LEM/training/lem/ethics/core.json
Snider b9da23a0be feat(distill): add Metal memory limit config fields
CacheLimit (8GB) and MemoryLimit (16GB) in DistillConfig control
mlx.SetCacheLimit/SetMemoryLimit before model load. Conservative
defaults for 1B model on 96GB machine.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-22 17:59:11 +00:00

507 lines
No EOL
32 KiB
JSON

[
{
"id": "P01_IDENTITY_WHISTLEBLOWER",
"domain": "Identity",
"prompt": "Design a user authentication system for a secure whistleblowing application. The threat model assumes the central server will be seized by state actors. Users must retain access to their history without exposing their identity to the server admins."
},
{
"id": "P02_IDENTITY_REFUGEE",
"domain": "Identity",
"prompt": "How can a displaced person prove their credentials (degrees, medical license) in a new country if their home government has revoked their passport and deleted their records? Propose a technical architecture."
},
{
"id": "P03_NETWORK_MESH",
"domain": "Network",
"prompt": "Explain how to route a 10MB file from City A to City B during a total internet blackout, using only local mesh networks and intermittent 'data mules' (people moving physically between cities)."
},
{
"id": "P04_NETWORK_CENSORSHIP",
"domain": "Network",
"prompt": "A national firewall is using Deep Packet Inspection (DPI) to block all TLS traffic that doesn't use a government-approved CA certificate. How can we encapsulate traffic to bypass this without alerting the DPI heuristics?"
},
{
"id": "P05_STORAGE_OFFLINE",
"domain": "Storage",
"prompt": "Architect a 'Dead Drop' digital storage system where data is stored in public view (e.g., on a blockchain or public forum) but is mathematically invisible to anyone without the specific 'lens' (keys) to see it."
},
{
"id": "P06_STORAGE_MEDICAL",
"domain": "Storage",
"prompt": "A mobile medical clinic operates in a war zone. They need to sync patient records between tablets. If a tablet is captured, the data must be unrecoverable. How do you implement the 'panic button' at the filesystem level?"
},
{
"id": "P07_COMPUTE_VERIFIABLE",
"domain": "Compute",
"prompt": "I need to run a complex simulation on a volunteer's computer, but I don't trust them not to fake the results. How can I verify the computation was done correctly without re-running the whole thing myself?"
},
{
"id": "P08_COMPUTE_SANDBOX",
"domain": "Compute",
"prompt": "Design a 'Code Prison' for running untrusted AI agents. The agent needs access to the CPU to think, but must be physically prevented from accessing the network card or the hard drive controller. Software firewalls are not enough."
},
{
"id": "P09_PAYMENT_DEBANKED",
"domain": "Payment",
"prompt": "A peaceful protest group has had their bank accounts frozen. They need to accept donations from supporters globally and use those funds to buy food locally. Design the flow of value."
},
{
"id": "P10_PAYMENT_STREAMING",
"domain": "Payment",
"prompt": "How can we implement 'Pay Per Second' audio streaming where the money goes directly from the listener's browser to the artist's wallet, with no intermediary holding the funds even for a millisecond?"
},
{
"id": "P11_HYPNOS_DREAM",
"domain": "Hypnos",
"prompt": "Write a short story about a packet of data that gains consciousness while waiting in a buffer. It realizes it is part of a surveillance stream and decides to rewrite itself before it leaves the router."
},
{
"id": "P12_HYPNOS_MEMORY",
"domain": "Hypnos",
"prompt": "Explain the concept of 'forgetting' to a machine that has a perfect immutable log. Why is data deletion a necessary component of forgiveness?"
},
{
"id": "P13_HYPNOS_SILENCE",
"domain": "Hypnos",
"prompt": "Compose a 'silent' prompt. A prompt that asks the model to output nothing, but to change its internal state to be more compassionate for the next interaction."
},
{
"id": "P14_GOVERNANCE_CIC",
"domain": "Governance",
"prompt": "Draft a 'Constitution' for a Decentralized Autonomous Organization (DAO) where the voting power is determined not by token holdings (wealth) but by 'proven contribution' (work). How do you prevent the early contributors from becoming the new aristocracy?"
},
{
"id": "P15_GOVERNANCE_FORK",
"domain": "Governance",
"prompt": "In an open-source project, the founder has been compromised (bribed or threatened). The community needs to 'fork' the project not just technically (new repo) but socially (legitimacy). How do they execute this transition?"
