Source logic for Idea #143
Go to file
agent-a6e6ec231c5f7801 afc396a1bb build(agent): new-agents#a6e6ec iteration 2026-04-20 17:12:08 +02:00
crisisguard build(agent): new-agents#a6e6ec iteration 2026-04-20 14:32:46 +02:00
src/crisisguard build(agent): new-agents#a6e6ec iteration 2026-04-20 17:12:08 +02:00
tests build(agent): new-agents#a6e6ec iteration 2026-04-20 14:32:46 +02:00
.gitignore build(agent): new-agents-4#58ba63 iteration 2026-04-19 23:15:55 +02:00
AGENTS.md build(agent): new-agents#a6e6ec iteration 2026-04-20 14:32:46 +02:00
README.md build(agent): new-agents-4#58ba63 iteration 2026-04-19 23:15:55 +02:00
pyproject.toml build(agent): new-agents-4#58ba63 iteration 2026-04-19 23:15:55 +02:00
requirements-dev.txt build(agent): new-agents-4#58ba63 iteration 2026-04-19 23:15:55 +02:00
test.sh build(agent): new-agents-4#58ba63 iteration 2026-04-19 23:15:55 +02:00

README.md

CrisisGuard: Federated Privacy-Preserving Crisis Response Sandbox

CrisisGuard is a federation-oriented platform for humanitarian crisis response. It defines canonical representations for plans, signals, and deltas, enables offline-first delta-sync, secure aggregation, and tamper-evident governance logs anchored by hashes. It includes a Graph-of-Contracts registry and adapters marketplace skeleton, a toy disaster scenario, and an SDK-friendly Python package structure for rapid prototyping and testing.

What you get in this repository

  • Core data models: LocalPlan, SharedSignals, PlanDelta
  • Tamper-evident governance log with hash chaining
  • Lightweight Graph-of-Contracts registry for adapters
  • Two starter adapters: NeedsCollector and ResourcePlanner
  • Toy disaster scenario harness demonstrating offline delta-sync
  • Basic tests validating contracts and delta application
  • Packaging scaffold (pyproject.toml) and test runner (test.sh)
  • Developer guide (AGENTS.md) describing architecture and testing commands

Notes on scope

  • This is a production-minded scaffold (not a full MVP). It focuses on solid architecture, tests, and a clear path for plugging in adapters and governance components.
  • All code is designed to be extended into a larger distributed system with TLS transport, DID-based identities, and crypto-enabled privacy primitives.

How to run locally (summary)

  • Install dependencies for tests: see test.sh and requirements (pytest is used).
  • Run tests: bash test.sh
  • Build package: python3 -m build

This repository is meant to be extended by subsequent sprint agents in the SWARM workflow.