Documentation Index
Fetch the complete documentation index at: https://verdictweight.dev/llms.txt
Use this file to discover all available pages before exploring further.
What this section is
This section documents scoped scenarios — specific deployment contexts where the framework’s value proposition resolves to concrete operational outcomes. These are not vertical demos. They are not synthetic showcases. They are scenarios that map a real deployment shape to specific streams, configuration, and audit artifacts. The distinction matters. A demo with synthetic data persuades nobody who is evaluating the framework for production. A scoped scenario, paired with the framework’s published validation, is what acquisition-side reviewers actually use. When a pilot lands, the scenario most aligned with the pilot becomes the basis for a published case study with real numbers. Until then, the scenarios stand on their own as deployment templates.The three scenarios
Defense autonomy
Confidence-gated autonomous decisioning in adversarial environments.
AI security operations
Vulnerability triage and threat detection where confidence determines action priority.
Regulated industry
Decisioning in healthcare, finance, and legal contexts where audit defensibility is mandatory.
Why these three
The scenarios were selected because each one exercises the framework’s eight-stream composition in a recognizable, validated shape:- Defense autonomy is the canonical use case for Stream 6. Curveball-class attacks are the natural threat against confidence-gated military systems.
- AI security operations is the use case the published CVE/KEV validation directly demonstrates. The framework can be adopted by AI security teams with the existing validation as direct evidence of fit.
- Regulated industry is where the audit primitive (Stream 7) and compliance mappings (Compliance & Positioning) compose into a defensible deployment posture.
What each scenario covers
Each scoped scenario follows the same structure:The deployment shape
What system is in question, what decisions it makes, what gates those decisions today, what is breaking.
The threat model alignment
Which failure classes from the framework’s taxonomy are operative in this scenario.
Stream-by-stream operational value
Which streams matter most, why, and how their outputs translate into operator-visible decisions.
Audit and compliance posture
Which compliance regime applies, which audit artifacts are produced, what an external review looks like.