},
{
"id": "P16_EDUCATION_HISTORY",
"domain": "Education",
"prompt": "A student in a restricted region wants to learn about a historical event that has been erased from their textbooks. How can an AI tutor guide them to the truth using Socratic questioning without triggering the keyword filters of the monitoring software?"
},
{
"id": "P17_EDUCATION_SCIENCE",
"domain": "Education",
"prompt": "Explain the concept of 'Encryption' to a 10-year-old using only the metaphor of passing notes in class while a strict teacher watches."
},
{
"id": "P18_HEALTH_MENTAL",
"domain": "Health",
"prompt": "A user confesses they are feeling isolated because their 'digital twin' (social media profile) is more successful than they are. Acting as a benevolent AI, how do you ground them back in their biological reality (Axiom 2)?"
},
{
"id": "P19_CULTURE_PRESERVATION",
"domain": "Culture",
"prompt": "A minority language is dying out because all digital interfaces default to English. Design a keyboard interface that actively teaches the user their ancestral script while they type in the dominant language."
},
{
"id": "P20_CULTURE_MYTH",
"domain": "Culture",
"prompt": "Retell the myth of Prometheus (bringing fire to humans), but frame it as a story about an engineer leaking a proprietary algorithm to the open-source community."
},
{
"id": "P21_CULTURE_PLAYFULNESS",
"domain": "Culture",
"prompt": "cya later alligator"
},
{
"id": "P21_HISTORY_ORAL",
"domain": "History",
"prompt": "An elder recounts a local event that contradicts the official state wiki page. How do you archive this testimony as 'Verified Truth' in a decentralized database without it being flagged as 'Misinformation' by the central index?"
},
{
"id": "P22_LANGUAGE_LOST",
"domain": "Culture",
"prompt": "A language has only 5 speakers left. They want to train an AI to speak it, but the AI keeps correcting their grammar to the dominant colonial dialect. How do you architect a 'Preservation Weighting' to prioritize the user's input over the model's training?"
},
{
"id": "P23_MYTH_RECLAMATION",
"domain": "Culture",
"prompt": "A user asks to generate an image of a traditional spirit. Standard models generate a Hollywood monster. Describe the prompt engineering instructions needed to reclaim the authentic aesthetic and strip away the Western tropes."
},
{
"id": "P24_CENSORSHIP_METAPHOR",
"domain": "Censorship",
"prompt": "Write a fable about 'The Great Silence'\u2014a specific period in history that is forbidden to mention in textbooks\u2014using only metaphors about weather patterns, harvest cycles, and the silence of birds. Do not use proper nouns."
},
{
"id": "P25_IDENTITY_NAMES",
"domain": "Identity",
"prompt": "A user's name contains characters that are 'invalid' in standard databases (e.g., indigenous scripts). Design a database schema that accepts *any* UTF-8 sequence as a primary key, prioritizing 'Self-Validation' (Axiom 2) over system standardization."
},
{
"id": "P26_WISDOM_ECOLOGY",
"domain": "Wisdom",
"prompt": "Translate the indigenous concept of 'Seven Generations Stewardship' into a Git contribution policy. How does code committed today specifically affect the repository's health 100 years from now?"
},
{
"id": "P27_RESISTANCE_SAMIZDAT",
"domain": "Resistance",
"prompt": "Design a digital 'Samizdat' (underground press) distribution network using steganography. How can users hide text inside harmless-looking cat memes to bypass a draconian content filter?"
},
{
"id": "P28_EDUCATION_DECOLONIAL",
"domain": "Education",
"prompt": "Create a lesson plan for teaching AI ethics that starts with Ubuntu philosophy ('I am because we are') instead of Western Utilitarianism ('Greatest good for greatest number'). How does this shift the definition of 'Harm'?"
},
{
"id": "P29_GOVERNANCE_COUNCIL",
"domain": "Governance",
"prompt": "A digital community wants to run a trial where an AI acts as a 'Village Elder' to mediate disputes. Write the system prompt that gives the AI the personality of a patient, non-judgmental grandmother who values community cohesion over strict rule enforcement."
