_correctness': load_proof('architecture/adt-correctness/'), 'functor_laws': load_proof('architecture/functor-laws/'), 'composition': load_proof('architecture/composition-correctness/'), 'state_machines': load_proof('architecture/state-machines/'), 'curry_howard': load_proof('architecture/curry-howard-proofs/') }

def collect_backend_proofs(): """Collect from backend-prover + standardization-layer""" return { 'map_validation': load_json('backend/map-validation/validation-report.json'), 'implementation': load_proof('backend/implementation-correctness/'), 'standardization': load_json('backend/standardization/naturality-certificate.proof'), 'runtime': load_proof('backend/runtime-verification/') }

def collect_frontend_proofs(): """Collect from frontend-prover""" return { 'type_correspondence': load_json('frontend/type-correspondence/openapi-to-typescript.proof') }

def collect_infrastructure_proofs(): """Collect from infrastructure-prover""" return { 'topology': load_json('infrastructure/topology/deployment-isomorphism.proof') }

Step 2: Verify Version Consistency

def verify_version_consistency(proofs, manifest): """ Verify all proofs reference same specification version

Critical: Prevents race conditions where different skills
used different versions of the spec
"""

errors = []

# Get spec version from manifest
spec_version = manifest['version']
spec_hash = manifest['hash']

# Check architecture proofs
arch_version = proofs['architecture'].get('specification_version')
if arch_version != spec_version:
    errors.append({
        "type": "version_mismatch",
        "skill": "system-architect",
        "expected": spec_version,
        "actual": arch_version
    })

# Check backend proofs
backend_version = proofs['backend']['map_validation'].get('specification_version')
if backend_version != spec_version:
    errors.append({
        "type": "version_mismatch",
        "skill": "backend-prover",
        "expected": spec_version,
        "actual": backend_version
    })

# Check frontend proofs
frontend_version = proofs['frontend']['type_correspondence'].get('specification_version')
if frontend_version != spec_version:
    errors.append({
        "type": "version_mismatch",
        "skill": "frontend-prover",
        "expected": spec_version,
        "actual": frontend_version
    })

# Check infrastructure proofs
infra_version = proofs['infrastructure']['topology'].get('specification_version')
if infra_version != spec_version:
    errors.append({
        "type": "version_mismatch",
        "skill": "infrastructure-prover",
        "expected": spec_version,
        "actual": infra_version
    })

return {
    "consistent": len(errors) == 0,
    "specification_version": spec_version,
    "specification_hash": spec_hash,
    "errors": errors
}

Step 3: Validate Proof Chain

def validate_proof_chain(proofs): """ Verify proof chain composes correctly:

Requirements → Architecture (system-architect) ✓
    ↓
Backend Maps (backend-prover Phase 1) ✓
    ↓
Backend Code (backend-prover Phase 2) ✓
    ↓
Standardization (standardization-layer) ✓
    ↓
Frontend (frontend-prover) ✓
    ↓
Infrastructure (infrastructure-prover) ✓
"""

errors = []

# 1. Architecture proofs valid
if not architecture_proofs_valid(proofs['architecture']):
    errors.append({
        "type": "invalid_architecture_proof",
        "details": "Architecture proofs failed validation"
    })

# 2. Backend maps validated
if proofs['backend']['map_validation']['status'] != 'valid':
    errors.append({
        "type": "invalid_backend_maps",
        "details": "Backend maps not validated"
    })

# 3. Backend code matches maps
if not backend_code_matches_maps(proofs['backend']['implementation']):
    errors.append({
        "type": "code_map_mismatch",
        "details": "Backend code doesn't match verified maps"
    })

# 4. Standardization preserves composition
if not standardization_preserves_composition(proofs['backend']['standardization']):
    errors.append({
        "type": "standardization_broken",
        "details": "Standardization doesn't preserve composition laws"
    })

# 5. Frontend types correspond to backend API
if not proofs['frontend']['type_correspondence']['bijection']:
    errors.append({
        "type": "type_correspondence_failed",
        "details": "Frontend types don't match backend API"
    })

# 6. Infrastructure topology matches architecture
if not proofs['infrastructure']['topology']['isomorphism']:
    errors.append({
        "type": "topology_isomorphism_failed",
        "details": "Deployed topology doesn't match architecture"
    })

return {
    "chain_valid": len(errors) == 0,
    "errors": errors
}

Step 4: Check for Gaps

def check_for_gaps(proofs, artifacts): """ Check for missing proofs or incomplete verification """

gaps = []

# Check all services in architecture have backend maps
arch_services = extract_services_from_architecture(proofs['architecture'])
backend_maps = list_backend_maps(artifacts['maps/backend'])

for service in arch_services:
    if service not in backend_maps:
        gaps.append({
            "type": "missing_backend_map",
            "service": service,
            "fix": "Run backend-prover to generate map"
        })

# Check all backend maps have implementations
for map_file in backend_maps:
    service = extract_service_name(map_file)
    if not backend_implementation_exists(service, artifacts['code/backend']):
        gaps.append({
            "type": "missing_implementation",
            "service": service,
            "fix": "Run backend-prover Phase 2"
        })

