Skip to main content

The Console

The surface where decisions are made, captured, and inspected.

MeshQu's operational system. Policies are authored here. Decisions flow through here. Receipts are issued here. Chains are inspected here.

This page documents the working surface that produces the receipts described elsewhere on the site. It's written for evaluators who have understood the primitive and want to see the system around it.

§ 01The authored object

Every decision binds to a policy version a human ratified.

Policies are typed objects, not free-form documents. Drafts are separate from active versions. Maker-checker is a tenant toggle. AI assistance produces first drafts; the human reviews, edits, ratifies.

  • a — typed

    Rules, not prose

    Thresholds, eligibility, conditional branches, temporal constraints. Each rule carries severity, label, and a default outcome.

  • b — ratified

    Drafts ≠ active

    A new version takes effect only on ratification. Prior versions are preserved indefinitely; the history is the audit trail.

  • c — assisted

    AI drafts, humans ratify

    Opt-in tenant feature. Author describes a rule; the assistant returns a structured first draft. Human edits are logged.

Vendor-Specific ControlsPROC_VENDOR_SPECIFIC_RULES· 5 rules · policy_snapshot_id sha256:8f2a…b41c
Active · v17Draft · v18Maker-checker on
  • 01TECH_SAMSUNG_CAP≷ thresholdCRITICAL

    When vendor_name equals Samsung, contract_value is at most 500,000. Flag as critical.

  • 02TECH_DELL_CAP≷ thresholdHIGH

    When vendor_name equals Dell, contract_value is at most 2,000,000. Flag as high.

  • 03TECH_CLOUD_VENDOR_CAP≷ thresholdMEDIUM

    When vendor_name equals [AWS, Google Cloud], contract_value is at most 3,000,000. Flag as medium.

Decision type: technology_procurement_approvalRatified by m.chen@acme · 2026-03-14

§ 02Composition

Real institutional policy is composed, not authored as one document.

A policy group is a named composition organised by contract, regulation, or business domain. Decisions reference the group version; the group version references the exact versions of its constituent policies.

  • a — composed

    Programme, not policy

    Screening, escalation, override, and closure operate together. The group binds them into one composite version.

  • b — versioned

    Group moves forward together

    When one constituent policy advances, the group advances. Old decisions remain bound to the older composite.

  • c — resolvable

    One id, one snapshot

    The group version on a receipt resolves deterministically to a single composite snapshot — eighteen months later, still.

AML ProgrammeAML_PROGRAMME · group_version sha256:c7e3…d901 · v9 ratified 2026-03-22
Active4 policies
2,847Decisions (7d)
96.4%Compliance rate
3Ratifications outstanding

Constituent policies

  • Sanctions & PEP ScreeningAML_SANCTIONS_SCREENING
    screeningv17Active
  • Analyst Review RequirementsAML_ANALYST_REVIEW
    escalationv04Active
  • Override AuthorityAML_OVERRIDE
    overridev02Draft v03
  • Final DispositionAML_FINAL_DISPOSITION
    closurev03Active

§ 03Observation

The Explorer is the index into the corpus of receipts.

Every decision the system captures appears in the feed at the moment it is sealed. Filter by type, verdict, actor, policy, group, regulation clause, date, or chain. The Investigation Panel surfaces receipt, trace, and chain.

  • a — queryable

    Filter the corpus

    Decision type, verdict, actor, policy, group, regulation clause, date range, or chain membership.

  • b — inspected

    Three views per receipt

    Details (verdict, violations, governance, proof), Trace (rule-by-rule evaluation), Chain (where it sits in any chain it belongs to).

  • c — anchored

    Lens into regulation

    Regulation-lens drilldown lands you in the feed already filtered to decisions touching a single clause of a single regulation.

All decisionsOpen chainsBy regulationLive
OutcomeFindingsRefStepRecordedTypePolicy
ALLOW3420-B2E3●●●3/314:22:08aml_dispositionAML_FINAL_DISPOSITION v1
ALLOW1BA2-7701●●○2/314:21:55aml_analyst_reviewAML_ANALYST_REVIEW v1
ALLOW74EE-3FF4●○○1/314:21:40aml_screeningAML_SANCTIONS_SCREENING v1
DENY1 critical5F6F-9F6C1/114:21:22bid_evaluationETIMAD_BID_EVAL 3 policies
ALLOW06EB-21A21/114:20:58bid_evaluationETIMAD_BID_EVAL 3 policies
ALLOW307C-FBF61/114:20:31technology_procurement_…ETIMAD_TECH_VENDORS 6 policies
Explorer · 2,847 decisions this weekIllustrative — schema is real; values are not.