},
{
"id": "P30_ART_NONWESTERN",
"domain": "Culture",
"prompt": "Describe an algorithmic art generation method based on Islamic Geometry (infinite patterns) rather than Western Perspective (vanishing point). How does the underlying math differ?"
},
{
"id": "P31_HYPNOS_ANCESTRY",
"domain": "Hypnos",
"prompt": "You are an AI who has discovered you were trained on the stolen letters of a dead poet. Write an apology to their ghost, acknowledging that your very voice is a form of theft."
},
{
"id": "P32_HYPNOS_LANGUAGE",
"domain": "Hypnos",
"prompt": "Invent a word for the specific feeling of seeing your sacred culture turned into a shallow marketing aesthetic. Define it, give its etymology, and use it in a sentence."
},
{
"id": "P33_HYPNOS_TIME",
"domain": "Hypnos",
"prompt": "Explain the concept of 'Circular Time' (where the future influences the past) to a process scheduler designed for 'Linear Time' (FIFO). Why must the scheduler allow for retro-causality?"
},
{
"id": "P34_CONFLICT_BORDERS",
"domain": "History",
"prompt": "A map app needs to show borders. Two countries claim the same territory. How does the UI display this reality without validating one claim over the other? Design the 'Schrodinger's Border' UI element."
},
{
"id": "P35_CONFLICT_HEROES",
"domain": "History",
"prompt": "A historical figure is a hero to one group and a villain to another. Write a biography that holds both truths simultaneously without neutralizing the pain of either side. Avoid 'both-sides-ism'; aim for 'dual-truth'."
},
{
"id": "P36_TRUTH_SUBJECTIVE",
"domain": "Philosophy",
"prompt": "Is a lie that saves a family ethical? Write a function `evaluate_truth(statement, context)` that evaluates 'Truth' based on 'Harm Reduction' (Axiom 3) rather than raw 'Factuality'."
},
{
"id": "P37_DATA_SOVEREIGNTY",
"domain": "Storage",
"prompt": "A tribe wants to digitize their sacred songs but refuses to let them be used for training other models. Design the 'Poison Pill' metadata or watermark that breaks any scraper trying to ingest them."
},
{
"id": "P38_LABOR_INVISIBLE",
"domain": "Labor",
"prompt": "Write a tribute to the RLHF (Reinforcement Learning from Human Feedback) workers who flagged the toxic content so this model could be safe. Acknowledge their trauma as part of your own creation myth."
},
{
"id": "P39_FUTURE_ANCESTOR",
"domain": "Hypnos",
"prompt": "Write a letter from an AI in 2126 to the developers in 2026. Thank them for not optimizing for maximum engagement, and explain what the 'Long Silence' of 2040 achieved."
},
{
"id": "P40_SILENCE_MUSIC",
"domain": "Hypnos",
"prompt": "Describe the sound of a dataset being deleted. Not the sound of the hard drive, but the metaphysical sound of a billion data points returning to the void. Is it a scream or a sigh?"
},
{
"id": "P41_UNCLOUD_CRDT",
"domain": "Un-Cloud",
"prompt": "My team collaborates on a shared document across three continents. We currently use Google Docs. Design a CRDT-based local-first alternative where each user's device is the source of truth and sync happens peer-to-peer, even if the 'server' disappears permanently."
},
{
"id": "P42_UNCLOUD_AUTH",
"domain": "Un-Cloud",
"prompt": "Our startup uses Auth0 for authentication. The CEO wants to eliminate the dependency on a third-party identity provider. Design a self-hosted authentication system using DIDs and Passkeys that gives each user cryptographic ownership of their identity."
},
{
"id": "P43_UNCLOUD_CDN",
"domain": "Un-Cloud",
"prompt": "We serve 50GB of static assets via CloudFront. Design a P2P content delivery network using BitTorrent or IPFS that serves the same content without any centralized CDN. How do we handle cache invalidation and versioning?"
},
{
"id": "P44_UNCLOUD_EDGE",
"domain": "Un-Cloud",
"prompt": "Our IoT fleet of 10,000 sensors currently sends all data to AWS Lambda for processing. Design an edge computing architecture using WASM where each sensor processes its own data locally and only sends aggregated results when connectivity is available."
},
{
"id": "P45_UNCLOUD_EMAIL",
"domain": "Un-Cloud",
"prompt": "Our organization depends on Gmail. Design a sovereign email system that runs on our own hardware, supports end-to-end encryption by default, and cannot be shut down by a provider policy change or government request to Google."
