ALERT
Alert Engines
1. Overview
Alert Engines (ALERT) are a capability class of Micro Engines (MICE) responsible for detecting threshold violations, trigger conditions, and escalation events over signals and meta-signals.
ALERT engines:
- evaluate explicit alert rules against incoming signals (or batches),
- emit alert meta-signals (not value mutations),
- optionally instruct escalation actions (e.g. notify, block, manual review request) as recommendations, not as routing authority.
ALERT is a type, not an identity.
Concrete engines are identified by MEID, versioned via ZAR, and leave CMI lineage stamps at runtime.
2. Position in the MICE Model
Capability, not identity
An Alert Engine:
- does not define which engine runs (MEID does),
- does not define deployment/version (ZAR does),
- does define a governed capability: rule-driven detection + escalation signaling.
Typical placement
| Dimension | Value |
|---|---|
| Capability type | ALERT |
| Typical tiers | Tier-0 / Meta (often AME-adjacent) |
| Common classification | Assurance-Engine (or Meta-Engine later) |
| Primary output | Alert meta-signal |
| Lineage impact | Appends CMI stamp to USO |
3. Core Responsibilities
ALERT engines exist to make “something is wrong / something needs attention” deterministic, auditable, and portable.
They typically handle:
-
Threshold checks
e.g. “trust_score < 0.8”, “missing_scope3_categories > 2”, “water_stress_exposure > X” -
Trend / anomaly triggers (rule-driven)
e.g. “YoY delta > 15%”, “sudden jump vs rolling baseline” (only when explicitly rule-defined) -
Policy gating signals
e.g. “reporting readiness = false → hold disclosure compilation” -
Escalation recommendations
e.g. “MANUAL_REVIEW”, “RECOMPUTE”, “REQUEST_EVIDENCE”
ALERT engines produce meta-signals that are consumable by:
- ZSSR (routing decisions),
- AAE (assurance workflows),
- disclosure compilation gates,
- monitoring dashboards / notifications.
4. Governance Principles (Non-negotiables)
-
Deterministic evaluation
Given the same inputs + same ruleset + same parameters, the engine must produce the same alerts. -
Explicit rule provenance
Every emitted alert must reference:- rule ID / ruleset ID,
- rule version,
- evaluation timestamp,
- the exact signals evaluated.
-
Non-mutating
ALERT engines do not modify source signals. They emit separate alert meta-signals. -
Safe-by-default escalation
ALERT can recommend actions, but must not unilaterally execute destructive actions (delete, overwrite, irreversible state changes). -
Federation-safe
Alerts must be representable as portable meta-signals with:- stable identifiers (MEID + ZAR),
- reproducible evaluation proof inputs,
- clear semantics (severity, rationale, coverage).
5. Inputs
ALERT engines consume one or more of:
- Signals (USO IDs + payload summaries)
- Meta-signals (trust, completeness, assurance statements)
- Context (jurisdiction, framework, org boundary, time window)
- Alert ruleset reference (ZAR address / registry pointer)
Canonical input envelope (conceptual)
{
"inputs": {
"signals": [
{ "uso_id": "uso:calc:ghg.scope3.total@2025", "value": 12345, "unit": "tCO2e" }
],
"context": { "jurisdiction": "EU", "framework": "ESRS" }
},
"options": {
"ruleset_ref": "schema.alert.ruleset.esrs_e1_readiness.v1_0_0"
}
}
6. Outputs
ALERT engines emit alert meta-signals. Each alert must include:
- severity (info/warn/high/critical)
- condition / rule reference
- subject(s) (the affected USO IDs)
- rationale (human-readable + machine readable)
- recommended action (optional)
- proof hooks (inputs hash / rule hash / registry references)
Canonical alert meta-signal (conceptual)
{
"type": "alert.signal",
"severity": "high",
"rule_id": "ESRS_E1_READINESS_MIN_TRUST",
"ruleset_id": "ALERT.RuleSet.ESRS_E1.Readiness.1_0_0",
"subject": ["uso:calc:ghg.scope3.total@2025"],
"finding": { "metric": "trust_score", "value": 0.72, "threshold": 0.80 },
"recommendation": { "action": "MANUAL_REVIEW", "target": "ZSSR" },
"provenance": {
"engine_meid": "MEID_ALERT_ESRS_READINESS",
"engine_cmi_stamp": "000123",
"ruleset_zar": "ZAR:RULESET:ALERT:ESRS_E1.Readiness:v1_0_0",
"evaluated_at": "2026-02-07T12:00:00Z"
}
}
7. What ALERT Engines Do Not Do
ALERT engines explicitly do not:
- ❌ compute primary values (CALC)
- ❌ validate structure/contracts (VALI) (they may rely on VALI results)
- ❌ transform formats or units (TRFM)
- ❌ probabilistically infer missing data (SEM)
- ❌ perform orchestration/routing as authority (ZSSR does that)
ALERT engines are detectors and notifiers, not compute engines.
8. Severity Model (v1)
A minimal, governed severity scheme:
info— informational; no action requiredwarn— potential issue; review recommendedhigh— likely reporting/assurance impactcritical— blocks disclosure readiness unless explicitly overridden
Rule: severity assignment must be declared in the rule itself, not implied by runtime.
9. Escalation Contract (v1)
ALERT can recommend standardized actions (v1 enum):
NONENOTIFY_OWNERREQUEST_EVIDENCERECOMPUTEVALIDATE_NEXTMANUAL_REVIEWBLOCK_DISCLOSURE
Important: the action is a recommendation meta-signal. ZSSR (or policy) decides what actually happens.
10. Governance & Change Control
ALERT engines are governance-sensitive because they can:
- block workflows,
- trigger reviews,
- affect disclosure readiness.
10.1. What is versioned where
- Engine implementation: versioned in ZAR (CMI build)
- Rulesets: versioned as ZAR artifacts (ruleset JSON)
- Severity / escalation semantics: versioned in rulesets, not in runtime code
10.2. Who can change what (v1 policy)
- Owner team can propose:
- new rules,
- threshold adjustments,
- new alert subjects.
- Core/CTO approval required for:
- rules marked critical,
- rules with BLOCK_DISCLOSURE,
- changes that expand coverage to regulated outputs.
10.3. Audit requirements (minimum)
Every alert must be reproducible from:
- the exact rule version,
- the evaluated input signals,
- the evaluation context,
- the engine artifact identity.
11. Interaction with ZSSR
ZSSR may use alert meta-signals to:
- route to manual review,
- trigger revalidation,
- block downstream compilation.
ZSSR precedence rule: explicit ZSSR rules override tag/alert heuristics. ALERT signals are strong evidence — not authority.
12. Example Alert Engines
- Summary
Alert Engines:
- create deterministic, auditable trigger events,
- enable escalation and workflow gating as meta-signals,
- support federation-safe readiness verification,
- keep “what needs attention” explicit and replayable.
They are the platform’s governed nervous system.
Stable