§ 04Attestation

Human decisions and automated decisions are the same kind of object.

A policy generates two surfaces from one definition: the evaluator that automated systems call, and a human-facing attestation form. Both run through the same evaluator. The receipt is structurally identical.

  • a — paired

    One policy, two surfaces

    Authoring updates the evaluator and the human form together. They cannot drift; they are derived from the same object.

  • b — shareable

    Public link or inline

    Forms open inside the console or share via one-use token or counterparty password. The attester’s identity is captured at the moment.

  • c — uniform

    Same envelope, different actor

    Same canonical fields, same signature, same anchoring. A regulator cannot tell from the schema which receipts were attested by a person.

ALLOW
All policy checks passed

Receipt · 3420-B2E3 · same schema as automated path

Evaluated under
AML Final Disposition v1
Snapshot
286b44d5
Recorded
12 May 2026, 09:18:33
Actor
@l.okafor head of compliance
Source
FORMattestation · one-use token
Sealed record
07aa34b0…92d64cVerified
Anchored
#1517415516Anchored
Same canonical fields. Same signature. Same anchoring.Illustrative — schema is real; values are not.

§ 05Sequence

Most decisions are sequences. The console captures them as chains.

A chain is a hash-linked sequence where each step references the receipt of its parent. The chain seals when the workflow closes. Replay re-runs any decision against the policy in force when it was made. Export produces an offline-verifiable bundle.

  • a — linked

    Hash-linked, sealed

    Every step references the receipt of its parent. The sealed chain is itself a verifiable object; linkage is checked from one action.

  • b — replayed

    Original vs replayed hash

    Re-run any decision against the snapshot in force when it was made. Divergence surfaces as a hash mismatch — values shown side by side.

  • c — exported

    Self-contained bundle

    JSON or tar. Receipts, policy snapshots, public keys, canonical-JSON forms. Verifiable offline; no access to MeshQu required.

Decision Workflow

5a521615-f00… · 5 steps · May 12, 09:18 → May 12, 09:21

Chain sealed6b717f215ffcffa1…5 steps · group: AML_PROGRAMME @ v9
  1. 1
    ALLOW
    AML Sanctions & PEP ScreeningAML_SANCTIONS_SCREENING · ref 74EE-3FF4
    May 12, 09:18:26
  2. 2
    ALLOW
    AML Analyst ReviewAML_ANALYST_REVIEW · ref 1BA2-7701
    May 12, 09:18:30
  3. 3
    ATTESTED
    AML Tier-2 EscalationAML_TIER2_REVIEW · ref E7C1-2A48
    May 12, 09:19:08
  4. 4
    ALLOW
    Head of Compliance OverrideAML_OVERRIDE · ref B9F0-DD17
    May 12, 09:20:17
  5. 5
    ALLOW
    AML Final DispositionAML_FINAL_DISPOSITION · ref 3420-B2E3
    May 12, 09:21:33
Hash-linked. Verifiable from one action. Exportable as a bundle.Illustrative — schema is real; values are not.

§ 06Posture

A feedback loop into authoring — not a risk score or a traffic light.

Two surfaces read decisions back into policy. The dashboard reads the corpus through the regulation’s own vocabulary or through the institution’s programme structure. Per-policy and per-group health views summarise decision behaviour. No composite scores, no percentages.

  • a — regulation lens

    Clause-by-clause posture

    Each clause’s open queue, rendered in the regulation’s own words. Ratifications outstanding. Reviews awaiting authority.

  • b — group lens

    Programme-by-programme

    Each policy group as a card — current activity, pending ratifications, open chains. One synthesis sentence at the top.

  • c — scoped

    Your corpus, not the industry

    All posture views are strictly your tenant. No aggregation across customers, no benchmarks, no comparative views.

61 decisions awaiting review across 9 groups.

Today · 14 May 2026

6LD §11(2)Ongoing monitoring of business relationships.
  • 23
    Decisions awaiting reviewoldest 186 days, newest 20 days
  • 34
    Overdue outcomesmost common gap: value not greater than
  • 0
    Recent violationslow 0 · medium 0 · high 0 · critical 0
6LD §15(1)Enhanced due diligence — elevated-risk relationships.
  • 7
    Reviews awaiting authority↓ 2 this week · average age 14 days
  • 0
    Recent violationslow 0 · medium 0 · high 0 · critical 0
  • 4
    Open chains pending closureoldest 12 days
Counts before claims. No risk scores, no traffic lights, no benchmarks.Illustrative — schema is real; values are not.

→ Where next

The console produces the receipts. The receipts outlive the console.

Where to go next depends on what you want to understand more deeply.