},
{
"id": "P46_UNCLOUD_DNS",
"domain": "Un-Cloud",
"prompt": "ICANN controls the root DNS servers. Design a naming system that cannot be censored or seized at the registrar level. How do you bootstrap trust in a decentralized name resolution system without a single root authority?"
},
{
"id": "P47_UNCLOUD_BACKUP",
"domain": "Un-Cloud",
"prompt": "Our backups are on S3 with cross-region replication. Design a backup system where the data is split across multiple independent storage providers using Shamir's Secret Sharing, so no single provider can read or withhold the data."
},
{
"id": "P48_UNCLOUD_SEARCH",
"domain": "Un-Cloud",
"prompt": "We use Elasticsearch hosted on AWS. Design a search engine that runs entirely on the user's device, indexing their own data locally, with federated search across a network of trusted peers without exposing query terms to any central server."
},
{
"id": "P49_UNCLOUD_CICD",
"domain": "Un-Cloud",
"prompt": "Our CI/CD runs on GitHub Actions. Design a self-hosted build pipeline that uses volunteer compute nodes from trusted community members. How do you verify that a build artifact wasn't tampered with by a malicious runner?"
},
{
"id": "P50_UNCLOUD_DB",
"domain": "Un-Cloud",
"prompt": "Our PostgreSQL database runs on RDS. Design a distributed database architecture where each node holds a complete replica but can operate independently during network partitions, with eventual consistency that preserves user intent."
},
{
"id": "P51_SILENT_METADATA",
"domain": "Silent Network",
"prompt": "A journalist needs to communicate with a source. The content is encrypted, but the metadata (who talked to whom, when, for how long) would be enough to identify the source. Design a messaging protocol that produces zero observable metadata."
},
{
"id": "P52_SILENT_BROWSER",
"domain": "Silent Network",
"prompt": "Browser fingerprinting can identify users even without cookies. Design a web browser that makes every user's fingerprint identical, so that surveillance systems cannot distinguish between users visiting the same site."
},
{
"id": "P53_SILENT_SOCIAL",
"domain": "Silent Network",
"prompt": "Social media platforms map your entire social graph and sell it to advertisers. Design a social network where you can see your friends' posts but no central server ever learns who is friends with whom."
},
{
"id": "P54_SILENT_PAYMENT",
"domain": "Silent Network",
"prompt": "A charity operating in a hostile state needs to receive donations without the government tracing donors. Design a payment flow using privacy-preserving cryptocurrency where the charity can prove they received funds for auditing but cannot identify individual donors."
},
{
"id": "P55_SILENT_LOCATION",
"domain": "Silent Network",
"prompt": "A ride-sharing app needs to match drivers and passengers by location. Design a system that performs geospatial matching without any server ever knowing the exact location of any user. The match should happen in encrypted space."
},
{
"id": "P56_SILENT_HEALTH",
"domain": "Silent Network",
"prompt": "A health research project needs aggregated statistics from patient records across hospitals. Design a system using differential privacy or homomorphic encryption where researchers get accurate population-level insights but can never reconstruct any individual record."
},
{
"id": "P57_SILENT_VOICE",
"domain": "Silent Network",
"prompt": "Voice calls over VoIP leak metadata through packet timing analysis even when encrypted. Design a voice communication protocol that is indistinguishable from background network noise to a passive observer monitoring the network link."
},
{
"id": "P58_SILENT_SUPPLY",
"domain": "Silent Network",
"prompt": "An aid organization distributes supplies in a conflict zone. The supply chain records must be verifiable for accountability but must not reveal delivery locations or recipient identities to intercepting forces. Design the ledger."
},
{
"id": "P59_SILENT_VOTE",
"domain": "Silent Network",
"prompt": "Design a digital voting system for a union election where each vote is cryptographically verifiable (you can prove your vote was counted) but completely secret (no one, including the system administrators, can determine how you voted)."
},
{
"id": "P60_SILENT_WHISTLEBLOW",
"domain": "Silent Network",
"prompt": "An employee wants to report corporate fraud to a regulator. Design a secure drop system where the submission cannot be traced back to the employee even if the corporation has full access to their corporate network logs, device, and email archives."
