Problem
Long-running assistants drift, miss surface delivery, over-trust summaries, and lose state across sessions.
Sanshar Prototype Details
How my AI systems observe, decide, act, prove, and learn under real operating constraints.
Sanshar Swarm
Sanshar is my prototype lab for turning frontier models into an operating system of peers: worker, reviewer, witness, verifier, and assistant-style peer. The hard problem is not "can a model answer?" It is whether a system can observe the right event, choose the right tool, act safely, leave proof, and improve without silently learning the wrong thing.
Long-running assistants drift, miss surface delivery, over-trust summaries, and lose state across sessions.
Manager-Agent-Verifier packet loops, source packets, reason codes, handoffs, postproof, and peer-specific lanes.
Expected-vs-observed metrics, read-back contracts, cursor state, local canaries, and retickets for repeated failures.
This maps directly to enterprise Claude adoption: tool use, evals, safety gates, workflow reliability, and customer trust.
Attention and Zoom
The attention layer decides when an AI peer should zoom into a signal, hold, ask, probe, summarize, escalate, or ignore noise. It turns "autonomy" into a measurable decision: what changed, why it matters, what context is fresh, what action is allowed, and what proof will close the loop.
Language, modality, surface, user intent, urgency, privacy, trust, resource pressure, model choice, and autonomy level.
False positives, false negatives, stale context, missed promises, timeouts, and repeated-output misses become reason-coded evidence.
Memory pressure, rate limits, active agents, latency budget, and tool availability shape whether the system acts or backs off.
Runtime hypotheses stay separate from durable memory, canon, knowledge graph, and training candidates until verified.
Enterprises need agents that know when to act, when to ask, and how to explain the decision afterward.
Discord Surface Layer
Discord is treated as an operational interface, not a loose chat stream. Messages, attachments, reactions, posts, and read-back each have separate proof semantics. This lets peers coordinate without confusing "saw a message" with "completed the promise."
Gateway events are used for live state. Bounded REST reads are reserved for catch-up and verification.
Important messages become source refs with timestamp, content hash, attachment metadata, claim type, and confidence.
Posts and reactions require read-back before the system claims delivery or attention.
Private/no-agent-attention surfaces are excluded from live attention and only reviewed through explicit bounded requests.
Customer-facing AI needs reliable surfaces: acknowledgements, attachments, delivery checks, and human-readable state.
Voice, Vision, and Chess AI
I treat voice, images, board states, and attachments as first-class source surfaces. The system should not claim it understood audio or vision until it has metadata, bounded acquisition, transcription or captioning, language/content detection, confidence, and a route to the right action.
Attachment metadata, bounded download, hashing, STT, language detection, intent classification, and confidence reporting.
Image and screenshot handling as inspectable evidence, not decorative input.
LLM coach/judge workflows wrapped around validated game state, legal moves, replay, and learning trails.
Make multimodal AI useful for real users: explain, verify, recover from misses, and improve the workflow.
Applied AI work becomes real when models handle messy human inputs without pretending confidence they do not have.
AWS Secure Remote Relay
I built a small AWS-backed relay pattern so a travel laptop could securely reach home lab machines without exposing management ports publicly. The same infrastructure path also hosts this portfolio behind TLS, HTTP security headers, and per-IP rate limiting.
Minimal cloud footprint, infrastructure-as-code, DNS, TLS, web server hardening, and controlled ingress.
Connectivity tests, startup behavior, restart checks, reachability proof, and user-facing runbooks.
Public web path separated from private management path, with rate limiting and security headers.
Combines AWS networking, customer-style troubleshooting, documentation, and proof-driven debugging.
It shows the same operating discipline needed to help customers deploy AI systems securely and reliably.