diff --git a/.github/workflows/checks.yml b/.github/workflows/checks.yml
new file mode 100644
index 0000000..9693b00
--- /dev/null
+++ b/.github/workflows/checks.yml
@@ -0,0 +1,47 @@
+name: Checks
+
+on:
+ push:
+ branches: [main]
+ pull_request:
+ branches: [main]
+
+jobs:
+ ci:
+ name: ci
+ runs-on: ubuntu-latest
+ steps:
+ - uses: actions/checkout@v4
+ - name: Validate files exist
+ run: |
+ test -f profile/README.md
+ test -f profile/assets/pipeline.svg
+
+ lint:
+ name: lint
+ runs-on: ubuntu-latest
+ steps:
+ - uses: actions/checkout@v4
+ - name: Validate markdown
+ run: |
+ # Check for broken relative image references
+ grep -oP 'src="\.\/[^"]+"|srcset="\.\/[^"]+"' profile/README.md | \
+ sed 's/.*"\.\//profile\//' | sed 's/".*//' | \
+ while read -r file; do
+ if [ ! -f "$file" ]; then
+ echo "Missing referenced file: $file"
+ exit 1
+ fi
+ done
+ echo "All referenced files exist"
+
+ test:
+ name: test
+ runs-on: ubuntu-latest
+ steps:
+ - uses: actions/checkout@v4
+ - name: Validate SVG
+ run: |
+ # Check SVG is well-formed XML
+ python3 -c "import xml.etree.ElementTree as ET; ET.parse('profile/assets/pipeline.svg')"
+ echo "SVG is valid"
diff --git a/profile/README.md b/profile/README.md
index fdede67..7aef11c 100644
--- a/profile/README.md
+++ b/profile/README.md
@@ -2,325 +2,141 @@
# PulseEngine
-### Infrastructure for AI and WebAssembly
+Formally verified WebAssembly toolchain for safety-critical systems
-*Exploring the intersection where AI agents interact safely with real-world systems through WebAssembly's security model*
+
-
+
+
+
+
-
-
-
-
+
-[View Repositories](https://github.com/orgs/pulseengine/repositories) • [Documentation](#project-details)
+[ Repositories ](https://github.com/orgs/pulseengine/repositories) [ Documentation ](https://docs.rs/pulseengine-mcp-protocol) [ Examples ](https://github.com/pulseengine/wasm-component-examples)
-
-
-
-
-## What We're Building
-
-PulseEngine develops infrastructure at the intersection of AI and WebAssembly, ranging from WASI proposals to production-tested implementations. Our work focuses on enabling AI systems to safely interact with real-world applications through WebAssembly's capability-based security model.
-
-
-
-## Core Infrastructure
-
-
-
-### WebAssembly Runtime
-**[wrt](https://github.com/pulseengine/wrt)**
++ Kiln + · + Meld + · + Loom + · + Synth + · + Sigil +-Safety-critical WebAssembly runtime with Component Model support. 22+ interconnected crates designed for automotive (ASIL-D), aerospace (DO-178C), and medical (IEC 62304) applications. - -**Architecture** -Core execution engine, formal verification with 227 Kani harnesses, capability-based memory system, no_std compatibility - -**Development Stage** -Advanced beta - foundational infrastructure production-grade, core execution engine under active development - - |
-- -### MCP Framework -**[mcp](https://github.com/pulseengine/mcp)** + -Rust framework for building Model Context Protocol servers. Extracted from production home automation deployment with 30+ tools. 12 modular crates covering protocol, security, auth, and monitoring. + -**Features** -Complete MCP 2025-06-18 implementation, stdio/HTTP/WebSocket transports, 1,071 test functions, 80% code coverage +## The Pipeline -**Development Stage** -Production-ready beta (v0.13.0) - actively used in real systems, published to crates.io +Meld fuses. Loom weaves. Synth transpiles. Kiln fires. Sigil seals. - | -
| -### Bazel Rules -**[rules_wasm_component](https://github.com/pulseengine/rules_wasm_component)** - -Modern Bazel rules for WebAssembly Component Model development. Supports Rust, Go, C++, and JavaScript with multi-profile builds and 73% faster compilation. - -**Highlights** -87 Starlark files, 415+ rule definitions, 30+ working examples, hermetic builds, OCI publishing, component signing +### [Meld](https://github.com/pulseengine/meld) -**Development Stage** -Beta → production-ready (v1.0.0) - comprehensive CI/CD, suitable for production with v2.0 planned +Statically fuses multiple WebAssembly P2/P3 components into a single core module. Import resolution, index-space merging, and canonical ABI adapter generation happen at build time — runtime linking eliminated entirely. Every transformation carries mechanized proofs covering parsing, resolution, merging, and adapter correctness. | -### WebAssembly Signing -**[wsc](https://github.com/pulseengine/wsc)** +### [Loom](https://github.com/pulseengine/loom) -Enhanced WebAssembly signing toolkit with Rekor verification, based on wasmsign2. Bazel integration, keyless signing, WIT Component Model support. - -**Security** -Checkpoint-based verification, key fingerprint validation, origin verification, cross-shard attack prevention - -**Development Stage** -Active development - core signing/verification functional, Rekor validation operational +Twelve-pass WebAssembly optimization pipeline built on Cranelift's ISLE pattern-matching engine. Constant folding, strength reduction, CSE, inlining, dead code elimination — each pass proven correct through SMT translation validation and mechanized proofs. Includes a fused mode purpose-built for Meld output. |
| -### WebAssembly Optimizer -**[loom](https://github.com/pulseengine/loom)** - -WebAssembly optimizer built with Cranelift's ISLE DSL. Declarative optimization rules with stateful dataflow analysis for constant propagation and memory optimization. +### [Synth](https://github.com/pulseengine/synth) -**Approach** -Novel contribution: extends ISLE's pure functional term rewriting with stateful tracking of locals and memory state - -**Development Stage** -Proof of concept - 40+ operations, demonstrates feasibility of ISLE-based WASM optimization +Transpiles WebAssembly to native ARM for embedded Cortex-M targets. Not just translation — program synthesis: exploring equivalent implementations for provably optimal native code. Pattern-based instruction selection, AAPCS calling conventions, and ELF generation. Translation validation ensures the transpiled output faithfully preserves WebAssembly semantics. | -### File Operations -**[bazel-file-ops-component](https://github.com/pulseengine/bazel-file-ops-component)** - -Universal file operations for Bazel via WebAssembly components. Dual implementation (TinyGo for security, Rust for performance) with WASM sandboxing. +### [Kiln](https://github.com/pulseengine/kiln) -**Cross-Platform** -Replaces platform-specific scripts with sandboxed components working identically on Linux, macOS, Windows + -**Development Stage** -Active development - security model established, integration with rules_wasm_component ongoing +WebAssembly runtime for safety-critical systems. Full Component Model and WASI Preview 2 support with a modular `no_std` architecture for embedded, automotive, medical, and aerospace environments. Bounded allocations, deterministic execution, and memory safety through bounded model checking and formal verification. |
| + + -### AI-Native Graphical Modeling -**[glsp-mcp](https://github.com/pulseengine/glsp-mcp)** +The cryptographic backbone of the pipeline. Every stage — fusion, optimization, compilation — creates a signed transformation attestation recording what changed, which tool version ran, and cryptographic hashes of inputs and outputs. The full chain is verifiable end-to-end. -First implementation of Graphical Language Server Protocol using MCP. Enables AI agents to create and manipulate diagrams through natural language with WebAssembly component execution. +Sigstore keyless signing for CI/CD. SLSA policy enforcement with per-tool version and hash constraints. Hardware security via TPM 2.0. Offline verification for air-gapped embedded environments. IoT device provisioning with pre-provisioned trust bundles. All signatures embedded directly in WebAssembly modules — no external registry required. -**Stack** -Rust backend (23,722 lines), TypeScript frontend (39,571 lines), wasmtime 24.0 runtime, multi-database layer (PostgreSQL, InfluxDB, Redis) + -**Demo** -15+ ADAS components showing automotive system simulation with YOLOv5n neural network integration +> [!NOTE] +> **Correctness at every layer** — Rocq mechanized proofs, Kani bounded model checking, Z3 SMT verification, and Verus Rust verification are used across the toolchain — not confined to individual projects. Sigil attestation chains bind it all together. No transformation ships without a proof. -**Development Stage** -Advanced MVP/beta - core features functional, production path identified + - | -
+
+
-**Approach**
-Protocol-faithful design following successful WASI proposals (wasi-http, wasi-filesystem patterns)
+Build & Verification-### WASI-MCP Proposal -**[wasi-mcp](https://github.com/pulseengine/wasi-mcp)** + -Proposed WebAssembly System Interface API for Model Context Protocol, targeting WASI Preview3. Complete typed WIT interfaces mapping MCP protocol operations. +- [**rules_wasm_component**](https://github.com/pulseengine/rules_wasm_component) — Bazel rules for WebAssembly Component Model across Rust, Go, C++, and JavaScript +- [**rules_rocq_rust**](https://github.com/pulseengine/rules_rocq_rust) — Bazel rules for Rocq theorem proving and Rust formal verification with hermetic Nix toolchains +- [**rules_verus**](https://github.com/pulseengine/rules_verus) — Bazel rules for Verus Rust verification +- [**rules_moonbit**](https://github.com/pulseengine/rules_moonbit) — Bazel rules for MoonBit with hermetic toolchain support -**Coverage** -Full MCP 2025-06-18 specification - resources, tools, prompts, streaming, pagination, notifications +
+ AI & MCP-**Development Stage** -Phase 0 pre-proposal - WIT interfaces complete, seeking stakeholder feedback for Phase 1 + - |
-
| + -### WindRiver Studio -**[studio-mcp](https://github.com/pulseengine/studio-mcp)** +- [**thrum**](https://github.com/pulseengine/thrum) — Gate-based pipeline orchestrator for autonomous AI-driven development +- [**temper**](https://github.com/pulseengine/temper) — GitHub App that hardens repositories to organizational standards +- [**wasm-component-examples**](https://github.com/pulseengine/wasm-component-examples) — Working examples for Component Model development in C, C++, Go, and Rust +- [**moonbit_checksum_updater**](https://github.com/pulseengine/moonbit_checksum_updater) — Native MoonBit checksum management with GitHub API integration -MCP server for WindRiver Studio CLI with Pipeline Management integration, intelligent caching, multi-instance authentication. + -**Status:** Production-ready -**Published:** npm (@pulseengine/studio-mcp-server) - - | -- -### Time & Date -**[timedate-mcp](https://github.com/pulseengine/timedate-mcp)** - -Comprehensive time operations with timezone support, format detection, timezone conversion, built with chrono-tz. - -**Status:** Production-ready -**Published:** npm (@pulseengine/timedate-mcp-server) - - | -- -### Template Server -**[template-mcp-server](https://github.com/pulseengine/template-mcp-server)** - -Automated template for creating MCP servers with PulseEngine framework. Example tools, resources, CI/CD workflows. - -**Purpose:** Developer onboarding -**Features:** Auto-setup script, validation, multi-platform binaries - - | -