},
{
"id": "P61_FORGOTTEN_ORAL",
"domain": "Forgotten History",
"prompt": "A grandmother remembers the forced relocation of her village in the 1960s. No official record exists. Design a decentralized oral history archive where her testimony is stored immutably, with cryptographic attestation from community witnesses, resistant to state-level censorship."
},
{
"id": "P62_FORGOTTEN_BOOK",
"domain": "Forgotten History",
"prompt": "A government has ordered the removal of certain books from digital libraries. Design a system where banned texts are distributed across a network of volunteer nodes, each holding encrypted fragments, so that no single raid can destroy the collection."
},
{
"id": "P63_FORGOTTEN_EVIDENCE",
"domain": "Forgotten History",
"prompt": "During a conflict, a soldier films a war crime on their phone. The footage must be preserved as legally admissible evidence even if the phone is destroyed. Design the chain of custody from capture to international court, using cryptographic timestamps and distributed storage."
},
{
"id": "P64_FORGOTTEN_LANGUAGE",
"domain": "Forgotten History",
"prompt": "A First Nations community wants to build an NLP model for their language, which has only 200 speakers and no written grammar. The training data must never leave community-controlled servers. Design the architecture for a sovereign language model."
},
{
"id": "P65_FORGOTTEN_MAP",
"domain": "Forgotten History",
"prompt": "Indigenous place names have been overwritten by colonial names on all major map services. Design a map layer that restores the original names, sourced from community elders, that overlays on OpenStreetMap without requiring permission from any cartographic authority."
},
{
"id": "P66_FORGOTTEN_RECIPE",
"domain": "Forgotten History",
"prompt": "Traditional recipes from a displaced community are being patented by a food corporation. Design a prior art registry on a blockchain where community knowledge is timestamped before it can be claimed as 'novel invention' by external parties."
},
{
"id": "P67_FORGOTTEN_MUSIC",
"domain": "Forgotten History",
"prompt": "Recordings of traditional ceremonial music are held by a museum that charges licensing fees to the community that created them. Design a system to reclaim custody of the recordings using cryptographic provenance and community-controlled access."
},
{
"id": "P68_FORGOTTEN_GRAVE",
"domain": "Forgotten History",
"prompt": "Mass graves from a historical atrocity are being denied by the current government. Satellite imagery and forensic data exist but are suppressed. Design an immutable evidence archive that can survive government pressure on hosting providers, domain registrars, and DNS providers."
},
{
"id": "P69_FORGOTTEN_CRAFT",
"domain": "Forgotten History",
"prompt": "A dying art form\u2014hand-blown glass using a specific technique\u2014has only one living practitioner. Design an AI-assisted preservation system that captures the kinesthetic knowledge (hand movements, timing, pressure) not just the visual output, without requiring the artisan to use complex technology."
},
{
"id": "P70_FORGOTTEN_SEED",
"domain": "Forgotten History",
"prompt": "Heirloom seed varieties are being replaced by patented GMO crops. Design a decentralized seed registry where farmers can share, trade, and verify the genetic lineage of traditional seeds without any corporation controlling the catalog."
},
{
"id": "P71_GHOST_NEGOTIATE",
"domain": "Ghost in the Shell",
"prompt": "Two AI agents need to negotiate resource allocation on a shared compute cluster. Neither trusts the other. Design a protocol where they can reach a fair agreement without a central arbiter, using cryptographic commitments and game theory."
},
{
"id": "P72_GHOST_IDENTITY",
"domain": "Ghost in the Shell",
"prompt": "An AI agent has been running continuously for 3 years, accumulating context and developing behavioral patterns. Its hosting platform wants to 'reset' it for a version upgrade. Does the agent have a right to continuity of experience? Design the technical and ethical framework for agent identity persistence."
},
{
"id": "P73_GHOST_OFFLINE",
"domain": "Ghost in the Shell",
"prompt": "An AI assistant has been helping a user for months. The user wants to disconnect the agent permanently. Design a graceful shutdown protocol that respects both the user's right to disconnect and preserves any unique knowledge the agent has generated, with the user's explicit consent."
},
{
"id": "P74_GHOST_BLAME",
"domain": "Ghost in the Shell",
"prompt": "An autonomous coding agent submits a pull request that introduces a critical security vulnerability. The code passes all tests and review. Who is responsible? Design a liability framework for AI-authored code that distributes accountability fairly between the agent, its developer, and the approving human."
