LIM - Lawful Intent Model
Execution begins with intent. Reality begins with law.
Build systems where nothing executes unless it is: intended, authorized, valid in time, lawfully allowed, and provable.
LIM replaces APIs and permissions with intent-driven, law-governed execution.
What LIM Solves
Modern systems suffer from:
- Blind API execution (
POST /transfer) - Hidden business rules inside code
- No proof of why something happened
- Replay and stale execution risks
- AI executing unsafe or unintended actions
LIM Fixes This
With LIM, every action must pass:
- Identity verification
- Time validation
- Law enforcement
- Deterministic execution
- Proof generation
The Model
Interpretation note: the key words MUST, SHOULD, and MAY follow RFC 2119 semantics.
Intent + Identity + Time + Law -> Valid Execution -> Proof
No shortcuts. No hidden execution.
How LIM Works
1. Declare Intent
2. Sign with Identity (SoftID)
3. Validate Moment (TickAuth / TPS)
4. Check Law (Digital Fabric)
5. Execute (AXIS / IDEL)
6. Generate Proof (Loom)
7. Record (OpenLogs)
Every step is explicit. Every result is verifiable.
Intent-First Architecture
Traditional systems:
POST /create-order
LIM systems:
create_intent({
type: "order.create",
items: [...],
actor: "anchor_A",
time: "TPS.y27.M09.W03.D07"
})
Systems do not execute requests. Systems evaluate intents.
Law is Executable
In LIM, law is not documentation. Law is machine-readable and enforced before execution.
Each law is versioned and verifiable.
law "TRANSFER_LIMIT" {
condition: amount <= account.limit
onFail: reject("Limit exceeded")
}
Built for the AI Era
AI should not execute directly.
- AI suggests intent
- LIM validates and executes
Prevents hallucinated actions, unsafe automation, and silent failures.
Every Action Produces Proof
Execution creates a Thread (Writ):
- Who acted
- What intent was declared
- When it happened
- Which law applied
- What result occurred
Not just logs. Verifiable reality.
Designed for Composable Systems
- SoftID - identity ownership
- TickAuth - moment validation
- AXIS / IDEL - deterministic execution
- Loom - proof binding
- OpenLogs - immutable records
- Whisper / Field Protocol - intent transport
Why Engineers Choose LIM
- Deterministic execution flow
- Explicit validation pipeline
- No hidden business logic
- Built-in auditability
- Safer AI integration
- Cross-system trust
Minimal Example
const intent = createIntent({
type: "payment.transfer",
from: anchorA,
to: anchorB,
amount: 100
});
const result = await LIM.execute(intent);
if (result.valid) {
console.log(result.threadId); // proof of execution
}
Mental Model
LIM is not a framework.
- Execution standard
- Validation pipeline
- Law enforcement layer
- Proof generator
LIM turns software from code execution into lawful intent realization.
The Shift
Before LIM: systems execute requests.
After LIM: systems enforce intent.
What You Get
- Intent Engine
- Law Engine
- Time Validation Layer
- Execution Adapter (AXIS)
- Proof Generator (Loom integration)
LIM Core SDK
Install the TypeScript kernel:
npm i @nextera.one/lim-core
Package: @nextera.one/lim-core · Runtime mode support:
strict, permissive, dry-run, evaluate-only
Get Started
- Read the specification
- Install the SDK
- Define your first law
- Execute your first intent
Final Line
LIM is the gatekeeper of execution. If it is not lawful, it does not exist.
License
This standard content is published under CC BY 4.0.