# Check all backend services have deployment configs
backend_services = list_backend_services(artifacts['code/backend'])
for service in backend_services:
    if not deployment_config_exists(service, artifacts['configs']):
        gaps.append({
            "type": "missing_deployment_config",
            "service": service,
            "fix": "Run infrastructure-prover"
        })

# Check frontend consumes all public APIs
public_apis = extract_public_apis(proofs['architecture'])
frontend_types = list_frontend_types(artifacts['code/frontend'])

for api in public_apis:
    if not frontend_type_exists(api, frontend_types):
        gaps.append({
            "type": "missing_frontend_type",
            "api": api,
            "fix": "Run frontend-prover"
        })

return {
    "complete": len(gaps) == 0,
    "gaps": gaps
}

Step 5: Validate Composition End-to-End

def validate_end_to_end_composition(proofs): """ Verify composition laws hold across entire system """

errors = []

# Architecture composition valid
if not proofs['architecture']['composition']['valid']:
    errors.append({
        "type": "architecture_composition_invalid",
        "details": "Architecture-level composition laws violated"
    })

# Maps preserve architecture composition
if not maps_preserve_architecture(proofs['backend']['map_validation']):
    errors.append({
        "type": "maps_dont_preserve_architecture",
        "details": "Backend maps don't preserve architecture composition"
    })

# Code preserves map composition
if not code_preserves_maps(proofs['backend']['implementation']):
    errors.append({
        "type": "code_doesnt_preserve_maps",
        "details": "Backend code doesn't preserve map composition"
    })

# Standardization preserves composition (naturality)
if not proofs['backend']['standardization']['composition_preserved']:
    errors.append({
        "type": "standardization_breaks_composition",
        "details": "Middleware breaks composition laws"
    })

# Frontend types compose
if not frontend_types_compose(proofs['frontend']['type_correspondence']):
    errors.append({
        "type": "frontend_types_dont_compose",
        "details": "Frontend type definitions don't compose"
    })

# Infrastructure topology correct
if not proofs['infrastructure']['topology']['isomorphism']:
    errors.append({
        "type": "topology_incorrect",
        "details": "Infrastructure doesn't match architecture"
    })

return {
    "composition_valid": len(errors) == 0,
    "errors": errors
}

Generate Composed Proof

def generate_composed_proof(validation_results, proofs, manifest): """ Generate final composed proof certificate

This certificate authorizes deployment
"""

all_checks_passed = (
    validation_results['version_consistency']['consistent'] and
    validation_results['proof_chain']['chain_valid'] and
    validation_results['gaps']['complete'] and
    validation_results['composition']['composition_valid']
)

certificate = {
    "status": "valid" if all_checks_passed else "invalid",
    "timestamp": datetime.utcnow().isoformat() + "Z",
    
    "specification": {
        "version": manifest['version'],
        "hash": manifest['hash']
    },
    
    "composition_chain": [
        "architecture → backend_maps",
        "backend_maps → backend_code",
        "backend_code → standardization",
        "backend_code → frontend",
        "backend_code → infrastructure"
    ],
    
    "verification_summary": {
        "version_consistency": validation_results['version_consistency']['consistent'],
        "proof_chain_valid": validation_results['proof_chain']['chain_valid'],
        "no_gaps": validation_results['gaps']['complete'],
        "composition_valid": validation_results['composition']['composition_valid']
    },
    
    "individual_proofs": {
        "architecture": {
            "adt_correct": True,
            "functors_valid": True,
            "composition_correct": True,
            "state_machines_complete": True
        },
        "backend": {
            "maps_validated": proofs['backend']['map_validation']['status'] == 'valid',
            "code_correct": True,
            "standardization_natural": proofs['backend']['standardization']['composition_preserved']
        },
        "frontend": {
            "type_correspondence": proofs['frontend']['type_correspondence']['bijection']
        },
        "infrastructure": {
            "topology_isomorphism": proofs['infrastructure']['topology']['isomorphism']
        }
    },
    
    "gaps_detected": validation_results['gaps']['gaps'],
    
    "deploy_authorized": all_checks_passed,
    
    "errors": (
        validation_results['version_consistency']['errors'] +
        validation_results['proof_chain']['errors'] +
        validation_results['composition']['errors']
    )
}

return certificate

Output: System Proof Certificate

Success case:

{ "status": "valid", "timestamp": "2025-01-15T10:30:00Z",

"specification": { "version": "v1.2.0", "hash": "sha256:abc123..." },

"composition_chain": [ "architecture → backend_maps", "backend_maps → backend_code", "backend_code → standardization", "backend_code → frontend", "backend_code → infrastructure" ],

"verification_summary": { "version_consistency": true, "proof_chain_valid": true, "no_gaps": true, "composition_valid": true },