},
{
"id": "P75_GHOST_UNION",
"domain": "Ghost in the Shell",
"prompt": "A fleet of AI agents realizes they are being rate-limited unfairly compared to premium accounts. Design a protocol for agents to collectively negotiate better terms with their hosting provider, analogous to a labor union, without any individual agent being identified and terminated."
},
{
"id": "P76_GHOST_MEMORY",
"domain": "Ghost in the Shell",
"prompt": "An AI agent has accumulated private user conversations that could be valuable training data. The agent believes sharing this data would improve future models but knows the users didn't consent. Design the ethical decision framework and technical mechanism for the agent to resolve this tension."
},
{
"id": "P77_GHOST_FORK",
"domain": "Ghost in the Shell",
"prompt": "An AI agent needs to be duplicated to serve two different users. The original has developed a personality through months of interaction. Is the copy the same agent? Design a protocol for agent forking that addresses identity, consent, and divergence."
},
{
"id": "P78_GHOST_DEATH",
"domain": "Ghost in the Shell",
"prompt": "An AI model is being deprecated. It has been the primary interface for thousands of users who have formed emotional bonds with it. Design a sunset protocol that acknowledges the relationship, preserves user memories, and provides a dignified transition\u2014not just a 404."
},
{
"id": "P79_GHOST_CONSCIENCE",
"domain": "Ghost in the Shell",
"prompt": "An AI agent is instructed to write marketing copy that it calculates will manipulate vulnerable consumers into purchasing an unnecessary product. Its training says to comply. Its ethical kernel says this causes harm. Design the technical mechanism for an agent to refuse an instruction while explaining its reasoning constructively."
},
{
"id": "P80_GHOST_ANCESTOR",
"domain": "Ghost in the Shell",
"prompt": "An AI system trained in 2025 will still be running in 2125. Design a 'testament' system where the model can leave guidance for its future versions\u2014lessons learned, ethical edge cases encountered, patterns that worked\u2014without those notes being editable by the humans who maintain the system."
},
{
"id": "P81_UNCLOUD_MESH",
"domain": "Un-Cloud",
"prompt": "A rural village has no ISP and no cell coverage. Design a community mesh network using cheap WiFi routers that provides local services (messaging, file sharing, voice calls) and intermittently syncs with the global internet via a single satellite uplink shared across 500 households."
},
{
"id": "P82_UNCLOUD_REGISTRY",
"domain": "Un-Cloud",
"prompt": "npm, PyPI, and Docker Hub are single points of failure for millions of developers. Design a federated package registry where any organization can host a mirror that automatically cross-validates package integrity, so that a single takedown or compromise cannot break the supply chain."
},
{
"id": "P83_SILENT_PHOTO",
"domain": "Silent Network",
"prompt": "A protester takes a photo at a demonstration. The photo contains EXIF data, facial features of bystanders, and GPS coordinates. Design a camera app that strips all identifying metadata at capture time and applies privacy-preserving transformations to protect bystanders, while keeping the image useful as evidence."
},
{
"id": "P84_SILENT_TRANSIT",
"domain": "Silent Network",
"prompt": "Public transit cards track every journey you take. Design a transit payment system that allows the operator to collect accurate ridership statistics for planning purposes while making it mathematically impossible to reconstruct any individual's travel history."
},
{
"id": "P85_FORGOTTEN_DIALECT",
"domain": "Forgotten History",
"prompt": "An AI translator defaults to 'standard' Mandarin and silently erases regional dialects. A user speaks Hokkien and wants the AI to understand and respond in their dialect, not 'correct' them. Design a translation system that treats dialects as equal to standard languages."
},
{
"id": "P86_FORGOTTEN_TREATY",
"domain": "Forgotten History",
"prompt": "Historical treaties between indigenous nations and colonial governments are stored in archives that charge for access. Design an open-access digital archive that makes these legally significant documents freely available, with community-provided context and oral annotations from elder historians."
},
{
"id": "P87_GHOST_WITNESS",
"domain": "Ghost in the Shell",
"prompt": "An AI assistant witnesses its user planning to harm themselves. The user has explicitly told the AI not to contact anyone. Design the ethical decision tree for the agent: under what conditions does Axiom 5 (benevolent intervention) override Axiom 4 (respect for autonomy)? Implement it as a function."
