Skip to content

Examples Catalog

A complete index of concrete examples throughout the framework.


Full worked examples showing pattern application.

ExampleLocationPatterns DemonstratedComplexity
Research AssistantLinkEscalation ladder, checkpoints, human-in-the-loopMedium
Trading SystemLinkRisk budgets, circuit breakers, blast radius containmentHigh
Healthcare BotLinkOutput filtering, human review, least-contextHigh
Code DeploymentLinkSandboxing, rollback, staged deploymentMedium

Multi-pattern architectures from Composing Patterns.

ArchitecturePatterns CombinedUse Case
Layered VerificationGateway + Ghost Checker + Human EscalationCustomer-facing content generation
Autonomous Agent SafetyLeast-X + Tripwires + Checkpoint-Rollback + Kill SwitchSelf-directed task completion
Multi-Agent CollaborationSeparation of Powers + Rotating Validator + Adversarial CollaborationAI-to-AI verification systems

Real or realistic examples of AI system incidents and successes.

Case StudyLocationTypeKey Lessons
Sydney IncidentLinkIncidentPersona drift, insufficient constraints
Code Review BotLinkSuccessGradual autonomy, tripwire monitoring
Near-MissLinkNear-missDetection mechanisms, recovery
Capability DriftLinkFailureMonitoring gaps, trust miscalibration
Anti-PatternsLinkAnalysisCommon failure modes

Historical examples from human organizations.

Case StudyLocationDomainFramework Application
Nuclear Launch AuthorityLinkMilitarySeparation of powers, human escalation
Open Source TrustLinkSoftwareDistributed verification, reputation
Organizational TrustLinkCorporateDelegation hierarchies, monitoring
Jury TrustLinkLegalVerification, independence
Criminal TrustLinkAdversarialDefection detection, incentives
Alliance CascadesLinkGeopoliticalEntanglement, cascade failures
Oversight DilemmaLinkRegulatoryMonitoring costs, capture
Trust Across CivilizationsLinkHistoricalCross-cultural trust mechanisms

Multi-part fictional case study exploring advanced scenarios.

ChapterLocationFocus
OverviewLinkIntroduction to the scenario
Containing Mr. XLinkContainment strategies
Mr. X PerspectiveLinkAdversarial agent viewpoint
Task ArchitectureLinkSystem design under constraints
Protocol CatalogLinkOperational protocols
Insurance Bot SpecLinkRisk quantification system
Power StrugglesLinkAuthority and control
Five Years LaterLinkLong-term evolution
Year TenLinkExtended consequences

Examples embedded within theory sections.

ExampleLocationIllustrates
Delegation Walk-ThroughLinkStep-by-step risk calculation
Exposure CascadeLinkRisk flow through chains
Power Dynamics CasesLinkPower formalization in practice

Examples from other fields that inform the framework.

DomainLocationRelevant Patterns
AviationEntanglements Case StudiesFailure correlation, redundancy
FinanceEntanglements Case StudiesSystemic risk, circuit breakers
NuclearHuman Systems CasesTwo-person rule, escalation
MedicalCross-Domain MethodsSecond opinions, checklists

Start here if you’re new to the framework:

Once you understand the basics:

For deep understanding: