/ README.org
README.org
1 #+title: Pi-Tokenomics 2 #+author: Xavier Brinon 3 #+date: [2026-04-19] 4 #+startup: indent 5 #+options: toc:2 num:nil ^:{} 6 7 * What This Is 8 9 A generalized framework for reasoning about the /token economics/ of 10 AI workflows — the tradeoffs between /intelligence per token/, /tokens 11 per dollar/, and /tokens per second/ as they play out across the 12 stages of any production AI pipeline. 13 14 The framework lifts the "production function" idea from AISLE's 15 [[https://aisle.com/blog/ai-cybersecurity-after-mythos-the-jagged-frontier][AI Cybersecurity After Mythos — the Jagged Frontier]] out of its 16 cybersec-specific container and asks: /what survives?/ 17 18 Short answer: the three metrics, the Pareto-frontier methodology, the 19 "no single model fits" claim, and two architectural patterns — 20 /Cheap fan-out → expensive fan-in/ and /Expensive plan → cheap 21 execution/. What does /not/ survive: named pipeline stages, cybersec 22 intelligence floors, domain-specific evals. 23 24 The framework replaces named stages with eight /stage-classifying 25 properties/ that determine which metric dominates for any stage of 26 any workflow. The result is prescriptive: for each stage, pick the 27 cheapest model on the Pareto frontier that clears the intelligence 28 floor /as implied by the property mix/. 29 30 * Why It Exists 31 32 Most production AI apps hardcode one model across every stage of a 33 pipeline. The framework argues this is doubly wasteful: frontier 34 prices on the bulk stages, and frontier-quality penalties on the 35 deep stages a single model cannot quite handle. The correct unit of 36 optimisation is the /stage/, not the /app/. 37 38 This repo is where that argument is being built, stress-tested, and 39 (eventually) turned into something publishable and/or operational. 40 41 * Contents 42 43 | File | Role | 44 |----------------------------+------------------------------------------------------------------------------------------| 45 | [[file:token_economics.org][=token_economics.org=]] | The framework. Metrics, properties, architectural patterns, four insights, open questions, directions for further exploration, downstream forks and research roadmap. | 46 | [[file:UBIQUITOUS_LANGUAGE.org][=UBIQUITOUS_LANGUAGE.org=]] | DDD-style glossary. Canonical terms, aliases to avoid, flagged ambiguities, example dialogue. | 47 48 * How to Read It 49 50 Depends on intent. 51 52 - First encounter, you want the thesis :: Read 53 [[file:token_economics.org][=token_economics.org=]] top to bottom. The =Origin= and =Three 54 Metrics= sections frame the argument; =Property Axes= is the core 55 move; =Architectural Patterns= and =Four Insights= are where the 56 framework becomes prescriptive. 57 - You are applying it to a real pipeline :: Start with the 58 [[file:UBIQUITOUS_LANGUAGE.org::*Example dialogue][example dialogue]] in the glossary (it shows the framework applied 59 to a TanStack loader audit), then jump to =Property Axes= and 60 =Architectural Patterns= in the main doc. 61 - You are editing or extending the framework :: Read the glossary 62 first — especially =Flagged ambiguities=. Several terms 63 (/orchestration/ vs /routing/, /accuracy/ vs /recall+precision/, 64 Cobb-Douglas vs Leontief) have open disagreements that new prose 65 should not re-introduce. 66 - You are picking up contributor work :: Start with =Downstream 67 Forks and Research Roadmap= in the main doc for the currently 68 prioritised work; fall back to =Directions for Further 69 Exploration= for the full idea well. Items are named, not 70 numbered, so they can be referred to by title. 71 72 * Status 73 74 Working document. The framework is coherent but not yet validated 75 against a real pipeline. /Open Questions/ in =token_economics.org= 76 flag the framework's most vulnerable spots — non-verifiable tasks, 77 Cobb-Douglas vs Leontief framing, agent-tool-level applicability, 78 maintainer trust as an external constraint. 79 80 No code yet. A research roadmap has been documented in =Downstream 81 Forks and Research Roadmap= of the main doc: three planned downstream 82 projects — a power-bar extension, a Pi-CrewLens plugin, and a 83 nano-analyzer per OWASP × tech stack — and a seven-step research 84 sequence that unblocks them. Current focus: /Operational metric 85 definitions/ (item 1); work not yet started. 86 87 * References 88 89 - AISLE article :: [[https://aisle.com/blog/ai-cybersecurity-after-mythos-the-jagged-frontier][AI Cybersecurity After Mythos — the Jagged Frontier]] 90 - Companion AISLE piece :: /System Over Model: Zero-Day Discovery at 91 the Jagged Frontier/ (referenced throughout the glossary)