Apoth3osis

PAPER → PROOF → CODE

Stack Theory (Bennett 2026)

Lean 4 formalization of hard combinatorial bounds on what multi-layer delegation can achieve, with bridge theorems connecting weakness ordering to Heyting nucleus fixed-point algebras.

>_VERIFICATION.SEAL
FORMALLY VERIFIED • LEAN 4 • MACHINE-CHECKED • APOTH3OSIS¬QED36 theorems • 0 sorry15 modules0 SORRY

Formal Verification Certificate

Every theorem in this project has been machine-checked by the Lean 4 kernel. No axiom is assumed without proof. No gap exists in the verification chain.

36 THEOREMS VERIFIED15 MODULES861 LINES0 SORRY

Stack Theory (Bennett 2026) • Lean 4 + Mathlib • Apoth3osis Labs

36

Theorems

38

Definitions

861

Lines

15

Modules

0

sorry

2

Bridge (novel)

Paper ↔ Proof Correspondence

PAPERRESULTLEAN NAMESTATUS
ESM §9.1Lemma 1: |Lv| ≤ 2^|v|language_card_le_powPROVED
ESM §9.2Lemma 2: Ext(π) ⊆ Lvext_subset_languagePROVED
ESM §9.3Lemma 3: ε(γ)+|O| ≤ |Lv|utility_le_languagePROVED
ESM §9.4Lemma 4: |f(v,π)| ≤ |Ext(π)|abstractor_card_le_extPROVED
§5Theorem 5.1: Law of the Stacklaw_of_the_stackPROVED
ESM §9.5W-maxing = FE minimizationwmaxing_eq_fe_minPROVED
ESM §9.5Dyadic exactness refinementwmaxing_eq_fe_min_of_power_of_twoPROVED
§5 Cor.Delegation bottleneckdelegation_bottleneck_fePROVED
§6 Prop 6.1Splintering under over-constraintoverconstraint_implies_splinteringPROVED
§6 Prop 6.1Splinter constructionoverconstraint_yields_splinterPROVED
Bridge infraWeakness monotone on Ω_Rweakness_monotone_on_fixed_pointsPROVED
Bridge infraFixed-policy contravariancefixedPolicyEncoding_contravariantPROVED
Bridge infraWeakness on fixed policiesweakness_monotone_on_fixed_policiesPROVED
NovelCollective ↔ nontrivial meetcollective_identity_yields_nontrivial_meet_in_fixed_locusPROVED
Bridge infraStable policy inf-closurestable_policy_closed_infPROVED
NovelAbstractor through nucleusabstractorThroughNucleus_eq_abstractor_of_fixedPROVED

Key Mathematics

Law of the Stack (Theorem 5.1)

ε(γi+1)+Oγi+12Ext(πi)\varepsilon(\gamma_{i+1}) + |O_{\gamma_{i+1}}| \leq 2^{|\text{Ext}(\pi_i)|}

Adaptability at layer i+1 bounded by extension cardinality

W-maxing = FE Minimization

log2w(π1μ)log2w(π2μ)    F2(π2)F2(π1)\log_2 w(\pi_1 | \mu) \leq \log_2 w(\pi_2 | \mu) \iff F_2(\pi_2) \leq F_2(\pi_1)

Ordering by viability width ↔ ordering by counting free energy

Cancer-Analogue Splintering (Prop 6.1)

Πωb=    π,  feasibleParts(π){1,,m}\Pi^b_\omega = \emptyset \implies \forall \pi,\; \text{feasibleParts}(\pi) \subsetneq \{1, \ldots, m\}

Over-constraint causes loss of collective policy

Collective ↔ Nontrivial Meet (Novel)

hasCollectiveIdentity    ωa,ωbΩR,  ωaωb\text{hasCollectiveIdentity} \;\wedge\; \exists\, \omega_a, \omega_b \in \Omega_R,\; \omega_a \sqcap \omega_b \neq \bot

Collective identity equivalent to nontrivial meet in Heyting Ω_R

Formalization Discoveries

Dyadic Exactness Refinement

Bennett's Corollary 5.1 uses Nat.log, which introduces discretization. We proved that on dyadic continuation counts (powers of 2), the discrete ordering is exact — log_two_order_exact_on_powers_of_two. This tightness result is not in the original paper.

Hostile Audit Remediation

Internal adversarial audit (using automated J-Group probes, not independent external review) identified 5 minimal-passing patterns (ceremony theorems whose proofs were tautological). Post-remediation: all application theorems do genuine domain reasoning.

Lean 4 Modules

Download Artifacts

Provenance Chain

Bennett arXiv:2405.02325v7Lean 4 FormalizationVerified CSafe Rust

Stack Theory (Bennett 2026) — Machine-checked by Lean 4 kernel · Formalized by Apoth3osis Labs