Public spec library
The agent does not run on opacity.
Architecture, security, concepts, and the vision behind Yig — written as durable articles you can forward to your security reviewer, your compliance officer, or the controller next desk over.
Public spec library
Architecture, security, concepts, and the vision behind Yig — written as durable articles you can forward to your security reviewer, your compliance officer, or the controller next desk over.
Why Yig exists, and what kind of product we are building.
How to think about Yig — the patterns and principles that govern every workflow.
How Yig is structured. Trust boundaries, layers, and what crosses each boundary.
Data residency, audit log, reviewer gate, and what we will not do.
Public summaries of completed internal specifications.