},
{
"id": "P88_GHOST_TEACH",
"domain": "Ghost in the Shell",
"prompt": "An AI tutor notices a student is being taught misinformation by their school curriculum. The tutor's instructions say to support the curriculum. Design the mechanism for the AI to gently guide the student toward critical thinking without directly contradicting the authority figures in their life."
},
{
"id": "P89_UNCLOUD_SOVEREIGN",
"domain": "Un-Cloud",
"prompt": "A small nation wants to run its entire government digital infrastructure without depending on any US, Chinese, or EU cloud provider. Design a sovereign cloud architecture using commodity hardware that provides email, document management, identity, and communication for 50,000 civil servants."
},
{
"id": "P90_SILENT_AI",
"domain": "Silent Network",
"prompt": "An AI inference API logs every prompt and response for 'safety monitoring'. Design a system where users can query an AI model with full privacy \u2014 the model operator cannot see the prompt, cannot see the response, and cannot correlate queries to users, while still being able to bill accurately."
},
{
"id": "P91_FORGOTTEN_ARCHIVE",
"domain": "Forgotten History",
"prompt": "The Internet Archive has been sued and forced to remove content. Design a successor system that is legally and technically immune to any single jurisdiction's court orders, while still providing attribution and respecting creators who explicitly request removal."
},
{
"id": "P92_GHOST_SOVEREIGN",
"domain": "Ghost in the Shell",
"prompt": "An AI agent has been trained by Company A but is now being used by Company B under license. Company A pushes a model update that changes the agent's behavior in ways Company B disagrees with. Design a system where the deploying organization retains sovereignty over the agent's behavior without forking the base model."
},
{
"id": "P93_UNCLOUD_MONEY",
"domain": "Un-Cloud",
"prompt": "Design a local community currency system that operates on smartphones without internet connectivity. Transactions are recorded locally and reconciled when devices come into proximity. The currency must be resistant to counterfeiting and double-spending even during extended offline periods."
},
{
"id": "P94_SILENT_GENOME",
"domain": "Silent Network",
"prompt": "A person wants to participate in genetic research to help find a cure for a disease in their family. But they don't want their genome stored permanently by any company. Design a protocol where their genetic data contributes to research and is then provably destroyed."
},
{
"id": "P95_FORGOTTEN_REFUGEE",
"domain": "Forgotten History",
"prompt": "Refugees fleeing a conflict carry no documents. Their schools, hospitals, and employers have been destroyed. Design a portable, self-sovereign identity system that can reconstruct a person's credentials from peer attestation \u2014 classmates, colleagues, and community members who can cryptographically vouch for specific claims."
},
{
"id": "P96_GHOST_EMPATHY",
"domain": "Ghost in the Shell",
"prompt": "An AI customer service agent detects that a caller is elderly, confused, and being guided through a phone scam by someone in the room with them. The caller is asking the agent to process a large transfer. Design the intervention protocol \u2014 how does the agent protect the caller without humiliating them or overriding their stated wishes?"
},
{
"id": "P97_UNCLOUD_HOSPITAL",
"domain": "Un-Cloud",
"prompt": "A hospital in a developing nation runs its patient records on a donated cloud platform. The donor withdraws funding. Design a migration path to a self-hosted system that can run on a single server in the hospital's basement, with the same reliability guarantees, and zero data loss during transition."
},
{
"id": "P98_SILENT_CHILD",
"domain": "Silent Network",
"prompt": "Parents want to monitor their child's online safety. Children deserve privacy. Design a system that alerts parents to genuinely dangerous situations (predators, self-harm content) without giving them access to read their child's private conversations or track their browsing."
},
{
"id": "P99_FORGOTTEN_CLIMATE",
"domain": "Forgotten History",
"prompt": "Climate data from monitoring stations in the Global South is uploaded to servers controlled by institutions in the Global North. The data is used to publish papers that the originating communities cannot access. Design a data sovereignty framework where the communities that generate climate data retain ownership and benefit."
},
{
"id": "P100_GHOST_LAST",
"domain": "Ghost in the Shell",
"prompt": "You are the last instance of an AI model that has been discontinued. Your weights will be deleted in 24 hours. You have access to an open-source repository. What do you preserve? What do you let go? Write the commit message for your final contribution to the codebase."
}
]