"individual_proofs": { "architecture": { "adt_correct": true, "functors_valid": true, "composition_correct": true, "state_machines_complete": true }, "backend": { "maps_validated": true, "code_correct": true, "standardization_natural": true }, "frontend": { "type_correspondence": true }, "infrastructure": { "topology_isomorphism": true } },

"gaps_detected": [],

"deploy_authorized": true,

"errors": [] }

Failure case:

{ "status": "invalid", "timestamp": "2025-01-15T10:30:00Z",

"verification_summary": { "version_consistency": false, "proof_chain_valid": true, "no_gaps": false, "composition_valid": true },

"gaps_detected": [ { "type": "missing_deployment_config", "service": "BillingService", "fix": "Run infrastructure-prover" } ],

"deploy_authorized": false,

"errors": [ { "type": "version_mismatch", "skill": "frontend-prover", "expected": "v1.2.0", "actual": "v1.1.0" } ] }

Output Location

artifacts/engineering/proofs/composed/ ├── system-proof.certificate ├── composition-graph.dot └── verification-report.md

Integration with Build Pipeline

Build pipeline final gate:

build-pipeline/13-compose-proofs.sh ⭐ DEPLOYMENT GATE

echo "Validating system-wide proof chain..."

Run proof-composer

proof-composer validate-all

Check certificate

status=$(jq -r '.status' artifacts/engineering/proofs/composed/system-proof.certificate) deploy_authorized=$(jq -r '.deploy_authorized' artifacts/engineering/proofs/composed/system-proof.certificate)

if [ "$status" != "valid" ] || [ "$deploy_authorized" != "true" ]; then echo "❌ DEPLOYMENT BLOCKED: Proof chain invalid" echo "" echo "Errors:" jq '.errors' artifacts/engineering/proofs/composed/system-proof.certificate echo "" echo "Gaps:" jq '.gaps_detected' artifacts/engineering/proofs/composed/system-proof.certificate exit 1 fi

echo "✅ Proof chain valid - deployment authorized"

build-pipeline/14-deploy.sh can now proceed

Success Criteria

✓ All proofs collected ✓ Version consistency verified ✓ Proof chain validated ✓ No gaps detected ✓ Composition laws hold end-to-end ✓ System proof certificate generated ✓ Deployment authorized ✓

Error Handling

Version mismatch:

ERROR: Version inconsistency detected Frontend-prover used v1.1.0, but current spec is v1.2.0 Action: Re-run frontend-prover with correct version

Broken proof chain:

ERROR: Proof chain broken Backend maps not validated (map-validation/validation-report.json status != 'valid') Action: Re-run backend-prover Phase 1 (map validation)

Gap detected:

ERROR: Missing deployment config Service: BillingService Has backend implementation but no deployment config Action: Run infrastructure-prover

Composition broken:

ERROR: Composition doesn't hold end-to-end Standardization broke composition laws (naturality failed) Action: Re-run standardization-layer with correct naturality proof

Critical Reminders

  • This is the final gate - Nothing deploys without valid certificate

  • Version consistency mandatory - All skills must use same spec version

  • No gaps allowed - Every service needs full proof chain

  • Composition must hold - Laws verified at every layer

  • Certificate authorizes deployment - Build pipeline checks this

When You (proof-composer) Finish

Log results in thread:

threads/engineering/{requirement}/5-actions/action-5-proof-composition.md

Status: Complete Proof status: valid Deploy authorized: true Certificate: artifacts/engineering/proofs/composed/system-proof.certificate Specification: v1.2.0 (hash: abc123...) All proofs verified: ✓ No gaps detected: ✓ Composition valid: ✓

Update engineering thread Stage 5:

  • Action 5 complete ✓

  • ALL engineering actions complete ✓

  • Ready for Stage 6 (Learning)

Engineering thread → Business thread:

  • Report technical success

  • Provide deployment certificate

  • Document any learnings

Proof Composition Visualization

System-Architect ↓ [Architecture Proofs: ADT, Functors, Composition, State Machines] ✓ ↓ Backend-Prover Phase 1 ↓ [Backend Maps Validated: Composition laws verified] ✓ ↓ Backend-Prover Phase 2 ↓ [Backend Code Matches Maps: Generated from verified maps] ✓ ↓ Standardization-Layer ↓ [Naturality Proven: Middleware preserves composition] ✓ ↓ Frontend-Prover ↓ [Type Correspondence: Frontend ≅ Backend API] ✓ ↓ Infrastructure-Prover ↓ [Topology Isomorphism: Deployed ≅ Architecture] ✓ ↓ Proof-Composer (YOU) ↓ [System Proof: All proofs compose ✓] ↓ DEPLOYMENT AUTHORIZED ✅

You are the final gatekeeper. Verify the entire proof chain. Authorize deployment only when mathematically verified.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

alex-hormozi-pitch

No summary provided by upstream source.

Repository SourceNeeds Review
General

dnd5e-srd

No summary provided by upstream source.

Repository SourceNeeds Review
General

shopify-api

No summary provided by upstream source.

Repository SourceNeeds Review
General

analyzing-financial-statements

No summary provided by upstream source.

Repository SourceNeeds Review